Series-1 (Sep-Oct 2019)Sep-Oct 2019 Issue Statistics
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This study reviews how voice recognition can be used in making it easier for people with disabilities to access door systems and provide better security to lives and properties. Popular Biometric technology includes iris scan, fingerprint scan and facial recognition. These biometric identifiers are unique and distinctive based on features and characteristics used to identify different individuals for the safety and security of their lives and properties. Unfortunately, these biometrics can be hacked. An individual's finger can be cut off to perform fingerprint scan, an eye ball can be removed to perform an iris scan, a pin or password can be hacked, and a picture of the individual can be used to perform facial recognition. These setbacks can be averted with voice recognition biometrics technology...........
Keywords:Access Control, Biometrics, Security, Voice Recognition
[1]. Ehud, Y. Shapiro, The fifth-generation project—a trip report, 1983, 637-641.
[2]. M. Cho, and J. Kang, ―Voice Security On the Rise: Examining the Path to Secure Voice Automation,‖Alticast Inc. Colorado, 2017.
[3]. de Vries, N. Cross, and D. P. Grant, Design Methodology and Relationships with Science: Introduction. Eindhoven: Kluwer Academic Publishers. p. 32. 1992, Archived from the original on 2016-10-24
[4]. Schlage's History of Locks. (n.d.). Retrieved from http://www.locks.ru/germ/informat/schlagehistory.htm.
[5]. Key Dimensions. (n.d.). Retrieved from http://www.dimensionsinfo.com/tabular-key-dimensions
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Examination and Comparison of Signatures by Computational Technique |
| Country | : | India |
| Authors | : | Suramya || Poonam Prakash || Vaibhav Saran |
| : | 10.9790/0661-2105011316 ![]() |
Abstract: Many signature verification techniques have been developed in order to distinguish between the genuine signatures and the forgeries. In this paper, an attempt is made to provide an effective method of examination and comparison of signatures by using a computational technique. For various legal problems and in relation to their admissibility in court this computational approach is given which is used as a reflection of the true state of evidence and to strengthen ones observation regarding differences among the two specimens. The computational method of measuring pixel values of signatures based on distance and angle based classification of signatures with better accuracy...........
Keywords: Signature, Examination, comparison, computational approach.
[1]. Bhattacharya, I., Ghosh P., Biswas S., (2013) Offline Signature Verification Using Pixel Matching Technique, International Conference on Computational Intelligence: Modeling Techniques and Applications (CIMTA) 971-977
[2]. Datta, D., Saha R. and Jana R., (2014) Offline signature verification using Euclidian distance, International Journal of Computer science and Information Technologies, 5(1), 707-710
[3]. Gunjal, S.N, Dange B.J and Brahmane A.V, (2016) Offline signature verification using feature point extraction, International Journal of Computer Application, 141(14) ,6-15
[4]. Malik, V., and Arora A., (2015) Signature Recognition Using MATLAB, IJRASET, 3(VI), 682-687
[5]. Osborn, A. S, (1929) Questioned Documents" 2nd ed. Nelson-Hall, Chicago, 205-216, 226-233, 247-248, 363-376.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This paper titled simulation model to determine the severity of corruption in Adamawa State civil service identifies various forms of staff corruption. despite numerous anti-corruption strategies that have been put in place to curb corruption, such as Economic and Financial Crime Commission (EFCC), Independent Corrupt Practices Commission (ICPC), Police Code of Conduct Bureau (PCCB), Police Service Commission (PSC), the X-Squad Unit and Public Complaint Bureau (PCB), it remains difficult to reduce corruption within the sector. This paper analysed.........
Keywords: Corruption, Fuzzy logic Model, Simulation, MATLAB
[1]. A.Schleifer & R.W. Vishny. (1993). "Corruption." The Quarterly Journal of Economics: 599-617.
[2]. J. Pope. (2000). Transparency International Source Book 2000: Confronting Corruption: The Element of a National Integrity System 13. Online available from
http://www.transparency.org/content/download/2439/14493/file/sourcebook.pdf.zip
[3]. L. K. Hoffman & R. N. Patel (2017). Collective Action on Corruption in Nigeria A Social Norms Approach to Connecting Society and Institutions Great Britain: The Royal Institute of International Affairs, http://www.chathamhouse.org
[4]. M. Salihu. (2000).Corruption in Nigeria. Lancaster University Management School Working Paper 2000/006. The LUMS Working Papers series
[5]. M. Morteza,M. T. Gholamreza & R. Hamed. (2013) Administrative corruption: Providing fuzzy inference system of good governance to combat corruption. 13th Iranian Conference on Fuzzy Systems (ICFS). Qazvin, Iran: IEEE Online available [Accessed November 12, 2017]
