Browsing by Author "Dadakhanov Sh."
Now showing 1 - 3 of 3
Results Per Page
Sort Options
Item Open Access ANALYZE AND DEVELOPMENT SYSTEM WITH MULTIPLE BIOMETRIC IDENTIFICATION(СДУ хабаршысы - 2020, 2020) Baimuratov O. ; Dadakhanov Sh.Abstract. Cause of a rapid increase in technological development, increasing identity theft, consumer fraud, the threat to personal data is also increasing every day. Methods developed earlier to ensure personal the information from the thefts was not effective and safe. Biometrics were introduced when it was needed technology for more efficient security of personal information. Old-fashioned traditional approaches like Personal identification number (PIN), passwords, keys, login ID can be forgotten, stolen or lost. In biometric authentication system, user may not remember any passwords or carry any keys. As people they recognize each other by the physical appearance and behavioral characteristics that biometric systems use physical characteristics, such as fingerprints, facial recognition, voice recognition, in order to distinguish between the actual user and scammer. In order to increase safety in 2005, biometric identification methods were developed government and business sectors, but today it has reached almost all private sectors as Banking, Finance, home security and protection, healthcare, business security and security etc. Since biometric samples and templates of a biometric system having one biometric character to detect and the user can be replaced and duplicated, the new idea of merging multiple biometric identification technologies has so-called multimodal biometric recognition systems have been introduced that use two or more biometric data characteristics of the individual that can be identified as a real user or not.Item Open Access Analyze and Development System with Multiple Biometric Identification(2020) Dadakhanov Sh.In the case of quick progress in technological improvement, growing shopper cheating, fraud, the threat to private knowledge is additionally increasing daily. Ways developed earlier to confirm personal info from the crimes weren't effective and safe. Statistics were introduced once it had been needed technology for more practical security of personal info. Recent ancient procedures like Personal identification number, keys, passwords, login ID may be forgotten, stolen, or lost. During a biometric identification system, the user might not get any keys or transfer any keys. In biometric authentication system, user may not remember any passwords or carry any keys. As people they recognize each other by the physical appearance and behavioral characteristics that biometric systems use physical characteristics, such as fingerprints, facial recognition, voice recognition, in order to distinguish between the actual user and scammer. In order to increase safety in 2005, biometric identification methods were developed government and business sectors, but today it has reached almost all private sectors as Banking, Finance, home security and protection, healthcare, business security and security etc. Since biometric samples and templates of a biometric system having one biometric character to detect and the user can be replaced and duplicated, the new idea of merging multiple biometric identification technologies has so-called multimodal biometric recognition systems have been introduced that use two or more biometric data characteristics of the individual that can be identified as a real user or not.Item Open Access RFID TECHNOLOGY AS A PART OF MONITORING SYSTEMS(СДУ хабаршысы - 2020, 2020) Baimuratov O. ; Mamatnabiyev Zh. ; Dadakhanov Sh. ; Berlikozha B.Abstract. The Internet of Things (IoT) technologies are getting more popular and being implemented as a solution for many relevant problems in information technology purposing low-costed, secure, and controlled remotely systems. Radio Frequency Identification (RFID) system is used as a type of IoT technology, which has three basic parts: tags, reader and system that manages tag identification (ID) number and its real time location. RFID systems are used in financial institutions, healthcare industry, mobile phones, cars, supply chain management, smart retails, smart house, object localization, security systems and various types of applications for positioning, managing people, assets, and inventory. This paper discusses performances of RFID technologies that use passive tags. Role of RFID technologies in monitoring systems and system architecture are reviewed and compared. Significance of RFID technologies and challenges are also considered for future works.