Search results for: types of biometrics
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5342

Search results for: types of biometrics

5312 Description of the Non-Iterative Learning Algorithm of Artificial Neuron

Authors: B. S. Akhmetov, S. T. Akhmetova, A. I. Ivanov, T. S. Kartbayev, A. Y. Malygin

Abstract:

The problem of training of a network of artificial neurons in biometric appendices is that this process has to be completely automatic, i.e. the person operator should not participate in it. Therefore, this article discusses the issues of training the network of artificial neurons and the description of the non-iterative learning algorithm of artificial neuron.

Keywords: artificial neuron, biometrics, biometrical applications, learning of neuron, non-iterative algorithm

Procedia PDF Downloads 466
5311 The Study of Groundcover for Heat Reduction

Authors: Winai Mankhatitham

Abstract:

This research investigated groundcover on the roof (green roof) which can reduce the temperature and carbon monoxide. This study is divided into 3 main aspects: 1) Types of groundcover affecting heat reduction, 2) The efficiency on heat reduction of 3 types of groundcover, i.e. lawn, arachis pintoi, and purslane, 3) Database for designing green roof. This study has been designed as an experimental research by simulating the 3 types of groundcover in 3 trays placed in the green house for recording the temperature change for 24 hours. The results showed that the groundcover with the highest heat reduction efficiency was lawn. The dense of the lawn can protect the heat transfer to the soil. For the further study, there should be a comparative study of the thickness and the types of soil to get more information for the suitable types of groundcover and the soil for designing the energy saving green roof.

Keywords: green roof, heat reduction, groundcover, energy saving

Procedia PDF Downloads 493
5310 New Approach for Constructing a Secure Biometric Database

Authors: A. Kebbeb, M. Mostefai, F. Benmerzoug, Y. Chahir

Abstract:

The multimodal biometric identification is the combination of several biometric systems. The challenge of this combination is to reduce some limitations of systems based on a single modality while significantly improving performance. In this paper, we propose a new approach to the construction and the protection of a multimodal biometric database dedicated to an identification system. We use a topological watermarking to hide the relation between face image and the registered descriptors extracted from other modalities of the same person for more secure user identification.

Keywords: biometric databases, multimodal biometrics, security authentication, digital watermarking

Procedia PDF Downloads 351
5309 A Comprehensive Survey on Machine Learning Techniques and User Authentication Approaches for Credit Card Fraud Detection

Authors: Niloofar Yousefi, Marie Alaghband, Ivan Garibay

Abstract:

With the increase of credit card usage, the volume of credit card misuse also has significantly increased, which may cause appreciable financial losses for both credit card holders and financial organizations issuing credit cards. As a result, financial organizations are working hard on developing and deploying credit card fraud detection methods, in order to adapt to ever-evolving, increasingly sophisticated defrauding strategies and identifying illicit transactions as quickly as possible to protect themselves and their customers. Compounding on the complex nature of such adverse strategies, credit card fraudulent activities are rare events compared to the number of legitimate transactions. Hence, the challenge to develop fraud detection that are accurate and efficient is substantially intensified and, as a consequence, credit card fraud detection has lately become a very active area of research. In this work, we provide a survey of current techniques most relevant to the problem of credit card fraud detection. We carry out our survey in two main parts. In the first part, we focus on studies utilizing classical machine learning models, which mostly employ traditional transnational features to make fraud predictions. These models typically rely on some static physical characteristics, such as what the user knows (knowledge-based method), or what he/she has access to (object-based method). In the second part of our survey, we review more advanced techniques of user authentication, which use behavioral biometrics to identify an individual based on his/her unique behavior while he/she is interacting with his/her electronic devices. These approaches rely on how people behave (instead of what they do), which cannot be easily forged. By providing an overview of current approaches and the results reported in the literature, this survey aims to drive the future research agenda for the community in order to develop more accurate, reliable and scalable models of credit card fraud detection.

Keywords: Credit Card Fraud Detection, User Authentication, Behavioral Biometrics, Machine Learning, Literature Survey

Procedia PDF Downloads 89
5308 A Method of Detecting the Difference in Two States of Brain Using Statistical Analysis of EEG Raw Data

Authors: Digvijaysingh S. Bana, Kiran R. Trivedi

Abstract:

This paper introduces various methods for the alpha wave to detect the difference between two states of brain. One healthy subject participated in the experiment. EEG was measured on the forehead above the eye (FP1 Position) with reference and ground electrode are on the ear clip. The data samples are obtained in the form of EEG raw data. The time duration of reading is of one minute. Various test are being performed on the alpha band EEG raw data.The readings are performed in different time duration of the entire day. The statistical analysis is being carried out on the EEG sample data in the form of various tests.

Keywords: electroencephalogram(EEG), biometrics, authentication, EEG raw data

Procedia PDF Downloads 442
5307 Development of a Secured Telemedical System Using Biometric Feature

Authors: O. Iyare, A. H. Afolayan, O. T. Oluwadare, B. K. Alese

Abstract:

Access to advanced medical services has been one of the medical challenges faced by our present society especially in distant geographical locations which may be inaccessible. Then the need for telemedicine arises through which live videos of a doctor can be streamed to a patient located anywhere in the world at any time. Patients’ medical records contain very sensitive information which should not be made accessible to unauthorized people in order to protect privacy, integrity and confidentiality. This research work focuses on a more robust security measure which is biometric (fingerprint) as a form of access control to data of patients by the medical specialist/practitioner.

Keywords: biometrics, telemedicine, privacy, patient information

Procedia PDF Downloads 269
5306 Trees in Different Vegetation Types of Mt. Hamiguitan Range, Davao Oriental, Mindanao Island, Philippines

Authors: Janece Jean A. Polizon, Victor B. Amoroso

Abstract:

Mt. Hamiguitan Range in Davao Oriental, Mindanao Island, Philippines is the only protected area with pygmy forest and a priority site for protection and conservation. This range harbors different vegetation types such as agroecosystem, dipterocarp forest, montane forest and mossy forest. This study was conducted to determine the diversity of trees and shrubs in different vegetation types of Mt. Hamiguitan Range. Transect walk and 16 sampling plots of 20 x 20 m were established in the different vegetation types. Specimens collected were classified and identified using the Flora Malesiana and type images. Assessment of status was determined based on International Union for the Conservation of Nature (IUCN). There were 223 species of trees, 141 genera and 71 families. Of the vegetation types, the pygmy forest obtained a comparatively high diversity value of H=1.348 followed by montane forest with H=1.284. The high species importance value (SIV) of Diospyros philippinensis for trees indicates that these species have an important role in regulating the stability of the ecosystem. The tree profile of the pygmy forest is different due to the ultramafic substrate causing the dwarfness of the trees. These forest types should be given high priority for protection and conservation.

Keywords: diversity, Mt Hamiguitan, vegetation, trees, shrubs

Procedia PDF Downloads 376
5305 Residents’ Awareness of Green Infrastructure Types in the Neighbourhood: Panacea for Biodiversity Conservation

Authors: Adedotun Ayodele Dipeolu, Olusegun Ayotunde Oriola

Abstract:

Rapid urban growth has led to the loss of contact with nature for most urban residents. While Green Infrastructure (GI) is promoted as a strategy to manage ecosystems’ functionality, the extent to which residents are aware of GI types which serve as alternatives to conventional landscapes to be conserved remains unclear. This paper examines the awareness level of GI types among residents of Lagos Metropolis, Nigeria and the association of their demographic characteristics with the level of awareness. Multi-stage sampling technique was used to select 1560 residents who completed semi-structured questionnaires. Descriptive statistics were used to explore data distributions while t-test assessed the differences in the awareness level of the male and female participants. From the 23 different types of GI facilities identified in the study area, residents reported a high level of awareness on just five of them. These include green gardens, green parks, grasses, street trees, and sports fields but a low level of awareness of the remaining 18 GI types. Awareness of GI types is presently low in the study area. Increased awareness will encourage care and protection of green infrastructure by residents which will consequently enhance availability and conservation of more biodiversity in Lagos, Nigeria, and other nations.

Keywords: awareness, biodiversity conservation, environmental sustainability, green infrastructure, urban centres

Procedia PDF Downloads 186
5304 Differentiation of Customer Types by Stereotypical Characteristics for Modular and Conventional Construction Methods

Authors: Peter Schnell, Phillip Haag

Abstract:

In the course of the structural transformation of the construction industry, the integration of industrialization and digitization has led to the development of construction methods with an increased degree of prefabrication, such as system or modular construction. Compared to conventional construction, these innovative construction methods are characterized by modified structural and procedural properties and expand the range of construction services. Faced with the supply side, it is possible to identify construction-specific customer types with different characteristics and certain preferences as far as the choice of construction method is concerned. The basis for this finding was qualitative expert interviews. By evaluating the stereotypical customer needs, a corresponding segmentation of the demand side can be made along with the basic orientation and decision behavior. This demarcation supports the target- and needs-oriented customer approach and contributes to cooperative and successful project management.

Keywords: differentiation of customer types, modular construction methods, conventional construction methods, stereotypical customer types

Procedia PDF Downloads 87
5303 The Classical Conditioning Effect of Animated Spokes-Characters

Authors: Chia-Ching Tsai, Ting-Hsiu Chen

Abstract:

This paper adopted 2X2 factorial design. One factor was experimental versus control condition. The other factor was types of animated spokescharacter, and one of the two levels was expert type, and the other level is attractive type. In the study, we use control versus experimental conditioning and types of animated spokescharacter as independent variables, and brand attitude as dependent variable to examine the conditioning effect of types of animated spokescharacter on brand attitude. There are 123 subjects participating in the experiment. The results showed conditioning group presents that animated spokescharacter has significantly superior effect of product endorsement in contrast to non-conditioning one, while there is no significant impact of types of animated spokescharacter on brand attitude.

Keywords: classical conditioning, animated spokes-character, brand attitude, factorial design

Procedia PDF Downloads 251
5302 The Effect of Socialization Tactics on Job Satisfaction of Employees, Regarding to Personality Types in Tehran University of Medical Science’s Employees

Authors: Maryam Hoorzad, Narges Shokry, Mandan Momeni

Abstract:

According to importance of socialization in effectiveness of organizations and on the other hand assessing the impact of individual differences on socialization tactics by measuring employees satisfaction, can be assessed for each of the personality types which socialization tactics is the more effective. The aim of this paper is to investigate how organizational socialization tactics affect job satisfaction of employees according to personality types. A survey was conducted using a measurement tool based on Van Maanen and Schein’s theory on organizational socialization tactics and Myers Briggs’ measurement tools of personality types. The respondents were employees with more than 3 years backward in Tehran University of Medical Science. Data collection was performed using both library and field, the data collection instrument was questionnaires and data were analysed using the Spss and Lisrel programs. It was found that investiture and serial tactics has a significant effect on employees satisfaction, any increase in investiture and serial tactics led to increase in job satisfaction and any increase in divestiture and disjunctive tactics led to reduction of job satisfaction. Investiture tactic has the most effect on employees satisfaction. Also based on the results, personality types affect the relationship between socialization tactics and job satisfaction. In the ESFJ personality type the effect of investiture tactic on employee satisfaction is the most.

Keywords: organizational socialization, organizational socialization tactics, personality types, job satisfaction

Procedia PDF Downloads 406
5301 Study of Phenotypic Polymorphism and Detection of Genotypic Polymorphism in Menochilus sexmaculatus (Coleoptera: Insecta) Using RAPD PCR

Authors: Huma Balouch

Abstract:

Menochilus sexmaculatus commonly known as six spotted zig zag ladybird, is an aphidophagus and the most misidentified Coccinellids due to the occurrence of numerous color variants. The correct identification of Menochilus sexmaculatus and its strains is necessary to implement the use of biological control. In the present study phenotypic and genotypic polymorphism was investigated in Menochilus sexmaculatus collected from Punjab, NWFP and Sindh provinces of Pakistan. Six different morphs of the species were distinguished by analyzing its Elytral color and spot pattern and then Polymerase Chain Reaction was used to generate random amplification of polymorphic DNA (RAPD) from six different types of Menochilus sexmaculatus. Forty primers (OPA & OPC Kit) were used to perform RAPD PCR on six different types of Menochilus sexmaculatus of which, seven primers revealed different patterns related to the Menochilus sexmaculatus types. These seven primers (OPA-04, OPA-09, OPA-18, OPC-04, OPC-12, OPC-15 and OPC-18) produced 111 clear polymorphic bands and 6 scorable strain specific markers. The cluster analysis applied to RAPD data showed high polymorphism among six types and it can be concluded that these six types are six polymorphic strains of the same species.

Keywords: Menochilus sexmaculatus, aphidophagus, coccinellids, phenotypic and genotypic polymorphism, RAPD-PCR, strain specific markers

Procedia PDF Downloads 464
5300 Human Identification Using Local Roughness Patterns in Heartbeat Signal

Authors: Md. Khayrul Bashar, Md. Saiful Islam, Kimiko Yamashita, Yano Midori

Abstract:

Despite having some progress in human authentication, conventional biometrics (e.g., facial features, fingerprints, retinal scans, gait, voice patterns) are not robust against falsification because they are neither confidential nor secret to an individual. As a non-invasive tool, electrocardiogram (ECG) has recently shown a great potential in human recognition due to its unique rhythms characterizing the variability of human heart structures (chest geometry, sizes, and positions). Moreover, ECG has a real-time vitality characteristic that signifies the live signs, which ensure legitimate individual to be identified. However, the detection accuracy of the current ECG-based methods is not sufficient due to a high variability of the individual’s heartbeats at a different instance of time. These variations may occur due to muscle flexure, the change of mental or emotional states, and the change of sensor positions or long-term baseline shift during the recording of ECG signal. In this study, a new method is proposed for human identification, which is based on the extraction of the local roughness of ECG heartbeat signals. First ECG signal is preprocessed using a second order band-pass Butterworth filter having cut-off frequencies of 0.00025 and 0.04. A number of local binary patterns are then extracted by applying a moving neighborhood window along the ECG signal. At each instant of the ECG signal, the pattern is formed by comparing the ECG intensities at neighboring time points with the central intensity in the moving window. Then, binary weights are multiplied with the pattern to come up with the local roughness description of the signal. Finally, histograms are constructed that describe the heartbeat signals of individual subjects in the database. One advantage of the proposed feature is that it does not depend on the accuracy of detecting QRS complex, unlike the conventional methods. Supervised recognition methods are then designed using minimum distance to mean and Bayesian classifiers to identify authentic human subjects. An experiment with sixty (60) ECG signals from sixty adult subjects from National Metrology Institute of Germany (NMIG) - PTB database, showed that the proposed new method is promising compared to a conventional interval and amplitude feature-based method.

Keywords: human identification, ECG biometrics, local roughness patterns, supervised classification

Procedia PDF Downloads 379
5299 Spelling Errors of EFL Students: An Insight into Curriculum Development

Authors: Sheikha Ali Salim Al-Breiki

Abstract:

The purpose of this study was to explore the types of the spelling errors students of grade ten make and to find out whether there were any significant differences between males and females with respect to the types of the spelling errors made. The sample of the study included 90 grade ten students from four different schools in North Batinah. The researcher manipulated the use of a test that consisted of two questions: an oral dictation test of 70 words with a contextualizing sentence and a free writing task. The misspellings were classified into nine different types. The findings revealed that the most common spelling errors among Omani grade ten students were vowel substitution, then came vowel omission in the second place and consonant substitution in the third place. Male students omitted more vowels than female students while females made more true word errors than their male counterparts. In light of the findings, the study presents some recommendations and suggestions for further studies.

Keywords: types of spelling errors, errors, ESL/EFL, error analysis

Procedia PDF Downloads 351
5298 Memory Types in Hemodialysis Patients: A Study Based on Hemodialysis Duration, Zahedan, South East of Iran

Authors: B. Sabayan, A. Alidadi, S. Ebrahimi, N. M. Bakhshani

Abstract:

Neuropsychological problems are more common in hemodialysis (HD) patients than in healthy individuals. The aim of this study was to investigate the effect of long term HD on memory types of HD patients. To assess the different type of memory, we used memory parts of the Persian Papers and Pencil Cognitive assessment package (PCAP) and Addenbrooke's Cognitive Examination (ACE-R). Our study included 80 HD patients of whom 39 had less than six months of HD and 41 patients and another group which had a history of HD more than six months. The population had a mean age of 51.60 years old and 27.5% of them were female. The scores of patients who have been hemodialyzed for a long time (median time of HD was up to 4 years) had lower score in anterograde, explicit, visual, recall and recognition memory (5.44±1.07, 9.49±3.472, 22.805±6.6913, 5.59±10.435, 11.02±3.190 score) than the HD patients who underwent HD for a shorter term, where the median time was 3 to 5 months (P<0.01). The regression result shows that, by increasing the HD duration, all memory types are reduced (R2=0.600, P<0.01). The present study demonstrated that HD patients who were under HD for a long time had significantly lower scores in the different types of memory. However, additional researches are needed in this area.

Keywords: hemodialysis patients, duration of hemodialysis, memory types, Zahedan

Procedia PDF Downloads 149
5297 Identification of Location Parameters for Different User Types of the Inner-City Building Stock: An Austrian Example

Authors: Bernhard Bauer, Thomas Meixner, Amir Dini, Detlef Heck

Abstract:

The inner city building stock is characterized by different types of buildings of different decades and centuries and different types of historical constructions. Depending on the natural growth of a city, those types are often located in downtown areas and the surrounding suburbs. Since the population is becoming older and the variation of the different social requirements spread with the so-called 'Silver Society', city quarters have to be seen alternatively. If an area is very attractive for young students to live there because of the busy nightlife, it might not be suitable for the older society. To identify 'Location Types A, B, C' for different user groups, qualitative interviews with 24 citizens of the city of Graz (Austria) have been carried out, in order to identify the most important values for making a location or city quarter 'A', 'B', or 'C'. Furthermore these acknowledgements have been put into a softwaretool for predicting locations that are the most suitable for certain user groups. On the other hands side, investors or owners of buildings can use the tool for determining the most suitable user group for the location of their building or construction project in order to adapt the project or building stock to the requirements of the users.

Keywords: building stock, location parameters, inner city population, built environment

Procedia PDF Downloads 294
5296 An Architecture Based on Capsule Networks for the Identification of Handwritten Signature Forgery

Authors: Luisa Mesquita Oliveira Ribeiro, Alexei Manso Correa Machado

Abstract:

Handwritten signature is a unique form for recognizing an individual, used to discern documents, carry out investigations in the criminal, legal, banking areas and other applications. Signature verification is based on large amounts of biometric data, as they are simple and easy to acquire, among other characteristics. Given this scenario, signature forgery is a worldwide recurring problem and fast and precise techniques are needed to prevent crimes of this nature from occurring. This article carried out a study on the efficiency of the Capsule Network in analyzing and recognizing signatures. The chosen architecture achieved an accuracy of 98.11% and 80.15% for the CEDAR and GPDS databases, respectively.

Keywords: biometrics, deep learning, handwriting, signature forgery

Procedia PDF Downloads 46
5295 Identifying Promoters and Their Types Based on a Two-Layer Approach

Authors: Bin Liu

Abstract:

Prokaryotic promoter, consisted of two short DNA sequences located at in -35 and -10 positions, is responsible for controlling the initiation and expression of gene expression. Different types of promoters have different functions, and their consensus sequences are similar. In addition, their consensus sequences may be different for the same type of promoter, which poses difficulties for promoter identification. Unfortunately, all existing computational methods treat promoter identification as a binary classification task and can only identify whether a query sequence belongs to a specific promoter type. It is desired to develop computational methods for effectively identifying promoters and their types. Here, a two-layer predictor is proposed to try to deal with the problem. The first layer is designed to predict whether a given sequence is a promoter and the second layer predicts the type of promoter that is judged as a promoter. Meanwhile, we also analyze the importance of feature and sequence conversation in two aspects: promoter identification and promoter type identification. To the best knowledge of ours, it is the first computational predictor to detect promoters and their types.

Keywords: promoter, promoter type, random forest, sequence information

Procedia PDF Downloads 165
5294 Safety and Efficacy of Recombinant Clostridium botulinum Types B Vaccine Candidate

Authors: Mi-Hye Hwang, Young Min Son, Kichan Lee, Bang-Hun Hyun, Byeong Yeal Jung

Abstract:

Botulism is a paralytic disease of human beings and animals caused by neurotoxin produced by Clostridium botulinum. The neurotoxins are genetically distinguished into 8 types, A to H. Ingestion of performed toxin, usually types B, C, and D, have been shown to produce diseases in most cases of cattle botulism. Vaccination is the best measure to prevent cattle botulism. However, the commercially available toxoid-based vaccines are difficult and hazardous to produce. We produced recombinant protein using gene of heavy chain domain of botulinum toxin B of which binds to cellular receptor of neuron cells and used as immunogen. In this study, we evaluated the safety and efficacy of botulism vaccine composed of recombinant types B. Safety test was done by National Regulation for Veterinary Biologicals. For efficacy test, female ICR mice (5 weeks old) were subcutaneously injected, intraperitoneally challenged, and examined the survival rates compared with vaccination and non-vaccination group. Mouse survival rate of recombinant types B vaccine was above 80%, while one of non-vaccination group was 0%. A vaccine composed of recombinant types B was safe and efficacious in mouse. Our results suggest that recombinant heavy chain receptor binding domain can be used as an effective vaccine candidate for type B botulism.

Keywords: botulism, livestock, vaccine, recombinant protein, toxin

Procedia PDF Downloads 204
5293 The Performance of Saudi Banking Industry 2000 -2011: Have the Banks Distinguished Themselves from One Another?

Authors: Bukhari M. S. Sillah, Imran Khokhar, Muhammad Nauman Khan

Abstract:

This paper studies the technical efficiency of Saudi banking sector using stochastic frontier model. A sample of 12 banks over the period 2000-2011 is selected to investigate their technical efficiencies in mobilizing deposits, producing investment and generating income. The banks are categorized as Saudi-owned banks, Saudi-foreign-owned banks and Islamic banks. The findings show some consistent pattern of these bank types; and there exist significant disparities among the banks in term of technical efficiency. The Banque Saudi Fransi stands out as a benchmark bank for the industry, and it is a Saudi-foreign owned bank type. The Saudi owned bank types have shown fluctuating performance during the period; and the Islamic bank types are no significantly different from Saudi-owned bank types.

Keywords: technical efficiency, production frontier model, Islamic banking

Procedia PDF Downloads 456
5292 The Effects of Different Types of Cement on the Permeability of Deep Mixing Columns

Authors: Mojebullah Wahidy, Murat Olgun

Abstract:

In this study, four different types of cement are used to investigate the permeability of DMC (Deep Mixing Column) in the clay. The clay used in this research is in the kaolin group, and the types of cement are; CEM I 42.5.R. normal portland cement, CEM II/A-M (P-L) pozzolan doped cement, CEM III/A 42.5 N blast furnace slag cement and DMFC-800 fine-grained portland cement. Firstly, some rheological tests are done on every cement, and a 0.9 water/cement ratio is selected as the appropriate ratio. This ratio is used to prepare the small-scale DMCs for all types of cement with %6, %9, %12, and %15, which are determined as the dry weight of the clay. For all the types of cement, three samples were prepared in every percentage and were kept on curing for 7, 14, and 28 days for permeability tests. As a result of the small-scale DMCs, permeability tests, a %12 selected for big-scale DMCs. A total of five big scales DMC were prepared by using a %12-cement and were kept for 28 days curing for permeability tests. The results of the permeability tests show that by increasing the cement percentage and curing time of all DMCs, the permeability coefficient (k) is decreased. Despite variable results in different cement ratios and curing time in general, samples treated by DMFC-800 fine-grained cement have the lowest permeability coefficient. Samples treated with CEM II and CEM I cement types were the second and third lowest permeable samples. The highest permeability coefficient belongs to the samples that were treated with CEM III cement type.

Keywords: deep mixing column, rheological test, DMFC-800, permeability test

Procedia PDF Downloads 49
5291 Programming with Grammars

Authors: Peter M. Maurer Maurer

Abstract:

DGL is a context free grammar-based tool for generating random data. Many types of simulator input data require some computation to be placed in the proper format. For example, it might be necessary to generate ordered triples in which the third element is the sum of the first two elements, or it might be necessary to generate random numbers in some sorted order. Although DGL is universal in computational power, generating these types of data is extremely difficult. To overcome this problem, we have enhanced DGL to include features that permit direct computation within the structure of a context free grammar. The features have been implemented as special types of productions, preserving the context free flavor of DGL specifications.

Keywords: DGL, Enhanced Context Free Grammars, Programming Constructs, Random Data Generation

Procedia PDF Downloads 121
5290 Skin Care through Ayurveda

Authors: K. L. Virupaksha Gupta

Abstract:

Ayurveda offers a holistic outlook regarding skin care. Most Initial step in Ayurveda is to identify the skin type and care accordingly which is highly personalized. Though dermatologically there are various skin type classifications such Baumann skin types (based on 4 parameters i) Oily Vs Dry ii) Sensitive Vs Resistant iii) Pigmented Vs Non-Pigmented iv) Wrinkled Vs Tight (Unwrinkled) etc but Skin typing in Ayurveda is mainly determined by the prakriti (constitution) of the individual as well as the status of Doshas (Humors) which are basically of 3 types – i.e Vata Pitta and Kapha,. Difference between them is mainly attributed to the qualities of each dosha (humor). All the above said skin types can be incorporated under these three types. The skin care modalities in each of the constitution vary greatly. Skin of an individual of Vata constitution would be lustreless, having rough texture and cracks due to dryness and thus should be given warm and unctuous therapies and oil massage for lubrication and natural moisturizers for hydration. Skin of an individual of Pitta constitution would look more vascular (pinkish), delicate and sensitive with a fair complexion, unctuous and tendency for wrinkles and greying of hair at an early age and hence should be given cooling and nurturing therapies and should avoid tanning treatments. Skin of an individual of kapha constitution will have oily skin, they are delicate and look beautiful and radiant and hence these individuals would require therapies to mainly combat oily skin. Hence, the skin typing and skin care in Ayurveda is highly rational and scientific.

Keywords: Ayurveda, dermatology, Dosha, skin types

Procedia PDF Downloads 380
5289 BAN Logic Proof of E-passport Authentication Protocol

Authors: Safa Saoudi, Souheib Yousfi, Riadh Robbana

Abstract:

E-passport is a relatively new electronic document which maintains the passport features and provides better security. It deploys new technologies such as biometrics and Radio Frequency identification (RFID). The international civil aviation organization (ICAO) and the European union define mechanisms and protocols to provide security but their solutions present many threats. In this paper, a new mechanism is presented to strengthen e-passport security and authentication process. We propose a new protocol based on Elliptic curve, identity based encryption and shared secret between entities. Authentication in our contribution is formally proved with BAN Logic verification language. This proposal aims to provide a secure data storage and authentication.

Keywords: e-passport, elliptic curve cryptography, identity based encryption, shared secret, BAN Logic

Procedia PDF Downloads 410
5288 Effects of Reversible Watermarking on Iris Recognition Performance

Authors: Andrew Lock, Alastair Allen

Abstract:

Fragile watermarking has been proposed as a means of adding additional security or functionality to biometric systems, particularly for authentication and tamper detection. In this paper we describe an experimental study on the effect of watermarking iris images with a particular class of fragile algorithm, reversible algorithms, and the ability to correctly perform iris recognition. We investigate two scenarios, matching watermarked images to unmodified images, and matching watermarked images to watermarked images. We show that different watermarking schemes give very different results for a given capacity, highlighting the importance of investigation. At high embedding rates most algorithms cause significant reduction in recognition performance. However, in many cases, for low embedding rates, recognition accuracy is improved by the watermarking process.

Keywords: biometrics, iris recognition, reversible watermarking, vision engineering

Procedia PDF Downloads 424
5287 Exploring Subjective Simultaneous Mixed Emotion Experiences in Middle Childhood

Authors: Esther Burkitt

Abstract:

Background: Evidence is mounting that mixed emotions can be experienced simultaneously in different ways across the lifespan. Four types of patterns of simultaneously mixed emotions (sequential, prevalent, highly parallel, and inverse types) have been identified in middle childhood and adolescence. Moreover, the recognition of these experiences tends to develop firstly when children consider peers rather than the self. This evidence from children and adolescents is based on examining the presence of experiences specified in adulthood. The present study, therefore, applied an exhaustive coding scheme to investigate whether children experience types of previously unidentified simultaneous mixed emotional experiences. Methodology: One hundred and twenty children (60 girls) aged 7 years 1 month - 9 years 2 months (X=8 years 1 month; SD = 10 months) were recruited from mainstream schools across the UK. Two age groups were formed (youngest, n = 61, 7 years 1 month- 8 years 1 months: oldest, n = 59, 8 years 2 months – 9 years 2 months) and allocated to one of two conditions hearing vignettes describing happy and sad mixed emotion events in age and gender-matched protagonist or themselves. Results: Loglinear analyses identified new types of flexuous, vertical, and other experiences along with established sequential, prevalent, highly parallel, and inverse types of experience. Older children recognised more complex experiences other than the self-condition. Conclusion: Several additional types of simultaneously mixed emotions are recognised in middle childhood. The theoretical relevance of simultaneous mixed emotion processing in childhood is considered, and the potential utility of the findings in emotion assessments is discussed.

Keywords: emotion, childhood, self, other

Procedia PDF Downloads 50
5286 Using Eye-Tracking to Investigate TEM Validity and Design

Authors: Cao Xi

Abstract:

This paper reports a study which used eye-tracking to examine the cognitive validity of TEM 8(Test for English Majors, Band 8). The study investigated test takers' reading patterns on four -item types using eye-tracking, and interviews. Thirty participants completed 22 items on a computer, with the Tobii X2 Eye Tracker recording their eye movements on screen. Eleven students further participated in a recall interview while viewing video footage of their gaze patterns on the test. The findings will indicate that first, different reading item types will employ different cognitive processes; then different reading patterns for stronger and weaker test takers’on each item types. The implication of this study is to provide recommendations for the use of eye tracking technology in language research.

Keywords: eye tracking, reading patterns, test for english majors, cognitive validity

Procedia PDF Downloads 125
5285 A Research Analysis on the Source Technology and Convergence Types

Authors: Kwounghee Choi

Abstract:

Technological convergence between the various sectors is expected to have a very large impact on future industrial and economy. This study attempts to do empirical approach between specific technologies’ classification. For technological convergence classification, it is necessary to set the target technology to be analyzed. This study selected target technology from national research and development plan. At first we found a source technology for analysis. Depending on the weight of source technology, NT-based, BT-based, IT-based, ET-based, CS-based convergence types were classified. This study aims to empirically show the concept of convergence technology and convergence types. If we use the source technology to classify convergence type, it will be useful to make practical strategies of convergence technology.

Keywords: technology convergence, source technology, convergence type, R&D strategy, technology classification

Procedia PDF Downloads 451
5284 User’s Susceptibility Factors to Malware Attacks: A Systematic Literature Review

Authors: Awad A. Younis, Elise Stronberg, Shifa Noor

Abstract:

Malware attacks due to end-user vulnerabilities have been noticeably increased in the past few years. Investigating the factors that make an end-user vulnerable to those attacks is critical because they can be utilized to set up proactive strategies such as awareness and education to mitigate the impacts of those attacks. Some existing studies investigated demographic, behavioral, and cultural factors that make an end-user susceptible to malware attacks. However, it has been challenging to draw more general conclusions from individual studies due to the varieties in the type of end-users and different types of malware. Therefore, we conducted a systematic literature review (SLR) of the existing research for end-user susceptibility factors to malware attacks. The results showed while some demographic factors are mostly associated with malware infection regardless of the end users' type, age, and gender are not consistent among the same and different types of end-users. Besides, the association of culture and personality factors with malware infection are consistent in most of the selected studies and for all type of end-users. Moreover, malware infection varies based on age, geographic location, and host types. We propose that future studies should carefully take into consideration the type of end-users because different end users may be exposed to different threats or be targeted based on their user domains’ characteristics. Additionally, as different types of malware use different tactics to trick end-users, taking the malware types into consideration is important.

Keywords: cybersecurity, malware, end-users, demographics, personality, culture, systematic literature review

Procedia PDF Downloads 206
5283 The Different Types of French Language in the Processes of Acquisition: Specifically about The Humor

Authors: Akbarnejad Neda

Abstract:

A foreign language acquisition occurs when we can tell a joke and understand it. Most jokes are told in slang and common language. In the process of foreign language acquisition, an autonomous learner try to learn the standard language. But there is a colossal divergence between the usage of the different types of language in society. Here, we investigate the french slang and common language and examine the accurate perception of their usage. We illuminate the slang language in the french literature that provide considerably different types of language for an autonomous learner. We provide furthermore evidence from the french novels that demonstrate properly the different types of language and give in one sentence its social meanings. For example, the famous Queneau expression « Doukipudonktant » present the impact of slang language in society. The characters in the novel transfer the slang and the common language and their accurate usages. We present that the language of the autonomous learner depends on the language of the text that is read. Because literature is a vehicle of the culture and the expression demonstrate their real significations and usage in the culture, slang and common language have a crucial role in the culture and all of them are manifested in the oral language.

Keywords: common language, french, humor, slang language

Procedia PDF Downloads 202