Biometric Authentication Systems

Biometric Authentication Systems

Автор: Vinayak Bharadi and Hemchandra Kekre

Biometric Authentication Systems have become inevitable components of modern day security. In this book we have discussed fingerprint, palmprint, finger-knuckle print, face, iris, dynamic signature, keystroke dynamics and their multimodal implementations. In physiological category fingerprints, palmprints & finger-knuckle prints, face & iris are discussed. Their unimodal as well as multimodal implementations are presented. In case of behavioral biometrics dynamic signature & keystroke dynamics for biometric authentication have been investigated. Digital signal & image processing based techniques such as Kekre Wavelets, Kekre’s Codebook Generation Algorithms and their variants are used for feature vector generation and recognition purpose. Multimodal systems consisting of the combinations of above mentioned biometric traits are presented. Multi-algorithmic, Multi-instance implementations are presented in this book. A new architecture called as hybrid multimodal…

Новые информационные технологии и лингвистика. Учебное пособие

Новые информационные технологии и лингвистика. Учебное пособие

Автор: Р. К. Потапова

Настоящее учебное пособие посвящено современным проблемам использования новых информационных технологий в лингвистике и лингвистическом образовании. С учетом специфики данного аспекта знаний в пособии нашли отражение такие направления, как динамика становления интеллектуальных систем обучения, компьютеризация обучения в гуманитарных областях знаний (включая иностранный язык), назначение, специфика и концепция дистанционного (дистантного) обучения, гипертекст в лингвистике, новые информационные технологии и лингводидактика, автоматизированные обучающие системы. Дополнительно приведены примеры языковой специфики общения на базе Интернета. Книга предназначена студентам, аспирантам и докторантам, специализирующимся в области теоретической и прикладной лингвистики по направлению «Лингвистика и новые информационные технологии», а также всем, кто интересуется проблемами взаимодействия между лингвистическими знаниями и новыми информационными технологиями.

Security Convergence: Managing Enterprise Security Risk

Security Convergence: Managing Enterprise Security Risk

Автор: Dave Tyson

Security Convergence describes the movement in business to combine the roles of physical security and security management with network computer security measures within an organization. This is the first book to discuss the subject of security convergence, providing real-world illustrations of implementation and the cost-saving benefits that result. Security Convergence discusses security management, electronic security solutions, and network security and the manner in which all of these interact. Combining security procedures and arriving at complete security solutions improves efficiency, greatly improves security, and saves companies money. Implementation of convergence principles has increased rapidly and the number of businesses moving to this model will continue to grow over the next few years. All security professionals, regardless of background, will find this a useful reference and a practical look at the benefits of convergence and a look to the future of how…

Effect of QoS Mechanisms on Power-Constrained Wireless Mesh Networks

Effect of QoS Mechanisms on Power-Constrained Wireless Mesh Networks

Автор: Olukayode Oki,Matthew Adigun and Pragasen Mudali

Wireless Mesh Network (WMN) is a collection of wireless nodes which can dynamically communicate with one another in multi-hop manner. WMN has received considerable attention as a means to connectivity in community and commercial entities. The easy deployment and self-management characteristics of WMN, makes it a good choice for rural areas. However, in most developing countries, electricity is scarce or unreliable in the rural areas. A candidate solution to the lack of electricity supply in these areas is the use of solar/battery-powered nodes. Significant efforts have gone into optimization of QoS provisioning in WMN; hence, a lot of QoS mechanisms on OSI layer have been proposed. It is, however, not clear how different QoS mechanisms on OSI layer affect the node lifetime and the energy cost per bit. Different protocols at different layers have varying effects on the energy efficiency of the battery-powered WMN nodes, when those protocols are subjected to various transmission power…

Service oriented Architecture for Open Hypermedia Systems

Service oriented Architecture for Open Hypermedia Systems

Автор: Omer Mohamed

Over the last decades open hypermedia systems become one of the well known systems for knowledge discovery and management. The First Edition of Omer Mohamed, Service Oriented Architecture for Open Hypermedia Systems, contains: *Historical review of open hypermedia systems, Scenarios Description and Analysis *The Proposed Analysis Framework for evaluation of Open Hypermedia Systems. *A comprehensive Summary and Analysis of Comparison *The Proposed architecture for service oriented Open Hypermedia Systems. *Prototypic Implementation of the architecture. This book provides an understanding of open hypermedia systems (history and trends) , some examples of famous systems,and the issues related to each system as well as an applicable architecture that can be used to develop open hypermedia systems using componet-based architecture. This book hihlights the fundamentals and work done in Hypemedia systems. and should be especially useful for professionals in hypermedia…

Employee Monitoring System Through Infrared Identification

Employee Monitoring System Through Infrared Identification

Автор: Malik Haris

Until now in industries, large organization, hospitals, offices have monitoring systems on their entrances like bio metric and cameras. The operator in monitor room has the tedious task of monitoring more than 30-40 camera feeds. Instead, by using IR identification, employee tracking solutions for personnel monitoring provides visibility to individuals entering and exiting restricted areas, their location within controlled zones, and their location history. It is a complete package for detecting and tracking employees, third parties, and customers. We added security for people and assets easily, and set up security zones for automated tracking. The project has number of phases, such as implementation of IR transmitter, decoder, micro controller, LCD interface and finally an interface with computer for simulation and tracking.

Mitigating congestion and collision in adhoc networks

Mitigating congestion and collision in adhoc networks

Автор: Premalatha Natarajan

Wireless technologies are being widely used today across the globe to support the communication needs of very large number of end users for voice communications and data services. Data services include activities such as sending e-mails, instant messages and accessing the Web. Due to an increased demand the network becomes congested. The congestion control mechanism in Transmission Control Protocol (TCP) is designed for wired networks. Due to the inherent characteristics of wireless networks, TCP when applied to wireless networks suffers from poor performance because of random loss, burst loss and packet reordering and therefore needs modification from the original protocol. This thesis proposes two enhancements in the TCP Vegas algorithm. The EnhancedVegas and NewVegas algorithms control the congestion in MANETs. An enhancement in MAC layer protocol called CTMAC-F protocol is proposed to control collision in the MAC layer. GPSR routing protocol is used for an efficient routing in…

Computer Networks from Scratch

Computer Networks from Scratch

Автор: Ashit Kumar Dutta and Abdul Rahaman Wahab Sait

In the world of technology, computer networks became a medium for communication between people and machines. Internet runs on the top of the computer networks.In this field, security become more necessary because most of the money transactions are happening through Internet.we have covered from basic ideas of the computer networks to modern technology exist in the field. This book will be more useful for the student community.

Cooperative Spectrum Sharing Between Coexisting WLAN Systems

Cooperative Spectrum Sharing Between Coexisting WLAN Systems

Автор: Rahamatullah Khondoker

From the economical and technical point of view, it is necessary to develop a spectrum sharing algorithm so that IEEE 802.11 networks can coexist with competing systems of the same or different technologies. A suitable way to maintain the coexistence is the centralized HCCA channel access method defined in IEEE 802.11e. This standard, however, only specifies the signaling for centralized channel access, but not the decision scheme which assigns airtime to the mobile stations. For this reason, the standard is extended in this book by a method called Regular Channel Access which is specially tailored to maintain the coexistence between neighboring networks, so that spectrum will be shared efficiently in both homogeneous and heterogeneous coexistence scenarios. In comparison to the legacy Distributed Coordination Function (DCF) of 802.11, Quality of Service (QoS) will be gained using the Regular Channel Access method

Intra and Inter Frames Based on Video Compression Techniques

Intra and Inter Frames Based on Video Compression Techniques

Автор: Aree Mohammed and Loay George

In this work, a color video compression scheme based on motion block matching method is proposed and designed. At first, shot boundary detection is applied using one of three criteria. This unit is used to dynamically partition the video sequences into group of pictures (GOPs). Each group of picture is then coded individually by using both inter and intra frame coding. An adaptive scheme is designed and implemented for the intra frame coding, using an adaptive block subband partitioning scheme. In this scheme, the frame is transformed by the wavelet transform based on the lifting scheme, and then encoding each block of the subband separately. Finally, for the inter frame coding part, an enhanced block’s motion estimation is proposed and applied, it is a modified version of One at a Time Search (OTS) block matching algorithm.