When the world was engulfed by a COVID-19 pandemic crisis, various activities could not be carried out normally. Activities may continue from home during a crisis by the use of a smartphone through the internet, because almost all people have their own smartphone, without requiring additional purchase of hardware. For formal learning, people can take the opportunity to use social media platforms to undertake conversations easily by using smart phones, even tablets. Teenagers or adults who are still studying in higher education institutions can undertake continuous learning for their work assignments. For example, they can use these tools to communicate through social media such as the WhatsApp, Telegram, Zoom, Microsoft Team, and Edmodo apps to connect with friends and lecturers. This research reveals trends of digital social media security and usability in the time of the COVID-19 pandemic situation, such as working from home, establishing a start-up, improving business processes and conducting online business within the digital ecosystem. The result is interesting and there are many uses of social media which have been addressed in this study during the COVID-19 pandemic for business purposes. The various social media platforms have different features that are available for use by subscribers, and also make it easier for people to do business. This is mainly due to the fact that they open up the global market and also make it cheaper to advertise. The government as well as the private sector has been in the forefront when it comes to the use of social media. Maintaining a good online presence is one of the key aspects that determine the success of start-up companies. This is due to the fact that most customers usually rely on the customer reviews in determining the ability of a company to meet the needs of clients. The main reason why most companies set up a customer relations department that is mandated with the responsibility of responding to customer feedback on various online platforms. On the other hand, the increased use of social media has brought new challenges when it comes to the security of information. Users must, therefore, secure their servers and technology from external and internal threats. One of the strategies used is the use of passwords to log into a portal where each person authorized to access the portal is provided with a password that is unique and known only by the user. The study has covered all these areas in detail including the use of database management systems in an organization or individual.
In recent years, by merit of convenient and unique features, bio-authentication techniques have been applied to identify and authenticate a person based on his/her spoken words and/or sentences. Among these techniques, speaker recognition/identification is the most convenient one, providing a secure and strong authentication solution viable for a wide range of applications.In this paper, to safeguard real-world objects, like buildings, we develop a speaker identification system named mel frequency cepstral coefficients (MFCC)-based speaker identification system for access control (MSIAC for short), which identifies a speaker U by first collecting U's voice signals and converting the signals to frequency domain. An MFCC-based human auditory filtering model is utilized to adjust the energy levels of different frequencies as U's voice quantified features. Next, a Gaussian mixture model is employed to represent the distribution of the logarithmic features as U's specific acoustic model. When a person, eg, x, would like to access a real-world object protected by the MSIAC, x's acoustic model is compared with known-people's acoustic models. Based on the identification result, the MSIAC will determine whether the access will be accepted or denied. KEYWORDS acoustic model, Fourier transformation, Gaussian mixture model, mel frequency cepstral coefficients, speaker identification 1 | INTRODUCTIONIn this information era, numerous high-tech products gradually enter our everyday lives and significantly change our living habits and patterns. The biometrics identification technology that provides us with easier and more convenient methods to identify people has gradually replaced some existing authentication techniques, which use passwords or pin numbers to authenticate users. But the passwords or pin numbers may be forgotten or forged and are no longer considered to offer a high level of security. The face recognition systems used at airport halls 1 and the voice assistant SIRI of iPhone 2 are two examples of the biometric identification systems.On the one hand, voice has been the most direct and natural method for us to express ideas, communicate with others, and do something for interaction. Therefore, recognizing people's identities from user's dialogue voice and contents and then providing the corresponding services should be a better method to practically make our daily lives easier. Up to present, speech recognition technology 3 has been well developed and applied to our living activities. But speaker recognition technology 4 is still far away from its practical applications. The reasons are that (i) there are too many parameters needed to be processed for speaker recognition; (ii) it is hard to collect voice features completely; and (iii) the identification process is complicated and takes a long time for calculation. Thus, it is difficult to be applied to those applications that need immediate response. Furthermore, the studies of speaker identification nowadays are partial, rather than whole. For example, the Hidden ...
The COVID19 pandemic has indirectly changed the landscape of the business environment system through cloud intelligence within the digital ecosystem that has as a goal increasing the access, efficiency, effectiveness, equity and quality of business processes through cloud intelligent systems. Cloud intelligent systems are becoming revolutionary in today’s world pandemic causing a complete and drastic change to a variety of industries, including, security, transportation, business, logistics and manufacturing. The main purpose of cloud intelligence systems is to facilitate the ease of access from any location and the management of practical computing resources. One of the challenges faced by cloud technology today is scheduling. The role of scheduling algorithms is very important, since tasks are executed by orders that may need more attention. Here, scheduling algorithms intended to minimize monetary cost and minimize makespan time to execute the workflow are presented. This study proposes cloud intelligent systems apps through an approach to cloud computing scheduling that may lead to great benefits and efficiency. The result is very promising. It showed that there are numerous applications of intelligent systems due to the more advanced hardware being built nowadays, plus business processes advancing to become smarter and more efficient in growing profitably over a destructive digital ecosystem during the COVID19 pandemic. The results indicate that intelligent systems over the cloud play a big role not just for interacting with the world helping businesses grow, but as well as in the advancement for a better tomorrow.
A handover security mechanism employing the Diffie-Hellman key exchange approach for the IEEE802.16e wireless networks Abstract. In this paper, we propose a handover authentication mechanism, called the handover key management and authentication scheme (HaKMA for short), which as a three-layer authentication architecture is a new version of our previous work, the Diffie-Hellman-PKDS-based authentication method (DiHam for short) improving its key generation flow and adding a handover authentication scheme to respectively speed up the handover process and increase the security level for mobile stations (MSs). AAA server supported authentication is also enhanced by invoking an improved extensible authentication protocol (EAP). According to the analyses of this study the HaKMA can effectively and efficiently provide user authentication and balance data security and system performance during handover.
Recent advances in wireless and mobile technologies have led to a new paradigm of the high-tech society and people's daily life. Accordingly, wireless and mobile technologies have been gaining tremendous attentions from researchers all over the world in recent years. However, a lot of new challenges, which go much beyond conventional network systems, still need to be solved for advanced applications. To further improve the quality of the modern communication, new techniques need to be continuously explored and developed. This special issue looks for significant contributions and high quality research results on wireless and mobile technologies in theoretical and practical aspects, especially on QoS routing, distributed authentication mechanism, automatic security assessment, fast handover security mechanism, enhancing MISP with Fast Mobile IPv6 and applications in wireless mobile networks, as well as ad-hoc networks. This special issue grew out of selected best papers from the Fifth International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA 2010), held in Fukuoka, Japan, and the 4th International Workshop on Intelligent, Mobile and Internet Services in Ubiquitous Computing (IMIS 2010), held in Krakow, Poland. This event was an effort to take up the challenges and to bring together an international community in the area. The first paper [1], "QoS Routing in Ad-hoc Networks Using GA and Multi-Objective Optimization" from Admir Barolli, Evjola Spaho, Leonard Barolli, Fatos Xhafa and Makoto Takizawa, proposes a QoS routing in ad-hoc networks. Distinguishing from existing works related to routing in ad-hoc networks, this paper designs a QoS-guaranteed solution based on Genetic Algorithms (GAs) and multi-objective optimization. In particular, the authors implemented a search space reduction algorithm, which reduces the search space for GAMAN (GA-based routing algorithm for Mobile Ad-hoc Networks) to find a new route. In the second paper [2], Inshil Doh, Jiyoung Lim and Kijoon Chae propose a "Distributed Authentication Mechanism for Secure Channel Establishment in Ubiquitous Medical Sensor Networks", in which bio-data is collected and delivered to the server system through mobile devices or gateways. This scheme adopts candidate devices, which act as the intermediary when the original device cannot function properly. In this way, bio-data of patients can be sensed and collected to monitor their body status uninterruptedly. The next paper [3] entitled "Design of a secure RFID authentication scheme preceding market transactions" by Chin-Ling Chen, proposes a RFID mutual authentication protocol for market application
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.