multifactor authentication in the Internet of things domain - Project Ideas | Grossarchive.com

Explore Project Topics on: multifactor authentication in the Internet of things domain

Related Works

ABSTRACT An important requirement of any information management system is to protect data and resources against unauthorized disclosure (secrecy) and unauthorized or improper modifications (integrity), while at the same time ensuring their availability to legitimate users (no denials-of-service). Enforcing protection therefore requires that every... Continue Reading
Abstract The Internet has undergone many changes in its 45-year-old history. The next wave for the Internet is the Internet of Things (IoT). IoT is is defined as “group of infrastructures interconnecting connected objects and allowing their management, data mining and the access to the data they generate” (Dorsemaine). This project implements... Continue Reading
ABSTRACT Automated Fish Feeder is a system, which focuses on aiding small scale fish farmers to feed their farms efficiently. By using Arduino and Internet of Things, this is made possible. This provides fish farmers with time and adequate information as the system is set to feed at several time intervals and send information through the internet... Continue Reading
Abstract Waste management is a raising concern faced by many nations in the world today. On the streets of major cities, it has become almost common to find waste which poses health hazards and other concerns to its communities and inhabitants. This project focuses on the use of smart systems and the Internet of Things (IOT), to provide an... Continue Reading
Abstract The increasing demand for electricity in Ghana has led to concerns about energy conservation, to reduce the rising energy costs as well as the carbon emissions produced from energy generation. Popular energy conservation methods used in Ghana include turning off devices when not in use and using Light Emitting Diode (LED) lamps in place... Continue Reading
ABSTRACT In our present society today, it is clearly seen that garbage cans are being placed in open environments because it needs to be accessed by the public. It can be observed that those garbage cans usually get filled up and overflow and litter the environment. Patil (2015) claims that this uncontrolled littering can lead to a gradual... Continue Reading
Internet of Things has been described as a system of related computing devices, machines, animals or people that are provided with unique identifiers to capture and transfer data over a network without requiring human intervention or human-to-computer interaction. It has been used in several fields such as surveillance, tracking and weather... Continue Reading
Abstract In traditional Internet of Things (IoT) systems, users are unable to authorize and/or deauthorize the collection of user data. Hence, the problem of the absence of user autonomy in IoT systems. The project aims to tackle this problem by suggesting a human-centered privacy-by-design option in the design and implementation of IoT systems.... Continue Reading
ABSTRACT Ground magnetics and electromagnetic datasets were processed to interpret the subsurface geology and structure of the southwest of Ghana within the Tarkwain and Volcanics in the central part of the Ashanti belt. The study was aimed at mapping lithology, delineating structural lineaments and their trends as well as the trend of... Continue Reading
ABSTRACT INVESTIGATING THE CONFORMITY BETWEEN THE ZIMBABWE LAND ADMINISTRATION SYSTEMAND THE LAND ADMINISTRATION DOMAIN MODEL Page 5 The increase in land utilization has necessitated the devising of more adequate technologies for better management and administration of the nation‟s most valuable resource. The land administration functions in... Continue Reading
ABSTRACT Social class and identity are two vital concepts that determine the personality and social relationship of individuals. As such, both concepts define the way people relate within their society. Chinua Achebe and No’violet Bulawayo in their text Things Fall Apart (1958) and We Need New Names (2014) respectively showed how social class... Continue Reading
CHAPTER ONE INTRODUCTION ·         Background of the study Many societies have beliefs rooted deep in ancient religion. Some beliefs include polygamy, polytheism, and patriarchy, or rule by men. One such culture is that of Achebe’s Things Fall Apart. Polytheism and polygamy are custom in the clan, and the role of each family member is... Continue Reading
ABSTRACT Social class and identity are two vital concepts that determine the personality and social relationship of individuals. As such, both concepts define the way people relate within their society. Chinua Achebe and No’violet Bulawayo in their text Things Fall Apart (1958) and We Need New Names (2014) respectively showed how social class... Continue Reading
ABSTRACT Language is an indispensible characteristic of every human society. The language one speaks tells much about one’s identity with regards to where the person comes from. In every society individuals and groups of persons would like to be differentiated from others, and in that effect, identity comes to play. In this study, the researcher... Continue Reading
ABSTRACT In this project, a biometric authentication system based on measurements of the user's three-dimensional (3-D) hand geometry is proposed. The system relies on a novel real-time and low-cost 3-D sensor that generates a dense range image of the scene. By exploiting 3-D information we are able to limit the constraints usually posed on the... Continue Reading
ABSTRACT In this project, a biometric authentication system based on measurements of the user's three-dimensional (3-D) hand geometry is proposed. The system relies on a novel real-time and low-cost 3-D sensor that generates a dense range image of the scene. By exploiting 3-D information we are able to limit the constraints usually posed on... Continue Reading
TABLE OF CONTENTS DECLARATION..........................................................................................................ii ACKNOWLEDGEMENTS............................................................................................. iii... Continue Reading
CHAPTER ONE INTRODUCTION 1.1       Background of the Study A biometric system is essentially a pattern recognition system that operates by acquiring biometric data from an individual, extracting a feature vector from the acquired data, comparing this feature vector from the... Continue Reading
Counterfeiting is the concern of everyone – the consumers and the manufacturers alike. Drugs counterfeiting has been on the increased, the market is not sought for and the income is on the high side but to the detriment of both the consumers, suppliers and manufacturers. Technology can be of utmost importance in this area via the development of... Continue Reading
Counterfeiting is the concern of everyone – the consumers and the manufacturers alike. Drugs counterfeiting has been on the increased, the market is not sought for and the income is on the high side but to the detriment of both the consumers, suppliers and manufacturers. Technology can be of utmost importance in this area via the development of... Continue Reading
ABSTRACT Most ATMs employ one means of authentication (single factor authentication) by using the PIN. These kinds of ATMs are vulnerable to ATM frauds like Card Skimming: where a device placed at the slot for the ATM Card copies all the information stored in ATM cards including the PINs and then copies of the original cards will be made,... Continue Reading
BIO METRIC  AUTHENTICATION OF AN AUTOMATIC TELLER MACHINE USING FINGERPRINT AND PASSWORD   CHAPTER ONE INTRODUCTION          1.1  Background to the Study In the olden days, financial institution in Nigeria did almost all their transactions manually, to allow customers perform their financial transactions and other banking processes. The... Continue Reading
DESIGN AND IMPLEMENTATION OF AN ELECTRONIC VOTING SYSTEM WITH FINGERPRINT AUTHENTICATION CHAPTER ONE BACKGROUND OF STUDY 1.0       Background of the Study Voting theory formally began in the 18th century and ever since, many proposal has been made towards using electronic technologies to improve elections (Sobia, Ummer, Ayesha, Usman, and... Continue Reading
ABSTRACT Focusing on methods that are used to implement strong user authentication for online-consumer identities, this article aims to distill a comprehensive view of strong user authentication by examining its concepts, implementation approaches, and challenges/additional concerns at the architectural level. It discusses effective solution... Continue Reading
C HAPTER ONE INTRODUCTION          1.1   Background to the Study In the olden days, financial institution in Nigeria did almost all their transactions manually, to allow customers perform their financial transactions and other banking processes. The customers have to form a queue which ends up consuming a lot of consumer’s time and is... Continue Reading
ABSTRACT Focusing on methods that are used to implement strong user authentication for online-consumer identities, this article aims to distill a comprehensive view of strong user authentication by examining its concepts, implementation approaches, and challenges/additional concerns at the architectural level. It discusses effective solution... Continue Reading
ABSTRACT African novelists draw their raw materials from different sources, some draw their raw materials from the folktales being told at night, some writes about the village life before the Colonial masters while some transfer the beauty in African tradition into their works. Laye’s The African Child and Achebe’s Things fall Apart are... Continue Reading
ABSTRACT African novelists draw their raw materials from different sources, some draw their raw materials from the folktales being told at night, some writes about the village life before the Colonial masters while some transfer the beauty in African tradition into their works. Laye’s The African Child and Achebe’s Things fall Apart are... Continue Reading
CHAPTER ONE 1.1    INTRODUCTION Reading through African novels, this research work was triggered by a lot of borrowing from oral traditional aesthetics into the written form by African novelists. The transfer of... Continue Reading
CHAPTER ONE 1.0     Introduction Previously, voting for general and local elections is done by electors with voting papers and voting boxes in which the voting papers are placed. This method reveals some kinds of negative situations. Not been able to determine... Continue Reading
whatsappWhatsApp Us