scispace - formally typeset
Search or ask a question

Showing papers by "Vincenzo Piuri published in 2006"


Proceedings ArticleDOI
01 Oct 2006
TL;DR: This work describes a system for personal identification and verification, based on the combination of multiple biometric readings and other user inputs, which does not rely on network access or databases to perform the verification/authentication phase.
Abstract: Several proposals have been formulated to combine cryptography and biometrics in order to secure data and to strengthen the personal authentication process, making the falsification of personal ID, like passports, more challenging. In this work we describe a system for personal identification and verification, based on the combination of multiple biometric readings and other user inputs. In such way authentication control can be performed and only allowed persons can access the resources which must be protected. The method consists of two main phases: enrollment and verification. In the first phase the data extracted from user inputs are processed by the proposed system and stored the in a innovative non-reversible form. In the second phase, the stored data are combined with the biometric readings and other user inputs in order to identify and verify the identity of the person. The system does not rely on network access or databases to perform the verification/authentication phase.

15 citations


Proceedings ArticleDOI
12 Jul 2006
TL;DR: As the results shown the proposed agency can be the consumer's key to take advantage of a DSM program automatically and to give maximum comfort to user.
Abstract: This work proposes a model of an intelligent short term demand side management system based on a MAS. The system is designed to avoid peaks of power request greater than a given threshold and to give maximum comfort to user. The proposed system is composed of a distributed network of processing nodes (PN). Each PN hosts one agent and it is able to manage a single socket tap allowing or disallowing it to supply power. Each agent reacts to a new critical condition entering in competition with the others to gain the access at a shared limited resource. As the results shown the proposed agency can be the consumer's key to take advantage of a DSM program automatically.

8 citations


Proceedings ArticleDOI
12 Jul 2006
TL;DR: This work proposes a novel approach for pattern extraction based on genetic techniques to identify the printing pattern that can be used in defect classification systems and experimental results show the valuable pattern extraction capabilities of the proposed approach.
Abstract: Time-to-market and high product quality standards are pushing the use of automatic visual inspection systems for defect detection in a wide broad of applications. The defect detection of particle boards requires the identification of all the printed and natural wood defects that can occur. The availability of information about the particle board to inspect (e.g. the pattern used to print the surface of the board) could increase heavily the defect detection capability of a quality assessment system. Nevertheless, most of the times the pattern is not available during the defect detection phase (i.e. when the pattern changes quickly or when printing and defect detection are not performed by the same company). We propose a novel approach for pattern extraction based on genetic techniques to identify the printing pattern that can be used in defect classification systems. Experimental results show the valuable pattern extraction capabilities of the proposed approach.

6 citations


Journal ArticleDOI
TL;DR: To guarantee the safety and privacy of citizens, institutions and enterprises are interested in using solutions based on biometric techniques to develop innovative services and for institutions, the adoption of these approaches improves services and shows responsiveness to citizens and their feelings.
Abstract: April 2006 IEEE Instrumentation & Measurement Magazine 23 A irports, public buildings, banks, court houses, ministry offices, and tourist attractions are frequently full of people. The ability to guarantee safety from terrorist or criminal actions would make the towns and the countryside more livable. At the same time, the public demands a guarantee that personal privacy will be maintained. For these reasons, the use of advanced techniques for recognition and identification of people is necessary. There are three main areas of application: ◗ recognition and identification of terrorists or criminals ◗ recognition and identification for access to personal information or physical entry into an area ◗ studying people movements, monitoring human behavior, and detecting anomalous scenes; early detection of suspicious behaviors may prevent dangerous acts. To guarantee the safety and privacy of citizens, institutions and enterprises are interested in using solutions based on biometric techniques to develop innovative services. For institutions, the adoption of these approaches improves services and shows responsiveness to citizens and their feelings. For enterprises, these solutions are extremely useful to maintain and increase their business and be competitive in domestic and worldwide markets.

3 citations




Proceedings ArticleDOI
13 Feb 2006
TL;DR: This paper proposes a solution for IPSec accelerator performance problems and high-level simulations and the related results are provided to show the properties of the algorithm.
Abstract: IPSec is a suite of protocols that adds security to communications at the IP level. Protocols within the IPSec suite make extensive use of cryptographic algorithms. Since these algorithms are computationally very intensive, some hardware acceleration is needed to support high throughput. IPSec accelerator performance may heavily depend on the dimension of the packets to be processed. When packets are small, the time needed to transfer data and to set up the accelerator may exceed the one to process the packets (e.g. to encrypt) by software. In this paper, we propose a solution for this problem. High-level simulations and the related results are provided to show the properties of the algorithm.

1 citations


Proceedings ArticleDOI
10 Jul 2006
TL;DR: A virtual simulation environment provided with a suitable graphical interface has been developed as the means for comparative analysis with real test bed activities to deal with overloading conditions.
Abstract: Grid computing systems are emerging as a consequence of the growing internet connectivity in combination with the need of shared resources to deploy large-scale scientific applications. In such a context, heterogeneity, decentralization, location, access and availability of resources need to be dealt with suitable simulation tools. In particular, overloading conditions may be critical and difficult to analyse when the grid is requested to guarantee affordable high performances. To deal with such a challenging task, a virtual simulation environment provided with a suitable graphical interface has been developed as the means for comparative analysis with real test bed activities.

1 citations



01 Jan 2006
TL;DR: In this article, a pattern extraction approach is proposed to identify the printing pattern that can be used for defect detection in a quality assessment system, where most of the patterns are not available during the defect detection phase (i.e. when the pattern changes quickly or when printing and defect detection are not performed by the company).
Abstract: Time-to-market andhighproduct quality standards arepushing theuseofautomatic visual inspection systems for defect detection ina widebroadofapplications. Thedefect detection ofparticle boards requires theidentification ofallthe printed andnatural wooddefects that canoccur. Theavailability ofinformation abouttheparticle boardtoinspect (e.g. the pattern usedtoprint thesurface oftheboard) couldincrease heavily thedefect detection capability ofa quality assessment system. Nevertheless, mostofthetimesthepattern isnot available during thedefect detection phase(i.e. whenthepattern changes quickly orwhenprinting anddefect detection arenot performed bythesamecompany). Wepropose anovel approach forpattern extraction basedongenetic techniques toidentify the printing pattern that canbeusedindefect classification systems. Experimental results showthevaluable pattern extraction capabilities oftheproposed approach. Keywords-Pattern Extraction, Surface Quality AssessementE Surface Defects Detection Quality ControlP article Boards