1,129 results on '"biometric data"'
Search Results
2. Current Landscape of Tech and Work Policy: A Roundup of Key Concepts
- Author
-
Bernhardt, Annette and Pathak, Laura
- Subjects
technology and work ,public policy ,digital workplace technology ,electronic monitoring ,algorithms ,data privacy ,bias ,discrimination ,biometric data ,automation ,warehouse quotas ,collective bargaining - Abstract
An overview of current U.S. public policy that regulates employers’ use of digital workplace technologies.
- Published
- 2024
3. Blurring the moral limits of data markets: biometrics, emotion and data dividends.
- Author
-
Bakir, Vian, Laffer, Alexander, and McStay, Andrew
- Subjects
- *
PERSONAL information management , *INFORMATION resources management , *PERSONALLY identifiable information , *BIOMETRIC identification , *TECHNOLOGICAL innovations - Abstract
This paper considers what liberal philosopher Michael Sandel coins the 'moral limits of markets' in relation to the idea of paying people for data about their biometrics and emotions. With Sandel arguing that certain aspects of human life (such as our bodies and body parts) should be beyond monetisation and exchange, others argue that emerging technologies such as Personal Information Management Systems can enable a fairer, paid, data exchange between the individual and the organisation, even regarding highly personal data about our bodies and emotions. With the field of data ethics rarely addressing questions of payment, this paper explores normative questions about data dividends. It does so by conducting a UK-wide, demographically representative online survey to quantitatively assess adults' views on being paid for personal data about their biometrics and emotions via a Personal Information Management System, producing a data dividend, a premise which sees personal data through the prism of markets and property. The paper finds diverse attitudes based on socio-demographic characteristics, the type of personal data sold, and the type of organisation sold to. It argues that (a) Sandel's argument regarding the moral limits of markets has value in protecting fundamental freedoms of those in society who are arguably least able to (such as the poor); but (b) that contexts of use, in particular, blur moral limits regarding fundamental freedoms and markets. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. BİYOMETRİK VE GENETİK VERİLERİN KORUNMASI KONUSUNDA AVRUPA KONSEYİ'NİN GENEL YAKLAŞIMI.
- Author
-
ATAK, Songül
- Abstract
Copyright of Türkiye Adalet Akademisi Dergisi is the property of Justice Academy of Turkey and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
5. Biometric Borders Envisaged by Frontex: Fundamental Rights in the Backseat
- Author
-
Matija Kontak
- Subjects
frontex ,biometrics ,biometric data ,personal data ,fundamental rights ,privacy ,Law ,Law of Europe ,KJ-KKZ - Abstract
(Series Information) European Papers - A Journal on Law and Integration, 2024 9(2), 621-640 | Article | (Table of Contents) I. Introduction. – II. Technological and legal aspects of biometrics. – II.1. Technological aspects and the application of biometrics in the EU. – II.2. Biometric legal framework. – III. Frontex’s biometric policy and fundamental rights. – III.1. Frontex role and legal obligations concerning biometrics. – III.2. Technology foresight on biometrics for the future travel. – IV. Conclusion. | (Abstract) This Article provides an assessment of the biometric policy of the European Border and Coast Guard Agency (Frontex) and its consequences for the fundamental rights of migrants. It provides an overview of the technological aspects of biometrics, their application, and the legal framework in the context of the Area of Freedom, Security and Justice. This sets the background for an analysis of how and why Frontex uses biometrics to advance its goals. This Article analyses policy papers, legal provisions, and other sources, but particularly the Technology Foresight on Biometrics for the Future of Travel, a report on biometrics published by Frontex. This Article concludes that Frontex fails to account for the consequences of its biometric policy on fundamental rights when considering the effects of biometric technologies for the future.
- Published
- 2024
- Full Text
- View/download PDF
6. LEGAL ASPECTS OF THE COLLECTION, STORAGE AND PROCESSING OF GENETIC INFORMATION
- Author
-
MOROZOV Sergey Yuryevich, TUZHILOVA-ORDANSKAYA Elena Markovna, AKHTYAMOVA Evgeniya Viktorovna, and KAZAKOV Nikita Andreevich
- Subjects
human genome ,genetic information ,personal data ,biometric data ,biological materials ,collection ,storage ,processing ,use ,biobank ,Law in general. Comparative and uniform law. Jurisprudence ,K1-7720 - Abstract
The legal norms regulating the collection, storage and processing of human genetic information are aimed at ensuring the proper conduct of genetic research procedures and protecting the participants’ rights. It is particularly important to highlight that national legislation, taking into account international practice, should provide specific methods for collecting biological material, information storage periods and features of its processing. Purpose: to identify the legal characteristics of the collection, storage and processing of genetic information, including legal issues and criteria for modernizing the legislation governing genetic information research. Methods: empirical methods of comparison, description and interpretation, formal-legal, interpreting legal norms. Results: the article considers legal aspects and characteristics of regulating the process and conditions of collection, storage and processing of genetic information; it reveals some problems encountered in genetic research, regarding the storage time of materials and confidentiality in the processing of third-party information. The authors outline ways of improvement to address them.
- Published
- 2024
- Full Text
- View/download PDF
7. Liability For Damage Based On The Processing Of Biometric Data Through Video Surveillance Of Residential Buildings Against The Provisions Of The General Data Protection Regulation Implementation Act
- Author
-
Davorin Pichler
- Subjects
damage ,personality rights ,biometric data ,video surveillance ,privacy ,Commerce ,HF1-6182 ,Recreation. Leisure ,GV1-1860 - Abstract
A special group of personal data is represented by biometric data. The protection of this data, in the Republic of Croatia, is provided by the General Data Protection Regulation and the General Data Protection Regulation Implementation Act. The right to one’s own figure is manifested through the biometric data of a certain person and represents a separate personality right. The right to one’s own figure can be violated by the unauthorized use of biometric data of the injured party, or, nowadays, by the frequent processing of personal data through video surveillance. The subject of the article is liability for non-property damage arising from the processing of biometric data through video surveillance of residential buildings, for private purposes, contrary to the provisions of the General Data Protection Regulation and the General Data Protection Regulation Implementation Act. The paper explores the assumptions of the liability of the injurer in the procedure for compensation for damages due to the violation of the personality rights, the criteria by which the court will be guided when determining the amount of compensation for damages and determining the extent of the damage caused to the injured party as a result of the unauthorized collection of personal data through video surveillance. The paper will try to provide guidelines for the regulation of these issues in a way that will satisfy the general, political interests and legal interests of the holders of personality rights.
- Published
- 2024
- Full Text
- View/download PDF
8. Neuromarketing and Eye-Tracking Technologies Under the European Framework: Towards the GDPR and Beyond.
- Author
-
Sposini, L.
- Subjects
ARTIFICIAL intelligence ,BIOMETRIC identification ,NEUROMARKETING ,EYE tracking ,PERSONALLY identifiable information - Abstract
The Regulation (EU) 2016/679 on the protection of natural persons regarding the processing of personal data (GDPR) is one of the key fundamental pieces of European legislation to protect human rights and freedoms. However, the development of AI systems that are capable of collecting and processing large amounts of data and predicting user habits and emotional states has affected traditional legal categories and tested their resilience. This paper assesses the limits of the current formulation of the GDPR which does not take expressly into account the category of inferred data as a special category of data. Furthermore, it questions whether the toolbox put in place by the GDPR is still effective in protecting data subjects from practices such as neuromarketing and eye-tracking systems. It shows that it is certainly the essential starting point, but that, on the other hand, cannot be spared criticism. For this, in the recent years, the European legislator has adopted further legislations including, in particular, the Digital Services Act (DSA) and the Artificial Intelligence Act (AIA). Although representing a step forward in protection against such technologies, they each have critical aspects that need to be considered. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. A Modern Approach to Securing Critical Infrastructure in Energy Transmission Networks: Integration of Cryptographic Mechanisms and Biometric Data.
- Author
-
Manowska, Anna, Boros, Martin, Hassan, Muhammad Waqar, Bluszcz, Anna, and Tobór-Osadnik, Katarzyna
- Subjects
INFRASTRUCTURE (Economics) ,ENERGY infrastructure ,INFORMATION technology ,THRESHOLD energy ,ENERGY security - Abstract
Energy security is a crucial issue for political, environmental, and economic reasons. This article presents a modern approach to securing critical infrastructure in energy transmission networks, which are managed by advanced IT systems. This paper focuses on the integration of cryptographic mechanisms with biometric data, providing an additional layer of protection against cyber threats. The discussed solutions enable the protection of management systems in energy transmission networks, enhancing their resilience to cyberattacks. The use of the command-line interface (CLI) in combination with biometrics allows for precise execution of security tasks such as network monitoring, firewall management, and automation of security tasks. This makes these systems more reliable and secure, which is essential for the stability of energy systems. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. Ethopolitical media: Organizing Assistive Technology, disability and care in the platform society.
- Author
-
Napolitano, Domenico and Sicca, Luigi Maria
- Subjects
- *
ASSISTIVE technology , *DIGITAL technology , *DISABILITIES , *HIGH technology industries , *HEALTH self-care , *DISABILITY studies - Abstract
In this paper we prompt a re-reading of Assistive Technology (AT) as a media system that organizes disability in the framework of digital health-care and the platform society. Drawing on disability media studies and organization studies, we investigate how the arrival of big tech and digital platforms in the field of AT reconfigures ways to account for, classify and potentially discriminate against disability. We argue that this new configuration can be explained as a shift from a biopolitical model – oriented toward disability normalization – to an ethopolitical model, oriented toward optimization and health enhancement. In the conclusions, we put forward the concept of ethopolitical media and discuss the implications of this for wider debates in media and cultural studies which deal with the relationship between media, health, and self-care. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. Designing for Safety, Privacy and Inclusivity in Social VR
- Author
-
Gray, Joanne E., Carter, Marcus, Egliston, Ben, Gray, Joanne E., Carter, Marcus, and Egliston, Ben
- Published
- 2024
- Full Text
- View/download PDF
12. Use of Multimodal Learning Analytics and Biometric Data as a Contribution to the Development of Pedagogical Activities in Entrepreneurship Area
- Author
-
Ruiz-Ramirez, J. A., Ponce-Naranjo, D., Calderón-Gurubel, J. E., González-Díaz, K. A., López-Andrade, A. D., Rivera-Cerros, E. A., Martínez-Giorgetti, J. E., Moreno, M. A. Ramírez, Huang, Ronghuai, Series Editor, Kinshuk, Series Editor, Jemni, Mohamed, Series Editor, Chen, Nian-Shing, Series Editor, Spector, J. Michael, Series Editor, Gonçalves, José Alexandre de Carvalho, editor, Lima, José Luís Sousa de Magalhães, editor, Coelho, João Paulo, editor, García-Peñalvo, Francisco José, editor, and García-Holgado, Alicia, editor
- Published
- 2024
- Full Text
- View/download PDF
13. Nonlinear Dynamic Model of the Oculo-Motor System Human Based on the Volterra Series
- Author
-
Pavlenko, Vitaliy, Shamanina, Tetiana, Chori, Vladyslav, and Awrejcewicz, Jan, editor
- Published
- 2024
- Full Text
- View/download PDF
14. Analysis of Legislative Framework Governing Biometric Data.
- Author
-
Jung, Youna and Virgil, Ethan D.
- Subjects
DATA privacy ,TECHNOLOGICAL innovations ,LEGISLATIVE reform ,FOURTEENTH century ,DATA protection ,BIOMETRIC identification ,BIOMETRY - Abstract
Biometrics has permeated modern technology, particularly within mobile devices, integrating into daily life. From the 14th century, biometrics has served as a foundational method for security, aiding in criminal identification through physical characteristics records. Advancements in technology have propelled the evolution of precise and automated systems for analyzing facial, vocal, and ocular biometrics. Major tech companies have adopted biometrics as the primary mode of user authentication, catapulting biometric security into the forefront of cybersecurity discussions. Despite the promising future of biometrics, governments worldwide are grappling with the challenging task of regulating the handling of biometric data. Mismanagement of biometric data could pose significant security risks to both individuals and public safety. Therefore, it is crucial to implement comprehensive regulations and legislative reforms to safeguard privacy and security in the era of biometrics. Towards this goal, this paper contributes to the discourse by identifying security and privacy issues related to biometric data. It conducts a comprehensive analysis of current legal frameworks governing biometric data through the lens of the CIAAA (Confidentiality, Integrity, Availability, Authenticity, and Accountability) security framework. Additionally, it highlights emerging trends and outlines the implications for future policymaking and technological advancements in this field. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. The Future Risk of Biometric Data Theft in Cybersecurity.
- Author
-
STOICA, Iulia-Teodora
- Subjects
BIOMETRIC identification ,INTERNET security ,FACE perception - Abstract
The aim of this paper is to analyze the technical and engineering issues surrounding the future risk of biometric data theft in cyber security. Biometric data, such as fingerprints, facial recognition, and voice recognition, are increasingly being used as a means of authentication in various industries. However, the collection, storage, and transmission of biometric data present unique security challenges, as this data is highly personal and cannot be changed if compromised. In this paper, we will examine the vulnerabilities in biometric authentication technologies, the risks associated with the use of biometrics in various industries, and the measures that can be taken to mitigate these risks [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. The Datafication of Migrant Bodies and the Enactment of Migrant Subjectivities: Biometric Data, Power and Resistance at the Borders of Europe.
- Author
-
Tsagarousianou, Roza
- Subjects
- *
BIOMETRIC identification , *IMMIGRANTS , *IMMIGRATION enforcement , *INFORMATION sharing , *SCHOLARLY method , *BUREAUCRACY - Abstract
The article engages with biometric data gathering technologies as part of migration infrastructures for the monitoring and control of migration. It explores power and agency by paying attention to the complexity of readings, interpretations, and storytelling of illegalised migrants in the Moria and Kara Tepe camps, in the Island of Lesvos in Greece, as they received their bureaucratic legal papers and discussed developments in their 'cases'. Borrowing from feminist and feminist security studies scholarship, the article argues for an understanding of data gathering and sharing infrastructures as material. It suggests that the datafication of migrants' bodies constitutes a manifestation of power that 'enacts' the migrant body as a subject of power but also produces counter self-subjectifications. The article also suggests an understanding of subject agency as the 'capacity to act' within contexts of power. Such a position on the agency of illegalised migrants allows us to examine the emergence of solidarities and alliances and to understand and contextualise not only actions that seem to be questioning and rejecting power, but also those that accept it and internalise it as a strategy of survival and of bettering one's life chances. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. DEVELOPMENT OF INFRASTRUCTURE FOR CASHLESS PAYMENTS IN FINTECH REVOLUTION CONTEXT
- Author
-
Юлія Терешко, Галина Толкачова, and Галина Михальчинець
- Subjects
financial technologies ,blockchain ,artificial intelligence ,biometric data ,payment systems ,payment terminals ,Economics as a science ,HB71-74 ,Business ,HF5001-6182 - Abstract
The article emphasizes an active transition towards a cashless economy and that this process is widespread, largely driven by the rapid development of financial technologies (FinTech). In this context, the article aims to identify the features of infrastructure development for cashless payments against the backdrop of significant changes in the financial sector, driven by the rapid growth of a new industry that leverages modern technologies to simplify and enhance financial services. The study demonstrates that the infrastructure for cashless payments is a constantly evolving network that facilitates financial transactions without using cash. At the same time, since all components of this infrastructure must operate synchronously at a global level, supporting transactions involving different currencies, regulatory requirements, and security standards, its evolution is driven by blockchain, artificial intelligence, and biometric data.
- Published
- 2024
- Full Text
- View/download PDF
18. Ensemble Learning Approach for Advanced Predictive Modeling of Biometric Data and Action States With Smart Sensing
- Author
-
Tajbeed A. Chowdhury, Sebastian Gratz-Kelly, Eric Wagner, Paul Motzki, and Martina Lehser
- Subjects
Biometric data ,ensemble learning ,intelligent system ,machine learning ,predictive models ,smart sensing ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
The advancement in wearable technology with integrated biometric sensors allows real-time continuous monitoring of vital data such as heart rate and breathing rate. The utilization of this real-time data can yield significant insights into a person’s health status by facilitating the early identification of anomalies or patterns that may point to possible health problems. Moreover, it illustrates how the vitals alter or respond as the individual carries out a certain task. For a physically or mentally demanding task, understanding this response could ensure better organization of that task and minimal strain on human health by reducing stress and cognitive load. Unfortunately, it is not always feasible to continuously monitor biometric data. In this paper, we propose an alternative solution to the problem by using predictive models to forecast data points in the future. This paper presents a method with an ensemble learning approach capable of forecasting vitals from small chunks of data. The intelligent system proposed in the paper is connected to a Dielectric Elastomer to provide smart sensing to the user. The paper presents a new dataset containing vitals and contributes to classifying a particular task or action state based on recorded human vitals. While existing research focuses on the prediction of biometrics, our model is capable of forecasting the biometrics and outperforms standard machine learning predictive models by a margin across multiple evaluation metrics and the forecasted graph shows the effectiveness of our approach. This technique offers a viable alternative for data monitoring by data simulation, improving task management, and minimizing health strain.
- Published
- 2024
- Full Text
- View/download PDF
19. Identifying PTSD sex-based patterns through explainable artificial intelligence in biometric data
- Author
-
García-Valdez, Andrea Alejandra, Román-Godínez, Israel, Salido-Ruiz, Ricardo A., and Torres-Ramos, Sulema
- Published
- 2024
- Full Text
- View/download PDF
20. Deep hashing with multilayer CNN-based biometric authentication for identifying individuals in transportation security
- Author
-
Borra, Subba Reddy, Premalatha, B., Divya, G., Srinivasarao, B., Eshwar, D., Reddy, V. Bharath Simha, and Kumar, Pala Mahesh
- Published
- 2024
- Full Text
- View/download PDF
21. BIOMETRIKUS ADATOK A GÉPPEL OLVASHATÓ ÚTI OKMÁNYOKBAN – AZ ICAO DOC 9303.
- Author
-
HELGA, BAUMGARTNER and ARNOLD, ŐSZI
- Abstract
Copyright of Safety & Security Sciences Review / Biztonságtudományi Szemle is the property of Obuda University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
22. A fast algorithm for robust estimates of the Hurst exponent when analyzing small samples of biometric and market data
- Author
-
V.I. Volchikhin, A.I. Ivanov, V.A. Tikhomirov, and D.V. Tarasov
- Subjects
autocorrelation functional ,hurst exponent ,small samples ,biometric data ,Technology - Abstract
Background. Currently, the Hurst exponent is quite easily interpreted in relation to biometric, medical and economic data, but it is customary to evaluate it on large samples. The purpose of the work is to reduce the sample of real data on which the Hurst exponent can be calculated quite reliably. Materials and methods. The connection between the Hurst exponent and autocorrelation functionals is used. It is proposed to reduce the problem to assessing the autocorrelation properties of the studied sequence of real data. Results and conclusions. Autocorrelation functionals relate to problems of quadratic computational complexity, while the Hurst exponent has a significantly higher computational complexity and is less stable. This makes it possible to reduce the requirements for the size of the real data sample used for calculations.
- Published
- 2024
- Full Text
- View/download PDF
23. Facial recognition technology: regulations, rights and the rule of law
- Author
-
Mais Qandeel
- Subjects
unacceptable risk AI systems ,facial recognition technology ,responsibility to protect ,duty to regulate ,human rights ,biometric data ,Information technology ,T58.5-58.64 - Abstract
Despite their pronounced potential, unacceptable risk AI systems, such as facial recognition, have been used as tools for, inter alia, digital surveillance, and policing. This usage raises concerns in relation to the protection of basic freedoms and liberties and upholding the rule of law. This article contributes to the legal discussion by investigating how the law must intervene, control, and regulate the use of unacceptable risk AI systems that concern biometric data from a human-rights and rule of law perspective. In doing so, the article first examines the collection of biometric data and the use of facial recognition technology. Second, it describes the nature of the obligation or duty of states to regulate in relation to new technologies. The article, lastly, assesses the legal implications resulting from the failure of states to regulate new technologies and investigates possible legal remedies. The article uses some relevant EU regulations as an illustrative example.
- Published
- 2024
- Full Text
- View/download PDF
24. Measurement inaccuracy of wearable photoplethysmogram in military smartwatch
- Author
-
Dongyeob Ra, Chankyu Han, Sungho Moon, Kangmin Kim, and Jonghwa Lee
- Subjects
Army TIGER 4.0 ,wearable device ,military smartwatch ,Photoplethysmogram (PPG) measurement error ,biometric data ,Military Science - Abstract
As the military adopts wearable devices, soldiers use them to check their own health and perform operations. Under these conditions, measurement errors in military smartwatches can significantly affect soldier safety and survival. Photoplethysmogram (PPG) measurement errors may arise from various factors including the physical condition of the user, contact point, and environmental conditions. In particular, soldiers may experience rapid changes in their heart rates owing to intense training and operational activities. In such situations, errors in PPG measurements may pose challenges in accurately assessing the health status of soldiers. Therefore, enhancing PPG measurement functionality using wearable devices is important to accurately assess the health status, improve survivability, and enhance the operational performance of soldiers on the battlefield. Consequently, research and development in this area are necessary. Thus, our study examined the factors contributing to potential PPG measurement errors in smartwatches, assessed the extent of these errors, and discussed approaches to improve and mitigate them.
- Published
- 2024
- Full Text
- View/download PDF
25. Using biometric data to protect information
- Author
-
K. N. Vlasov, O. V. Tolstykh, and O. V. Isaev
- Subjects
biometrics ,biometric data ,information security ,authentication ,identity authenticity ,individual characteristics of a person ,Technology - Abstract
Objective. An urgent task is to evaluate the system for protecting access to information while minimizing errors, based on the use of human biometric data. It is necessary to evaluate and compare methods and solutions of biometric authentication, and the possibility of combining them.Method. The method for assessing and comparing biometric authentication methods and solutions is based on practical experience and regulatory and technical documentation on the use of biometric data for information security purposes. It is necessary to complicate the possibility of unauthorized access to information. At the same time, improving the system should not worsen the comfort of a legitimate user when trying to access. The remaining tasks are to reduce entry time and simplify the system.Result. An assessment of biometric authentication methods and solutions was carried out and a solution was proposed for the development of biometric authentication systems to protect against unauthorized access, the key criteria in which were the complexity of hacking, user comfort, login time and simplification of the system.Conclusion. The optimal solution in the development of biometric authentication systems would be to use multi-factor authentication using dynamic parameters of the access subject. A modern biometric authentication system should be installed taking into account the level of security required at the time.
- Published
- 2023
- Full Text
- View/download PDF
26. The Compliance of Facial Processing in France with the Article 9 Paragraph 2 (a) (g) of (EU) General Data Protection Regulation
- Author
-
Daria Bulgakova and Valentyna Bulgakova
- Subjects
biometric data ,human recognition ,digital legal identity ,unique identification ,alicem application ,Law - Abstract
The legal identity of individuals is critical in digital ecosystems, and biometric systems play a vital role in verifying identities throughout their lives. However, these systems also pose significant risks and require responsible use. The European Union has established a digital strategy to create a trusted and secure digital identity, setting a global standard for technological development in identification. In line with the General Data Protection Regulation Article 9(1), member countries must justify any exceptions to the rule provided. France has taken a leading role in using unique identification legally, implementing digitally processed attributes such as facial recognition through the Alicem application on smartphones to identify individuals in a digital environment, and improving e-services uniquely. Specifically, the article analyses the General Data Protection Regulation Article 9, paragraph 1, and the exceptional conditions outlined in paragraph 2 (a) (g) along with scrutinized legislation in France of Decree n°2019-452 of 13 May 2019, which authorized the use of unique identification known as ‘Certified Online Authentication on Mobile.’ The research recommends that EU member countries taking approaches to introduce GDPR Article 9 into national legislation should consider their citizens’ specific needs and concerns while aligning with the European Union law because it is critical to balance the benefits of biometric systems with the risks posed to personal data protection, ensuring that their responsible use contributes to a secure and trustworthy digital ecosystem.
- Published
- 2023
- Full Text
- View/download PDF
27. Intuitionistic Fuzzy Stream Cipher for Privacy Preservation of Biometric Data in IoMT
- Author
-
Sarkar, Arun, Chakraborty, Rajdeep, Das, Malabika, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Mandal, Jyotsna Kumar, editor, and De, Debashis, editor
- Published
- 2023
- Full Text
- View/download PDF
28. Contribution of TEE and Parallel Computing to Performance and Security of Biometric Authentication Improvement
- Author
-
Maxim EDOH, Tahirou DJARA, Aziz SOBABE, and Antoine VIANOU
- Subjects
parallel computing ,trusted execution environment ,biometric data ,sgx ,Probabilities. Mathematical statistics ,QA273-280 ,Technology ,Technology (General) ,T1-995 - Abstract
In a world increasingly dominated by digital interactions, it has become essential to guarantee the authenticity of personal identities. Traditional authentication methods, based on passwords or tokens, are proving inadequate in the face of advanced cyber threats. In response, the field of biometric recognition has emerged as a transformative force, offering a new paradigm for identity verification with significant accuracy and convenience. The problems that arise here are the vulnerability and confidentiality of biometric data before, during and after a biometric recognition operation, and the low processing speed during the same operation. The aim of this work is to propose a combination of the concepts of parallel computing and Trusted Execution Environments (TEE) as a solution to the problems raised. Finally, a hardware-assisted technology namely Intel SGX (Software Guard Extensions) is proposed for practical implementations.
- Published
- 2023
- Full Text
- View/download PDF
29. Facial Recognition Technology and Ensuring Security of Biometric Data: Comparative Analysis of Legal Regulation Models
- Author
-
D. Utegen and B. Zh. Rakhmetov
- Subjects
biometric authentication ,biometric data ,digital technologies ,facial recognition ,technologies ,identification ,law ,legal regulation ,personal data ,privacy ,security ,Law - Abstract
Objective: to specify the models of legal regulation in the sphere of biometric identification and authentication with facial recognition technology in order to elaborate recommendations for increasing information security of persons and state-legal protection of their right to privacy.Methods: risk-oriented approach in law and specific legal methods of cognition, such as comparative-legal analysis and juridical forecasting, are significant for the studied topic and allow comparing the legal regulation models used in foreign countries and their unions in the sphere of biometric identification and authentication with facial recognition systems, forecasting the possible risks for the security of biometric data, taking into account the prospects of further dissemination of the modern facial recognition technology, and to shape recommendations on legal protection of biometric data.Results: the ways are proposed to further improve legislation of the Republic of Kazakhstan and other countries currently developing the legal regulation of biometric data, regarding the admissible criteria for using the facial recognition technology, the elaboration of categorization of biometric systems with a high and low risk levels (by the example of the experience of artificial intelligence regulation in the European Union), and the necessity to introduce a system of prohibitions of mass and unselective surveillance of humans with video surveillance systems, etc.Scientific novelty: consists in identifying a positive advanced foreign experience of developing legal regulation in the sphere of facial recognition based on biometry (European Union, the United States of America, the United Kingdom of Great Britain and Northern Ireland), which can be used for further improvement of the national legislation in order to create more effective mechanisms of legal protection of personal data, including biometric information.Practical significance: based on risk-oriented approach and comparative analysis, the research allows elaborating measures for enhancing the legal protection of biometric data and ensuring effective protection of civil rights and freedoms by forecasting further expansion of the modern facial recognition technology.
- Published
- 2023
- Full Text
- View/download PDF
30. Personal Data in Artificial Intelligence Systems: Natural Language Processing Technology
- Author
-
I. G. Ilin
- Subjects
artificial intelligence ,biometric data ,digital technologies ,law ,lawfulness ,legal risk ,legaltech ,legislation ,natural language processing technology ,personal data ,Law - Abstract
Objective: to conceptualize, from the viewpoint of personal data protection legislation, the development of natural language processing technology, identifying possible legal barriers to such development and directions for further research of the issue.Methods: the research is based on general scientific methods of cognition, along with which formal-legal and comparative-legal methods were applied, as well as the method of theoretical modeling.Results: it was found that the observance of personal data regime natural language processing in the development of natural language processing technology leads technology, to a conflict between private-legal and public-legal interests, which, personal data in turn, creates obstacles for further development of this technology. The shortcomings of the existing legal order are shown, namely, the insufficient correspondence to the technical features of technology development. This may lead to the risks of excessive regulation, or, on the contrary, to the risks of neglecting critical areas that require protection. Problems in qualifying the data involved in the technology development are outlined. An attempt is made to define the limits of ensuring the lawfulness of personal data processing within the natural language processing technology. The material, temporal and territorial effect of the legal regulation in this field is identified as the limits of ensuring the legality. The author touches upon the possibility of using personal data as a consideration, which is important for the development of natural language processing technology and for the improvement of the information and communication technology industry.Scientific novelty: the paper supplements the scientific discussion on the legal regulation of personal data processing by artificial intelligence systems with an analysis of natural language processing technology. The latter is insufficiently studied, making it relevant to research information law, namely, the legal relations arising around artificial intelligence systems, and to assess the impact of a personal data regime on the development of natural language processing technology.Practical relevance: the applied aspects of the problems researched and the results obtained can be used to improve the legal regulation of public relations in the field of creation and development of artificial intelligence, as well as to identify and assess the legal risks arising in the personal data processing by developers of digital products based on natural language processing technology.
- Published
- 2024
- Full Text
- View/download PDF
31. Telematic performance enforced by the pandemic: NeuroKnitting Beethoven.
- Author
-
Guljajeva, Varvara, Canet Sola, Mar, and Kuzmin, Iurii
- Subjects
COVID-19 pandemic ,BIOMETRIC identification ,PANDEMICS ,CULTURAL history ,TRAVEL restrictions - Abstract
The interactive performance NeuroKnitting Beethoven was conceived as a live work combining music, neurofeedback and algorithmic knitting to commemorate Ludwig van Beethoven's 250th anniversary and to provide an alternative experience of the classical music canon. This article describes how, due to travel restrictions during the COVID pandemic, the interactive performance became also a telematic project. Apart from the practical considerations regarding the technical execution and adaptation of the work, we focus on the opportunities provided by this transition. We further reflect on how meanings and dynamics ingrained in the technical media deployed by the artists are uncovered and actualised in a new context. Taking the concept of data sensification as our starting point, we examine the capability of biometric data for establishing 'telepathic' connections and the latent imaginative potential of EEG technology that underscores its cultural history. In the context of social distancing during the Covid pandemic, when real-time video and sound connections were found to be an inadequate surrogate for in-person communication, we argue that sensification of brain data could be a means for creating an alternative space of remote intimacy and for providing an experience of 'psychic' connection between the participants. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
32. Glukhin v. Russia. App. No. 11519/20. Judgment.
- Author
-
Zalnieriute, Monika
- Subjects
- *
FREEDOM of expression lawsuits , *HUMAN facial recognition software - Abstract
The article discusses the case Glukhin v. Russia wherein the European Court of Human Rights ruled that the use of facial recognition technology to convict a protester violated his rights to a private life and freedom of expression under Articles 8 and 10 of the European Convention on Human Rights.
- Published
- 2023
- Full Text
- View/download PDF
33. Il trattamento dei dati biometrici nel quadro della strategia europea dei dati, fra rischi di mass surveillance e tutela dei diritti fondamentali
- Author
-
Francesca Mollo
- Subjects
surveillance ,biometric data ,data protection ,Law ,Political science - Abstract
The contribution reconstructs the theme of mass surveillance, intertwined with the protection of personal data. It starts to investigate the criticality profiles connected to the treatment of some specific categories of data, in particular biometric data, the treatment of which –systematically and on a large scale – is likely to define new surveillance models. Under these profiles, the article analyzes the jurisprudence of the European Court of Human Rights and Court of Justice.
- Published
- 2023
- Full Text
- View/download PDF
34. HURST EXPONENT ESTIMATES ON SMALL SAMPLES: THE SIMPLEST VERSION OF FEDER'S NON-LINEAR METHOD ERROR COMPENSATOR FOR MODELING ECONOMIC AND BIOMETRIC DATA
- Author
-
Aleksandr I. Ivanov, Dmitriy V. Tarasov, and Kirill A. Gorbunov
- Subjects
autocorrelation functional ,hurst exponent ,small samples ,biometric data ,methodological error ,error corrector ,Motor vehicles. Aeronautics. Astronautics ,TL1-4050 - Abstract
Background. Currently, the Hurst exponent is quite easily interpreted in relation to biometric, medical and economic data, but it is customary to evaluate it on large samples. The aim of the work is to eliminate the methodological error that occurs due to small samples of real data. Materials and methods. The simulation of two-dimensional Brownian motion is used, which gives rise to the possibility of calculating the Hurst exponents. It is proposed by means of simulation modeling to build in advance a nonlinear corrector of methodological errors discovered earlier by E. Feder. Results and conclusions. A relation has been obtained for the value of methodological errors in estimating the Hurst exponent, which makes it possible to correct estimates for small values of the exponent H 0.65. The need to correct methodological errors is growing as the size of small samples of real economic and biometric data decreases.
- Published
- 2023
- Full Text
- View/download PDF
35. Access Control to Robotic Systems Based on Biometric: The Generalized Model and its Practical Implementation.
- Author
-
Abu-Jassar, Amer Tahseen, Attar, Hani, Lyashenko, Vyacheslav, Amer, Ayman, Sotnik, Svitlana, and Solyman, Ahmed
- Subjects
MULTI-factor authentication ,ACCESS control ,ANALYTIC hierarchy process ,ROBOTICS ,FUZZY sets ,MEMBERSHIP functions (Fuzzy logic) - Abstract
The paper presents a generalized system's structural scheme and components for monitoring and controlling access to robotic systems based on biometric data for decision-making. Mathematical decision-making models for choosing the best alternative based on fuzzy sets are proposed. The fuzzy analytical hierarchy process determined weights of 6 criteria (for k
1 criterion weighting factor is equal to 2.2; for k2 criterion - 1.8; for k3 criterion - 0.6; for k4 criterion - 0.6; for k5 criterion - 0.6; for k6 criterion - 0.2, that is, most weighty would be k1 - recognition accuracy) against which the best option was evaluated. Thus, during evaluation of alternative on six criteria it was obtained that t alternative X1 (face recognition in full-face), will have the key value of membership function of resulting fuzzy set alternatives with ideal value of integral criterion, equal to 0.53, and as result, implemented rational choice, taking into account given criteria. The difference is that we have introduced such criteria as anti-spoofing. The access control system for robotic systems works in real-time. It is implemented based on an algorithmic decision-making complex, which includes two-factor authentication to increase security: registration involves entering employee data from the keyboard (password, login, surname, first name, position) and physiological authentication (identification by face). Face detection is proposed to be implemented on several images: face, profile, face, and profile in the mask. A distinctive feature of our development is that often, a main requirement for "access control systems with facial identification" is the frontal location of the face relative to the camera; in our case, the image of the face at an angle was added. [ABSTRACT FROM AUTHOR]- Published
- 2023
- Full Text
- View/download PDF
36. Single Sign-On (SSO) Fingerprint Authentication Using Blockchain
- Author
-
Thakurdesai, Abhijeet, Nistor, Marian Sorin, Bein, Doina, Pickl, Stefan, Bein, Wolfgang, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, and Latifi, Shahram, editor
- Published
- 2022
- Full Text
- View/download PDF
37. Using Behavioral Biometrics of Fingerprint Authentication to Investigate Physical and Emotional User States
- Author
-
Salman, Adan S., Salman, Ammar S., Salman, Odai S., Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, and Arai, Kohei, editor
- Published
- 2022
- Full Text
- View/download PDF
38. 'Almeno tu nel metaverso'. Labour law and the challenge of new digital spaces
- Author
-
Marco Peruzzi
- Subjects
metaverse ,labour law ,pay ,health and safety ,data protection ,biometric data ,discrimination ,artificial intelligence ,algorithms ,Law ,Labor systems ,HD4861-4895 - Abstract
The contribution suggests an initial reflection on the issues that the metaverse scenario poses for labour law, from the payment in cryptocurrencies, to the questions raised by the configuration of virtual twins (i.e. the enforcement of data processing guarantees and the applicability of anti-discriminatory law), up to health and safety aspects and the collective projection of protection. In this perspective, particular attention is paid to the choices of content and method outlined in the construction of the regulatory architecture of EU sources on the subject of new technologies, algorithmic processes and artificial intelligence.
- Published
- 2022
- Full Text
- View/download PDF
39. Immigration Biometric Data Exchange Among Asean Member States: Opportunities and Challenges in Legislations
- Author
-
Mohammad Thoriq Bahri
- Subjects
asean ,bali process ,biometric data ,data protection ,immigration ,Law in general. Comparative and uniform law. Jurisprudence ,K1-7720 ,Political institutions and public administration (General) ,JF20-2112 - Abstract
Biometric data can be described as data containing human physical characteristics. They can be in the form of fingerprint data, retina scans, and voice recognition. The application of biometrics for immigration purposes reduce the number of terrorism case and illegal migrants in the European Union (EU) territory and the United States. In 2013, biometric data exchange in ASEAN was made possible with the Bali Process Protocol. By a qualitative research methodology, using the CIPP (Context, Input, Process, and Product) analysis, this research attempts to find the legal obstacles as the main barriers in implementing biometric data exchange in the ASEAN region. This study finds that not all ASEAN countries have laws on personal data protection, which affect the Standard Operating Procedures (SOP) related to how the biometric data will be retrieved, processed, and managed, as well as the actions required if there is a violation of the law related to the SOP. This study suggests that ASEAN can accommodate the EU’s framework, by using the General Data Protection Regulation (GDPR) as a single standard in the application of Data Protection regulations for the biometric data exchange system in ASEAN.
- Published
- 2022
- Full Text
- View/download PDF
40. DERECHOS FUNDAMENTALES E INTELIGENCIA ARTIFICIAL EMOCIONAL EN IBORDERCTRL: RETOS DE LA AUTOMATIZACIÓN EN EL ÁMBITO MIGRATORIO.
- Author
-
Romano, Andrea
- Subjects
DIGITAL technology ,WINDBREAKS, shelterbelts, etc. ,ARTIFICIAL intelligence ,LEGAL judgments ,CIVIL rights - Abstract
Copyright of Revista Catalana de Dret Públic is the property of Revista Catalana de Dret Public and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
41. Digital innovation and human rights: dilemmas in international law enforcement practice
- Author
-
M. A. Mikhailov and T. A. Kokodey
- Subjects
digitalization ,information and communication trends ,protection ,personal data ,digital technologies ,international law enforcement practice ,identification ,biometric data ,Law - Abstract
The subject of the study is the legal nature of personal data, as well as a set of legal norms governing relations in the field of their processing and circulation in the Russian Federation and foreign countries. The article uses a comparative method, a system analysis method, as well as a forecasting method.The purpose of the article is to confirm or refute the hypotheses about the further strengthening of the contradictions between the emergence and implementation of new technologies for processing personal data versus ensuring the protection of human rights, as well as the expediency and possibility of using foreign legislative experience in domestic practice to counter these threats and reduce the risks arising from this and damage.Main results, scope. The article examines the legislative experience of legal regulation of the types, scope, and nature of personal data in the People's Republic of China, the United States of America, the Republic of Belarus, and the Russian Federation. At the same time, Chinese legislation most quickly responds to the challenges of the criminal use of biometric technologies, American legal norms are less acceptable for our practice due to the peculiarities of case law, and Belarusian law has only recently entered into force, opening the era of legal regulation in this area. The facts of the use of new technologies (such as deepfake) for the processing of biometric information for criminal purposes and the problems of law enforcement in this area, as well as legal disputes of citizens who have suffered damage from the use of these technologies, are analyzed. It is predicted that it will be impossible to fully ensure the protection of human rights in the context of the emergence of new technologies for processing personal data. The importance of the desire to predict threats to the protection of personal information at the stage of emergence of new technologies for processing personal data in order to neutralize them in a timely manner is indicated.Conclusion. An analysis of the legislation of foreign countries will make it possible to give preference to the Chinese experience, which promptly counteracts the risks of using new technologies for criminal purposes. An analysis of domestic and global law enforcement practice will make it possible to predict the spread of new ways of committing crimes, the misuse of personal data, and vulnerabilities in their storage and protection. At the same time, excessive restrictions on access to data, their processing and their circulation can make it difficult for law enforcement agencies to solve the tasks of ensuring state security and the protection of public order. It requires constant monitoring of threats and risks and timely technical and legal response to their manifestation. The purpose of the study has been achieved, ways to improve legislation in order to protect human rights in the context of the introduction of digital innovations in all spheres of human activity are proposed. Security, combating crime.
- Published
- 2022
- Full Text
- View/download PDF
42. Evaluation and assessment of virtual reality-based simulated training: exploring the human–technology frontier
- Author
-
Akdere, Mesut, Jiang, Yeling, and Lobo, Flavio Destri
- Published
- 2022
- Full Text
- View/download PDF
43. (Do not) remember my face: uses of facial recognition technology in light of the general data protection regulation.
- Author
-
Raposo, Vera Lúcia
- Subjects
- *
HUMAN facial recognition software , *GENERAL Data Protection Regulation, 2016 , *BIOMETRIC identification , *DATA transmission systems , *COMPUTER security - Abstract
Facial recognition technology is a state-of-the-art digital tool widely used by private and public entities. Its benefits are notable, but the challenges that it presents cannot be overlooked, as this paper will expose. In Europe, a major challenge is ensuring compliance with the General Data Protection Regulation, starting with the search of a proper legal ground for data processing and the identification of an adequate exception to allow the processing of biometric data. The implementation of security measures and the risks associated with data transfer to third countries must also be considered. A further issue is the reliability of facial recognition technology, which relates to data accuracy. These challenges are substantial, but they are not insurmountable. More comprehensive and in-depth knowledge of the legal intricacies of the General Data Protection Regulation, more secure and transparent data-processing procedures, and full acknowledgement of the technology's limitations might provide a liability shield. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
44. Stress Estimation Using Biometric and Activity Indicators to Improve QoL of the Elderly †.
- Author
-
Matsumoto, Kanta, Matsui, Tomokazu, Suwa, Hirohiko, and Yasumoto, Keiichi
- Subjects
- *
BIOMETRIC identification , *OLDER people , *ACTIVITIES of daily living , *BIOINDICATORS , *MACHINE learning - Abstract
It is essential to estimate the stress state of the elderly to improve their QoL. Stress states change every day and hour, depending on the activities performed and the duration/intensity. However, most existing studies estimate stress states using only biometric information or specific activities (e.g., sleep duration, exercise duration/amount, etc.) as explanatory variables and do not consider all daily living activities. It is necessary to link various daily living activities and biometric information in order to estimate the stress state more accurately. Specifically, we construct a stress estimation model using machine learning with the answers to a stress status questionnaire obtained every morning and evening as the ground truth and the biometric data during each of the performed activities and the new proposed indicator including biological and activity perspectives as the features. We used the following methods: Baseline Method 1, in which the RRI variance and Lorenz plot area for 4 h after waking and 24 h before the questionnaire were used as features; Baseline Method 2, in which sleep time was added as a feature to Baseline Method 1; the proposed method, in which the Lorenz plot area per activity and total time per activity were added. We compared the results with the proposed method, which added the new indicators as the features. The results of the evaluation experiments using the one-month data collected from five elderly households showed that the proposed method had an average estimation accuracy of 59%, 7% better than Baseline Method 1 (52%) and 4% better than Baseline Method 2 (55%). [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
45. Relația dintre protecția datelor și inteligența artificială. Impactul reglementării inteligenței artificiale în Uniunea Europeană.
- Author
-
ȘANDRU, Daniel-Mihail
- Subjects
PERSONALLY identifiable information ,ARTIFICIAL intelligence ,GENERAL Data Protection Regulation, 2016 ,DATA protection ,ELECTRONIC data processing ,BIOMETRIC identification - Abstract
Copyright of Revista Română de Drept European is the property of Wolters Kluwer Romania and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
46. LA RECOPILACIÓN DE DATOS BIOMÉTRICOS EN COSTA RICA: CONTROVERSIAS ÉTICAS A PARTIR DEL PROYECTO DE LEY N° 21321.
- Author
-
Piedra Alegría, Jonathan
- Subjects
BIOMETRIC identification ,ALGORITHMIC bias ,DATABASES ,BIOMETRY ,ETHICS - Abstract
Copyright of Revista Enfoques: Ciencia Política y Administración Pública is the property of Universidad Central de Chile and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
47. A Hybrid AES with a Chaotic Map-Based Biometric Authentication Framework for IoT and Industry 4.0.
- Author
-
Altameem, Ayman, P, Prabu, T, Senthilnathan, Poonia, Ramesh Chandra, and Saudagar, Abdul Khader Jilani
- Subjects
BIOMETRIC identification ,INDUSTRY 4.0 ,HUMAN fingerprints ,ADVANCED Encryption Standard ,INTERNET of things ,COGNITIVE processing speed ,PUBLIC key cryptography - Abstract
The Internet of Things (IoT) is being applied in multiple domains, including smart homes and energy management. This work aims to tighten security in IoTs using fingerprint authentications and avoid unauthorized access to systems for safeguarding user privacy. Captured fingerprints can jeopardize the security and privacy of personal information. To solve privacy- and security-related problems in IoT-based environments, Biometric Authentication Frameworks (BAFs) are proposed to enable authentications in IoTs coupled with fingerprint authentications on edge consumer devices and to ensure biometric security in transmissions and databases. The Honeywell Advanced Encryption Security-Cryptography Measure (HAES-CM) scheme combined with Hybrid Advanced Encryption Standards with Chaotic Map Encryptions is proposed. BAFs enable private and secure communications between Industry 4.0's edge devices and IoT. This work's suggested scheme's evaluations with other encryption methods reveal that the suggested HAES-CM encryption strategy outperforms others in terms of processing speeds. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
48. Virtual reality-based simulated training: evaluation and assessment
- Published
- 2022
- Full Text
- View/download PDF
49. Omniscient Eye Student Attendance Using Facial Recognition and Classroom Behavior Analysis
- Author
-
Mishra, Debashish, Mishra, Omm, Maity, Satyabrata, Howlett, Robert J., Series Editor, Jain, Lakhmi C., Series Editor, Mishra, Debahuti, editor, Buyya, Rajkumar, editor, Mohapatra, Prasant, editor, and Patnaik, Srikanta, editor
- Published
- 2021
- Full Text
- View/download PDF
50. Towards Socially and Emotionally Believable ICT Interfaces
- Author
-
Esposito, Anna, Faundez-Zanuy, Marcos, Morabito, Francesco Carlo, Pasero, Eros, Howlett, Robert J., Series Editor, Jain, Lakhmi C., Series Editor, Esposito, Anna, editor, Faundez-Zanuy, Marcos, editor, Morabito, Francesco Carlo, editor, and Pasero, Eros, editor
- Published
- 2021
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.