Contactless Technologies for Smart Cities: Big Data, IoT, and Cloud Infrastructures




Download 4.04 Mb.
Pdf ko'rish
bet9/24
Sana13.06.2023
Hajmi4.04 Mb.
#72555
1   ...   5   6   7   8   9   10   11   12   ...   24
Bog'liq
asosiy 2
MTA Majmua(2021), 1, 4-Karno kartadan foydalanib mantiqiy ifodalarni minimallash, Kalendar reja algoritm, Ishchi dastur(Dasturlash I) 24.11.2021, 1 -amaliyot, 4-Lab, Yurtimiz mustaqillikga erishishidan oldin milliy urf odat, 7-8-mavzuDT larni sertifikatlashtirish, Axborotlarni izlash va ajratib olish fanidan mustaqil ish Mavzu, Abdulla Oripov O\'zbekiston (qasida), 2 lab Yarashov Diyorbek, TATU NF Hemis axborot tizimi, Algo 1-299, prezentatsiya
Biometrics in National Security
Contactless biometric techniques are also employed by 
National Security organizations around the world. Many 
countries have already implemented such schemes since 
2014 in their government facilities and during the COVID-
19 crisis, contact tracing, entrance/exit systems, immigra-
tion, and medical records were all operating using biometric 
verification and analysis. In more detail, some countries have 
implemented strict border control and immigration rules to 
protect their citizens and inhibit the virus spread. In addi-
tion, biometric authentication mechanisms have been widely 
used for the verification of security personnel who work in 
mission-critical positions (e.g., army, central intelligence, 
etc.) [
43
]. The United States has mandated the record reten-
tion of military personnel biometrics for identification and 
verification before granting entrance to the nation’s military 
facilities. Likewise, North Korea has integrated AI features 
along with biometric and facial recognition software in their 
homemade smartphone ‘Jindallae’. AnyVision, an AI-based 
security company based in Israel, and supported by Micro-
soft, has established its business in 40 different countries 
around the globe. AnyVision builds key-based authentica-
tion, identification, and access control systems using cus-
tom built API and software development kits. Thus, pro-
tecting the privacy leveraging facial recognition, iris scan
and thumb impression mechanism. As a result, confidential 
data can be accessed by authorized personnel providing reli-
able and trust-based real-time authentication [
44
]. Different 
policies and practices are implemented by countries when 
handling biometric methods to protect their military infra-
structure [
13
].
As connectivity continues to spread across the globe, 
the use of touchless technologies is also expanding to more 
applications. From nuclear warhead management to fighter 
jet missile launching, soldiers are identified and authorized 
based on their personal biometrics. Data obtained from 
sensors in battle tanks are used to analyze the identity and 
current status of the operating personnel during military 
missions [
45
]. Battleship and submarine captains are also 
authorized only using their personal biometric scans. Thus, 
with contactless big data biometric strategies, nations can 
identify potential terrorists and criminals before they arrive 
on their borders sourcing their criminal records from the 
national databases [
46
].

Download 4.04 Mb.
1   ...   5   6   7   8   9   10   11   12   ...   24




Download 4.04 Mb.
Pdf ko'rish

Bosh sahifa
Aloqalar

    Bosh sahifa



Contactless Technologies for Smart Cities: Big Data, IoT, and Cloud Infrastructures

Download 4.04 Mb.
Pdf ko'rish