Agnitè Maxim Wilfrid Straiker Edoh, Tahirou Djara, Abdou-Aziz Sobabe Ali Tahirou, A. Vianou
In this work, the authors propose a new biometric authentication system on mobile devices, enhancing security at these terminals and preserving user privacy. The proposed system uses a method of extracting strong features from minutiae with refinement of the method with regard to the further elimination of false minutiae by the calculation of geometric information (orientations and distances between minutiae) to obtain true terminations and stronger bifurcations facilitating the recognition of individuals. A series of tests carried out using a recognition and authentication application allowed us to achieve a false rejection rate of 13.81% and a false acceptance rate of almost zero (0.021%). The authors also propose a security model using hash functions and a random number to make the recognition system revocable, more difficult to compromise and thus reducing the risk of usurpation.
{"title":"Biometric Authentication Methods on Mobile Platforms","authors":"Agnitè Maxim Wilfrid Straiker Edoh, Tahirou Djara, Abdou-Aziz Sobabe Ali Tahirou, A. Vianou","doi":"10.4018/ijmcmc.334130","DOIUrl":"https://doi.org/10.4018/ijmcmc.334130","url":null,"abstract":"In this work, the authors propose a new biometric authentication system on mobile devices, enhancing security at these terminals and preserving user privacy. The proposed system uses a method of extracting strong features from minutiae with refinement of the method with regard to the further elimination of false minutiae by the calculation of geometric information (orientations and distances between minutiae) to obtain true terminations and stronger bifurcations facilitating the recognition of individuals. A series of tests carried out using a recognition and authentication application allowed us to achieve a false rejection rate of 13.81% and a false acceptance rate of almost zero (0.021%). The authors also propose a security model using hash functions and a random number to make the recognition system revocable, more difficult to compromise and thus reducing the risk of usurpation.","PeriodicalId":43265,"journal":{"name":"International Journal of Mobile Computing and Multimedia Communications","volume":"28 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139226654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-20DOI: 10.38007/ijmc.2023.040110
{"title":"Reverse Chronology: The Nature of News Stories——Based on the Investigation of the Typical Reports of the Model of the Times","authors":"","doi":"10.38007/ijmc.2023.040110","DOIUrl":"https://doi.org/10.38007/ijmc.2023.040110","url":null,"abstract":"","PeriodicalId":43265,"journal":{"name":"International Journal of Mobile Computing and Multimedia Communications","volume":"25 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85678676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-19DOI: 10.38007/ijmc.2023.040109
Baifang Liu, Yingqi Jia
: With the progress of information technology and the popularity of the Internet, the traditional Accounting information system (AIS) has been unable to meet the growing information processing needs of enterprises. The traditional AIS has problems such as inconvenient data storage and sharing, low efficiency of information transmission, etc. The AIS based on computer network can effectively solve these problems. This paper aimed to study the design of AIS based on computer network to improve the efficiency and accuracy of enterprise financial management. This paper first introduced the importance of computer network in enterprise management and the application of AIS in modern enterprises. Then, this paper put forward the demand of using computer network technology to design and establish AIS, and expounded the advantages of computer network in realizing real-time sharing and collaborative processing of financial data. This paper put forward indicators to evaluate different design schemes in terms of performance, security and reliability, and emphasized the importance of security in the design of enterprise AIS. This paper was committed to providing reference for enterprises to select appropriate AIS design scheme based on computer network through research and experiment.
{"title":"Design of Accounting Information System Based on Computer Network","authors":"Baifang Liu, Yingqi Jia","doi":"10.38007/ijmc.2023.040109","DOIUrl":"https://doi.org/10.38007/ijmc.2023.040109","url":null,"abstract":": With the progress of information technology and the popularity of the Internet, the traditional Accounting information system (AIS) has been unable to meet the growing information processing needs of enterprises. The traditional AIS has problems such as inconvenient data storage and sharing, low efficiency of information transmission, etc. The AIS based on computer network can effectively solve these problems. This paper aimed to study the design of AIS based on computer network to improve the efficiency and accuracy of enterprise financial management. This paper first introduced the importance of computer network in enterprise management and the application of AIS in modern enterprises. Then, this paper put forward the demand of using computer network technology to design and establish AIS, and expounded the advantages of computer network in realizing real-time sharing and collaborative processing of financial data. This paper put forward indicators to evaluate different design schemes in terms of performance, security and reliability, and emphasized the importance of security in the design of enterprise AIS. This paper was committed to providing reference for enterprises to select appropriate AIS design scheme based on computer network through research and experiment.","PeriodicalId":43265,"journal":{"name":"International Journal of Mobile Computing and Multimedia Communications","volume":"43 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81704627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-15DOI: 10.38007/ijmc.2023.040108
Shenze Li
: With the rapid development of information technology, data center network security issues have become increasingly complex and severe. In order to address this challenge, various information technology driven solutions have been proposed, aimed at improving the security performance of data center networks. This article will explore these solutions and provide relevant numerical data support. By comparing the performance of traditional and new solutions in key indicators such as attack detection rate, false alarm rate, response time, and number of security events, it can be seen that the new solution has achieved significant results in improving network security performance. For example, the attack detection rate of the new solution has reached 95%, which is a significant improvement compared to 75% of traditional solutions. At the same time, the false alarm rate has been reduced to 5%, with a decrease of 50% compared to the traditional solution of 10%. The background significance of information technology driven data center network security solutions is significant, and remarkable numerical results have been achieved in key indicators.
{"title":"Challenges and Solutions for Network Security in Data Centers Driven by Information Technology","authors":"Shenze Li","doi":"10.38007/ijmc.2023.040108","DOIUrl":"https://doi.org/10.38007/ijmc.2023.040108","url":null,"abstract":": With the rapid development of information technology, data center network security issues have become increasingly complex and severe. In order to address this challenge, various information technology driven solutions have been proposed, aimed at improving the security performance of data center networks. This article will explore these solutions and provide relevant numerical data support. By comparing the performance of traditional and new solutions in key indicators such as attack detection rate, false alarm rate, response time, and number of security events, it can be seen that the new solution has achieved significant results in improving network security performance. For example, the attack detection rate of the new solution has reached 95%, which is a significant improvement compared to 75% of traditional solutions. At the same time, the false alarm rate has been reduced to 5%, with a decrease of 50% compared to the traditional solution of 10%. The background significance of information technology driven data center network security solutions is significant, and remarkable numerical results have been achieved in key indicators.","PeriodicalId":43265,"journal":{"name":"International Journal of Mobile Computing and Multimedia Communications","volume":"6 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74745922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This article examines usability evaluation methodologies, then presents a non-conscious behavioral indicator based on user eye movements and pupil dilation. The authors test how gender and online buying history affect the behavioral index's usability scores. This study uses three Iranian online food retailers. Thirty participants were asked to add things from predetermined grocery stores to virtual shopping carts before the experiment took them to the other two websites in a random order to collect eye movement data. Each group's presentation order was randomized. The number of fixations, number of saccades, total duration of fixations, scan-path length, pupil size, and task time were inversely linked with self-report usability measures. This research evaluates groups with different levels of online shopping expertise and gender based on experienced usability. Differences between groups suggest that user demographics affect usability.
{"title":"Using Eye Tracking to Measure Overall Usability of Online Grocery Shopping Websites","authors":"A. B. Naeini, A. Mahdipour, Rasam Dorri","doi":"10.4018/ijmcmc.326129","DOIUrl":"https://doi.org/10.4018/ijmcmc.326129","url":null,"abstract":"This article examines usability evaluation methodologies, then presents a non-conscious behavioral indicator based on user eye movements and pupil dilation. The authors test how gender and online buying history affect the behavioral index's usability scores. This study uses three Iranian online food retailers. Thirty participants were asked to add things from predetermined grocery stores to virtual shopping carts before the experiment took them to the other two websites in a random order to collect eye movement data. Each group's presentation order was randomized. The number of fixations, number of saccades, total duration of fixations, scan-path length, pupil size, and task time were inversely linked with self-report usability measures. This research evaluates groups with different levels of online shopping expertise and gender based on experienced usability. Differences between groups suggest that user demographics affect usability.","PeriodicalId":43265,"journal":{"name":"International Journal of Mobile Computing and Multimedia Communications","volume":"302 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74183747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper investigates generating machine color emotion through deep learning. The grayscale image colorization model's training process resembles human memory color. Sixty images were recolored and quality evaluated to explore machine generated color impressions. Six experimental samples were recolored under D65, A, CWF, and TL84 light sources. Changes in lightness, chroma, and hue angle compared the original and colorized images, exploring light source effects on machine color perception. Analyzing differences in coloring results within the CIEL* a* b* color space for pixels with equal grayscale verified machine color emotion generation. Results show the machine learns to form color impressions from samples. Different light source color temperatures impact color prediction accuracy. The machine accurately colors images based on semantic context, demonstrating spontaneous color emotion generation through deep learning. This research positively contributes to the development of intelligent devices with color emotion.
{"title":"Deep Learning-Based Machine Color Emotion Generation","authors":"Tongyao Nie, Xinguang Lv","doi":"10.4018/ijmcmc.325349","DOIUrl":"https://doi.org/10.4018/ijmcmc.325349","url":null,"abstract":"This paper investigates generating machine color emotion through deep learning. The grayscale image colorization model's training process resembles human memory color. Sixty images were recolored and quality evaluated to explore machine generated color impressions. Six experimental samples were recolored under D65, A, CWF, and TL84 light sources. Changes in lightness, chroma, and hue angle compared the original and colorized images, exploring light source effects on machine color perception. Analyzing differences in coloring results within the CIEL* a* b* color space for pixels with equal grayscale verified machine color emotion generation. Results show the machine learns to form color impressions from samples. Different light source color temperatures impact color prediction accuracy. The machine accurately colors images based on semantic context, demonstrating spontaneous color emotion generation through deep learning. This research positively contributes to the development of intelligent devices with color emotion.","PeriodicalId":43265,"journal":{"name":"International Journal of Mobile Computing and Multimedia Communications","volume":"9 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84498651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-11DOI: 10.38007/ijmc.2023.040107
{"title":"On the Color rule of Children's Educational Website Games","authors":"","doi":"10.38007/ijmc.2023.040107","DOIUrl":"https://doi.org/10.38007/ijmc.2023.040107","url":null,"abstract":"","PeriodicalId":43265,"journal":{"name":"International Journal of Mobile Computing and Multimedia Communications","volume":"84 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80819384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-20DOI: 10.38007/ijmc.2023.040105
{"title":"An Efficient Algorithm for Multi-dimensional and Multi-point Random Seismic Response Analysis of Spatial Grid Structure based on Computer","authors":"","doi":"10.38007/ijmc.2023.040105","DOIUrl":"https://doi.org/10.38007/ijmc.2023.040105","url":null,"abstract":"","PeriodicalId":43265,"journal":{"name":"International Journal of Mobile Computing and Multimedia Communications","volume":"38 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90171937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-20DOI: 10.38007/ijmc.2023.040101
{"title":"Disclosure and Forecast of Stock Issuance Information Based on High Performance Computing and Blockchain Technology","authors":"","doi":"10.38007/ijmc.2023.040101","DOIUrl":"https://doi.org/10.38007/ijmc.2023.040101","url":null,"abstract":"","PeriodicalId":43265,"journal":{"name":"International Journal of Mobile Computing and Multimedia Communications","volume":"82 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79957616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-20DOI: 10.38007/ijmc.2023.040102
{"title":"Network Accounting Mode Management in Multimedia Environment on Account of Embedded Microprocessor","authors":"","doi":"10.38007/ijmc.2023.040102","DOIUrl":"https://doi.org/10.38007/ijmc.2023.040102","url":null,"abstract":"","PeriodicalId":43265,"journal":{"name":"International Journal of Mobile Computing and Multimedia Communications","volume":"3 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78296080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}