scholarly journals Biometric Authentication System Using Face Geometry

2019 ◽  
Vol 8 (08) ◽  
pp. 24805-24813
Author(s):  
Ibebuogu Chinwe C ◽  
Philip Seth ◽  
Anyaduba Obiageli J

This seminar paper deals with biometric authentication, using human facial geometry as the login verification parameter. Biometric is the measurement and statistical analysis of human's unique physical and behavioral characteristics by mapping face geometry, fingerprints, iris, and voice. The aim of this seminar paper is to develop a functional Biometric Authentication System Using Face Geometry as the authentication method. Facial Geometry Authentication is a category of biometric technology that maps an individual's facial features mathematically and stores the data as face-prints in a database. Meanwhile the objective of this paper is to improve data access security, enhance identification accuracy, and contribute to the improvement of the existing facial recognition systems, focusing mainly on increasing its accuracy performance. On the other hand, hacking into users’ privacy, loss of confidential information, and high running costs, among others geared the motivation to develop a biometric authentication system using face geometry. Furthermore, the software engineering methodology adopted in this seminar paper is the Structural System Analysis and Design Methodology (SSADM). The software is developed in Visual C-sharp, and the database in SQL Server 2012; using Microsoft Visual Studio 2012 as the integrated development environment. Besides, OpenCV 2.4.8 library is used for image processing, image mapping, and computer vision.  The expected result of this seminar paper include: improved user data security, and increased efficiency in facial detection/recognition.

Author(s):  
Z.-M. Zadorozhnyy ◽  
V. Muravskyi ◽  
S. Yatsyshyn ◽  
O. Shevchuk

Abstract. Modern conditions of growing cyber threats caused by the hybrid conflicts around the world and looming biological threat of the COVID-19 pandemic necessitate the introduction of biometric authentication of employees, leading to the transformation in the methodology and organization of accounting at enterprises. The procedure for accounting and control of time worked and wages of the employees is the first to undergo changes due to the forcibly limited access of employees to the enterprise data and premises, which determines the topicality and aims of this research. The aim of the article is to investigate the prospects for monitoring the working time and movement of employees on the premises (facilities) of the enterprise with the use of biometric technology in order to develop the methodology of automation of the accounting of payments made to employees and to ensure the cybersecurity of economic entities. The prospects of using an automated employee checkpoint system based on biometrics for the purposes of accounting and control are explored. The paper improves the methodology of accounting and control over the working time and wages of employees based on the automated employee authentication system using data on the time spent on premises and performance of job functions. Recommendations are made on ensuring biological and cyber security of enterprises in terms of categorizing the enterprise premises and equipment according to their functions and level of access to information and material flows. The research examines the prospects of accounting for the employee costs, as well as accurate distribution of overhead and other costs based on data of the biometric employee authentication system. It is advised to conduct further research into the peculiarities of methodology and organization of accounting under conditions of distance and isolated job performance by accounting employees, as it raises the requirements to cybersecurity of enterprises. Keywords: accounting, working time, wages (salary), biometrics, employee authentication, automation of accounting and control, cybersecurity, COVID-19. JEL Classification M41, M49 Formulas: 0; fig.: 2; tabl.: 1; bibl.: 18.


Author(s):  
Saleema A. ◽  
Sabu M. Thampi

Biometric technology is spearheading the existing authentication methods in the IoT. Considering the balance between security and convenience, voice biometrics seems to be the most logical biometric technologies to be used. The authors present an extensive survey to identify, analyze, and compare various methods and algorithms for the different phases in the process of speaker identification/recognition, which is the part and parcel in voice biometrics. The chapter is intended to provide essential background information to those interested in learning or planning to design voice authentication systems. The chapter highlights the need for a biometric authentication system, the reason why we prefer voice, its present state of affairs, and its scope with fog computing to be used in IoT.


2014 ◽  
Vol 989-994 ◽  
pp. 5588-5591
Author(s):  
Li Hua Chen ◽  
Tie Zhu Niu

In the course of sports meeting, managing large amounts of data by hand is very difficult, the computer will be used in sports meeting management, accuracy and efficiency of data processing provides an important safeguard, in this paper, the sports meeting information system analysis and design. First, workflow analysis, pointed out the modern sports meeting work flow, as the basis for the next software development work; Then, functional requirements analysis, modeling example through interaction with each participant to clarify the main functions of the system implementation; Finally, the framework structure design, design the SSH three layer frame structure based on J2EE, for the presentation layer, business logic, data access layer is described in detail. To study the content of this article is based, easy to construct, easy maintenance, good reusability Web systems.


2014 ◽  
Vol 50 (3) ◽  
pp. 1841-1863 ◽  
Author(s):  
Tarek Menni ◽  
Jerome Galy ◽  
Eric Chaumette ◽  
Pascal Larzabal

2021 ◽  
Author(s):  
Fatin Atiqah Rosli ◽  
Saidatul Ardeenawatie Awang ◽  
Azian Azamimi Abdullah ◽  
Mohammad Shahril Salim

Author(s):  
Manfred Ehresmann ◽  
Georg Herdrich ◽  
Stefanos Fasoulas

AbstractIn this paper, a generic full-system estimation software tool is introduced and applied to a data set of actual flight missions to derive a heuristic for system composition for mass and power ratios of considered sub-systems. The capability of evolutionary algorithms to analyse and effectively design spacecraft (sub-)systems is shown. After deriving top-level estimates for each spacecraft sub-system based on heuristic heritage data, a detailed component-based system analysis follows. Various degrees of freedom exist for a hardware-based sub-system design; these are to be resolved via an evolutionary algorithm to determine an optimal system configuration. A propulsion system implementation for a small satellite test case will serve as a reference example of the implemented algorithm application. The propulsion system includes thruster, power processing unit, tank, propellant and general power supply system masses and power consumptions. Relevant performance parameters such as desired thrust, effective exhaust velocity, utilised propellant, and the propulsion type are considered as degrees of freedom. An evolutionary algorithm is applied to the propulsion system scaling model to demonstrate that such evolutionary algorithms are capable of bypassing complex multidimensional design optimisation problems. An evolutionary algorithm is an algorithm that uses a heuristic to change input parameters and a defined selection criterion (e.g., mass fraction of the system) on an optimisation function to refine solutions successively. With sufficient generations and, thereby, iterations of design points, local optima are determined. Using mitigation methods and a sufficient number of seed points, a global optimal system configurations can be found.


2010 ◽  
Vol 455 ◽  
pp. 237-241
Author(s):  
X.Y. Yang ◽  
H.B. Zheng ◽  
Z.W. Zhang

With the development of manufacturing automation and intelligent increasing speed, the construction in plant management information has been important tasks to promote business innovation ability, improve competitiveness and manufacturing execution. In this paper, UML (Unified Modeling Language) and object-oriented modeling technology were applied to model the static structure and dynamic behavior of the plant management information from requirement analysis to system implementation, including functional requirement model, static structural model, asset management time sequence chart, system physical model and so on. The visualized system analysis method and technology better planned the system design and improved the efficiency of the system development. It will play a guiding role in the object-oriented software development.


Sign in / Sign up

Export Citation Format

Share Document