scholarly journals Fingereye: improvising security and optimizing ATM transaction time based on iris-scan authentication

Author(s):  
Abiodun Esther Omolara ◽  
Aman Jantan ◽  
Oludare Isaac Abiodun ◽  
Humaira Arshad ◽  
Nachaat AbdElatif Mohamed

The tumultuous increase in ATM attacks using eavesdropping, shoulder-surfing, has risen great concerns. Attackers often target the authentication stage where a customer may be entering his login information on the ATM and thus use direct observation techniques by looking over the customer's shoulder to steal his passwords. Existing authentication mechanism employs the traditional password-based authentication system which fails to curb these attacks. This paper addresses this problem using the FingerEye. The FingerEye is a robust system integrated with iris-scan authentication. A customer’s profile is created at registration where the pattern in his iris is analyzed and converted into binary codes. The binary codes are then stored in the bank database and are required for verification prior to any transaction. We leverage on the iris because every user has unique eyes which do not change until death and even a blind person with iris can be authenticated too. We implemented and tested the proposed system using CIMB bank, Malaysia as case study. The FingerEye is integrated with the current infrastructure employed by the bank and as such, no extra cost was incurred. Our result demonstrates that ATM attacks become impractical. Moreover, transactions were executed faster from 6.5 seconds to 1.4 seconds.

The usage and management of information technology resources and services are revolutionized with the arrival of Cloud Computing. But, the revolution always comes with problems. Authentication is one such problem. Especially for Graphical Password Authentication System, there is a threat of shoulder surfing attack. This research presents a multi-level graphical password authentication mechanism by extending an existing method. UGPSCCCT (User guided Graphical Password Scheme for Cloud using Caesar Cipher Technique) is the existing method and this method is extended in this paper such that another level of security is added. The user credentials in this method are transmitted to the server in encryption format. A key is generated for every login to encrypt user details. The analysis of the proposed method is done by calculating the computational cost and communication cost of the proposed method


1978 ◽  
Vol 192 (1) ◽  
pp. 81-92
Author(s):  
B. B. Hundy ◽  
S. Broadstock

The use of aluminium alloy instead of steel for the structural components of a 32 ton articulated lorry has been examined. The probable manufacturing difficulties have been assessed and shown to be minimal. The savings in weight possible by using aluminium have been calculated from a structural analysis of the cab, tractor chassis and trailer and from this and an assessment of the manufacturing processes the extra cost of manufacturing in aluminium has been determined. A typical case study shows that this extra cost can be easily recovered by utilising the increased load capacity of the vehicle during the first few years of its life.


2016 ◽  
Vol 9 (5) ◽  
pp. e3
Author(s):  
Shelly Menolascinoa ◽  
Mitch Belgina ◽  
Lillian Fishera ◽  
Elizabeth Ranuma
Keyword(s):  

2016 ◽  
Vol 2 (1) ◽  
pp. 103-113
Author(s):  
Priscila Carneiro Hamada ◽  
Georgia De Souza Assumpção ◽  
Carina Toledano Prado Lopes ◽  
Daniel Costa ◽  
Guilherme Fernandes da Fonseca Pereira ◽  
...  

This study aimed to analyze the processes of security management in a hospital in a big city at Rio de Janeiro’s State. The research method used was case study, strategy chosen by include both direct observation as a series of interviews. The obtained results allowed to highlight the importance of security management in a hospital, educate employees, assess risk scenarios, control the logistics flows of patients and contaminated products and waste.


2018 ◽  
Vol 13 (3) ◽  
pp. 274-281
Author(s):  
J. Setianto ◽  
Sutriyono Sutriyono ◽  
H. Prakoso ◽  
B. Zain

Red junglefowl domestication has been carried out by communities in the region of Bengkulu Province. This research aimed to study the management of keeping red junglefowl and the offsprings and the coops. The research was carried out in Bengkulu Province. The sample of breeders was selected using snow-ball sampling method. The selected samples were recorded and used as the data and information sources. The data were collected by interviewing, questionnaires, and direct observation. The data obtained were processed, presented in the form of tables, drawings and analyzed descriptively. Based on research method, out of a total of 200 red junglefowl breeders and or the offsprings were chosen 50 (25%) respondents from Bengkulu city, 50 (25%) respondents from Seluma District, 50 (25%) respondents from Central Bengkulu District and 50 (25%) respondents from North Bengkulu District. The red junglefowl and the offsprings breeding is divided into keeping the hens, roosters and chicks. The hens were kept in the coop during the day and night (41%), released during the day and night (22%) and kept during the night in the coop and released during the day (37%). In the same way, in sequence, the breeding of roosters was 71%, 12.5% and 16.5%, while the breeding of chicks was 37%, 18% and 45%. 31% respondents provided quarantine coop, while 69% respondents did not. 75% provided hens coop and 25% did not, 61% provided roosters coop and 39% did not. Finally, the respondents who provided chicks coop were 40.5% and 59.5% did not. The breeding management has not been done intensively, some respondents have completed coops system, but not yet meet the criteria of good coop.Keywords: Domestication, red junglefowl, coops


2020 ◽  
Vol 6 (7) ◽  
pp. 1450
Author(s):  
Dias Rizqi Wardani ◽  
Siti Inayatul Faizah

Muzara’ah is the contract between farm workers and farm owners in which, cost of cultivations, seeds, and fertilizers are provided by the farm owners, meanwhile the farm workers have responsibility in giving their best efforts on cultivating the farmland. Later then, the harvest will be shared according to the contract that has been agreed. The purpose of this research is to describe farmer’s welfare in the village of Sodo after implementing Muzara’ah Contract with the Maqashid Sharia approach. This research approach is qualitative descriptive and uses case study as its strategy. Informants in this research are administrator from Krido Tani Farmers Association, The farm workers, and the farm owners. These informants determined by using purposive sampling technique. The data collection techniques are carried out through interview and direct observation. According to the research, it was shown that agricultural cooperation with Muzara’ah Contract has a role in improving farm workers’ welfare, viewed from the indicators of Maqasid Sharia.Keywords : Muzara’ah, Welfare, Farmer, Agricultural Cooperation


Author(s):  
Darma Darma ◽  
Safruddin Safruddin ◽  
Achmar Mallawa

This study aims to identify main facilities and determine the level of the main facilities utilization of Birea fish landing base, Pa'jukukang District, Bantaeng Regency. The research was conducted from May to July 2020. The method used in this research is a case study. Primary data was consisting of the length of the pier, the distance between ships, the length of time to moor, the length of the breakwater and the length of the trip, and the size and number of ships anchored, were collected through direct observation in the field. Meanwhile, secondary data such as catch production data, development of the number and types of fishing units, the size of the port pool area, and the depth of the waters were taken through the interviews method. The utilization rate of the main facilities utilization of Berea fish landing base are a pier utilization rate of 90.5%, a port pool of 72.5%, a land port 86%, and two meters of water depth are required. Based on the research results, it is found that the long pier is still possible to accommodate ships that are anchored, while the port pool and portland still meet the requirements, however, dredging is necessary for dredging the depth of the waters for shipping in and out of ships. Key words: birea fish landing base, the level of main facilities utilization, bantaeng regency.


Author(s):  
David A. Eubanks

This chapter describes Coker College’s subjective performance assessment program to rate student thinking and communication skills. It uses a discussion of the epistemology of assessment to motivate an emphasis on direct observation by experts as the basis for “authentic” assessment for complex learning outcomes. Results from Coker College’s experience are given and discussed in the context of this approach. The purpose of this chapter is to give a philosophical framework and practical methods that can help institutions assess liberal arts learning outcomes. Such assessments can provide information crucial to improving programs and pedagogy and form the basis for institutional effectiveness reports to stakeholders.


Proceedings ◽  
2019 ◽  
Vol 21 (1) ◽  
pp. 29
Author(s):  
Daniel Garabato ◽  
Jorge Rodríguez García ◽  
Francisco J. Novoa ◽  
Carlos Dafonte

Nowadays, a wide variety of computer systems use authentication protocols based on several factors in order to enhance security. In this work, the viability of a second-phase authentication scheme based on users’ mouse behavior is analyzed by means of classical Artificial Intelligence techniques, such as the Support Vector Machines or Multi-Layer Perceptrons. Such methods were found to perform particularly well, demonstrating the feasibility of mouse behavior analytics as a second-phase authentication mechanism. In addition, in the current stage of the experiments, the classification techniques were found to be very stable for the extracted features.


Sign in / Sign up

Export Citation Format

Share Document