Search Results/Filters    

Filters

Year

Banks




Expert Group











Full-Text


Issue Info: 
  • Year: 

    2017
  • Volume: 

    5
  • Issue: 

    1 (17)
  • Pages: 

    61-72
Measures: 
  • Citations: 

    0
  • Views: 

    801
  • Downloads: 

    0
Abstract: 

One of the most impressive tools for evaluation of Cyber security is the usage of the secure verification system with high reliability.Biometric based verification systems have been able to overcome this problem to a large extent.In many cases,some consideration such as hardware cost,speed and accuracy make chal-lenges to choose the architecture of verification system.In this paper,an ordinary sensor is used to increase the security and accuracy of the verification system and also decrease the hardware cost.After acquiring the hand image,it is divided into 6 segments and finally by using Arc-Gabor filter bank as a descriptor,unique features are extracted from images.Also,by extracting knowledge from the FAR and FRR curves in order to estimate verifiers’weight and using weighted score summation for information fusion in the level of matching score,the verification system is designed.In this system,by utilizing one ordinary sensor and potential of multimodal architecture,its average of Equal Error Rate for COEP database is around 2.25% and also the average of elapsed time for verification is less than 0.19 seconds.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 801

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

KARAGAH

Issue Info: 
  • Year: 

    2021
  • Volume: 

    15
  • Issue: 

    54
  • Pages: 

    143-163
Measures: 
  • Citations: 

    0
  • Views: 

    369
  • Downloads: 

    0
Abstract: 

Silmultaneous with the advancement of science and technology, criminals’ methods and tactics get more complicated, too and police should equip itself with the world’ s latest technology to extricate from this challenge. One of these technologies is biometrics which enables police to take giant steps in collecting crime evidence. The present research is of applied type in terms of kind and objective with a qualitative approach. The study society includes elite and experts with a sample mass of eighteen people to the saturation level using targeted sampling method and the collection tool includes semi-structured interviews in which the results of the interview were transcribed and encoded. The findings of this research indicated thatcollecting biometric-based crime evidence is possible in foiur deminsions (laboratories, field investigations, Web and cyber-management) where these dimensions are interrelated. According to the findings of this research, biometrics will augment police crime laboratories capabilities, particularly identity recognition laboratories which are in line with the most important function of biometrics and during course of police field investigations, the biometric technology will increase the police investigations domain in order to enable the police to obtain reliable evidence and be able to track in cyber domain and to provide electronic surveillance with the help of biometrics and to collect crime evidence.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 369

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2006
  • Volume: 

    3314
  • Issue: 

    1
  • Pages: 

    0-0
Measures: 
  • Citations: 

    1
  • Views: 

    406
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 406

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2013
  • Volume: 

    10
  • Issue: 

    1 (29)
  • Pages: 

    1-13
Measures: 
  • Citations: 

    0
  • Views: 

    4138
  • Downloads: 

    0
Abstract: 

Introduction: Evaluation of hospital information system (HIS) is a complex endeavor, in which all human, technical and organizational aspects should be considered. This study aimed to develop indicators for HIS evaluation.Methods: Present qualitative study was carried out through a cross-sectional method in 2012 in Kerman province, using Delphi technique. Given the objectives of this study, three independent phases were performed including literature review, providing draft indicators for HIS evaluation and reaching consensus. Required data were obtained through interviews and designed forms. Twenty-three experts composed the study population in interview and reaching consensus phases. Validity and reliability were confirmed through content validity and test-retest method, respectively. Data were analyzed using descriptive statistics.Results: Final set of indicators for HIS evaluation consisted of ninety-one indicators under 8 main topics, i.e. technical quality, software quality, architecture and interface quality, vendor quality, after-sale services quality, workflow support quality, support department, outcome quality and HIS cost.Conclusion: Given the complexity of information system evaluation, all human, technical and organizational aspects have to be taken into account in any evaluation. Proposed indicators provide the possibility of comprehensive evaluation of HIS.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 4138

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2016
  • Volume: 

    11
  • Issue: 

    3
  • Pages: 

    296-303
Measures: 
  • Citations: 

    0
  • Views: 

    356
  • Downloads: 

    247
Abstract: 

This review article aimed to evaluate ocular biometric changes after trabeculectomy. The PubMed database was searched using the keywords “axial length” (AL), “anterior chamber depth” (ACD), “corneal astigmatism,” “corneal topography” and “trabeculectomy.” The extracted studies were categorized based on the evaluated parameters and the biometry method (contact and non‑contact). Comparable studies with respect to their sample size were combined for statistical analysis. Twenty‑five studies including 690 individuals which met the inclusion criteria were selected. After trabeculectomy, a significant and persistent AL reduction, with a range of 0.1‑0.19 and 0.1‑0.9 mm measured with contact and non‑contact methods, respectively, was observed. With respect to topographic changes, 0.38‑1.4 diopters (D) with‑the‑rule (WTR) astigmatism was induced postoperatively. All studies revealed ACD reduction immediately after surgery, which gradually deepened and approximated its preoperative levels on day 14. ACD reduction was not significant after that period in the majority of cases. In conclusion, changes in ACD is of small amount and of short period, thus it can be ignored, however, reported changes in AL and keratometry are of sufficient magnitude and can affect the refractive prediction of combined cataract surgery and trabeculectomy.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 356

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 247 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 1
Issue Info: 
  • Year: 

    2003
  • Volume: 

    -
  • Issue: 

    -
  • Pages: 

    744-747
Measures: 
  • Citations: 

    1
  • Views: 

    152
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 152

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2022
  • Volume: 

    11
  • Issue: 

    1
  • Pages: 

    0-0
Measures: 
  • Citations: 

    1
  • Views: 

    50
  • Downloads: 

    19
Abstract: 

AIMS: The correct use of biometric evidence has a special place in crime detection due to the importance of identifying criminals. The purpose of this research was to investigate the challenges of using biometric evidence in identity detection. MATERIALS AND METHODS: The current research is a descriptive survey in terms of type and method, applied in terms of purpose, and a documentary survey in terms of data collection, which was conducted in 2020. The sample studied in this research included detectives and investigation police officers of Gilan province in Iran with at least 5 years of executive experience. A researcher-made questionnaire was used as a research tool. The validity of the questionnaire was confirmed by experts and the reliability of the questionnaire was obtained at 0. 951 by calculating Cronbach’, s alpha coefficient. For data analysis, Pearson’, s correlation coefficient, T-test, and one-way analysis of variance were used with Version 3 of Smart PLS software. FINDINGS: In this research, 84 detectives and investigation police officers of Gilan province (14 women and 70 men) participated 23 of them had a high school diploma, 19 of them had an associate degree, 38 people had a bachelor’, s degree, and 4 people had a master’, s degree. The effect and t-value of the variable of providing organizational financial resources were respectively 0. 817 and 12. 78, the provision of expert human force were respectively 0. 658 and 9. 24, and also the training of human force were respectively 0. 508 and 6. 27 in the use of biometric evidence in identity detection. Spearman’, s correlation coefficient investigating the relationship between the use of biometric evidence and human force training was 0. 482, with the allocation of financial resources 0. 353, and with the lack of human forces, it was 0. 519 (p<0. 001). The results of the research showed that the variables of human resources training with an average rating of 1. 35, allocation of human forces with an average rating of 2. 46, and shortage of human forces with an average rating of 2. 19 were effective in the use of biometric evidence. CONCLUSION: The studies show the effectiveness of all three independent variables of the challenges of providing organizational financial resources, providing expert human force, and human force training on the variable of using biometric evidence.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 50

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 19 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Journal: 

COMMUNICATIONS

Issue Info: 
  • Year: 

    0
  • Volume: 

    46
  • Issue: 

    4
  • Pages: 

    516-539
Measures: 
  • Citations: 

    1
  • Views: 

    144
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 144

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2003
  • Volume: 

    5099
  • Issue: 

    -
  • Pages: 

    0-0
Measures: 
  • Citations: 

    1
  • Views: 

    235
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 235

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2020
  • Volume: 

    3
  • Issue: 

    1
  • Pages: 

    29-41
Measures: 
  • Citations: 

    0
  • Views: 

    170
  • Downloads: 

    118
Abstract: 

The smart home is an important Internet of Things applications. Due to the smartphones development, expansion of their network, and growing the data transfer rate, security in personal life has become a dramatic challenge. Therefore, it is essential to secure such a system to create a sense of relaxation in the lives of users and homeowners to deal with possible occurrences. The integration of technologies for the automation of home affairs with the Internet of things means that all physical objects can be accessed on cyberspace; therefore, the concerns raised by users about the lack of privacy and security are serious arguments that science and technology should answer. Therefore, addressing security issues is a crucial necessity for the development of the smart homes. Although authentication protocols have been proposed based on smart cards for multi-server architectures, their schemes cannot protect the system against stolen smart cards and dictionary attacks in the login phase and do not satisfy perfect forward secrecy. To overcome these limitations, this paper proposes an anonymous, secure protocol in connected smart home environments, using solely lightweight operations. The proposed protocol in this paper provides efficient authentication, key agreement, and enables the anonymity of devices and unlinkability. It is demonstrated that the computation complexity of the protocol is low as compared to the existing schemes, while security has been significantly improved. This protocol ensures that even if the stakeholder’ s device or the IoT device is attacked, they are robust against them.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 170

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 118 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button