scholarly journals Identity Management Based on Frontal Facial Recognition for Voters Register in Zambia

2019 ◽  
Vol 3 (1) ◽  
pp. 28-39
Author(s):  
Lubasi K. Musambo ◽  
Jackson Phiri

Biometric technology offers a great opportunity to identify individuals, authenticate individuals and separate individuals. Using these advantages, an election or voting model can be developed to perform elections for a country such as Zambia. Zambia currently uses a manual based voting or election model that heavily relies on paper presented documents that must be physically verified and or matched to existing prior collected information before an individual is allowed to participate in an election or a voting system. This paper proposes a frontal facial election based biometric model that can be used to rid the current election system of redundancy and introduce a paperless, accurate and efficient identification, authentication and voting process. A baseline study conducted shows that biometric authentication based on this proposed model improves a work related process such as a voting system. We start by introducing the elements that make a biometric model ideal, we then give an insight into the Zambian based election system and then we review various biometric technologies available and then finally introduce our biometric model.

Energies ◽  
2021 ◽  
Vol 14 (4) ◽  
pp. 930
Author(s):  
Fahimeh Hadavimoghaddam ◽  
Mehdi Ostadhassan ◽  
Ehsan Heidaryan ◽  
Mohammad Ali Sadri ◽  
Inna Chapanova ◽  
...  

Dead oil viscosity is a critical parameter to solve numerous reservoir engineering problems and one of the most unreliable properties to predict with classical black oil correlations. Determination of dead oil viscosity by experiments is expensive and time-consuming, which means developing an accurate and quick prediction model is required. This paper implements six machine learning models: random forest (RF), lightgbm, XGBoost, multilayer perceptron (MLP) neural network, stochastic real-valued (SRV) and SuperLearner to predict dead oil viscosity. More than 2000 pressure–volume–temperature (PVT) data were used for developing and testing these models. A huge range of viscosity data were used, from light intermediate to heavy oil. In this study, we give insight into the performance of different functional forms that have been used in the literature to formulate dead oil viscosity. The results show that the functional form f(γAPI,T), has the best performance, and additional correlating parameters might be unnecessary. Furthermore, SuperLearner outperformed other machine learning (ML) algorithms as well as common correlations that are based on the metric analysis. The SuperLearner model can potentially replace the empirical models for viscosity predictions on a wide range of viscosities (any oil type). Ultimately, the proposed model is capable of simulating the true physical trend of the dead oil viscosity with variations of oil API gravity, temperature and shear rate.


Sensors ◽  
2020 ◽  
Vol 20 (22) ◽  
pp. 6546
Author(s):  
Kazi Masum Sadique ◽  
Rahim Rahmani ◽  
Paul Johannesson

The Internet of things (IoT) will accommodate several billions of devices to the Internet to enhance human society as well as to improve the quality of living. A huge number of sensors, actuators, gateways, servers, and related end-user applications will be connected to the Internet. All these entities require identities to communicate with each other. The communicating devices may have mobility and currently, the only main identity solution is IP based identity management which is not suitable for the authentication and authorization of the heterogeneous IoT devices. Sometimes devices and applications need to communicate in real-time to make decisions within very short times. Most of the recently proposed solutions for identity management are cloud-based. Those cloud-based identity management solutions are not feasible for heterogeneous IoT devices. In this paper, we have proposed an edge-fog based decentralized identity management and authentication solution for IoT devices (IoTD) and edge IoT gateways (EIoTG). We have also presented a secure communication protocol for communication between edge IoT devices and edge IoT gateways. The proposed security protocols are verified using Scyther formal verification tool, which is a popular tool for automated verification of security protocols. The proposed model is specified using the PROMELA language. SPIN model checker is used to confirm the specification of the proposed model. The results show different message flows without any error.


Author(s):  
Xianjie Yang ◽  
Sayed Nassar

In an effort to establish a theoretical outline of a criterion for preventing the vibration-induced loosening of preloaded threaded fasteners, this paper provides an experimental and analytical insight into the effect of the initial bolt preload and the excitation amplitude on the self loosening performance of cap screw fastener. A nonlinear model is used for predicting the clamp load loss caused by the vibration-induced loosening of cap screw fasteners under cyclic transverse loading. Experimental verification was conducted on the twisting torque variation and the effect of the preload level and transverse displacement amplitude. Comparison of the experimental and analytical results on the clamp load loss with the number of cycles verifies that the proposed model accurately predicts self-loosening performance.


1987 ◽  
Vol 31 (02) ◽  
pp. 101-106
Author(s):  
Kyu Nam Cho ◽  
William S. Vorus

A new three-dimensional method is proposed for analyzing orthogonally stiffened grillage structures. The method is based on earlier work related to bridge decks. The relationship between system displacement and loads is described mathematically, and matrices are developed to examine the shear compatibility between plate and beam elements. The paper concludes with a comparison between deflections obtained by several different procedures and the proposed model.


Author(s):  
Dongbo Xi ◽  
Fuzhen Zhuang ◽  
Yanchi Liu ◽  
Jingjing Gu ◽  
Hui Xiong ◽  
...  

Human mobility data accumulated from Point-of-Interest (POI) check-ins provides great opportunity for user behavior understanding. However, data quality issues (e.g., geolocation information missing, unreal check-ins, data sparsity) in real-life mobility data limit the effectiveness of existing POIoriented studies, e.g., POI recommendation and location prediction, when applied to real applications. To this end, in this paper, we develop a model, named Bi-STDDP, which can integrate bi-directional spatio-temporal dependence and users’ dynamic preferences, to identify the missing POI check-in where a user has visited at a specific time. Specifically, we first utilize bi-directional global spatial and local temporal information of POIs to capture the complex dependence relationships. Then, target temporal pattern in combination with user and POI information are fed into a multi-layer network to capture users’ dynamic preferences. Moreover, the dynamic preferences are transformed into the same space as the dependence relationships to form the final model. Finally, the proposed model is evaluated on three large-scale real-world datasets and the results demonstrate significant improvements of our model compared with state-of-the-art methods. Also, it is worth noting that the proposed model can be naturally extended to address POI recommendation and location prediction tasks with competitive performances.


2014 ◽  
Vol 9 (2) ◽  
pp. 107
Author(s):  
Muhammad Ilyas Sikki ◽  
Sugi Guritman ◽  
Hendra Rahmawan

The e-voting system which developed using two central facilities protokol consist of three component that is voting machine as client for interaction with voter, central legitimization agency (CLA) as server voter authentication, and central tabulating facility (CTF) as server for result recapitulation voter vote count. Research in this paper just focused to voter authentication process on voting machine toward database of voter that stored in CLA with using fingerprint biometric technology. Fingerprint biometric technology used for voter registration process, voter verification process, and voter authentication process who will doing election. Registration process for acquiring voter fingerprint image database, verification process to be sure voter database can be verificated or not, and authentication process for voter authorization who can be permitted or not by system give of vote in election.


Author(s):  
Seyed Reza Seyed-Javadin ◽  
Reza Raei ◽  
Mohammad Javad Iravani ◽  
Mohammad Safari

Taking advantage of applications of marketing in the Islamic banking is a great opportunity for this area to gain competitive advantage in the today’s turbulent business and market. Specialized field of Islamic banking marketing is a subset of marketing management has received less attention and consideration. Islamic banking (IB) is one of the growing fields in the today's economy. To achieve more advancement in the IB it is necessary that recent findings of the other research and practical areas to be used and implemented. Scholars and experts believe that the market for Islamic banking has grown rapidly over the past few years, and this robust growth is expected to continue for the foreseeable future. In many markets, Islamic banking has evolved from being a niche offering into being part of the mainstream financial services landscape. Marketing capabilities can provide the convenient and required ground for the continued growth of Islamic banking. This study aimed at present a conceptual model to explain the determining factors to achieve the IB marketing from managerial perspective. Using a descriptive method this study tried to identify and present the main factors from managerial perspective that affected on the IB marketing. Proposed model and appropriated explanations have been provided in the paper.


2015 ◽  
pp. 557-570
Author(s):  
Dashbalbar Gangabaatar

Mongolia introduced a new electronic voting system for the first time for the 2012 parliamentary election. E-voting empowers citizens by making voting simpler and providing better opportunities for certain groups of citizens to participate in the election process. The electoral reform was one of the major steps the parliament carried out in order to restore public trust lost in the violent protests against the 2008 parliamentary election results. A free, transparent, and fair electoral system was important to correct the fraud in the old election system. This chapter examines the effectiveness of the mixed system of election, the electronic voting system, and other changes to the electoral system in Mongolia.


Author(s):  
Dashbalbar Gangabaatar

Mongolia introduced a new electronic voting system for the first time for the 2012 parliamentary election. E-voting empowers citizens by making voting simpler and providing better opportunities for certain groups of citizens to participate in the election process. The electoral reform was one of the major steps the parliament carried out in order to restore public trust lost in the violent protests against the 2008 parliamentary election results. A free, transparent, and fair electoral system was important to correct the fraud in the old election system. This chapter examines the effectiveness of the mixed system of election, the electronic voting system, the constitutionality of the electoral systems, and other changes to the electoral system in Mongolia.


Sign in / Sign up

Export Citation Format

Share Document