<?xml version="1.0" encoding="UTF-8"?>
<item xmlns="http://omeka.org/schemas/omeka-xml/v5" itemId="19306" public="1" featured="0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://omeka.org/schemas/omeka-xml/v5 http://omeka.org/schemas/omeka-xml/v5/omeka-xml-5-0.xsd" uri="https://archives.christuniversity.in/items/show/19306?output=omeka-xml" accessDate="2026-05-19T01:15:32+00:00">
  <collection collectionId="16">
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="51377">
                <text>Conference Papers</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </collection>
  <itemType itemTypeId="28">
    <name>Conference Paper</name>
    <description>Faculty Publications- Conference Papers</description>
  </itemType>
  <elementSetContainer>
    <elementSet elementSetId="1">
      <name>Dublin Core</name>
      <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
      <elementContainer>
        <element elementId="50">
          <name>Title</name>
          <description>A name given to the resource</description>
          <elementTextContainer>
            <elementText elementTextId="165912">
              <text>Allometry Authentication in the Field of Finance: Creation of Well Secured System using AI Algo Based Systems</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="49">
          <name>Subject</name>
          <description>The topic of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="165913">
              <text>AI-driven systems; Banking; Biometric authentication; Ethical considerations; Facial recognition; Fingerprint recognition; Regulatory compliance; Security; User experience; Voice authentication</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="41">
          <name>Description</name>
          <description>An account of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="165914">
              <text>It is true the banking sector is increasingly under pressure to tighten security in an ever-changing digital arena, even as the customer experience needs to be strengthened. Thus, the use of biometric authentication through enhanced AI-driven systems that would enhance the security protocols while at the same time smoothening the users' interactions was a promising way in response. The paper that follows explores the integration of biometric authentication within banking systems in a bid to make clear its effectiveness in relation to reinforcing security and enhancing user experience. Accordingly, bijson etal. argue that biometric security fits perfectly in banks, since with the increasing cyber threats, banks are bound to deploy more advanced security mechanisms. These traditional means, suchjson, use of passwords and PINs, have shown vulnerabilities that are liable to exploitation and should be changed into something much more resilient. The authentication under biometrics also validates a user's identity by basing it on unique physiological or behavioral traits, such as a fingerprint, features of the face, patterns of the iris, and the voice. Biometric systems authenticate users with a very high level of confidence through AI-based algorithms, averting the security risks associated with unauthorized access and identity theft. Further, biometric authentication overcomes the flaws that prevail with the traditional mode of methods and hence, it ensures a very comfortable and user-friendly mode of system security.  2024 IEEE.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="39">
          <name>Creator</name>
          <description>An entity primarily responsible for making the resource</description>
          <elementTextContainer>
            <elementText elementTextId="165915">
              <text>Tandon A.; Anitha C.; Kataria A.; Mohammed N.Q.; Al-Khuzaie M.Y.; Almulla A.A.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="48">
          <name>Source</name>
          <description>A related resource from which the described resource is derived</description>
          <elementTextContainer>
            <elementText elementTextId="165916">
              <text>2024 4th International Conference on Advance Computing and Innovative Technologies in Engineering, ICACITE 2024, pp. 962-967.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="45">
          <name>Publisher</name>
          <description>An entity responsible for making the resource available</description>
          <elementTextContainer>
            <elementText elementTextId="165917">
              <text>Institute of Electrical and Electronics Engineers Inc.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="40">
          <name>Date</name>
          <description>A point or period of time associated with an event in the lifecycle of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="165918">
              <text>2024-01-01</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="43">
          <name>Identifier</name>
          <description>An unambiguous reference to the resource within a given context</description>
          <elementTextContainer>
            <elementText elementTextId="165919">
              <text>&lt;a href="https://doi.org/10.1109/ICACITE60783.2024.10617124" target="_blank" rel="noreferrer noopener"&gt;https://doi.org/10.1109/ICACITE60783.2024.10617124&lt;/a&gt;
&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.scopus.com/inward/record.uri?eid=2-s2.0-85201831853&amp;amp;doi=10.1109%2FICACITE60783.2024.10617124&amp;amp;partnerID=40&amp;amp;md5=3528714a4fcf5070f41cffb6c3b3d56f" target="_blank" rel="noreferrer noopener"&gt;https://www.scopus.com/inward/record.uri?eid=2-s2.0-85201831853&amp;amp;doi=10.1109%2fICACITE60783.2024.10617124&amp;amp;partnerID=40&amp;amp;md5=3528714a4fcf5070f41cffb6c3b3d56f&lt;/a&gt;</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="47">
          <name>Rights</name>
          <description>Information about rights held in and over the resource</description>
          <elementTextContainer>
            <elementText elementTextId="165920">
              <text>Restricted Access</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="46">
          <name>Relation</name>
          <description>A related resource</description>
          <elementTextContainer>
            <elementText elementTextId="165921">
              <text>ISBN: 979-835036016-5</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="42">
          <name>Format</name>
          <description>The file format, physical medium, or dimensions of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="165922">
              <text>Online</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="44">
          <name>Language</name>
          <description>A language of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="165923">
              <text>English</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="51">
          <name>Type</name>
          <description>The nature or genre of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="165924">
              <text>Conference paper</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="38">
          <name>Coverage</name>
          <description>The spatial or temporal topic of the resource, the spatial applicability of the resource, or the jurisdiction under which the resource is relevant</description>
          <elementTextContainer>
            <elementText elementTextId="165925">
              <text>Tandon A., Jagannath International Management School, Department of It, Vasant Kunj, New Delhi, India; Anitha C., Mohan Babu University Erstwhile Sree Vidyanikethan Engineering College, Department of Computer Science and Engineering, Tirupati, India; Kataria A., Christ Deemed to Be University, School of Business and Management, Bangalore, India; Mohammed N.Q., AL-Nisour University College, Department of Medical Laboratories Technology, Baghdad, Iraq; Al-Khuzaie M.Y., National University of Science and Technology, College of Health and Medical Technology, Dhi Qar, Iraq; Almulla A.A., Al-Hadi University College, Baghdad, Iraq</text>
            </elementText>
          </elementTextContainer>
        </element>
      </elementContainer>
    </elementSet>
  </elementSetContainer>
</item>
