The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
After researching deeply on mine electromechanical equipment maintenance management, this paper has developed mine electromechanical equipment maintenance management system based on ASP.NET 2.0 technology and database technology. This system includes the information related to maintenance such as device information, repair project information, fitting information, course review information, report...
With the number of applications in the e-government network increasing, the complexity of users and privilege management in the applications has increased. In order to solve the problem, we need to establish a unified authorized management platform. So that we can achieve users and privilege unified management. To ensure authorized management platform's security, there is a higher demand for the access...
The mobile database may encounter a series of safety problems from the mobile client, the wireless network, the loophole of itself, the attacks from hacker, viruses and so on, in the actual application process, while the data security of backend database is under threat. To ensure the safety of mobile database, the identity authentication must be consummated, the access-control mechanism should be...
Recently diverse studies have emerged on the ubiquitous environment including the ones on RFID tag. In terms of security, in particular, RFID tag is not able to provide complex forms of security services due to its hardware limits, putting in turn limits on its wider use. Therefore, this thesis is to suggest an improved RFID tag authentication scheme using face recognition scheme. It divides passive...
Developing efficient handwriting recognition systems that are fast and highly reliable is a challenging problem. This work represents the development of an online handwriting recognition system for Bangla script, widely used in eastern India and Bangladesh. In our approach, an online handwritten character/cluster is characterized by structure or shape based representation of a stroke in which a stroke...
Wavelets are widely used to extract the texture features for pattern recognition applications including biometric authentication. This can be attributed to the discriminating capability of wavelet features and the availability of fast algorithms for implementing discrete wavelet transform (DWT). In most of the wavelet based palmprint applications, distribution of energies in space-frequency domain...
The important issue in multi-class classification on support vector machines is the decision rule, which determines whether an input pattern belongs to a predicted class. To enhance the accuracy of multi-class classification, this study proposes a multi-weighted majority voting algorithm of support vector machine (SVM), and applies it to overcome complex facial security application. The proposed algorithm...
The challenge of facial biometrics is the decision rule of how to determine whether the claimant is the genuine user. It is an important issue that the decision rule affects the accuracy of performance. Therefore, the study proposes a breadth-first-based decision algorithm for facial biometrics. The proposed algorithm searches different graph paths to obtain a verified decision to accept or reject...
As security is a major concern in present times, reliable authentication systems are in great demand. A biometric trait like the vascular pattern on the back of the hand of a person is unique and secure. A biometric system working on this principle often fails to authenticate a person either because of the varying hand posture or due to an injury altering the vein pattern. In this paper we propose...
In this paper, we present the technique to manage user profiles and authentication using LDAP (lightweight directory access protocol). The user profiles maintained in the LDAP directory information tree (DIT) which contains various information about users. This information can be retrieved by the users depending upon the level of access provided to them on the network. Various services use this authentication...
It is very important to protect the data security in distributed Web applications. In this paper, a file content tamper-proofing system is proposed, which can effectively resist file content tampering, and prevents illegal information spreading. To meet the requirement of authentication speed, a fast authentication algorithm combines file length verification and HMAC is used in the file content tamper-proofing...
Numerous authentication protocols for RFID systems were proposed as attempt to prevent unauthorized tracking and monitoring, impersonation or cloning, and information leakage. Many of such attempts cannot establish essential requirements that one robust authentication protocol must guarantee. In this paper, we propose a rapid mutual authentication protocol, called FLMAP, that overcomes all the drawbacks...
Most biometric systems deployed in real-world applications are unimodal, such as they use a single source of information for authentication (e.g., single fingerprint, face, voice ...). Some of the limitations imposed by unimodal biometric systems can be overcome by including multiple sources of information for establishing identity. In this paper, it is shown that fingerprint and face recognition...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.