Skip to main content

Popular posts from this blog

CISC VS RISC computers (all details)

CISC Introduction            The term "CISC" (complex instruction set computer or computing) refers to computers designed with a full set of computer instructions that were intended to provide needed capabilities in the most efficient way. Intel's   Pentium   microprocessors are CISC microprocessors. CISC is a   processor design   where single   instructions   can execute several low-level operations (such as a load from   memory , an arithmetic   operation , and a   memory store ) or are capable of multi-step operations or   addressing modes   within single instructions. The primary goal of CISC architecture is to complete a task in as few lines of assembly as possible. This is achieved by building processor hardware that is capable of understanding & executing a series of operations, this is where our CISC architecture introduced. T...

DHCP principle , DHCP server and client communication process

1. Explain with principle: the DHCP server and client communication process DHCP stands for Dynamic Host Configuration Protocol. It handles the automatic assignment of IP addresses and other configuration settings for devices on your network. DHCP automates Network and Sharing Center in your control panel. This is especially good for people who have laptops, aren't hooked up to the Internet all the time and often move from place to place with their portable devices. They can simply get a new IP address as needed without having to do it manually. DHCP is designed to make the assignment of IP addresses and other network configuration information faster and easier. DHCP is a protocol that uses Level 4 on the OSI model. It communicates using User Datagram Protocol (UDP) datagrams through UDP Port 68. DHCP works with most current and past Windows clients, and also Linux, Macintosh, and many network-capable printers. DHCP is desi...

Google Dorks for sql injection | new 2017 |

default.php?catID= cart_additem.php?id= item_show.php?code_no= details.php?BookID= item.php?prodtype= inurl:php?id+site:it+show inurl:php?id+site:fr+show inurl:php?id+site:dk+shop inurl:php?id+site:pt+shop inurl:php?id+site:za+shop inurl:php?id+site:fi+shop acclogin.php?cartID= addToCart.php?idProduct= inurl:php?id+site:es+shop inurl:php?id+site:ro+shop inurl:php?id+site:au+shop inurl:php?id+site:fr+checkout List.php?CatID= inurl:php?id+site:au+product inurl:php?id+site:au+succes inurl:php?id+site:uk+shop inurl:php?id+site:au+shop inurl:php?id+site:fr+shop inurl:php?id+site:it+shop inurl:php?id+site:de+shop inurl:php?id+site:pl+shop itemdetail.php?item= inurl:php?id+site:au+checkout

HISTORY OF BIOMETRICS

1.                                       HISTORY OF BIOMETRICS
Idea of biometric was introduced hundreds, even thousands of years ago.In an cave estimated to be at least 31,000 years old,-painting representing the use of signature is found. In early as 500 B.C. – business transactions are recorded in clay tablets that include fingerprints.”Chinese parents also used fingerprints and footprints to differentiate children from one another. But true biometric systems began with the emergence of computer systems. 
       1858       – First systematic capture of hand images for identification
       1870       – develops anthropometries to identify individuals
       1892       – develops a classification system for fingerprints
       1896       – fingerprint classification system
       1903       – NY State Prisons begin using fingerprints
       1936       – Concept of using the iris pattern for identification
       1960       – Face recognition becomes semi-automated
       1960       – First model of acoustic speech production is created
       1963       – Hughes research paper on fingerprint automation is published
       1965       -Automated signature recognition research begins
       1969       – FBI pushes to make fingerprint recognition an automated process
       1998         - FBI launches COOlS (DNA forensic database)
       2011         – Biometric identification used to identify body of Osama bin Laden
       2013        – Apple includes fingerprint scanners into consumer- targed  Smartphones

The idea of using patterns for personal identification was originally proposed in 1936 by ophthalmologist Frank Burch. By the 1980’s the idea had appeared in James Bond films, but it still remained science fiction and conjecture. In 1987, two other ophthalmologists Aram Safir and Leonard Flom patented this idea and in 1987 they asked John Daugman to try to create actual algorithms for this iris recognition. These algorithms which Daugman patented in 1994 are the basis for all current iris recognition systems and products.   Daugman algorithms are owned by Iridian technologies and the process is licensed to several other Companies who serve as System integrators and developers of special platforms exploiting iris recognition in recent years several products have been developed for acquiring its images over a range of distances and in a variety of applications. One active imaging system developed in 1996 by licensee Sensor deployed special cameras in bank ATM to capture IRIS images at a distance of up to 1 meter. This active imaging system was installed in cash machines both by NCR Corps and by Diebold Corp in successful public trials in several countries during I997 to 1999. A new and smaller imaging device is the low cost “Panasonic Authenticam” digital camera for handheld, desktop, e-commerce and other information security applications. Ticket less air travel, check-in and security procedures based on iris recognition kiosks in airports have been developed by eye ticket. Companies in several, countries are now using Daughman’s algorithms in a variety of products.   

Comments