scholarly journals Research and Development of Palmprint Authentication System Based on Android Smartphones

2020 ◽  
Vol 2020 ◽  
pp. 1-16
Author(s):  
Xinman Zhang ◽  
Kunlei Jing ◽  
Guokun Song

The security problems of online transactions by smartphones reveal extreme demand for reliable identity authentication systems. With a lower risk of forgery, richer texture, and more comfortable acquisition mode, compared with face, fingerprint, and iris, palmprint is rarely adopted for identity authentication. In this paper, we develop an effective and full-function palmprint authentication system regarding the application on an Android smartphone, which bridges the algorithmic study and application of palmprint authentication. In more detail, an overall system framework is designed with complete functions, including palmprint acquisition, key points location, ROI segmentation, feature extraction, and feature coding. Basically, we develop a palmprint authentication system having user-friendly interfaces and good compatibility with the Android smartphone. Particularly, on the one hand, to guarantee the effectiveness and efficiency of the system, we exploit the practical Log-Gabor filter for feature extraction and discuss the impact of filtering direction, downsampling ratio, and discriminative feature coding to propose an improved algorithm. On the other hand, after exploring the hardware components of the smartphone and the technical development of the Android system, we provide an open technology to extend the biometric methods to real-world applications. On the public PolyU databases, simulation results suggest that the improved algorithm outperforms the original one with a promising accuracy of 100% and a good speed of 0.041 seconds. In real-world authentication, the developed system achieves an accuracy of 98.40% and a speed of 0.051 seconds. All the results verify the accuracy and timeliness of the developed system.

2020 ◽  
Vol 36 (S1) ◽  
pp. 37-37
Author(s):  
Americo Cicchetti ◽  
Rossella Di Bidino ◽  
Entela Xoxi ◽  
Irene Luccarini ◽  
Alessia Brigido

IntroductionDifferent value frameworks (VFs) have been proposed in order to translate available evidence on risk-benefit profiles of new treatments into Pricing & Reimbursement (P&R) decisions. However limited evidence is available on the impact of their implementation. It's relevant to distinguish among VFs proposed by scientific societies and providers, which usually are applicable to all treatments, and VFs elaborated by regulatory agencies and health technology assessment (HTA), which focused on specific therapeutic areas. Such heterogeneity in VFs has significant implications in terms of value dimension considered and criteria adopted to define or support a price decision.MethodsA literature research was conducted to identify already proposed or adopted VF for onco-hematology treatments. Both scientific and grey literature were investigated. Then, an ad hoc data collection was conducted for multiple myeloma; breast, prostate and urothelial cancer; and Non Small Cell Lung Cancer (NSCLC) therapies. Pharmaceutical products authorized by European Medicines Agency from January 2014 till December 2019 were identified. Primary sources of data were European Public Assessment Reports and P&R decision taken by the Italian Medicines Agency (AIFA) till September 2019.ResultsThe analysis allowed to define a taxonomy to distinguish categories of VF relevant to onco-hematological treatments. We identified the “real-world” VF that emerged given past P&R decisions taken at the Italian level. Data was collected both for clinical and economical outcomes/indicators, as well as decisions taken on innovativeness of therapies. Relevant differences emerge between the real world value framework and the one that should be applied given the normative framework of the Italian Health System.ConclusionsThe value framework that emerged from the analysis addressed issues of specific aspects of onco-hematological treatments which emerged during an ad hoc analysis conducted on treatment authorized in the last 5 years. The perspective adopted to elaborate the VF was the one of an HTA agency responsible for P&R decisions at a national level. Furthermore, comparing a real-world value framework with the one based on the general criteria defined by the national legislation, our analysis allowed identification of the most critical point of the current national P&R process in terms ofsustainability of current and future therapies as advance therapies and agnostic-tumor therapies.


Author(s):  
SARIKA KHALADKAR ◽  
SARITA MALUNJKAR ◽  
POOJA SHINGOTE

Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. The need for something more secure along with being user friendly is required. This is where Image Based Authentication (IBA) comes into play. This helps to eliminate tempest attack, shoulder attack, Brute-force attack. Using the instant messaging service available in internet, user will obtain the One Time Password (OTP) after image authentication. This OTP then can be used by user to access their personal accounts. The image based authentication method relies on the user’s ability to recognize pre-chosen categories from a grid of pictures. This paper integrates Image based authentication and HMAC based one time password to achieve high level of security in authenticating the user over the internet.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Mareike Bockholt ◽  
Katharina A. Zweig

AbstractWhen considering complex systems, identifying themost importantactors is often of relevance. When the system is modeled as a network, centrality measures are used which assign each node a value due to its position in the network. It is often disregarded that they implicitly assume a network process flowing through a network, and also make assumptions ofhowthe network process flows through the network. A node is then central with respect to this network process (Borgatti in Soc Netw 27(1):55–71, 2005,10.1016/j.socnet.2004.11.008). It has been shown that real-world processes often do not fulfill these assumptions (Bockholt and Zweig, in Complex networks and their applications VIII, Springer, Cham, 2019,10.1007/978-3-030-36683-4_7). In this work, we systematically investigate the impact of the measures’ assumptions by using four datasets of real-world processes. In order to do so, we introduce several variants of the betweenness and closeness centrality which, for each assumption, use either the assumed process model or the behavior of the real-world process. The results are twofold: on the one hand, for all measure variants and almost all datasets, we find that, in general, the standard centrality measures are quite robust against deviations in their process model. On the other hand, we observe a large variation of ranking positions of single nodes, even among the nodes ranked high by the standard measures. This has implications for the interpretability of results of those centrality measures. Since a mismatch of the behaviour of the real network process and the assumed process model does even affect the highly-ranked nodes, resulting rankings need to be interpreted with care.


2021 ◽  
Author(s):  
Sébastien Herbert ◽  
Léo Valon ◽  
Laure Mancini ◽  
Nicolas Dray ◽  
Paolo Caldarelli ◽  
...  

BackgroundQuantitative imaging of epithelial tissues prompts for bioimage analysis tools that are widely applicable and accurate. In the case of imaging 3D tissues, a common post-processing step consists in projecting the acquired 3D volume on a 2D plane mapping the tissue surface. Indeed, while segmenting the tissue cells is amenable on 2D projections, it is still very difficult and cumbersome in 3D. However, for many specimen and models used in Developmental and Cell Biology, the complex content of the image volume surrounding the epithelium in a tissue often reduces the visibility of the biological object in the projection, compromising its subsequent analysis. In addition, the projection will distort the geometry of the tissue and can lead to strong artifacts in the morphology measurement.ResultsHere we introduce DProj a user-friendly tool-box built to robustly project epithelia on their 2D surface from 3D volumes, and to produce accurate morphology measurement corrected for the projection distortion, even for very curved tissues. DProj is built upon two components. LocalZProjector is a user-friendly and configurable Fiji plugin that generates 2D projections and height-maps from potentially large 3D stacks (larger than 40 GB per time-point) by only incorporating the signal of interest, despite a possibly complex image content. DeProj is a MATLAB tool that generates correct morphology measurements by combining the height-map output (such as the one offered by LocalZProjector) and the results of the cell segmentation on the 2D projection. In this paper we demonstrate DProj effectiveness over a wide range of different biological samples. We then compare its performance and accuracy against similar existing tools.ConclusionsWe find that LocalZProjector performs well even in situations where the volume to project contains spurious structures. We show that it can process large images without a pre-processing step. We study the impact of geometrical distortions on morphological measurements induced by the projection. We measured very large distortions which are then corrected by DeProj, providing accurate outputs.


2021 ◽  
Author(s):  
Shekh Md Mahmudul Islam

<p> This article is focused on providing some insight into the requirements for a non-contact continuous identity authentication system using radar sensing technologies. The article also discusses the basic principles supporting the potential new role of radar sensing technologies in a broad area of applications. It also highlights challenges associated with this new technology and provides some direction on what is needed to address requirements for real-world applications. </p>


2021 ◽  
Author(s):  
Shekh Md Mahmudul Islam

<p> This article is focused on providing some insight into the requirements for a non-contact continuous identity authentication system using radar sensing technologies. The article also discusses the basic principles supporting the potential new role of radar sensing technologies in a broad area of applications. It also highlights challenges associated with this new technology and provides some direction on what is needed to address requirements for real-world applications. </p>


2017 ◽  
Vol 1 (1) ◽  
pp. 44-49
Author(s):  
Nur Azizah ◽  
Dedeh Supriyanti ◽  
Siti Fairuz Aminah Mustapha ◽  
Holly Yang

In a company, the process of income and expense of money must have a profit-generating goal base. The success of financial management within the company, can be monitored from the ability of the financial management in managing the finances and utilize all the opportunities that exist with as much as possible with the aim to control the company's cash (cash flow) and the impact of generating profits in accordance with expectations. With a web-based online accounting system version 2.0, companies can be given the ease to manage money in and out of the company's cash. It has a user friendly system with navigation that makes it easy for the financial management to use it. Starting from the creation of a company's cash account used as a cash account and corporate bank account on the system, deletion or filing of cash accounts, up to the transfer invoice creation feature, receive and send money. Thus, this system is very effective and efficient in the management of income and corporate cash disbursements.   Keywords:​Accounting Online System, Financial Management, Cash and Bank


Diabetes ◽  
2020 ◽  
Vol 69 (Supplement 1) ◽  
pp. 1607-P
Author(s):  
MAYU HAYASHI ◽  
KATSUTARO MORINO ◽  
KAYO HARADA ◽  
MIKI ISHIKAWA ◽  
ITSUKO MIYAZAWA ◽  
...  

2013 ◽  
Vol 12 (7) ◽  
pp. 451-459
Author(s):  
Ashraf Yehia El-Naggar ◽  
Mohamed A. Ebiad

Gasoline come primarily from petroleum cuts, it is the preferred liquid fuel in our lives. Two gasoline samples of octane numbers 91 and 95 from Saudi Arabia petrol stations were studied. This study was achieved at three different temperatures 20oC, 30oC and 50oC representing the change in temperatures of the different seasons of the year. Both the evaporated gases of light aromatic hydrocarbons (BTEX) of gasoline samples inside the tank were subjected to analyze qualitatively and quantitatively via capillary gas chromatography. The detailed hydrocarbon composition and the octane number of the studied gasoline samples were determined using detailed hydrocarbon analyzer. The idea of research is indicating the impact of light aromatic compounds in gasoline on the toxic effect of human and environment on the one hand, and on octane number of gasoline on the other hand. Although the value of octane number will be reduced but this will have a positive impact on the environment as a way to produce clean fuel.


Sign in / Sign up

Export Citation Format

Share Document