TECHNOLOGIES



You have found 16 search results

Biometric security and verification using hardware artificial intelligence to solve the issues on content security. We address the immediate problem on security of data and also local storage as an option. This reduces conventional reliance on Wifi and cloud ecosystem which can be unreliable, and can also be limited in connectivity and coverage.

Booth C03 - Longway A.I. Technologies Pte Ltd
Favourite

Prisma/DB is a transparent database middleware that provides selective end-to-end encryption of the data while maintaining full database queryability. By using latest achievements in cryptography, Prisma/DB provides unprecedented level of security and functionality. Prisma/DB is able to provide this functionality by putting together many well-established cryptosystems and secure data processing techniques and making them work together in a seamless way. Leveraging the deep integration with the ...

Booth B18 - Nanyang Technological University - NTUitive Pte Ltd
Favourite

Anti-counterfeiting technology is an indispensable asset in times of widespread circulation of counterfeit and pirated goods in the global market. It provides companies and consumers with a means to benefit from product identification and authentication. Single layer QR codes and barcodes are widely used in the industry for product authentication. Manufacturers and consumers alike use QR codes/ barcodes as a means to store and provide information about the product and to support their logistica...

Booth FI15 - i-Sprint Innovations Pte Ltd
Favourite

Biometric verification is the verification of a person’s identity through one of his/her biometric data (e.g. biometric signature, fingerprint). Signature verification technologies are used in online banking, bank cheque clearing (offline or image signatures), and credit card purchases (online or biometric signatures) worldwide. For services in application areas where signature verification is extremely important, such as banking transactions, an innovative 'biometric signature verification sys...

Booth C20 - SABANCI UNIVERSITY
Favourite

The use of our embedded A.I. hardware solution in command access and security provides the benefit of a local storage to limit hacking possibilities when securing an office or a building. This solution takes away the reliance on big data and computational powers required by conventional methods to recognize facial ID, fingerprint, retina and other access authentication.

Booth C03 - Longway A.I. Technologies Pte Ltd
Favourite

The Problem – Legacy infrastructure, an ever-increasing demand The current eco-system is based on single unsecured files stored in one location, without recovery protocols and limited security. Customers do not know where their files are stored, including which country their data could potentially be stored in. Large vendors are building their own data centres, which are expensive, prone to being hacked, and, ultimately, insecure. The Solution – Distributed cloud storage Distributed cloud st...

Booth UK12 - Yotta Laboratories Ltd.
Favourite

The Neuromem Smart technology is an edge computing A.I. chip which runs on a patented pattern recognition engine for low power and fast reactive computing capabilities. Longway A.I. offers an immediate use of this A.I. chip on its custom embedded modules providing companies with a quick access to edge computing hardware. Our solution will immediate bridge the gap between A.I. and your product or services, delivering enhanced value especially in the IoT space. Deployment cuts across important ind...

Booth C03 - Longway A.I. Technologies Pte Ltd
Favourite

There has recently been a significant desire across industries and sectors to exploit Artificial Intelligence (AI) especially to drive the automation of human tasks and gain new insights from sensory information (data). AI can be used for “advisory-roles” (e.g. augmenting human decision-making) or “critical-roles” where the AI output could directly or indirectly impact life, society, environment, livelihood and at scale. AI such as typical neural networks are unable to sufficiently explain or re...

Booth UK07 - CRITICAL CYBER SYSTEMS
Favourite

A facial recognition system aims to identify or verify a person from a digital image or a video frame. Facial recognition technology typically used in security/surveillance applications. However, it can also be deployed in other areas, such as commercial, marketing, automotive and robotics. It offers significant advantages over other biometric systems like those based on fingerprint or eye iris, especially when target subjects are uncooperative. Typical challenges for the facial recognition s...

Booth C24 - Panasonic R&D Center Singapore
Favourite

Security is a critical concern around the world and the defender has limited security resources that preclude full security coverage of important potential targets at all times. Thus, allocations of limited security resources must be intelligent, taking into account differences in priorities of targets requiring security coverage, the response of adversaries to the security posture based on knowledge gained from surveillance, and potential uncertainty over the types, capabilities, knowledge, and...

Booth B18 - Nanyang Technological University - NTUitive Pte Ltd
Favourite

License Plate Recognition (LPR) system can be deployed all day to perform surveillance and illegal parking deterrence and reduce reliance on human resources. It can also help to improve customer relationship management when the human resource is limited, for example, LPR system could identify VIP's license plate and allow the LPR system’s user to have more response time to prepare for the arrival of VIPs. Typical technical challenges for LPR include low-resolution images, illumination issues, ...

Booth C24 - Panasonic R&D Center Singapore
Favourite

The model-based cybersecurity assessment software tool supports holistic security assessment of complex critical infrastructures systems, such as power grids, metros, and other critical information infrastructure systems.  By using the tool, security practitioners can integrate diverse inputs from different experts ---- including domain-specific threat scenarios and process models, system architectures, security controls, and attacker models ---- to reason about the security posture of the syst...

Booth B35 - ADSC (Illinois at Singapore Pte Ltd)
Favourite

When face recognition fails, person re-identification is needed. With person re-identification, we aim to determine whether a given person has already appeared over a network of cameras. A robust modelling of the appearance of the person is necessary for succesful re-identification. This is a challenging task as significant appearance changes may be caused by variations in lighting conditions, camera view angles and different poses of the person. Furthermore, attribute recognition helps to ide...

Booth C24 - Panasonic R&D Center Singapore
Favourite

Security is a major hindrance for wide scale adoption of IoT. Constant sharing of information between devices and users could occur without the consent of related and authorized personnel. In addition, there is a lack of a security platform that provides access control and personalized security policies based on users’ needs and context, across different types of IoT ‘things’ and smart mobile devices. The availability of such security platform in the market will enable developers and service pro...

Booth B14 - Nanyang Polytechnic
Favourite

A Korean company has developed technology applicable to an emergency platform, after carrying out research on crime rates. Sexually related crimes have increased to 60.3% since 2006, and there have been no effective solutions to prevent these crimes. The company therefore developed a voice recognition emergency platform. It activates when a person who is at risk shouts “Help Me” both in a noisy and quiet environments.The product senses the person’s voice in the case of emergenc...

Booth B02 - VOIM Co Ltd
Favourite

The growth of smart, autonomous and connected devices in our everyday lives is also punctuated by the vulnerability of these systems towards malicious attacks, capturing sensitive private data or sending fraudulent, unauthenticated information. Furthermore, privacy-aware citizenry often contests the intrusion of such devices, thereby limiting their applicability. Therefore, future smart devices should also possess two important features namely, end-to-end security and customisable privacy. We in...

Booth B18 - Nanyang Technological University - NTUitive Pte Ltd
Favourite

Services & Digital Economy