:::

詳目顯示

回上一頁
題名:Applying Fuzzy AHP to Evaluate and Select Emerging Biometric Technologies
書刊名:科技管理學刊
作者:王仁聖 引用關係劉哲宏徐作聖 引用關係
作者(外文):Wang, Jen-shengLiu, Che-hungShyu, Joseph Z.
出版日期:2012
卷期:17:3
頁次:頁51-82
主題關鍵詞:生物辨識技術科技評選模糊層級分析法最佳解模糊化之績效值BiometricsTechnology assessmentFuzzy analytic hierarchy processBest non-fuzzy performance
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:40
生物辨識科技(Biometric technologies)近幾年在資訊產業被廣泛地推廣來強化安全性與隱私性,並形成一個新興產業。 以往生物辨識只有應用在特殊領域,但目前逐漸開始應用在消費型電子產品來解決安全性與隱私性問題,所以本研究根據傳統科技評估準則結合生物辨識科技本身特性,透過模糊層級分析法(fuzzy analytic hierarchy process,FAHP)來評選與建議。另外, 本研究利用最佳解模糊化之績效值(non-fuzzy best performance,BNP)來協助達成多目標評準之目的。雖然研究結果首先顯示傳統科技評估準則仍是佔了重要的比重,接著才是生物辨識科技個別的競爭性和生物辨識科技的基本要素,但仍指出研究目標科技的特性需要被特別考慮。結論顯示指紋辨識(fingerprint recognition)、虹膜辨識(iris recognition)和臉部辨識 (face recognition) 在進行生物辨識技術評選時,具有較大的優勢。
Biometric technologies have been widely promoted around the world to strengthen the security and privacy in the IT world recently, as well as the facilitation of a new industry. Biometrics have been applied in specific territories for decades, but recently proliferated in customer and resident electronic products to enhance security and privacy issues. This study aims to apply fuzzy analytic hierarchy process (FAHP) to evaluate biometrics through conventional technology assessment considerations combined with viewpoints from the particularity of biometric technologies, and provide selection suggestions for industries. Besides, this paper uses non-fuzzy best performance (BNP) to resolve multi-goal problems for achieving our research purposes. Although the results show that technology assessment is the most important object to select biometric technologies followed by the biometric competence and key elements of biometric, it also indicates that the features of the target technologies should be considered when evaluated. Conclusively, fingerprint recognition, iris recognition, and face recognition would be the more advantageous biometrics in evaluation and selected.
期刊論文
1.Wei, Chun Chin、Chien, Chen Fu、Wang, Mao Jiun J.(2005)。An AHP-based Approach to ERP System Selection。International Journal of Production Economics,96(1),47-62。  new window
2.Hsu, Y. G.、Tzeng, G. H.、Shyu, J. Z.(2003)。Fuzzy Multiple Criteria Selection of Government: Sponsored Frontier Technology R&D Projects。R&D Management,33(5),539-551。  new window
3.Shehabuddeen, N.、Prober, D.、Phaal, R.(2006)。From theory to practice: Challenges in operationalising a technology selection framework。Technovation,26(3),324-407。  new window
4.Jain, A. K.、Ross, A.(2004)。Multibiometric Systems, Appeared in Communication of the ACM。Special Issue on Multimodal Interfaces,47(1),34-40。  new window
5.Tsaur, S. H.、Tzeng, G. H.、Wang, G. C.(1997)。Evaluating tourist risks from fuzzy perspectives。Annals of Tourism Research,24(4),796-812。  new window
6.Chan, F. T. S.、Kumar, N.(2007)。Global supplier development considering risk factors using fuzzy extended AHP-based approach。Omega: The International Journal of Management Science,35(4),417-431。  new window
7.Hu, A. H.、Hsu, C. W.、Kuo, T. C.、Wu, W. C.(2009)。Risk evaluation of green components to hazardous substance using FMEA and FAHP。Expert Systems with Applications,36(3),7142-7147。  new window
8.Buckley, James J.(1985)。Fuzzy hierarchical analysis。Fuzzy Sets and Systems,17(3),233-247。  new window
9.Van Laarhoven, P. J. M.、Pedrycz, W.(1983)。A Fuzzy Extension of Saaty's Priority Theory。Fuzzy Sets and Systems,11(1-3),229-241。  new window
10.Zadeh, Lotfi Asker(1965)。Fuzzy sets。Information and Control,8(3),338-353。  new window
11.Vaidya, Omkarprasad S.、Kumar, Sushil(2006)。Analytic Hierarchy Process: An Overview of Applications。European Journal of Operational Research,169(1),1-29。  new window
圖書
1.Saaty, T. L.(1998)。The Analytic Hierarchy Process: Planning, Priority Setting, Resource Allocation。New York:McGraw-Hill International Book Co.。  new window
其他
1.Adeoye, S. O.(2010)。A Survey of Emerging Biometric Technologies。  new window
2.Balestra, G., Knaflitz, M., Massa, R., & Sicuro, M.(2007)。AHP for the acquisition of biomedical instrumentation。  new window
3.Bhattacharyya, D., Das, P., Kim, T. H., & Bandyopadhyay, K.S.(2009a)。Vascular Pattern Analysis towards Pervasive Palm Vein Authentication。  new window
4.Bhattacharyya, D., Das, P., Kim, T. H., & Bandyopadhyay, K.S.(2009b)。Biometric Authentication: A Review。  new window
5.Biometrics Identity Management Agency(2010)。Biometrics Glossary version 4.0, Software Engineering Center CECOM Life Cycle Management Command (2010)。  new window
6.Bolle, R. M., Connell, J. H., Pankanti, S., Ratha, N .K., & Senior, A. W.(2004)。Guide to Biometrics。  new window
7.Cappelli, R., Maio, D., Maltoni, D., Wayman, J. L., & Jain, A. K.(2006)。Performance evaluation of fingerprint verification systems。  new window
8.Coldrick, S., Longhurst, P., Ivey, P., & Hannis, J.(2005)。An RandD options selection model for investment decisions。  new window
9.Dabbah, M. A., Woo, W. L., & Dlay, S. S.(2007)。Secure Authentication for Face Recognition。  new window
10.Delac, K. & Grgic, M.(2004)。A Survey of Biometric Recognition Methods。  new window
11.Deng, H.(1999)。Multicriteria analysis with fuzzy pairwise comparison。  new window
12.Fleischer, T., Decker, M., & Fiedeler, U.(2005)。Assessing emerging technologies-methodological challenges and the case of nanotechnologies。  new window
13.Fu, H. P., Chao, P., Chang, T. H., & Chang, Y. S.(2008)。he impact of market freedom on the adoption of third-party electronic marketplaces: a fuzzy AHP analysis。  new window
14.Ganorkar, R. S. & Ghatol, A. A.(2007)。Iris Recognition: An Emerging Biometric Technology。  new window
15.Gerdsri, N. & Kocaoglu, D. F.(2007)。Applying the Analytic Hierarchy Process (AHP) to build a strategic framework for technology road mapping。  new window
16.Goudelis, G., Tefas, A., & Pitas, I.(2008)。Emerging Biometric Modalities: A Survey。  new window
17.Grijpink, J. H. A. M.(2008)。Trend report on biometrics: Some new insights, experiences and developments。  new window
18.Heyer, R.(2008)。Biometrics Technology Review 2008。  new window
19.Hong, J. H., Yun, E. K., & Cho, S. B.(2005)。A Review of Performance Evaluation for Biometrics Systems。  new window
20.Huang, C. C., Chu, P. Y., & Chiang, Y. H.(2008)。A fuzzy AHP application in government-sponsored RandD project selection。  new window
21.International Biometric Group(2009)。Biometrics Market and Industry Report 2009-2014。  new window
22.Jain, A. K., Nandakumar, K., & Nagar, A.(2008)。Biometric Template Security。  new window
23.Jain, A. K., Ross, A., & Pankanti, S.(2006)。Biometric: A Tool for Information Security。  new window
24.Jain, A. K., Ross, A., & Prabhakar, S.(2004)。An Introduction to Biometric Recognition。  new window
25.Kar, B., Kartik, B., & Dutta, P. K.(2006)。Speech and Face Biometric for Person Authentication。  new window
26.Kent, S. & Millett, L.(2003)。Who Goes There?: Authentication Technologies Through the Lens of Privacy。  new window
27.Kim, W. K., Han, S. K., Oh, K. J., Kim, T. Y, Ahn, H. C., & Song, C. W.(2010)。The dual analytic hierarchy process to prioritize emerging technologies。  new window
28.Kong, A., Zhang, D., & Kamel, M.(2009)。A survey of palm print recognition。  new window
29.Lee, H. I., Chen, W. C., & Chang, C. J.(2008)。A fuzzy AHP and BSC approach for evaluating performance of IT development in the manufacturing industry in Taiwan。  new window
30.Lee, Y. G.. & Song, Y. I.(2007)。Selecting the key research areas in nano-technology field using technology cluster analysis: A case study based on national RandD programs in South Korea。  new window
31.Matsumoto, T., Hoshino, H., Yamada, K., & Hasino, S.(2006)。Impact of artificial gummy fingers on fingerprint systems。  new window
32.National Science and Technology Council(2006)。Biometrics Foundation Documents。  new window
33.NBSP(2008)。Biometric Technology Application Manual Volume One, Biometric Basics Compiled and Published by: National Biometric Security Project 2008。  new window
34.Opricovic, S. & Tzeng, G. H.(2003)。Defuzzification within a multi criteria decision model。  new window
35.Prabhakar, S., Pankanti, S., & Jain, A. K.(2003)。Biometric Recognition: Security and Privacy Concerns。  new window
36.Riley, R. A. & Kleist, V. F.(2005)。The biometric technologies business case: a systematic approach。  new window
37.Ross, A.(2010)。Iris recognition: The path forward。  new window
38.Ross, A., Dass, S., & Jain, A. K.(2005)。A deformable model for fingerprint matching。  new window
39.Shen, Y. C., Chang, S. H., Lin, G. T. R., & Yu, H. C.(2010)。A hybrid selection model for emerging technology。  new window
40.Tran, T. A. & Daim, T.(2008)。A taxonomic review of methods and tools applied in technology assessment。  new window
41.Uludag, U., Pankanti, S., Prabhakar, S., & Jain, A.K.(2004)。Biometric Cryptosystems: Issues and Challenges, Proceedings of the IEEE。  new window
42.Vielhauer, C.(2006)。Biometric Modalities. Different Traits for Authenticating Subjects: Chapter 3 in Biometric User Authentication for IT Security。  new window
43.Yu, O. S., Hsu, G. J. Y., & Chen, T. Y.(1998)。Introduction to Technological Management: Technological Forecast and Planning。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE