Abstract-Handwritten signatures are considered as the most natural method of authenticating a person's identity (compared to other biometric and cryptographic forms of authentication). The learning process inherent in Neural Networks (NN) can be applied to the process of verifying handwritten signatures that are electronically captured via a stylus. This paper presents a method for verifying handwritten signatures by using a NN architecture. Various static (e.g., height, slant, etc.) and dynamic (e.g., velocity, pen tip pressure, etc.) signature features are extracted and used to train the NN. Several Network topologies are tested and their accuracy is compared. The resulting system performs reasonably well with an overall error rate of 3.3% being reported for the best case.
There is an increasing need for environmental measurement systems to further science and thereby lead to improved policies for sustainable management. Marine environments are particularly hostile and extremely difficult for deploying sensitive measurement systems. As a consequence the need for data is greatest in marine environments, particularly in the developing economies/regions. Expense is typically the most significant limiting factor in the number of measurement systems that can be deployed, although technical complexity and the consequent high level of technical skill required for deployment and servicing runs a close second. This paper describes the Smart Environmental Monitoring and Analysis Technologies (SEMAT) project and the present development of the SEMAT technology. SEMAT is a “smart” wireless sensor network that uses a commodity-based approach for selecting technologies most appropriate to the scientifically driven marine research and monitoring domain/field. This approach allows for significantly cheaper environmental observation systems that cover a larger geographical area and can therefore collect more representative data. We describe SEMAT's goals, which include: (1) The ability to adapt and evolve; (2) Underwater wireless communications; (3) Short-range wireless power transmission; (4) Plug and play components; (5) Minimal deployment expertise; (6) Near real-time analysis tools; and (7) Intelligent sensors. This paper illustrates how the capacity of the system has been improved over three iterations towards realising these goals. The result is an inexpensive and flexible system that is ideal for short-term deployments in shallow coastal and other aquatic environments.
This paper presents an extension of earlier work in the use of artificial intelligence for prediction of sporting outcomes. An expanded model is described, as well as a broadening of the area of application of the original work. The model used is a form of multi-layer perceptron and it is presented with a number of features which attempt to capture the quality of various sporting teams. The system performs well and compares favourably with human tipsters in several environments. A study of less rigid "World Cup" formats appears, along with extensive live testing results in a major international tipping competition.
Abstract-Shill bidding is where spurious bids are introduced into an auction to drive up the final price for the seller, thereby defrauding legitimate bidders. Trevathan and Read presented an algorithm to detect the presence of shill bidding in online auctions. The algorithm observes bidding patterns over a series of auctions, and gives each bidder a shill score to indicate the likelihood that they are engaging in shill behaviour. While the algorithm is able to accurately identify those with suspicious behaviour, it is designed for the instance where there is only one shill bidder. However, there are situations where there may be two or more shill bidders working in collusion with each other. Colluding shill bidders are able to engage in more sophisticated strategies that are harder to detect. This paper proposes a method for detecting colluding shill bidders, which is referred to as the collusion score. The collusion score, either detects a colluding group, or forces the colluders to act individually like a single shill, in which case they are detected by the shill score algorithm. The collusion score has been tested on simulated auction data and is able to successfully identify colluding shill bidders.
Expense and the logistical difficulties with deploying scientific monitoring equipment are the biggest limitations to undertaking large scale monitoring of aquatic environments. The Smart Environmental Monitoring and Assessment Technologies (SEMAT) project is aimed at addressing this problem by creating an open standard for low-cost, near real-time, remote aquatic environmental monitoring systems. This paper presents the latest refinement of the SEMAT system in-line with the evolution of existing technologies, inexpensive sensors and environmental monitoring expectations. We provide a systems analysis and design of the SEMAT remote monitoring units and the back-end data management system. The system’s value is augmented through a unique e-waste recycling and repurposing model which engages/educates the community in the production of the SEMAT units using social enterprise. SEMAT serves as an open standard for the community to innovate around to further the state of play with low-cost environmental monitoring. The latest SEMAT units have been trialled in a peri-urban lake setting and the results demonstrate the system’s capabilities to provide ongoing data in near real-time to validate an environmental model of the study site.
Biometric security devices are now permeating all facets of modern society. All manner of items including passports, driver's licences and laptops now incorporate some form of biometric data and/or authentication device. As handwritten signatures have long been considered the most natural method of verifying one's identity, it makes sense that pervasive computing environments try to capitalise on the use of automated Handwritten Signature Verification systems (HSV). This paper presents a HSV system that is based on a Hidden Markov Model (HMM) approach to representing and verifying the hand signature data. HMMs are naturally suited to modelling flowing entities such as signatures and speech. The resulting HSV system performs reasonably well with an overall error rate of 3.5% being reported in the best case experimental analysis.
Shill bidding is where fake bids are introduced into an auction to drive up the final price for the seller, thereby defrauding legitimate bidders. Although shill bidding is strictly forbidden in online auctions such as eBay, it is still a major problem. This paper presents a software bidding agent that follows a shill bidding strategy. The malicious bidding agent was constructed to aid in developing shill detection techniques. The agent incrementally increases an auction's price, forcing legitimate bidders to submit higher bids in order to win the item. The agent ceases bidding when the desired profit from shilling has been attained, or in the case that it is too risky to continue bidding without winning the auction. The agent's ability to inflate the price has been tested in a simulated marketplace and experimental results are presented. This is the first documented bidding agent that perpetrates auction fraud. We do not condone the use of the agent outside the scope of this research.
scite is a Brooklyn-based startup that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
334 Leonard St
Brooklyn, NY 11211
Copyright © 2023 scite Inc. All rights reserved.
Made with 💙 for researchers