• Title/Summary/Keyword: Biometric

Search Result 769, Processing Time 0.033 seconds

Parasitic Behaviour of Xanthopimpla pedator Fabricius (Hymenoptera: Ichneumonidae) on Tropical Tasar Silkworm, Antheraea mylitta Drury (Lepidoptera: Saturniidae) Reared on Seven Forestry Host Plants in Uttarakhand, India

  • Bhatia, Narendra Kumar;Yousuf, Mohammad
    • International Journal of Industrial Entomology and Biomaterials
    • /
    • v.27 no.2
    • /
    • pp.243-264
    • /
    • 2013
  • Antheraea mylitta Drury is a commercial silk producing forest insect in India and Xanthopimpla pedator Fabricius is its larval-pupal endoparasitoid, which causes pupal mortality that affects seed production. Effects of host plants, rearing season and their interactions on parasitic behaviour of X. pedator were studied here, as influence of these factors on biological success of X. pedator is not known. Seven forest tree species were tested as food plants for A. mylitta, and rate of pupal parasitization in both the rearing seasons were recorded and analysed. Results showed that rearing season and host plants significantly affected the rate of pupal parasitization in both the sexes. Pupal mortality was found significantly higher (14.52%) in second rearing season than the first (2.89%). Likewise, host plants and rearing seasons significantly affected length, diameter, and shell thickness of cocoons in both sexes. Out of all infested pupae, 85.59% were found male, which indicated that X. pedator chooses male spinning larva of A. mylitta for oviposition, but we could not answer satisfactorily the why and how aspect of this sex specific parasitic behaviour of X. pedator. Multiple regression analysis indicated that length and shell thickness of male cocoons are potential predictors for pupal parasitization rate of X. pedator. Based on highest cocoon productivity and lowest pupal mortality, Terminalia alata, T. tomentosa, and T. arjuna were found to be the most suitable host plants for forest based commercial rearing of A. mylitta in tropical forest areas of Uttarakhand state, where it has never been reared earlier. Sex and season specific interaction of X. pedator with its larval-pupal host, A. mylitta is a novel entomological study to find out explanations for some of the unresolved research questions on parasitic behaviour of X. predator that opens a new area for specialised study on male specific parasitization in Ichneumonidae.

Cryptanalysis and Improvement of RSA-based Authentication Scheme for Telecare Medical Information Systems

  • Kim, Keewon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.2
    • /
    • pp.93-103
    • /
    • 2020
  • The telecare medical information system (TMIS) supports convenient and rapid health-care services. A secure and efficient authentication and key agreement scheme for TMIS provides safeguarding electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Giri et al. proposed an RSA-based remote user authentication scheme using smart cards for TMIS and claimed that their scheme could resist various malicious attacks. In this paper, we point out that their scheme is still vulnerable to lost smart card attacks and replay attacks and propose an improved scheme to prevent the shortcomings. As compared with the previous authentication schemes for TMIS, the proposed scheme is more secure and practical.

Changes of abdominal muscle activity according to trunk stabilization exercises using a Swiss ball

  • Lee, Suk Min;Lim, Hee Sung;Byun, Hyo Jin;Kim, Myung Joon
    • Physical Therapy Rehabilitation Science
    • /
    • v.9 no.1
    • /
    • pp.18-24
    • /
    • 2020
  • Objective: The purpose of this study was to compare the activities of the abdominal muscles according to trunk stabilization exercises using Swiss ball in normal individuals. Design: Cross-sectional study. Methods: Ten healthy university students participated in this study. The subjects were required to complete the following three exercise positions: Exercise position 1, sitting on a Swiss ball and lifting the legs; Exercise position 2, pushing to a plank position from an ending position; and Exercise position 3, push-up posture with the legs on a Swiss ball. Changes in the trunk muscle activities were estimated using Biometric electromyography (EMG). Activities of the dominant side internal oblique muscle (IOM) and external oblique muscle (EOM) were estimated in all participants. The maximal voluntary isometric contraction (MVIC %) was measured to standardize the EMG signals for the IOM and EOM during maximum resistance when sitting up with each shoulder pointing towards the contralateral pelvis with knees bent and both arms crossed on the chest for 5 seconds. Results: There was a significant difference in the activity of the internal and external oblique muscles between Exercises 1 and 2 and Exercises 1 and 3 (p<0.05). Furthermore, the IOM/EOM activity ratio was the greatest during Exercise 3 and the smallest during Exercise 1. IOM and EOM activities were the greatest during Exercise 2 with greater EOM activity. Conclusions: In future studies, it will be necessary to investigate muscle activities by supplementing the above-mentioned limitations during the stabilization exercise. The results of this study may be used as a basis for controlling the intensity and frequency of exercise while prescribing trunk stabilization exercises.

A Study on improvement for a means of access to electronic financial service (전자금융서비스 접근매체 변화에 따른 법제도 개선방안)

  • Han, Se Jin
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.17-22
    • /
    • 2015
  • As financial deregulation policies implemented by the government, electronic financial service is improved but security concerns are increasing and ultimately weaken trust in the financial service. Electronic financial service becomes more and more dependant on the IT platform and the initiatives of access device is also gradually shift to that platform. As biometric sensor is mounted on the smartphone, structural change in the access device is coming. It must be a positive signs in terms of fintech development, in the other side, it can cause many problems such as weakness of regulation and ambiguity of principals of responsibility. So in this paper, by analysing this problem-the shift of service initiative-on the access device I'll propose the best way to the the legal amendments.

Embedded-based Power Monitoring Security Module Design (임베디드 전력 모니터링 보안 모듈 설계)

  • Yoon, Chan-Ho;Kim, Gwang-Jun;Jang, Chang-Soo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.10
    • /
    • pp.1485-1490
    • /
    • 2013
  • The demonstration project of the electrical grid for Smart grid is progressed, the smart digital appliances AV technology, Smart home energy management technology charging the management function of complex energy for the automation management of air conditioning and heating, humidity and air, the health care technology charging the design of housing for the elderly and disabled and the measurement of individual bio information, and the Smart home security technology dealing with the biometric security and motion sensors, etc. have been studied. The power monitoring terminal which uses a variety of wired and wireless networks and protocol is the target additionally to be considered in addition to the security vulnerabilities that was occurred in the existing terminal. In this research paper, the author analyzes the cryptographic techniques corresponding to the smart meter occurred by the problems that are exposed on the outside which are vulnerable to physical attacks, and intends to propose the design of the security systems for the Smart meter terminal being able to maximize the efficiency of the terminal.

A study on face area detection using face features (얼굴 특징을 이용한 얼굴영역 검출에 관한 연구)

  • Park, Byung-Joon;Kim, Wan-Tae;Kim, Hyun-Sik
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.3
    • /
    • pp.206-211
    • /
    • 2020
  • It is Face recognition is a very important process in image monitoring and it is a form of biometric technology. The recognition process involves many variables and is highly complex, so the software development has only begun recently with the development of hardware. Face detection technology using the CCTV is a process that precedes face analysis, and it is a technique that detects where the face is in the image. Research in face detection and recognition has been difficult because the human face reacts sensitively to different environmental conditions, such as lighting, color of skin, direction, angle and facial expression. The utility and importance of face recognition technology is coming into the limelight over time, but many aspects are being overlooked in the facial area detection technology that must precede face recognition. The system in this paper can detect tilted faces that cannot be detected by the AdaBoost detector and It could also be used to detect other objects.

User Authentication Mechanism using Smartphone (스마트폰을 이용한 사용자 인증 메커니즘)

  • Jeong, Pil-seong;Cho, Yang-hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.301-308
    • /
    • 2017
  • With the popularization of smart phones and the development of the Internet, many people use smart phones to conduct identity verification procedures. smart phones are easier and faster to authenticate than personal desktop computers. However, as Internet hacking technology and malicious code distribution technology rapidly evolve and attack types become more diverse, authentication methods suitable for mobile environment are required. As authentication methods, there are methods such as possessive-based authentication, knowledge-based authentication, biometric-based authentication, pattern-based authentication, and multi-element authentication. In this paper, we propose a user authentication mechanism that uses collected information as authentication factor using smart phone. Using the proposed authentication mechanism, it is possible to use the smart phone information and environment information of the user as a hidden authentication factor, so that the authentication process can be performed without being exposed to others. We implemented the user authentication system using the proposed authentication mechanism and evaluated the effectiveness based on applicability, convenience, and security.

An Improved ID-based Anonymous Authentication Scheme for Wireless Body Area Networks (WBAN 환경에서의 개선된 ID 기반 익명 인증 기법)

  • Jeong, Min-Soo;Suk, Jae Hyuk;Lee, Dong Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.322-332
    • /
    • 2017
  • Wireless Body Area Networks is an environment that provides an appropriate service remotely by collecting user's biometric information. With the growing importance of sensor, WBAN also attracts extensive attention. Since WBAN is representatively used in the medical field, it can be directly related to the patient's life. Hence security is very important in WBAN. Mutual authentication between the client and the application provider is essential. And efficiency is also important because a used device is limited to computation cost. In this reason, ID-based anonymous authentication scheme in WBAN has been intensively studied. We show that the recent research result of Wu et al. which is about the ID-based anonymous authentication scheme is vulnerable to impersonation attack. And we propose a new ID-based anonymous authentication scheme that is secure against the attacks discovered in the existing schemes. Compared to the existing schemes, the computation cost of our scheme is improved by 30.6% and 7.3%.

Adaptive Hybrid Fingerprint Matching Method Based on Minutiae and Filterbank (특징점과 필터뱅크에 기반한 적응적 혼합형 지문정합 방법)

  • 정석재;박상현;문성림;김동윤
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.7
    • /
    • pp.959-967
    • /
    • 2004
  • Jain et al. proposed the hybrid matching method which was combined the minutia-based matching method and the filter-bank based matching method. And, their experimental results proved the hybrid matching method was more effective than each of them. However, this hybrid method cannot utilize each peculiar advantage of two methods. The reason is that it gets the matching score by simply summing up each weighted matching score after executing two methods individually. In this paper, we propose new hybrid matching method. It mixes two matching methods during the feature extraction process. This new hybrid method has lower ERR than the filter-bank based method and higher ERR than the minutia-based method. So, we propose the adaptive hybrid scoring method, which selects the matching score in order to preserve the characteristics of two matching methods. Using this method, we can get lower ERR than the hybrid matcher by Jain et al. Experimental results indicate that the proposed methods can improve the matching performance up to about 1% in ERR.

Multimodal Biometrics Recognition from Facial Video with Missing Modalities Using Deep Learning

  • Maity, Sayan;Abdel-Mottaleb, Mohamed;Asfour, Shihab S.
    • Journal of Information Processing Systems
    • /
    • v.16 no.1
    • /
    • pp.6-29
    • /
    • 2020
  • Biometrics identification using multiple modalities has attracted the attention of many researchers as it produces more robust and trustworthy results than single modality biometrics. In this paper, we present a novel multimodal recognition system that trains a deep learning network to automatically learn features after extracting multiple biometric modalities from a single data source, i.e., facial video clips. Utilizing different modalities, i.e., left ear, left profile face, frontal face, right profile face, and right ear, present in the facial video clips, we train supervised denoising auto-encoders to automatically extract robust and non-redundant features. The automatically learned features are then used to train modality specific sparse classifiers to perform the multimodal recognition. Moreover, the proposed technique has proven robust when some of the above modalities were missing during the testing. The proposed system has three main components that are responsible for detection, which consists of modality specific detectors to automatically detect images of different modalities present in facial video clips; feature selection, which uses supervised denoising sparse auto-encoders network to capture discriminative representations that are robust to the illumination and pose variations; and classification, which consists of a set of modality specific sparse representation classifiers for unimodal recognition, followed by score level fusion of the recognition results of the available modalities. Experiments conducted on the constrained facial video dataset (WVU) and the unconstrained facial video dataset (HONDA/UCSD), resulted in a 99.17% and 97.14% Rank-1 recognition rates, respectively. The multimodal recognition accuracy demonstrates the superiority and robustness of the proposed approach irrespective of the illumination, non-planar movement, and pose variations present in the video clips even in the situation of missing modalities.