:::

詳目顯示

回上一頁
題名:Applying Fuzzy AHP to Evaluate and Select Emerging Biometric Technologies
書刊名:科技管理學刊
作者:王仁聖 引用關係劉哲宏徐作聖 引用關係
作者(外文):Wang, Jen-shengLiu, Che-hungShyu, Joseph Z.
出版日期:2013
卷期:18:1
頁次:頁51-82
主題關鍵詞:生物辨識技術科技評選模糊層級分析法最佳解模糊化之績效值BiometricsTechnology assessmentFuzzy analytic hierarchy processBest non-fuzzy performance
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:17
生物辨識科技(Biometric technologies)近幾年在資訊產業被廣泛地推廣來強化安全性與隱私性,並形成一個新興產業。以往生物辨識只有應用在特殊領域,但目前逐漸開始應用在消費型電子產品來解決安全性與隱私性問題,所以本研究根據傳統科技評估準則結合生物辨識科技本身特性,透過模糊層級分析法(fuzzy analytic hierarchy process,FAHP)來評選與建議。另外,本研究利用最佳解模糊化之績效值(non-fuzzy best performance,BNP)來協助達成多目標評準之目的。雖然研究結果首先顯示傳統科技評估準則仍是佔了重要的比重,接著才是生物辨識科技個別的競爭性和生物辨識科技的基本要素,但仍指出研究目標科技的特性需要被特別考慮。結論顯示指紋辨識(fingerprint recognition)、虹膜辨識(iris recognition)和臉部辨識(face recognition) 在進行生物辨識技術評選時,具有較大的優勢。
Biometric technologies have been widely promoted around the world to strengthen the security and privacy in the IT world recently, as well as the facilitation of a new industry. Biometrics have been applied in specific territories for decades, but recently proliferated in customer and resident electronic products to enhance security and privacy issues. This study aims to apply fuzzy analytic hierarchy process (FAHP) to evaluate biometrics through conventional technology assessment considerations combined with viewpoints from the particularity of biometric technologies, and provide selection suggestions for industries. Besides, this paper uses non-fuzzy best performance (BNP) to resolve multi-goal problems for achieving our research purposes. Although the results show that technology assessment is the most important object to select biometric technologies followed by the biometric competence and key elements of biometric, it also indicates that the features of the target technologies should be considered when evaluated. Conclusively, fingerprint recognition, iris recognition, and face recognition would be the more advantageous biometrics in evaluation and selected.
期刊論文
1.Bhattacharyya, D.、Das, P.、Kim, T. H.、Bandyopadhyay, K.S.(2009)。Vascular Pattern Analysis towards Pervasive Palm Vein Authentication。Journal of Universal Computer Science,15(5),1081-1089。  new window
2.Coldrick, S.、Longhurst, P.、Ivey, P.、Harmis, J.(2005)。An RandD options selection model for investment decisions。Technovation,25(3),185-193。  new window
3.Fu, H. P.、Chao, P.、Chang, T. H.、Chang, Y. S.(2008)。The impact of market freedom on the adoption of third-party electronic marketplaces: a fuzzy AHP analysis。Industrial Marketing Management,37,698-712。  new window
4.Gerdsri, N.、Kocaoglu, D. F.(2007)。Applying the Analytic Hierarchy Process (AHP) to build a strategic framework for technology road mapping。Math. Comput. Modelling,46(7),1071-1080。  new window
5.Huang, C. C.、Chu, P. Y.、Chiang, Y. H.(2008)。A fuzzy AHP application in government-sponsored RandD project selection。Omega-International Journal of Management Science,36(6),1038-1052。  new window
6.Lee, Y. G.、Song, Y. I.(2007)。Selecting the key research areas in nano-technology field using technology cluster analysis: A case study based on national RandD programs in South Korea。Technovation,27(1),57-64。  new window
7.Prabhakar, S.、Pankanti, S.、Jain, A. K.(2003)。Biometric Recognition: Security and Privacy Concerns。IEEE Security and Privacy,March/April,33-42。  new window
8.Wei, Chun Chin、Chien, Chen Fu、Wang, Mao Jiun J.(2005)。An AHP-based Approach to ERP System Selection。International Journal of Production Economics,96(1),47-62。  new window
9.Adeoye, S. O.(2010)。A Survey of Emerging Biometric Technologies。International Journal of Computer Applications,9(10),1-5。  new window
10.Bhattacharyya, D.、Ranjan, R.、Alisherov, A. F.、Choi, M. K.(2009)。Biometric Authentication: A Review。International Journal of u- and e- Service Science and Technology,2(3),13-28。  new window
11.Cappelli, R.、Maio, D.、Maltoni, D.、Wayman, J. L.、Jain, A. K.(2006)。Performance evaluation of fingerprint verification systems。IEEE Trans. Pattern Anal. Mach. Intell,28(1),3-18。  new window
12.Fleischer, T.、Decker, M.、Fiedeler, U.(2005)。Assessing emerging technologies - methodological challenges and the case of nanotechnologies。Technological Forecasting and Social Change,72(9),1112-1121。  new window
13.Goudelis, G.、Tefas, A.、Pitas, I.(2008)。Emerging Biometric Modalities: A Survey。Journal on Multimodal User Interfaces,2(3/4),217-235。  new window
14.Grijpink, J. H. A. M.(2008)。Trend report on biometrics : Some new insights, experiences and developments。Computer law and security report,24,261-264。  new window
15.Hong, J. H.、Yun, E. K.、Cho, S. B.(2005)。A Review of Performance Evaluation for Biometrics Systems。International Journal of Image and Graphics,5(3),501-536。  new window
16.Hsu, Y. G.、Tzeng, G. H.、Shyu, J. Z.(2003)。Fuzzy Multiple Criteria Selection of Government: Sponsored Frontier Technology R&D Projects。R&D Management,33(5),539-551。  new window
17.Jain, A. K.、Nandakumar, K.、Nagar, A.(2008)。Biometric Template Security。EURASIP Journal on Advances in Signal Processing 2008。  new window
18.Jain, A. K.、Ross, A.、Pankanti, S.(2006)。Biometric: A Tool for Information Security。IEEE Trans. Information Forensics and Security,1(2),125-144。  new window
19.Jain, A. K.、Ross, A.、Prabhakar, S.(2004)。An Introduction to Biometric Recognition。IEEE Transactions on Circuits and Systems for Video Technology,14(1),4-20。  new window
20.Kim, W. K.、Han, S. K.、Oh, K. J.、Kim, T. Y.、Ahn, H. C.、Song, C. W.(2010)。The dual analytic hierarchy process to prioritize emerging technologies。Technological Forecasting and Social Change,77(4),566-577。  new window
21.Kong, A.、Zhang, D.、Kamel, M.(2009)。A survey of palm print recognition。Pattern Recognition,42(7),1408-1418。  new window
22.Lee, Amy H. I.、Chen, Wen-Chin、Chang, Ching-Jan(2008)。A fuzzy AHP and BSC approach for evaluating performance of IT development in the manufacturing industry in Taiwan。Expert Systems with Applications,34(1),96-107。  new window
23.Riley, R. A.、Kleist, V. F.(2005)。The biometric technologies business case: a systematic approach。Information Management and Computer Security,13(2),89-105。  new window
24.Ross, A.(2010)。Iris recognition: The path forward。IEEE Computer,43(2),30-35。  new window
25.Ross, A.、Dass, S.、Jain, A. K.(2005)。A deformable model for fingerprint matching。Journal of Pattern Recognition,38(1),95-103。  new window
26.Shehabuddeen, N.、Prober, D.、Phaal, R.(2006)。From theory to practice: Challenges in operationalising a technology selection framework。Technovation,26(3),324-407。  new window
27.Shen, Y. C.、Chang, S. H.、Lin, G. T. R.、Yu, H. C.(2010)。A hybrid selection model for emerging technology。Technological Forecasting and Social Change,77,151-166。  new window
28.Tran, T. A.、Daim, T.(2008)。A taxonomic review of methods and tools applied in technology assessment。Technological Forecasting and Social Change,75(9),1396-1405。  new window
29.Uludag, U.、Pankanti, S.、Prabhakar, S.、Jain, A.K.(2004)。Biometric Cryptosystems: Issues and Challenges。Proceedings of the IEEE,92(6),948-960。  new window
30.Vielhauer, C.(2006)。Biometric Modalities. Different Traits for Authenticating Subjects: Chapter 3 in Biometric User Authenticating for IT Security。Advances in Information Security,18(1),33-75。  new window
31.Jain, A. K.、Ross, A.(2004)。Multibiometric Systems, Appeared in Communication of the ACM。Special Issue on Multimodal Interfaces,47(1),34-40。  new window
32.Opricovic, S.、Tzeng, G. H.(2003)。Defuzzification within a multi criteria decision model。International Journal of Uncertainty, Fuzziness and Knowledge-based Systems,11(5),635-652。  new window
33.Tsaur, S. H.、Tzeng, G. H.、Wang, G. C.(1997)。Evaluating tourist risks from fuzzy perspectives。Annals of Tourism Research,24(4),796-812。  new window
34.Chan, F. T. S.、Kumar, N.(2007)。Global supplier development considering risk factors using fuzzy extended AHP-based approach。Omega,35(4),417-431。  new window
35.Hu, A. H.、Hsu, C. W.、Kuo, T. C.、Wu, W. C.(2009)。Risk evaluation of green components to hazardous substance using FMEA and FAHP。Expert Systems with Applications,36(3),7142-7147。  new window
36.Buckley, James J.(1985)。Fuzzy hierarchical analysis。Fuzzy Sets and Systems,17(3),233-247。  new window
37.Van Laarhoven, P. J. M.、Pedrycz, W.(1983)。A Fuzzy Extension of Saaty's Priority Theory。Fuzzy Sets and Systems,11(1-3),229-241。  new window
38.Zadeh, Lotfi Asker(1965)。Fuzzy sets。Information and Control,8(3),338-353。  new window
39.Vaidya, Omkarprasad S.、Kumar, Sushil(2006)。Analytic Hierarchy Process: An Overview of Applications。European Journal of Operational Research,169(1),1-29。  new window
40.Deng, H.(1999)。Multicriteria Analysis with Fuzzy Pairwise Comparison。International Journal of Approximate Reasoning,21(3),215-231。  new window
會議論文
1.Balestra, G.、Knaflitz, M.、Massa, R.、Sicuro, M.(2007)。AHP for the acquisition of biomedical instrumentation.Conf3581-3584。  new window
2.Delac, K.、Grgic, M.(2004)。A Survey of Biometric Recognition Methods。46th International Symposium Electronics in Marine, ELMAR-2004。Zadar, Croatia。  new window
3.Matsumoto, T.、Hoshino, H.、Yamada, K.、Hasino, S.(2006)。Impact of artificial gummy fingers on fingerprint systems。Proc. of SPIE,4677。  new window
4.Dabbah, M. A.、Woo, W. L.、Dlay, S. S.(200704)。Secure Authentication for Face Recognition。IEEE Symposium on Computational Intelligence in Image and Signal Processing,(會議日期: 2007/04),121-126。  new window
5.Ganorkar, R. S.、Ghatol, A. A.(2007)。Iris Recognition: An Emerging Biometric Technology。The 6th WSEAS International Conference on Signal Processing, Robotics and Automation。Greece。91-96。  new window
6.Kar, B.、Kartik, B.、Dutta, P. K.(2006)。Speech and Face Biometric for Person Authentication。IEEE International Conference on Industrial Technology,391-396。  new window
研究報告
1.National Biometric Security Project(2008)。Biometric Technology Application Manual Volume One。  new window
圖書
1.Bolle, R. M.、Connell, J. H.、Pankanti, S.、Ratha, N. K.、Senior, A. W.(2004)。Guide to Biometrics。New York:Springer。  new window
2.Yu, O. S.、Hsu, G. J. Y.、Chen, T. Y.(1998)。Introduction to Technological Management: Technological Forecast and Planning。Taipei:Wu Nan Publishing Company。  new window
3.Saaty, T. L.(1998)。The Analytic Hierarchy Process: Planning, Priority Setting, Resource Allocation。New York:McGraw-Hill International Book Co.。  new window
4.Heyer, R.(2008)。Biometrics Technology Review 2008。Edinburgh, South Australia:DSTO。  new window
5.International Biometric Group(2009)。Biometrics Market and Industry Report 2009-2014。New York:International Biometric Group。  new window
6.Kent, S.、Millett, L.(2003)。Who Goes There?: Authentication Technologies Through the Lens of Privacy。National Academies Press。  new window
其他
1.Biometrics Identity Management Agency(2010)。Biometrics Glossary version 4.0, Software Engineering Center CECOM Life Cycle Management Command (2010),http://www.biometrics.dod.mil/Files/Documents/Standards/BioGlossary.pdf。  new window
2.National Science and Technology Council(2006)。Biometrics Foundation Documents,http://www.biometrics.gov/documents/biofoundationdocs.pdf。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE