identity verification
Recently Published Documents


TOTAL DOCUMENTS

491
(FIVE YEARS 199)

H-INDEX

30
(FIVE YEARS 6)

Electronics ◽  
2022 ◽  
Vol 11 (1) ◽  
pp. 143
Author(s):  
Ting-Yu Lin ◽  
Hung-Tse Chan ◽  
Chih-Hsien Hsia ◽  
Chin-Feng Lai

Acne is a skin issue that plagues many young people and adults. Even if it is cured, it leaves acne spots or acne scars, which drives many individuals to use skincare products or undertake medical treatment. On the contrary, the use of inappropriate skincare products can exacerbate the condition of the skin. In view of this, this work proposes the use of computer vision (CV) technology to realize a new business model of facial skincare products. The overall framework is composed of a finger vein identification system, skincare products’ recommendation system, and electronic payment system. A finger vein identification system is used as identity verification and personalized service. A skincare products’ recommendation system provides consumers with professional skin analysis through skin type classification and acne detection to recommend skincare products that finally improve skin issues of consumers. An electronic payment system provides a variety of checkout methods, and the system will check out by finger-vein connections according to membership information. Experimental results showed that the equal error rate (EER) comparison of the FV-USM public database on the finger-vein system was the lowest and the response time was the shortest. Additionally, the comparison of the skin type classification accuracy was the highest.


2021 ◽  
pp. 552-571
Author(s):  
Michael L. Walker

This chapter marshals ethnographic data from county jails in southern California to examine how a penal environment shapes the ways prisoners experience time, track time, and orient themselves to the past, present, or future. Building from research that conceptualizes the ordering of social behavior according to “event” or “clock” time, it is argued that incoming prisoners experience a disorienting incongruity between clock time in free society and event time in jail. Temporal congruity is conceptualized as another kind of social need like identity verification, group inclusivity, and other basic social needs identified by social psychologists. Additionally, and in part because penal time was organized around events, prisoners use somewhat idiosyncratic quality-of-life events to create timetables and thereby break indefinite time into manageable segments. Finally, a relationship between self-efficacy and temporal orientation (past, present, or future) is shown with the argument that as self-efficacy increases, so does the likelihood of prisoners being oriented to the future. On the other hand, the lower the self-efficacy, the greater the likelihood of an orientation to the present. Given the findings, it is recommended that jails operate on more conventional time schedules with regular access to natural light. This work has implications for the sociology of time as well as future studies of punishment.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Shixian Song

With cloud computing's powerful computing power, many end users can create a variety of effective network applications using the cloud's services without having to worry about computing technology or access methods. Based on CC technology's on-demand service characteristics and unlimited dynamic expansion capability, this article designs and implements a shared network examination system. In the Web mode, the functions of receiving and distributing examination data, identity verification, online examination, and examination result collection can be realized using the SaaS deployment structure, MVC three-tier architecture, Java modeling language, XFIE, JSON, web service, DES, and other technologies combined with MySQL database. At the same time, the improved parallel genetic annealing algorithm (IPGAA) is proposed as a CC resource scheduling strategy. The IPGAA has better adaptability in the CC system with various cloud resources because it combines the fast global search ability of the genetic algorithm (GA) with the local search ability of the simulated annealing algorithm. Simulation tests show that the IPGAA is effective.


2021 ◽  
Vol 7 (167) ◽  
pp. 46-50
Author(s):  
S. Burlutska ◽  
O. Chabanenko

The world has not yet come up with a single recipe for fighting corruption. But thanks to constant progress, anti-corruption strategies are replenished with effective innovation mechanisms. The global experience of using blockchain opens up new prospects for eliminating corruption in the world. Blockchain is an opportunity not only to modernize outdated functional systems, but also to apply new, more effective means of combating corruption and cybercrime. One of the main advantages of the blockchain is that all network participants have a register of transaction data. Therefore, if someone decides to hide, delete or change their recalculations in the accounting book, then copies of these transactions still remain in tens of thousands of other users and the system immediately accesses them. Therefore, a few minutes will be enough to solve the issues of detecting a crime. Today, it is worth highlighting 3 types of widespread use of blockchain technology in the fight against corruption: identity verification, asset registration and tracking of monetary transactions. For example, you can check the purpose of money transfers in real time, see salary payments, and compare prices among suppliers. Like any type of crime, corruption in human society cannot be completely excluded. However, decentralized platforms functioning on blockchain technology, already today, firstly, can directly bring together the customer and the executor, and secondly, all the conditions agreed upon by the participants can then be easily verified (thus, it will be impossible to imperceptibly inflate the price when using blockchain). Blockchain technology is in demand because it creates an unprecedented degree of trust in information in relationships between individuals and public organizations, or between the state, people and private institutions.


2021 ◽  
Vol 26 (4) ◽  
pp. 111-120
Author(s):  
Łukasz Goździaszek

Abstract The aim of the article is to present the legal provisions used to identify taxpayers (and similarly other entities) using electronic communication in the times of COVID-19, in the light of the construction of public ICT systems for submitting declarations and applications. The COVID-19 pandemic accelerated the IT transformation, including the benefits of switching to digital tools, unless the legislator had already imposed an obligation to use electronic communication. For tax purposes, the range of possible signatures has not been limited to a qualified electronic signature, a trusted signature, a personal signature, and possibly a simple identity verification mechanism using an account in an ICT system secured only with a password. It is often used to sign the so-called “authorization data” (“tax data”). The new facilitations in the field of creating a trusted profile should translate into the popularization of the trusted signature, especially as there are more and more non-tax online services provided by public entities.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Jianwen Hu ◽  
Yuling Chen ◽  
Xiaojun Ren ◽  
Yixian Yang ◽  
Xiaobin Qian ◽  
...  

As the technical support of the industrial Internet of Things, blockchain technology has been widely used in energy trading, data transactions, and Internet of Vehicles. However, most of the existing energy trading models only address the transaction security and transaction privacy issues that arise in the energy trading process, ignoring the fairness of resource allocation and transaction equity in the trading process. In order to tackle those problems, an energy trading scheme called HO-TRAD is proposed in this paper to improve the efficiency of model trading while ensuring the fairness of energy trading. We propose a new trading strategy in the HO-TRAD energy trading scheme that guarantees fairness in the allocation of trading resources by introducing an entity’s active reputation value. Use smart contracts to achieve transparency and ensure fairness in the transaction process. Based on the identity verification foundation of the consortium chain, the scheme enhances the existing PBFT consensus algorithm and improves the efficiency of model transactions. The experimental simulation indicates that the scheme requires less transaction time and has higher transaction fairness and security.


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Gwan-Hwan Hwang ◽  
Tao-Ku Chang ◽  
Hung-Wen Chiang

The PKI framework is a widely used network identity verification framework. Users will register their identity information with a certification authority to obtain a digital certificate and then show the digital certificate to others as an identity certificate. After others receive the certificate, they must check the revocation list from the CA to confirm whether the certificate is valid. Although this architecture has a long history of use on the Internet, significant doubt surrounds its security. Because the CA may be attacked by DDoS, the verifier may not obtain the revocation list to complete the verification process. At present, there are many new PKI architectures that can improve on the CA’s single point of failure, but since they still have some shortcomings, the original architecture is still used. In this paper, we proposed a semidecentralized PKI architecture that can easily prevent a single point of failure. Users can obtain cryptographic evidence through specific protocols to clarify the responsibility for the incorrect certificate and then submit the cryptographic evidence to the smart contract for automatic judgment and indemnification.


Author(s):  
Sumaiya M N ◽  
Nischitha R C ◽  
Pavithra B ◽  
Poorna M Bhat ◽  
Sindhu B K

Attendance management system is an important part of daily online /offline classroom evaluation. At the beginning and end of class, it is usually checked by the teacher, but it may appear that a teacher may miss someone or some students answer multiple times. Our project is based on face recognition and face recognition technologies. The concept of face recognition is to give a computer system the ability to find and recognize human faces fast and precisely in images or videos. Computers that detect and recognize faces could be applied to a wide variety of practical applications including criminal identification, security systems, identity verification etc. The entire process involved in our project can be categorized into two main processes as face detection and face recognition process. Face detection involves the detection of an input image for further processing. Face Recognition, where the detected and processed face is compared to the database of known faces to decide the correct person. The attractiveness of the proposed system is, it generates an attendance file which includes the subject name alongside other parameters which are already present. Easy accessibility of attendance using excels technology.


Sign in / Sign up

Export Citation Format

Share Document