首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 156 毫秒
1.
Due to the great increase in Information Technology (IT) systems where user authentication is needed, security in those systems relies on using PINs or passwords. During recent years, the scientific community has been trying to improve biometric techniques to be accepted as an alternative to other user authentication schemes. One of the sectors where user identity must be verified, is the identification cards sector. In fact, if great security wants to be achieved, smart cards should be used. But cardholder verification is performed using Card Holder Verification Keys (CHV-Keys), which are PIN-based. The authors are trying to integrate fingerprint verification inside a smart card, following their works in the past. The fingerprint scheme used is shown, and the work to achieve the integration inside a commercial smart card is detailed.  相似文献   

2.
Access control system with hand geometry verification and smartcards   总被引:1,自引:0,他引:1  
An access control system that joins the uniqueness of biometric verification, as well as the storage security and processing capabilities of smart cards, is defined here. The biometric technique chosen has been hand geometry, which is considered to provide low/medium security (there are other much more secure, as fingerprint, iris or retina), to be easy to use, to achieve high acceptance by users, and which performance is given throughout fast processing and medium cost. Also, the small template size needed for each user is positive for storage and processing capabilities required in the system. But the innovation in the system proposed is that the smart card not only stores the user's template, but also performs the verification process with the features set by the terminal to the card. With this improvement, the security of the system has risen because the template is never extracted from the card, avoiding duplication of such sensible data. The specifications for the enrolment process will be presented as well as the applications where this new system is recommended  相似文献   

3.
A biometric identification system, based on the processing of the human iris by the dyadic wavelet transform, has been introduced. The procedure to obtain an iris signature of 256 bits has been described, as well as the feature extraction block and the verification system. The results have shown that the system can achieve high rates of security.  相似文献   

4.
Nowadays many systems need a portable media to store some sensible data, such as smart cards. The information can be protected by the user with his Personal Identification Number (PIN), or through biometrics. Unfortunately, there is not a smart card today that can verify the biometric template inside it, performing this task in the terminal. The author has developed the algorithms and data structures needed to solve this problem. Therefore, he has created a smart card with user biometric authentication, based on an Open Platform smart card (in this case, a JavaCard). To achieve these results, different biometric techniques have been studied: speaker verification, hand geometry and iris recognition. Experimental results are given to show the viability of the prototype developed  相似文献   

5.
On measurement of operational security   总被引:1,自引:0,他引:1  
Ideally, a measure of the security of a system should capture quantitatively the intuitive notion of “the ability of the system to resist attack.” That is, it should be operational, reflecting the degree to which the system can be expected to remain free of security breaches under particular conditions of operation (including attack). Instead, current security levels at best merely reflect the extensiveness of safeguards introduced during the design and development of a system. Whilst we might expect a system developed to a higher level than another to exhibit “more secure behavior” in operation, this cannot be guaranteed; more particularly, we cannot infer what the actual security behavior will be from knowledge of such a level. In the paper we discuss similarities between reliability and security with the intention of working toward measures of “operational security” similar to those that we have for reliability of systems. Very informally, these measures could involve expressions such as the rate of occurrence of security breaches, or the probability that a specified “mission” can be accomplished without a security breach. This new approach is based on the analogy between system failure and security breach, but it raises several issues which invite empirical investigation. We briefly describe a pilot experiment that we have conducted to judge the feasibility of collecting data to examine these issues  相似文献   

6.
For decades, wind tunnel testing has been conducted in test section environments that have not been adequately or consistently documented. Since wind tunnel flow quality can adversely affect test results, accurate and consistent flow quality measurements are required, along with an understanding of the sources, characteristics, and management of flow turbulence. This paper will review turbulence measurement techniques and data obtained in subsonic, transonic, and supersonic test facilities as they relate to the determination and assessment of wind tunnel flow quality. The principles and practical application of instrumentation used in the measurement and characterization of wind tunnel turbulence will be described. Techniques used for the identification of the sources of wind tunnel disturbances, and the performance of turbulence suppression devices will be outlined. These test techniques will be illustrated with extensive measurements obtained in a number of test facilities. The measurements will provide comprehensive turbulence data that are vital to the assessment and management of flow quality. Procedures designed to assess the potential influence of adverse flow quality on wind tunnel model test performance will also be discussed.  相似文献   

7.
Data fusion in biometrics   总被引:4,自引:0,他引:4  
Any biometric system has drawbacks and cannot warranty 100% identification rates, nor 0% false acceptance and rejection ratios. One way to overcome the limitations is through a combination of different biometric systems. In addition, a multimodal biometric recognition is more difficult to fool than a single, biometric system, because it is more unlikely to defeat two or three biometric systems than one. This paper summarizes the different data fusion levels, and how it must be performed in order to improve the results of each combined system on its own  相似文献   

8.
IriScan Inc. has been developing an identification/verification system capable of positively identifying and verifying the identity of individuals without physical contact or human intervention. A new technology, using the unique patterns of the human iris, shows promise of overcoming previous shortcomings and providing positive identification of an individual without contact or invasion, at extremely high confidence levels. The video-based system locates the eye and iris; evaluates the degree of occlusion by eyelid and spectral reflection; determines the quality of image focus; and determines the center and boundary of the pupil and the limbus (outer edge of the iris) for processing. The iris is zoned, and the features therein measured and encoded into a 256-byte (2048 bit) IrisCode for enrollment or identification. The presented biometric is compared to an extensive database for identification, or to a referenced IrisCode for verification. Computations and decisions are accomplished at extremely high rates of speed, resulting in processing times of less than two seconds. The process is based on the unique nature and extreme richness of the human iris. The multiple features produce a non-duplicable organ with more than 400 degrees of freedom, or measurable variables. The IriScan process typically uses about 200 of these to create a code which can be compared to an entire database in milliseconds, producing a positive identification with “imposter odds” as high as 1 in 1034  相似文献   

9.
于雪梅  程伟  谷伟岩 《飞行力学》2012,30(3):201-205
以Y12飞机起飞性能飞行试验实测数据为例,研究了利用极大似然法进行飞机起飞性能参数辨识的问题。首先通过理论分析建立了Y12飞机双发起飞性能数学模型;然后从简化灵敏度导数计算角度提出了以飞机在起飞滑跑过程中速度增量为观测量的观测方程,分析给出了待辨参数和利用极大似然法进行参数识别的方法;最后针对极大似然法的几个要素,如迭代初值、代价函数、迭代次数、样本长度、试验数据段的选取等对辨识结果的影响进行了讨论和分析。结果表明,利用极大似然法可以快速、准确地辨识出起飞性能所需的参数,并具有较高的精度,在今后的性能飞行试验数据分析中应注重推广和应用。  相似文献   

10.
Face recognition is one of the most successful ways for biometric recognition. One of its advantages is the high social acceptance by users, because it does not have the criminal stigma associated to other biometric traits, such as fingerprints. In addition, the cost of a webcam can be below 20 USD, which is certainly lower than other biometric acquisition devices. For this reason, the authors have developed a low-cost door-opening system, which is installed in our university premises for lab control access.  相似文献   

11.
分布式进化算法及其在翼型气动反设计中的应用   总被引:3,自引:0,他引:3  
构造了一种新型基于基因算法与博弈论的并行分级多目标优化方法,并应用于多段翼型气动反设计。此方法基于二进制编码的基因算法和博弈论,优化变量被分配给不同的博弈者,因而总体优化问题转变为分裂空间中的局部优化问题。文中给出了一个多段翼型形状,位置可压位流的反设计问题的求解算例,引入了基于非结构网格的分级结构。与传统基因算法数值算例的对比表明了本文构造的并行分级算法具有较高的计算效率,可广泛应用于多目标优化问题。  相似文献   

12.
岳振江  刘莉  余磊  康杰 《航空学报》2019,40(8):222931-222931
飞行器的结构模态参数在线获取对其高效、可靠运行具有重要意义。传统时变结构模态参数辨识方法存在辨识虚假结果较多,抵抗测量数据中的极端异常值能力差等问题,难以有效应用于在线过程。建立一种基于长短时记忆网络的时变结构模态参数在线辨识网络模型,通过数据集构建过程离线地引入先验信息,同时结合模型自身特性,有效提升制约在线辨识应用的可靠性。实验结果表明:在不同时变规律下,与传统辨识方法相比,在线辨识模型能有效缓解虚假结果问题,同时保证辨识结果的连续性;采用α稳定分布模型对脉冲噪声进行建模,验证了其在测量数据包含由于偶发因素产生的极端异常值时在线辨识鲁棒性。  相似文献   

13.
基于卫星导航的车载自主化列车控制是智能铁路技术体系的关键组成部分。对中国列车控制系统体系架构进行了梳理,分析了列控专用列车自主定位基本结构及与列控系统的接口模式。结合列车运行控制对安全性的特定需求,探讨了列车自主定位性能需求体系,介绍了国内外基于卫星导航的新型列车控制系统的发展情况,阐述了列车自主定位技术内涵及主要研究进展,从多源感知融合无缝定位、列车卫星定位主动增强、定位专用轨道地图数据库、自主定位性能测试评估等多个方面进行了全面系统的梳理和分析,介绍了伪卫星增强列车定位、轨旁卫星定位增强网络、地理分布式零现场虚拟测试设施等典型成果,并对前沿技术运用演进、关键场景融合优化、复杂环境安全防护、跨层协同全息感知、专用标准规范体系等未来发展方向进行了展望。  相似文献   

14.
Shifted Rayleigh filter: a new algorithm for bearings-only tracking   总被引:1,自引:0,他引:1  
A new algorithm, the "shifted Rayleigh filter," is introduced for two- or three-dimensional bearings-only tracking problems. In common with other "moment matching" tracking algorithms such as the extended Kalman filter and its modern refinements, it approximates the prior conditional density of the target state by a normal density; the novel feature is that an exact calculation is then performed to update the conditional density in the light of the new measurement. The paper provides the theoretical justification of the algorithm. It also reports on simulations involving variants on two scenarios, which have been the basis of earlier comparative studies. The first is a "benign" scenario where the measurements are comparatively rich in range-related information; here the shifted Rayleigh filter is competitive with standard algorithms. The second is a more "extreme" scenario, involving multiple sensor platforms, high-dimensional models and noisy measurements; here the performance of the shifted Rayleigh filter matches the performance of a high-order bootstrap particle filter, while reducing the computational overhead by an order of magnitude.  相似文献   

15.
针对遥测系统在恶劣天气条件、航天器姿态调整、天线指向偏离、脉冲干扰等各种因素影响下出现的遥测信号闪断以至接收机丢帧问题,提出一种适用于闪断信道的纠删码技术,用于恢复丢失的数据帧.首先介绍LDPC(低密度奇偶校验)纠删码的编译码算法,然后构造一种以短码长的随机码为外码、IRA(不规则重复累积)LDPC码为内码的级联纠删码,最后给出纠删码的应用策略和实现纠删码所需的CCSDS(空间数据系统咨询委员会)协议扩展.通过仿真实验和分析,得到了LDPC纠删码和级联纠删码的纠删性能,得出级联纠删码与LDPC纠删码均可获得接近理想的纠删性能的结论,且级联纠删码的构造更为灵活,可适应不同的应用环境,对CCSDS协议进行适当扩展后即可支持纠删码在CCSDS遥测链路中的应用.  相似文献   

16.
A robust adaptive control scheme is proposed that can be applied to a practical autopilot design for feedback-linearized skid-to-turn (STT) missiles with aerodynamic uncertainties. The approach is to add a robust adaptive controller to a feedback-linearizing controller in order to reduce the influence of the aerodynamic uncertainties. The proposed robust adaptive control scheme is based on a sliding mode control technique with an adaptive law for estimating the unknown upper bounds of uncertain parameters. A feature of the proposed scheme is that missile systems with aerodynamic uncertainties can be controlled effectively over a wide operating range of flight conditions. It is shown, using Lyapunov stability theory, that the proposed scheme can give sufficient tracking capability and stability for a feedback-linearized STT missile with aerodynamic uncertainties. The six-degree-of-freedom nonlinear simulation results also show that good performance for several uncertainty models and engagement scenarios can be achieved by the proposed scheme in practical night conditions  相似文献   

17.
For a multi-sensor target tracking system, the effects of temporally staggered sensors on system performance are investigated and compared with those of synchronous sensors. To capture system performance over time, a new metric, the average estimation error variance (AEV), is proposed. For a system that has N sensors with equal measurement noise variance, numerical results show that the optimal staggering pattern is to use N uniformly staggered sensors. We have also shown analytically that the AEV of the system with N uniformly staggered sensors is always smaller than that of the system with N synchronous sensors. For sensors with different measurement noise variances, the optimal staggering pattern can be found numerically. Practical guidelines on selecting the optimal staggering pattern have been presented for different target tracking scenarios. Due to its simplicity, uniform staggering can be used as an alternative scheme with relatively small performance degradation.  相似文献   

18.
On the vulnerability of biometric security systems   总被引:1,自引:0,他引:1  
This paper presents an overview of the weakness of biometric security systems and possible solutions to improve it. Different levels of attack are described, and the strengths and weaknesses of the main biometric system are emphasized. Solutions are provided with special emphasis on cryptography and watermarking techniques.  相似文献   

19.
This paper examines the utility of remote, isolated Antarctic research stations as analogs for long-duration spaceflights from the perspective of psychosocial processes of adaptation and adjustment. Certain features of the physical and man-made environments found in Antarctica are similar to those that will be encountered in outer space. In both settings, men and women are likely to experience a number of physiological and psychological changes in response to the extreme environmental conditions and the prolonged isolation and confinement. Biomedical research in Antarctica provides an opportunity to study the causes of these changes and to develop strategies for reducing the risks to health and well-being before they pose a serious threat to crew safety and mission success. A number of lessons for long-duration spaceflight are examined, including screening and selection of personnel; training programs designed to facilitate individual adjustment and group adaptation and minimize group conflict; identification of optimal leadership characteristics for small, isolated groups; an understanding of social dynamics and group "microcultures" necessary for the organization and management of small but heterogeneous groups; organization of work activities; facility design; and support infrastructure.  相似文献   

20.
综合化航电系统的安全问题将是系统设计者的主要挑战之一,密钥管理是解决安全问题的基础.综合化航电系统的密钥管理不同于联合式航电系统,不存在专用的安全模块和加密总线,因此密钥及保密数据的加载需要新的方式.从综合化航电系统的特点出发,从地面到空中全方位考虑密钥的生成、加载、分配、存储以及擦除的过程,给出了航电系统密钥管理的一个具体方案,并对该方案的优缺点进行了分析,表明该方案具有较好的安全性.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号