Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "authentication" wg kryterium: Temat


Tytuł:
Analysis of potential risks of SMS-based authentication
Autorzy:
Szpunar, Albert
Stęchły, Arkadiusz
Powiązania:
https://bibliotekanauki.pl/articles/31233158.pdf
Data publikacji:
2023
Wydawca:
Patryk Organiściak
Tematy:
authentication
cyber security
two-factor authentication
2FA
SMS
text message
uwierzytelnianie
bezpieczeństwo cybernetyczne
uwierzytelnianie dwuskładnikowe
wiadomość tekstowa
Opis:
The pervasive use of mobile devices and the omnipresence of the Internet have ushered in a transformative era. Nearly everyone, regardless of age, possesses a mobile phone, bridging generational gaps in digital interaction. Mobile phones have become highly personal, with users guarding them zealously. Service providers recognize this intimate relationship, offering an opportunity to enhance security. Traditional password-based security is vulnerable to data breaches, prompting the adoption of mobile phones as a more robust platform for safeguarding digital assets. This shift has also facilitated the development of digital identification applications, reducing reliance on physical identity documents. Additionally, mobile banking applications are replacing physical payment cards, enabling secure transactions. The ascendancy of mobile payment solutions is diminishing the role of physical cash and wallets. In summary, mobile devices have reshaped security and daily activities, becoming the cornerstone of our digital existence, offering higher levels of security, convenience, and efficiency.
Źródło:
Advances in Web Development Journal; 2023, 1; 13-25
2956-8463
Pojawia się w:
Advances in Web Development Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cancelable template generation based on quantization concepts
Autorzy:
Nassar, Rana M.
Khalaf, Ashraf A. M.
El-Banby, Ghada M.
El-Samie, Fathi E. Abd
Hussein, Aziza I.
El-Shafai, Walid
Powiązania:
https://bibliotekanauki.pl/articles/27315703.pdf
Data publikacji:
2023
Wydawca:
Polska Akademia Nauk. Stowarzyszenie Elektryków Polskich
Tematy:
cancelable biometrics
quantization concepts
DCT
JPEG
access control
authentication
Opis:
The idea of cancelable biometrics is widely used nowadays for user authentication. It is based on encrypted or intentionally-distorted templates. These templates can be used for user verification, while keeping the original user biometrics safe. Multiple biometric traits can be used to enhance the security level. These traits can be merged together for cancelable template generation. In this paper, a new system for cancelable template generation is presented depending on discrete cosine transform (DCT) merging and joint photographic experts group (JPEG) compression concepts. The DCT has an energy compaction property. The low-frequency quartile in the DCT domain maintains most of the image energy. Hence, the first quartile from each of the four biometrics for the same user is kept and other quartiles are removed. All kept coefficients from the four biometric images are concatenated to formulate a single template. The JPEG compression of this single template with a high compression ratio induces some intended distortion in the template. Hence, it can be used as a cancelable template for the user acquired from his four biometric traits. It can be changed according to the arrangement of biometric quartiles and the compression ratio used. The proposed system has been tested through merging of face, palmprint, iris, and fingerprint images. It achieves a high user verification accuracy of up to 100%. It is also robust in the presence of noise.
Źródło:
Opto-Electronics Review; 2023, 31, 3; art. no. e145940
1230-3402
Pojawia się w:
Opto-Electronics Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Discrimination of Selected Cold-Pressed and Refined Oils by Untargeted Profiling of Phase Transition Curves of Differential Scanning Calorimetry
Autorzy:
Islam, Mahbuba
Magdalena, Montowska
Emilia, Fornal
Jolanta, Tomaszewska-Gras
Powiązania:
https://bibliotekanauki.pl/articles/16538550.pdf
Data publikacji:
2023-08-02
Wydawca:
Instytut Rozrodu Zwierząt i Badań Żywności Polskiej Akademii Nauk w Olsztynie
Tematy:
authentication
plant oils
chemometrics
multivariate data analysis
melting profiles
orthogonal partial least squares-discriminant analysis
differential scanning calorimetry
Opis:
The authenticity assessment of edible oils is crucial to reassure consumers of product compliance. In this study, a new approach was taken to combining untargeted profiling by using differential scanning calorimetry (DSC) with chemometric methods in order to distinguish cold-pressed oils (flaxseed, camelina, hempseed) from refined oils (rapeseed, sunflower, soybean). The whole spectrum of DSC melting profiles was considered as a fingerprint of each oil. Flaxseed and hempseed oils exhibited four endothermic peaks, while three peaks with one exothermic event were detected for camelina seed oil. In the case of refined oils, two endothermic peaks were detected for rapeseed oil, three for sunflower oil and four for soybean oil. Thermodynamic parameters, such as peak temperature, peak heat flow and enthalpy, differed for each type of oil. Principal component analysis (PCA) and orthogonal partial least squares-discriminant analysis (OPLS-DA) were used for processing data consisting of the whole spectrum of heat flow variables of melting phase transition. PCA demonstrated a clear separation between refined and cold-pressed oils as well as six individual oils. The OPLS-DA showed a distinct classification in six classes according to the types of oils. High OPLS-DA coefficients including R2X(cum)=0.971, R2(cum)=0.916 and Q2X(cum)=0.887 indicated good fitness of the model for oil discrimination. Variables influence on projection (VIP) plot indicated the most significant variables of the heat flow values detected at temperatures around −29°C, −32°C, −14°C, −10°C, −24°C and −41°C for the differentiation of oils. The study ultimately demonstrated great potential of the untargeted approach of using the whole melting DSC profile with chemometrics for the discrimination of cold-pressed and refined oils.
Źródło:
Polish Journal of Food and Nutrition Sciences; 2023, 73, 3; 224-232
1230-0322
2083-6007
Pojawia się w:
Polish Journal of Food and Nutrition Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Hardware Implementation of an Enhanced Security- and Authentication-Related Automotive CAN Bus Prototype
Autorzy:
Zniti, Asmae
Ouazzani, Nabih
Powiązania:
https://bibliotekanauki.pl/articles/2200704.pdf
Data publikacji:
2023
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
CAN
automotive security
attack
authentication
Opis:
In this paper a new security technique aiming to ensure safe and reliable communications between different nodes on an automotive Controller Area Network (CAN) is presented. The proposed method relies on a robust authentication code using Blake-3 as a hash algorithm within an adapted structure that includes a monitor node. A prototype is implemented and run effectively to perform hardware simulations of real case-based security problems of automotive embedded CAN systems. As a result, data transfer can take place on a newly enhanced CAN bus according to the standard protocol without being intercepted nor tampered with by unauthorized parties thereby highlighting the effectiveness of the proposed technique.
Źródło:
International Journal of Electronics and Telecommunications; 2023, 69, 1; 83--88
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Improved Framework for Blockchain Application Using Lattice Based Key Agreement Protocol
Autorzy:
Oleiwi, Zahraa Ch.
Dihin, Rasha Ai
Alwan, Ali H.
Powiązania:
https://bibliotekanauki.pl/articles/2200725.pdf
Data publikacji:
2023
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
key agreement protocol
lattice based protocol
mutual authentication
Diffie-Hellman protocol
forward secrecy
Opis:
One of the most recent challenges in communication system and network system is the privacy and security of information and communication session. Blockchain is one of technologies that use in sensing application in different important environments such as healthcare. In healthcare the patient privacy should be protected use high security system. Key agreement protocol based on lattice ensure the authentication and high protection against different types of attack especially impersonation and man in the middle attack where the latticebased protocol is quantum-withstand protocol. Proposed improved framework using lattice based key agreement protocol for application of block chain, with security analysis of many literatures that proposed different protocols has been presented with comparative study. The resultant new framework based on lattice overcome the latency limitation of block chain in the old framework and lowered the computation cost that depend on Elliptic curve Diffie-Hellman. Also, it ensures high privacy and protection of patient’s information.
Źródło:
International Journal of Electronics and Telecommunications; 2023, 69, 1; 5--10
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Protecting web applications from authentication attacks
Autorzy:
Gugała, Łukasz
Łaba, Kamil
Dul, Magdalena
Powiązania:
https://bibliotekanauki.pl/articles/31233161.pdf
Data publikacji:
2023
Wydawca:
Patryk Organiściak
Tematy:
web application security
cybersecurity
2FA
authentication
two-factor authentication
bezpieczeństwo aplikacji internetowych
bezpieczeństwo cybernetyczne
uwierzytelnianie
uwierzytelnianie dwuskładnikowe
Opis:
This paper explores the critical domain of safeguarding web-based applications against authentication attacks, recognizing the persistent challenges posed by evolving cyber threats. The project delineates the distinct objectives of such attacks, including data theft, identity theft, and service disruption, underlining their potential far-reaching implications, such as the compromise of sensitive corporate data and the execution of unauthorized administrative operations. It underscores the pivotal role of user awareness and education as the ultimate defense against authentication-related breaches. Robust security measures, encompassing the use of strong, intricate passwords, encrypted network communication, two-factor authentication, and the regulation of failed login attempts, are emphasized as essential safeguards. Additionally, the project underscores the significance of maintaining system components through regular updates and conducting comprehensive security audits. A holistic approach, integrating technical and human factors, underscores user awareness and ongoing training as indispensable elements in the endeavor to enhance security in an increasingly digital landscape. "Protecting Web Applications from Authentication Attacks" aims to equip its readers with a comprehensive understanding of authentication system security and offers practical directives for bolstering defense mechanisms in a professional and formal context.
Źródło:
Advances in Web Development Journal; 2023, 1; 26-42
2956-8463
Pojawia się w:
Advances in Web Development Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Two-factor authentication (2FA) comparison of methods and applications
Autorzy:
Florczak, Sebastian
Jasiak, Adrian
Szczygieł, Izabela
Powiązania:
https://bibliotekanauki.pl/articles/31233162.pdf
Data publikacji:
2023
Wydawca:
Patryk Organiściak
Tematy:
cybersecurity
authentication
two-factor authentication
2FA
bezpieczeństwo cybernetyczne
uwierzytelnianie
uwierzytelnianie dwuskładnikowe
Opis:
In this document, the investigation delves into the realm of two-factor authentication (2FA), exploring its applications and comparing various methods of implementation. Two-factor authentication, often referred to colloquially as two-step verification, serves to enhance credential security during login processes across platforms such as Facebook and online banking, among others. While 2FA has significantly improved the security of the login and registration processes, it is noteworthy that its adoption tends to be more prevalent among younger individuals. Unfortunately, an increasing number of financial scams target older individuals who may be disinclined to engage with what they perceive as the complexity of multi-step authentication and password confirmation. Subsequent chapters provide a discussion of the various types of two-factor authentication, furnish detailed descriptions, and offer a summary of the benefits and gains achievable through the deployment of 2FA.
Źródło:
Advances in Web Development Journal; 2023, 1; 26-45
2956-8463
Pojawia się w:
Advances in Web Development Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A new hand-movement-based authentication method using feature importance selection with the hotelling’s statistic
Autorzy:
Doroz, Rafal
Wrobel, Krzysztof
Porwik, Piotr
Orczyk, Tomasz
Powiązania:
https://bibliotekanauki.pl/articles/2147116.pdf
Data publikacji:
2022
Wydawca:
Społeczna Akademia Nauk w Łodzi. Polskie Towarzystwo Sieci Neuronowych
Tematy:
biometrics
person authentication
feature selection
Hotelling’s statistic
Opis:
The growing amount of collected and processed data means that there is a need to control access to these resources. Very often, this type of control is carried out on the basis of biometric analysis. The article proposes a new user authentication method based on a spatial analysis of the movement of the finger’s position. This movement creates a sequence of data that is registered by a motion recording device. The presented approach combines spatial analysis of the position of all fingers at the time. The proposed method is able to use the specific, often different movements of fingers of each user. The experimental results confirm the effectiveness of the method in biometric applications. In this paper, we also introduce an effective method of feature selection, based on the Hotelling T2 statistic. This approach allows selecting the best distinctive features of each object from a set of all objects in the database. It is possible thanks to the appropriate preparation of the input data.
Źródło:
Journal of Artificial Intelligence and Soft Computing Research; 2022, 12, 1; 41--59
2083-2567
2449-6499
Pojawia się w:
Journal of Artificial Intelligence and Soft Computing Research
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Logos & Techne - About New Possibilities of Creating Art with Artificial Intelligence
Autorzy:
Marcinkowski, Arkadiusz Mieczysław
Powiązania:
https://bibliotekanauki.pl/articles/23952446.pdf
Data publikacji:
2022
Wydawca:
Politechnika Gdańska
Tematy:
artificial intelligence
art authentication
art restoration
Opis:
The integration of artificial intelligence (AI) in the art world has been transforming various industries, including the creation of new artwork, interpretation of existing pieces of art, curation of exhibitions, authentication of artworks, creation of interactive art, and restoration of damaged artwork. AI algorithms can analyze and generate new pieces of art based on collected data, classify elements in a painting, curate exhibitions and collections tailored to specific audiences, authenticate artworks, create interactive art, and restore damaged artwork. This article explores the various possibilities and applications of AI in the art world, highlighting its potential to innovate and revolutionize the industry even further as the technology continues to evolve.
Źródło:
TASK Quarterly. Scientific Bulletin of Academic Computer Centre in Gdansk; 2022, 26, 4
1428-6394
Pojawia się w:
TASK Quarterly. Scientific Bulletin of Academic Computer Centre in Gdansk
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Neuromanagement decision making in facial recognition biometric authentication as a mobile payment technology in retail, restaurant, and hotel business models
Autorzy:
Dijmărescu, Irina
Iatagan, Mariana
Hurloiu, Iulian
Geamănu, Marinela
Rusescu, Ciprian
Dijmărescu, Adrian
Powiązania:
https://bibliotekanauki.pl/articles/19322524.pdf
Data publikacji:
2022
Wydawca:
Instytut Badań Gospodarczych
Tematy:
neuromanagement decision making
facial recognition
biometric authentication
mobile payment technology
retail, restaurant, and hotel business
Opis:
Research background: With growing evidence of biometric identification techniques as authentication, there is a pivotal need for comprehending contactless payments by use of facial recognition algorithms in retail, restaurant, and hotel business models. Purpose of the article: In this research, previous findings were cumulated showing that harnessing facial recognition payment applications as software-based contactless biometric algorithms results in remarkably qualitative enhancement in purchasing experience. Methods: Throughout March and November 2021, a quantitative literature review of the Web of Science, Scopus, and ProQuest databases was carried out, with search terms including "facial recognition payment technology", "facial recognition payment system", "facial recognition payment application", "face recognition-based payment service", "facial authentication for mobile payment transactions", and "contactless payment through facial recognition algorithms". As the analyzed research was published between 2017 and 2021, only 187 articles satisfied the eligibility criteria. By removing questionable or unclear findings (limited/nonessential data), results unsubstantiated by replication, too general content, or having quite similar titles, 38, mainly empirical, sources were selected. The Systematic Review Data Repository was harnessed, a software program for the gathering, processing, and analysis of data for our systematic review. The quality of the selected scholarly sources was assessed by employing the Mixed Method Appraisal Tool. Findings & value added: Harnessing facial recognition payment applications as software-based contactless biometric algorithms results in remarkably qualitative enhancement in purchasing experience. Subsequent attention should be directed to whether perceived value and trust shape customers' adoption of biometric recognition payment devices.
Źródło:
Oeconomia Copernicana; 2022, 13, 1; 225-250
2083-1277
Pojawia się w:
Oeconomia Copernicana
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Optical asymmetric double-image encryption and authentication in an interference-based scheme using sparse representation
Autorzy:
Luan, Guangyu
Huang, Caojun
Powiązania:
https://bibliotekanauki.pl/articles/2172860.pdf
Data publikacji:
2022
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
optical encryption
asymmetry
interference
double-image
authentication
Opis:
We report an optical asymmetric scheme for double-image encryption and authentication based on interference using sparse representation. We employ sparse representation and interference to process the Fresnel spectra related with the two original images, and then respectively acquire two ciphertexts and two pairs of private keys. Each original image possesses its corresponding two private keys. Furthermore, the decrypted image is compared with its corresponding plaintext with the aid of a nonlinear correlation for authentication. In the proposed scheme, any information concerning each primary image and comprising its silhouette cannot be recognized even though one, two, or even three masks of the two ciphertexts and two private keys are utilized for decryption. The Fresnel spectrum functions which have different diffraction distances enhance the security of the proposal significantly. Moreover, the proposal also avoids the crosstalk problem. The effectiveness and security of this proposed method are demonstrated via numerical simulations.
Źródło:
Optica Applicata; 2022, 52, 4; 497--510
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Zasada ogólna pisemności w postępowaniu podatkowym
General principle of writing in tax proceedings
Autorzy:
Masternak, Marian
Powiązania:
https://bibliotekanauki.pl/articles/2123401.pdf
Data publikacji:
2022-08-16
Wydawca:
Uniwersytet Łódzki. Wydawnictwo Uniwersytetu Łódzkiego
Tematy:
zasady ogólne postępowania podatkowego
zasada pisemności
uwierzytelnianie pism
podpis własnoręczny
podpis elektroniczny
podpis osobisty
pieczęć elektroniczna
general principles of tax proceedings
the principle of writing
authentication of documents
handwritten signature
electronic signature
trusted signature
personal signature
electronic seal
Opis:
Przedmiotem artykułu jest analiza zasady pisemności, będącej jedną z zasad ogólnych postępowania podatkowego. Celem opracowania jest ustalenie i wyjaśnienie istoty tej zasady oraz wymogów związanych z jej realizacją, z uwzględnieniem niedawnych zmian przepisów konstytuujących wymienioną zasadę, w tym nowo uregulowanych sposobów uwierzytelniania pism utrwalonych w postaci papierowej lub elektronicznej. Autor podejmuje próbę odpowiedzi na pytanie, czy zmiany te ograniczają się do uporządkowania i ujednolicenia terminologii stosowanej w Ordynacji podatkowej i w ustawie o doręczeniach elektronicznych, czy też na nowo kształtują treści zasady pisemności. W artykule zawarta jest też ocena obecnej regulacji oraz wnioski de lege ferenda dotyczące tej zasady.
The subject of the article is an analysis of the principle of writing, which is one of the general principles of tax proceedings. The aim of the study is to establish and explain the essence of this principle and the requirements related to its implementation, taking into account recent changes to the provisions constituting the said principle, including the newly regulated methods of authentication of letters recorded in paper or electronic form. The author tries to answer the question whether these changes are limited to ordering and standardizing the terminology used in the Tax Ordinance and the Electronic Service Act, or whether they shape the content of the rules of writing anew. The article also includes an assessment of the current regulation and de lege ferenda conclusions regarding this principle.
Źródło:
Kwartalnik Prawa Podatkowego; 2022, 3; 163-178
1509-877X
Pojawia się w:
Kwartalnik Prawa Podatkowego
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Alternatywne narzędzia zdalnej identyfikacji
Alternative tools of remote identification and authentication
Autorzy:
Lewandowski, Remigiusz
Powiązania:
https://bibliotekanauki.pl/articles/1879408.pdf
Data publikacji:
2021
Wydawca:
Agencja Bezpieczeństwa Wewnętrznego
Tematy:
biometria
identyfikacja
uwierzytelnienie
autoryzacja
tożsamość
biometrics
identification
authentication
authorization
identity
Opis:
W pracy przeanalizowano proces zdalnej identyfikacji w tej postaci, w jakiej jest on realizowany obecnie. Na tej podstawie zdiagnozowano najważniejsze słabe strony metod wykorzystywanych w tym procesie. W przypadku metod niebiometrycznych ich główną słabością jest ograniczenie ich stosowania do weryfikacji określonych danych uwierzytelniających posiadanych przez użytkownika (osobę weryfikującą się), a nie do weryfikacji tożsamości per se. Z kolei stosowane współcześnie metody biometryczne są czasochłonne i obarczone subiektywizmem w ocenie zgodności danych biometrycznych ze wzorcem. Alternatywę dla tych metod stanowi zaprezentowany w niniejszym artykule model, który jest oparty na w pełni zautomatyzowanej, zdalnej identyfikacji biometrycznej, wykorzystującej jako wzorzec dane biometryczne zawarte w dokumentach osobistych i paszportach. Model jest wolny od słabości i ograniczeń innych analizowanych biometrycznych i niebiometrycznych metod identyfikacji i charakteryzuje się bardzo niskim poziomem błędu.
The paper presents an analysis of the present-day process of remote identification. On this basis, the most important weaknesses of the methods were diagnosed. With regard to non-biometric methods, the main weakness and limitation is that they only verify Alternatywne narzędzia zdalnej weryfikacji tożsamości | 101 if the user (the person being verified) has appropriate credentials, and they do not verify the identity per se. On the other hand, the currently applied biometric methods are time-consuming and subjective in assessing the compliance of biometric data with the template. An alternative to these methods is a model, presented in this paper, which is based on fully automated, remote biometric identification using biometric data contained in IDs and passports as a template. The model is free from the weaknesses and limitations of other biometric and non-biometric identification methods analysed in this paper and has a very low error rate.
Źródło:
Przegląd Bezpieczeństwa Wewnętrznego; 2021, 13, 25; 85-101
2080-1335
2720-0841
Pojawia się w:
Przegląd Bezpieczeństwa Wewnętrznego
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
An Authenticated Routing Protocol for Wireless Ad Hoc Network Based on Small World Model
Autorzy:
Wang, Daxing
Xu, Leying
Powiązania:
https://bibliotekanauki.pl/articles/1844509.pdf
Data publikacji:
2021
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
small world model
wireless ad hoc network
routing protocol
authentication theory
AODV routing protocol
Opis:
Compared with traditional cellular networks, wireless ad hoc networks do not have trusted entities such as routers, since every node in the network is expected to participate in the routing function. Therefore, routing protocols need to be specifically designed for wireless ad hoc networks. In this work, we propose an authenticated routing protocol based on small world model (ARSW). With the idea originating from the small world theory, the operation of the protocol we proposed is simple and flexible. Our simulation results show the proposed ARSW not only increases packet delivery ratio, but also reduces packet delivery delay. In particularly, Using authentication theory, the proposed ARSW improves communication security.
Źródło:
International Journal of Electronics and Telecommunications; 2021, 67, 3; 425-430
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Exterior monitoring of targeted objects: UAV platform for real-time identification and authentication of livestock
Autorzy:
Pavlásek, Pavel
Powiązania:
https://bibliotekanauki.pl/articles/34655778.pdf
Data publikacji:
2021
Wydawca:
Politechnika Poznańska. Wydawnictwo Politechniki Poznańskiej
Tematy:
monitoring system
UAV
identification
machine learning
IoT
beacon
authentication
Opis:
Digitization and automation are transforming traditional systems for monitoring and managing objects in exteriors. Innovative farms are gradually moving in livestock management systems from paper reporting to integrated, shared and autonomous services throughout the livestock live-cycle. Although autonomous monitoring is a reality today, the benefits of autonomous monitoring by unmanned aerial systems (UAVs) for animal identification and authentication do not lie in the herd itself, but in what aerial systems can offer when operated and managed in an integrated ecosystem. At present, UAVs are little used in the agro sector as a concept “mobility-as-a-service” (MaaS), because farmers themselves in the real environment are not able to respond flexibly to technological innovations and adapt to the demand for monitoring and providing authentic data in real-time to the subsidy payment system. The focus of the paper is the presentation of a procedure targeted on design of an objects monitoring system in exterior according to defined parameters with selected main and specific data; taking in the account predefined parameters at the same time, the requirements for technological means and software with the support of machine learning for livestock identification as well as composition of selected technical equipment using the IoT concept with unique beacons for subsequent data processing in the reliable authentication methodology of every monitored objects are defined.
Źródło:
Poznan University of Technology Academic Journals. Electrical Engineering; 2021, 106; 5-16
1897-0737
Pojawia się w:
Poznan University of Technology Academic Journals. Electrical Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies