Monday, December 28, 2015

Palm Vein Technology


Introduction

This technology is really important technology because it has started to be used because of big robbery of the banks. Before this there have been using other technologies which are fingerprint, face and iris recognition and etc… After having started to be used palm vein technology has been realized that is the best way to ensure the user in user authentication processes. This technology is been increasing widely.

Potential research challenges regarding palm reading technology 

                Palm print technology is one of the most important and new technology that is being used in various areas. This technology is used mostly in areas which security is important such as criminal cases and banks. Although there has been many research and improvements to make better usage of this, still there is many challenges and problems that need further investigation.

Using pin authentication is not secure anymore. By developing the technology systems day by day security because one of the most important issue of life. By using tiny webcam in japan hackers watched people to enter their pin code in golf cabin and rubbed the more than nearly US $4 million. And in Europe hackers steal €23 million in only second half of 2010 by ATM frauds. But the palm scan technology is more secure that Regardless of the possibility that a cheat were to hack off your hand to trick a vein scanner, he'd need to keep all the blood inside your separated limb to make it work [1]. The palm print recognitions system is very more accurate than finger print and other biometric systems. If your profile is enlisted with your right hand, don't sign in with your left, the examples of a singular's two hands vary. This technology is high applicable than others, Not at all like unique mark based validation strategies, for which enrollment and confirmation of biometric information can't be effectively finished if the surface of the skin is affected by scraped area or dryness, contact less palm vein confirmation has insignificant weakness to such outer variables. Compared to other biometric technologies, palm print is also user acceptable. Not with standing requiring no immediate contact with the sensor surface, the non-obtrusive examining procedure is did in a straightforward and regular way that is not ungainly to the client. This reduces potential mental resistance because of concerns with respect to cleanliness or trouble of utilization [2]. But still there is many lacking areas that this technology needs to be researched and developed.
Technology channelings that must be researched in palm print recognition systems:
-          Because system saves for every person more than one palm print data, matching this with data from data base which there is millions of palm print data is hard and time need. In palm print matching device, one palm print must be matched with more than one palm print of same person and this is one-to-many matching which is much harder than one-to-one matching. Although there are many fast and accurate matching algorithms but still this is a challenge that must be researched for.
-          There are various components that can impact the nature of the caught picture of palm print. They are body temperature, surrounding temperature, mugginess, unevenly circulation of warmth, warmth radiation and proximity of vein to surface, camera alignment and core interest. To make system accurate these must be calculated and need for more research.
-          It is moderately costly and not accessible for large scale manufacturing yet. More alternative way of palm print recognitions which are cheaper must be developed and researched.


Resources:
[1]          The Biometric Wallet, Eliza Strickland, 30 May 2012,
[2]          Mallikarjuna et al., International Journal of Advanced Research in Computer Science and Software Engineering 3(7), July - 2013, retrieved: http://www.ijarcsse.com/docs/papers/Volume_3/7_July2013/V3I7-0440.pdf


Monday, May 4, 2015

GSM cellular network

GSM defines function definitions and specifies the interface requirements, but there is no limitation for the hardware to be used. This approach aims to restrict the device to work with designers and operators is to be able to get from different manufacturers. GSM network is divided into three main systems: Switching System (SS), Base Station System (BSS) and Operation and Support System (OSS).

Switching system:

Switching System is responsible for call processing and subscriber related functions. The switching system comprises the following functional units:
  • ·         Home Location Register (HLR)
  • ·         Mobile Services Switching Center (MSC)
  • ·         Visitor Location Register (VLR)
  • ·         Authentication Center (AUC)
  • ·         Equipment Identity Register (EUR)

Base Station System (BSS)

Base Station Controllers (BSC) and Base Transceiver Station consists of BSS performs all operations related to radio frequency.

Operation and Support System (OSS)


Operations and Maintenance Center (OMC) is connected to all devices and BSc in switching systems. OMC shape adapted to the GSM system is called Operating Support System (OSS). OSS is a functional system that allows network operators to monitor and control the network. The purpose of the OSS in a GSM network is to provide needed customer support as regional and local operations to a reasonable cost.

2G, 3G, and 4G technologies

2G:  The basic technology that 2G stands on is; Increase the capacity of the system, bring additional services (sms…), decrease the cost, manage security and increase it. This technology digitalized all the network system. As the 2G system we can name GSM (global system for mobile) and IS-95 (cdmaone).

Some QoS (Quality of services) for 2G can be listed as bellow;
  • -          Physical Channel: 200kHz
  • -          Data rate: 270 Kbps
  • -          Modulation: 0.3 GMSK
  • -          Channel rate: 270.833kbps
  • -          Modulation Efficiency (b/s/Hz): 1.4
  • -          Traffic Channels per Carrier: 8
  • -          Multiple Access: FDD/FDMA/TDMA
  • -          Divided into two standards: TDMA and CDMA
  • -          Includes: GSM, Digital AMPS, CDMA, PDC(personal digital comm.) and multiple digital system


2G technology provides circuit-switched data service (9.6Kbps – 14.4Kbps) but by the 2.5 the max data rate reached (57-384 Kbps) which the normal data rate was 30 – 70 Kbps. While transferring to 3G from 2G, first transferring from 2G to 2.5G is done by GPRS (General Packet Radio Service) then by EDGE (Enhanced Data for GSM Evolution) transformation for 2.75 is performed. After these all steps transformation to 3G technology is accomplished.

Problems for 2G:
  • -                Low transmission quality
  • -                Spotty coverage
  • -                Video not support
  • -                System capacity
  • -                Limited coverage area by towers
  • -                Abrupt drop calls


3G:  Some QoS (Quality of services) for 3G can be listed as bellow;
  • -                  Transfer voice and non-voice data
  • -                   3G can deliver broadband capacity
  • -                    Support greater no. of voice and data customer
  • -                    It’s using standard: W-CDMA and EVDO
  • -                    Less complexity and faster transmission
  • -                    Speed: 384Kbps – 2Mbps
  • -                    Increased spectrum efficiency – 5Mhz
  • -                    High data rate


İnternational Telecommunication Unit (ITU) did not declared any information about 3G data transfer speed but for the normal users it changes between (2-14.4 Mbps) and for the moving tool it is minimum 348Kbps. 3G it providing much better security service than 2G, in addition to this it is also supports point to point security when it is possible to access to general parts of application, but this is not a property specified to 3G. 3G technology is using KASUMI block crypto instate of old technology A5 / 1 stream cipher.

Problems for 3G:
  • -                  High bandwidth required
  • -                  High cost of spectrum
  • -                  Huge capacity


4G: Some QoS (Quality of services) for 4G can be listed as bellow;
  • -                  The successor of 3G
  • -                  High data rate 20 to 100 Mbps
  • -                   High resolution movies, TV
  • -                  4G based on IPv6 (128 bits)
  • -                   Lower cost than previous generation
  • -                   Faster and more reliable


By 4G it aimed to transfer data from any point of the word to another by the 100Mbps and for the multimedia it can provide high quality performance including video streaming, TV, video calls, video clips, News, Music, Sports, Chat ,GPS, Telemedicine. And for the business it promise high speed networking, VPN Access sales force, Automation Video Conferencing, Real Time Financial information. 

Wednesday, March 25, 2015

The domain names and the domain numbers in the internet (national and international)

Domain names are used to identify one or more IP addresses or website. Without domain name user can access to the website with IP (internet protocol). The domain name is just a simple (word format) representation of IP address.

                The domain number in the internet is the IP (internet protocol), which computers use it to communicate among themselves in internet environment. These numbers are exclusive to every PC in internet. As example, when you write ninova.com to the address bar, web browser first converts it into IP address then it guides the user to the computer that possess that PI address. Therefor it is not needed to know IP address of a site to visit it, to make easy access and remember for every site a domain name must be taken. Domain name can be taken from internet service servers or web hosting firms.

                The domain names possess to a hierarchical structure. They are separated with the points from left to right in increasing order. From www.mfa.com.tr the right most part (gon.tr) is TLD (top/first level domain), the middle one (mfa) is SLD (second level domain) and the first level domain names are separated inside it into two parts:
  • ·         Generic Top level Domain (gTLD)

gTLD – Generic Top-Level Domains are the most common and the most sought after names. These include .com, .net, .org, .biz, .info, and several others. This names are added in 1984 to the domain name systems and since that time it is being used.
  • ·         Country Code Top level Domain (ccTLD)

ccTLD – Country Code Top-Level Domains that were created specifically for a single country’s use. That country can put any sort of restrictions on it that they choose. Some countries only allow citizens to register domains under their ccTLD. Other countries ‘rent’ their TLD out for use by the global public, as in the case with .cc, the official ccTLD for the Cocos Islands, .ws, the official ccTLD for Western Samoa, and .tv, the official ccTLD for Tuvalu. This is a two character suffix which is identified in ISO (international Organizations for Standardization) 3166 standard. In every country they assign these standard with a special institution and in international area it is IANA (internet Assigned Numbers Authority).

Best of lucks :)

Information about TCP-Tahoe, TCP-Reno, TCP-New Reno and TCP-Vegas by comparing their mechanisms

TCP-Tahoe: This is a “Congestion avoidance” method in TCP protocol. The algorithms that is uses is:
Slow-start: At the beginning It start with making “congestions windows” value 1 “cwnd = 1” to avoid connection start problem.
Congestion avoidance: it used “Additive increase Multiplicative Decrease”. When a packet is lost it detects it as a congestion and takes half of valid windows size as new threshold level and saves. Congestion window set to ‘1’ and until reaching threshold level it continues with Slow-start.
The most important point in Tahoe is; it can detect the packet loss only when there is time out.
The problem is Tahoe is, to detect if there is a congestion or not, it waits the timeout which during this the pipeline is not used.

TCP-Reno: It is similar to Tahoe and as a difference it can do Fast Retransmit. The Fast Retransmit is method to detect the packet lost from 3 same ACK return (in this method for every packet it returns one ACK). If there is 3 same ACK return then it get as a packet lost and resend the packet by making half the congestion window(cwnd = ½*cwnd) it continues. The problem in this method is, although it is very useful in single packet loss its performance decrease when there is more than one packet loss.

TCP-Reno New: New version of the TCP-Reno. When there is more than one packet loss, without decreasing congestion window it resend the packet. It is more useful in mobile environments where packet loss is bigger. The problem is this method is inside RTT (round trip time) it can send only one packet.

TCP-Vegas: In this protocol when packet send the system time is saves and when ACK returned it also control the time and makes RTT calculations and saves it into timestamp. It controls it in two conditions:

  • ·         When there is same ACK return it control the time and check if there is a timeout or not, if there is it retransmits without waiting 3.ACK return.
  • ·         When there is different ACK came it check if there is timeout, if there is it retransmits.

Monday, March 2, 2015

Annotated bibliography about Autonomous Vehicles

M. Anderson, J., Kalra, N., & A. Oluwatola, O. (2014). 1. In Autonomous Vehicle Technology(1st ed., Vol. 1, p. 4,5). CAMBRIDGE, UK: RAND Corporation.

This book prepared with The RAND Corporation which is a nonprofit institution that helps improve policy and decision making through research and analysis. This book is about autonomous vehicle with its all aspects. With starting from introduction part it explains Autonomous Vehicle Technology Important. Beginning with Google’s efforts today many industrialized companies are making researches and developments and as these technology increasing day by day governmental policy made in several states of US and being considered in other places also. One other important point for AVs is, as we know every year many people die with car accidents which is mostly occurred with human mistake. Using AVs(autonomous vehicles) will apparently reduce this accident with a huge percentage because they would do any error. In the following parts of this book you can find also history, current state and future promises of AVs also.

Staff, CNN Wire. "Google Gets License to Operate Driverless Cars in Nevada." CNN. Cable News Network, 08 May 2012

In this article by referring to some benefits of AVs such as preventing traffic accidents and decreasing the time and energy consumed while traveling it also gives information about the technical parts that the Google used in AVs. I think this is best article that shortly introduced the AVs and its importance in daily life. There is a short video from Google is test drive which a person of 95 percent blind is doing the deriving that is brilliant.

Doug Newcomb, You won't need a driver's license by 2040, http://www.cnn.com/2012/09/18/tech/innovation/ieee-2040-cars/index.html, (9-25-2013)

This article is one of the most inspiring article that explains well the important of AVs in the future. Besides the important like reducing accidents and low energy consume with vehicle, some technological ways that how the vehicle will communicate with each other and prevent the crash or traffic jam is being explained in this article such as V2V, V2I and V2X.

"Pros and Cons - Autonomous Cars." Pros and Cons - Autonomous Cars. Google, 18 Nov. 2012
This site is introducing in very clear way that what pros and what cons would be there is Autonomous cars enter officially to our daily lives. Although there is no any academic or scientific reliable reasons but at least it will give an idea about the results of a world that the Autonomous cars are in use.


This is also one of the important book that you can find price and clear information about Autonomous cars. The technology that autonomous car use is well introduced as well as its sociological effects. One of the interesting point that mentioned here is, Auto-enthusiasts will disappear due to car sharing, as cars are no longer person, and why would anyone want to make any modifications or improvements to a car that isn't their own.

Jim Motavalli,The Future of Cars: Autonomous...and Electric, http://www.plugincars.com/cars-future-autonomousand-electric-128131.html. (9-25-2013)

This article will be best answer to question like Will gas stations change? Electric vs gas?
Electric cars automatically fueling in garage would be preferable to standard mechanical cars filling up with gas automatically and more risk in plugging in a gas pump or electric plug? By considering the view point of some companies like Nissan and also some researching groups like a team at Oxford University that are making some development in autonomous cars, this article has offers most valuable answers.

RAND Corporation. (2014). Self-Driving Vehicles Offer Potential Benefits, Policy Challenges for Lawmakers [Press release]. Retrieved from http://www.rand.org/news/press/2014/01/06.html. (January 2014)

This is one of the journal news which is done by the James M. Anderson the Senior Behavioral Scientist. This research and study is done by interviewing with many people from different areas about the autonomous vehicle and its results and apparently it make this news valuable. You can find the negative effects of using these cars from the perspective of policymaker, economy and personal life (by data which these car collect).

James M. Anderson…Oluwatobi Oluwatola,(2014). Autonomous Vehicle Technology How to Best Realize Its Social Benefits (RB-9755-RC). Retrieved from http://www.rand.org/pubs/research_briefs/RB9755.html

This is a research report about the autonomous vehicle from the following point of views, about the current technologies that is being used such as making sense of the world and Vehicle communication, about the benefits of these vehicles from the perspective of avoiding crashes and increasing mobility and so on… and about some guidelines for governments to make some policies regarding secure usage of these vehicle while they started to be used. I think this is valuable study and research to make people more aware from future technology.

Bora Alp Baydere… Charlie Ritter Madden,(2014). The Future of the Automobile Car-Sharing Service using Autonomous Automobiles. Retrieved from: http://web.stanford.edu/class/me302/PreviousTerms/2014-06Car-SharingServiceUsingAutonomousAutomobiles(paper).pdf

This is an article about the autonomous vehicle that Stanford University is sharing with its student and probably is the most detailed research about AVs. It is introducing its technology by details as well as its benefits and its challenges that might society and world across when these enter to our lives.



KPMG AND CAR are two Global automotive industry which are making researches by distinct groups and programs. Together they published this article which has detailed information about self-deriving cars. In this article they take the autonomous cars as a new area of business and its revolutions and affects to other industries. Besides giving information that these cars using, in this article its financial dimensions is also taken considerations.