Learn More
This research examines whether the integration of facial and fingerprint biometrics can improve the performance in financial infrastructure security such as ATM protection. Fingerprint biometrics consider distorted and misaligned fingerprints caused by environmental noise such as oil, wrinkles, dry skin, dirt and displacement of the query fingerprint with(More)
Problems of impersonation and other malpractices of various degrees have continued to mar the electronic-assessment (e-assessment) of students at various levels. The use of traditional methods of password and token passing for identity management and control has failed to provide acceptable solution to these problems, due to their susceptibility to theft(More)
— Ensuring the security of patient medical record has become an important issue with this current l electronic medical record, this is due to the fact that patient confidential health information can be access, view and edit on Personal Computer (PC) at any time. In order to protect the patient health confidential information, this research use bimodal(More)
Recommender system is an application that filtered personalized information based on user preference from large information obtained. However, in order to provide effective and efficient recommendation it is necessary to accurately construct user's interest and taste. In constructing the user interest and taste there is need to obtain accurate feedback from(More)
The emergence of the Intelligent Transportation System (ITS) has given new hope and an unprecedented number of promising benefits to the transportation industry. However, these benefits are accompanied with inherent challenges that are due to the higher mobility of the vehicular nodes. One of the major problems faced is the induced Doppler Shift (DS) in the(More)
Problems of impersonation and other malpractices of various degrees have continued to mar the electronic-assessment (eassessment) of students at various levels. The use of traditional methods of password and token passing for identity management and control has failed to provide acceptable solution to these problems, due to their susceptibility to theft and(More)
Wireless Sensor Networks (WSNs) consists of sensor nodes that are battery powered, these nodes are often deployed in remote areas and left unattended for long periods between battery charges. According to the studies, over sixty percent of energy is consumed during the transmission and reception process of the network. Due to the reason stated above,(More)
  • 1