6 research outputs found

    Future of Human Security Based on Computational Intellegence

    Get PDF
    This paper discusses the contact less palm veinauthentication device that uses blood vessel patterns as a personal identifying factor. The vein information is hard to duplicate since veins are internal to the human Body. This paper presents a review on the palm vein authentication process and its relevance and competence as compared to the contemporary Biometric methods. Th is authentication technology offers a high level of Accuracy. The importance of biometrics in the current field of Security has been illustrated in this paper. We have also outlined opinions about the utility of biometric authentication systems, comparison between different techniques and their advantages and disadvantage. Its significance is studied in this paper with reference to the banks, E-Voting, point of sale outlets and card/document less security system. Fujitsu plans to further expand applications for this technology by downsizing the sensor and improving the certification speed. I.2.m C.2.

    Development of Human-Biometric Sensor Interaction Model for Distinctive Assert Framework

    Get PDF
    These days Biometric technologies have acquired a distinguished element of solving digital identity and crucial security tasks. These technologies enhance identification and authentication depending on the physiological and behavioral characteristics of an individual. This made the governmental agencies to choose the technology of Biometrics as an additive for distinctive scenarios in which identification through ID cards and passports play a prominent role. Recent researches have proclaimed that Biometric Systems depends on how individuals collaborate and agree with it the responsibility of hoaxer in an Distinctive Assert Framework and has amalgamated to develop the HSBI model to a full genre which can grade likely False Asserts and Attack Presentations. This paper, reviews the work related to Human-Biometric Sensor Interaction model with respect to the initiation of tokens into the Biometric System that perform tasks relating to the security enhancement

    A New Computing Envornment Using Hybrid Cloud

    Get PDF
    Cloud computing is commonly used for the delivery of software, infrastructure and storage services over the internet. The delivery of services can be done in the private cloud or public cloud. Private cloud resources will be within our data center and it is a secure environment where only specified client can operate. Public cloud resources are provided in a virtualized environment, which provides a pool of shared resources. Hybrid cloud is integration of private, public and in some cases community cloud to perform unique functions within the same organization. Small and medium scale organizations cannot effort to setup IT infrastructure so hybrid cloud is the solution for them. This paper deals with the hybrid cloud computing and architecture of the hybrid cloud computing, advantages, disadvantages and differences of hybrid cloud computing. This paper also tells about the challenges of the hybrid cloud computing
    corecore