{"id":"https://openalex.org/W4239177533","doi":"https://doi.org/10.1504/ijcse.2016.10000004","title":"Transforming grid to cloud services for multimodal biometrics","display_name":"Transforming grid to cloud services for multimodal biometrics","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W4239177533","doi":"https://doi.org/10.1504/ijcse.2016.10000004"},"language":"en","primary_location":{"id":"doi:10.1504/ijcse.2016.10000004","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijcse.2016.10000004","pdf_url":null,"source":{"id":"https://openalex.org/S65043351","display_name":"International Journal of Computational Science and Engineering","issn_l":"1742-7185","issn":["1742-7185","1742-7193"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Computational Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072259792","display_name":"Sitalakshmi Venkatraman","orcid":"https://orcid.org/0000-0002-2772-133X"},"institutions":[{"id":"https://openalex.org/I149672521","display_name":"Federation University","ror":"https://ror.org/05qbzwv83","country_code":"AU","type":"education","lineage":["https://openalex.org/I149672521"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Sitalakshmi Venkatraman","raw_affiliation_strings":["School of Science, Information Technology and Engineering, University of Ballarat, P.O. Box 663, Ballarat, VIC 3353, Australia"],"affiliations":[{"raw_affiliation_string":"School of Science, Information Technology and Engineering, University of Ballarat, P.O. Box 663, Ballarat, VIC 3353, Australia","institution_ids":["https://openalex.org/I149672521"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5072259792"],"corresponding_institution_ids":["https://openalex.org/I149672521"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.22211078,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"1","first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13062","display_name":"Cognitive Computing and Networks","score":0.8452000021934509,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13062","display_name":"Cognitive Computing and Networks","score":0.8452000021934509,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.8245999813079834,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7615354061126709},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7313408851623535},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.6593614816665649},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.5637549161911011},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5524519681930542},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5198122262954712},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.4576110243797302},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.42426639795303345},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4235069453716278},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.14554616808891296}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7615354061126709},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7313408851623535},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.6593614816665649},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.5637549161911011},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5524519681930542},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5198122262954712},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.4576110243797302},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.42426639795303345},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4235069453716278},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.14554616808891296},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1504/ijcse.2016.10000004","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijcse.2016.10000004","pdf_url":null,"source":{"id":"https://openalex.org/S65043351","display_name":"International Journal of Computational Science and Engineering","issn_l":"1742-7185","issn":["1742-7185","1742-7193"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Computational Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.44999998807907104,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2931996793","https://openalex.org/W4205234238","https://openalex.org/W3148880067","https://openalex.org/W2788934790","https://openalex.org/W3167767780","https://openalex.org/W1988660452","https://openalex.org/W3043682580","https://openalex.org/W2941559775","https://openalex.org/W3142266060","https://openalex.org/W2593645431"],"abstract_inverted_index":{"Various":[0],"barriers":[1],"due":[2],"to":[3,57,62,120,122],"performance,":[4],"security":[5,178],"and":[6,39,42,86,92,98,110,126,156,180],"privacy":[7,40,112,182],"issues":[8,34],"associated":[9,35],"with":[10,36,139],"shared":[11],"heterogeneous":[12,82],"data":[13],"centres":[14],"impede":[15],"the":[16,33,50,67,123,130,133,176,192],"diffusion":[17,187],"of":[18,45,74,135,149,167,188],"multimodal":[19,37,88,118,154,189],"biometrics":[20,89,119,190],"that":[21],"could":[22,80,114,171],"enhance":[23],"secured":[24],"systems":[25],"in":[26,60,106,191],"our":[27],"everyday":[28],"lives.":[29],"This":[30],"paper":[31,131,161],"identifies":[32],"fusion":[38,155],"risks":[41],"provides":[43],"means":[44],"addressing":[46],"them.":[47],"It":[48],"presents":[49],"need":[51],"for":[52,95,117,152,184],"transforming":[53],"from":[54],"grid-based":[55],"services":[56,59,79,104,137],"cloud-based":[58],"order":[61],"address":[63],"these":[64],"issues,":[65],"paving":[66],"way":[68],"towards":[69],"a":[70,164,185],"successful":[71,186],"user":[72,127,181],"acceptance":[73],"biometric":[75],"systems.":[76],"Though":[77],"grid":[78],"provide":[81],"resource":[83],"sharing":[84],"capabilities":[85],"security,":[87],"require":[90],"scalability":[91],"pricing":[93],"flexibility":[94],"gaining":[96],"user-acceptance":[97],"easy":[99],"adoption.":[100],"By":[101],"leveraging":[102],"'on-the-demand'":[103],"offered":[105],"cloud":[107,136],"computing,":[108],"reliable":[109],"context-sensitive":[111],"policies":[113],"be":[115,172],"applied":[116],"cater":[121],"different":[124],"business":[125],"requirements.":[128],"Further,":[129],"combines":[132],"concept":[134],"along":[138],"momentum":[140],"back":[141],"propagation":[142],"induced":[143],"artificial":[144],"neural":[145],"network":[146],"(MBP-ANN)":[147],"model":[148,170],"machine":[150],"learning":[151],"efficient":[153],"flexible":[157],"authentication":[158],"schemes.":[159],"The":[160],"also":[162],"describes":[163],"case":[165],"scenario":[166],"how":[168],"this":[169],"adopted":[173],"by":[174],"applying":[175],"varying":[177],"requirements":[179],"preferences":[183],"cloud.":[193]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
