BIOMETRICS in SECURE e-transactions
#1

BIOMETRICS in SECURE e-transactions

[attachment=17211]

INTRODUCTION:

This paper provides a broad overview of the subject of biometrics, their usage, how performance is measured, the typical construction of systems and practical implementation issues. A basic understanding of computer networks is requisite in order to understand the principles of network security. A NETWORK has been defined as any set of interlinking lines resembling a net, a network of roads an interconnected system, a network of alliances. This definition suits our purpose well. A computer network is simply a system of interconnected computers.

Moving on to the definition of biometrics, it is a means of identifying a person by measuring a particular physical or behavioral characteristic and later comparing it to those of many people that are stored in the data base. Biometrics was identified as one amongst 10 emerging technologies which would change the world in the twenty-first century.




KEYWORDS:

Gene sequencing, Genomics, Databases, Data Management, Proteomics, Geom., Proteome, Transcriptomics, Metabalomics, Glycomics, Nucleotide, Data gatherers, Dataprocessers, Molecular Phylogenies.

1. INTRODUCTION

1. a) DEFINITION

Bioinformatics is the application of quantitative and analytical computational techniques to model biological systems. It is the buzzword of the current times. If biotechnology is hot, bioinformatics is its hottest arm, shrouded in a lot of hype, with conveniently concealed ground realities. It is necessary that bioinformatics is viewed in the proper perspective in order to reap the rich benefits that accrue out of it.

The term bioinformatics is the short form of biological informatics, just as biotechnology is the short form of biological technology.

Bioinformatics can be defined as any application of computation to the field of biology, including data management, algorithm development, and data mining.

A database is meant to store voluminous information in an orderly fashion, to facilitate addition and/or deletion of information and to provide for its retrieval in any one or more of several different permutations and combinations as desired by the user used it in different contexts.

1.b)A BRIEF HISTORY OF BIOINFORMATICS:

Bioinformatics has emerged out of the inputs of specialists from several different areas such as biology, biochemistry, biophysics, molecular biology, and biostatistics and computer science. Specially designed algorithms and organized computer databases are at the core of all bioinformatics operations. Algorithms, that are necessarily complex, make voluminous data easy to handle for defined purposes, in an amazingly short time, a process that is humanly impossible. The requirements of such an activity make heavy and high level demands on both the hardware and the software capabilities of computers.



1.c)BIOINFORMATICS COMPRISES OF:

Bioinformatics encompasses the use of tools and techniques from three separate disciplines; molecular biology (the source of the data to be analyzed), computer science (supplies the hardware for running analysis and the networks to communicate the results), and the data analysis algorithms which strictly define Bioinformatics.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: seminar project on biometrics in secure e transaction, download biometrics in secure e transactions report, abstract on biometrics in secure e transaction, biometrics transactions pdf, seminar report on secure web transactions, biometrics in secure e transactions ppt, secure authentication using automated biometrics abstract,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  SECURE DATA TRANSMISSION USING STEGANOGRAPHY seminar paper 1 1,914 24-11-2012, 01:35 PM
Last Post: seminar details
  SSL – Secure Socket Layer seminar details 1 1,146 12-11-2012, 01:16 PM
Last Post: seminar details
  On the Use of Mobile Phones and Biometrics for Accessing Restricted Web Services project uploader 1 2,392 05-11-2012, 11:46 AM
Last Post: Guest
  Secure Data Collection in Wireless Sensor Networks full report seminar details 0 1,163 09-06-2012, 05:40 PM
Last Post: seminar details
  SILC (Secure Internet Live Conferencing) project uploader 0 988 09-06-2012, 03:59 PM
Last Post: project uploader
  Secure Internet Live Conferencing (SILC) protocol seminar details 0 1,092 07-06-2012, 02:18 PM
Last Post: seminar details
  USER IDENTIFICATION THROUGH KEYSTROKE BIOMETRICS ppt seminar details 0 913 07-06-2012, 12:59 PM
Last Post: seminar details
  USER IDENTIFICATION THROUGH KEYSTROKE BIOMETRICS ppt seminar details 0 2,148 06-06-2012, 05:37 PM
Last Post: seminar details
  Secure Communication seminar details 0 846 05-06-2012, 12:30 PM
Last Post: seminar details
  Secure and Practical Outsourcing of Linear Programming in Cloud Computing full report seminar details 0 868 04-06-2012, 05:42 PM
Last Post: seminar details

Forum Jump: