Dissertationen zum Thema „Biometrisk Data“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Biometrisk Data" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Nytorpe, Piledahl Staffan, und Daniel Dahlberg. „Detektering av stress från biometrisk data i realtid“. Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-31248.
Madsen, Angelica, und Carl Nymanson. „Bör du v(AR)a rädd för framtiden? : En studie om The Privacy Paradox och potentiella integritetsrisker med Augmented Reality“. Thesis, Malmö universitet, Malmö högskola, Institutionen för datavetenskap och medieteknik (DVMT), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-43868.
In a time when digitalization is more widespread than ever, the amount of data collected and shared is increasing. As new technologies develop, challenges for privacy concerns arises. An active online user is likely to engage in one or many social media platforms, where the purpose often involves sharing information with others. Since Augmented Reality is more frequently supported in some of the biggest social media applications, the purpose of this study was to investigate potential privacy concerns with Augmented Reality. The study’s approach consisted of an empirical data collection to create a theoretical framework for the study. Based on this, a digital survey and interviews were conducted to further investigate the user's behavior online and The Privacy Paradox. Based on the results of the survey, The Privacy Paradox could be confirmed and a better understanding of how the user interacts through digital channels was achieved. The study treats different aspects of privacy concerns such as user terms, privacy policies, data brokers, future consequences and what technology enables. The study reached the conclusion that users, businesses and today's technology allow a more sensitive type of information to be collected through a data breach. Even if there has not yet occurred a data breach enabled by Augmented Reality prior to this study, there is a risk that it is only a matter of time until this happens.
Pisani, Paulo Henrique. „Biometrics in a data stream context“. Universidade de São Paulo, 2017. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-08052017-141153/.
A crescente presença da Internet nas tarefas do dia a dia, juntamente com a evolução dos sistemas computacionais, contribuiu para aumentar a exposição dos dados. Esse cenário evidencia a necessidade de sistemas de autenticação de usuários mais seguros. Uma alternativa para lidar com isso é pelo uso de sistemas biométricos. Contudo, características biométricas podem mudar com o tempo, o que pode afetar o desempenho de reconhecimento devido a uma referência biométrica desatualizada. Esse efeito pode ser chamado de template ageing na área de sistemas biométricos adaptativos ou de mudança de conceito em aprendizado de máquina. Isso levanta a necessidade de adaptar automaticamente a referência biométrica com o tempo, uma tarefa executada por sistemas biométricos adaptativos. Esta tese estudou sistemas biométricos adaptativos considerando biometria em um contexto de fluxo de dados. Neste contexto, o teste é executado em um fluxo de dados biométrico, em que as amostras de consulta são apresentadas uma após a outra para o sistema biométrico. Um sistema biométrico adaptativo deve então classificar cada consulta e adaptar a referência biométrica. A decisão de executar a adaptação é tomada pelo sistema biométrico. Dentre as modalidades biométricas, esta tese foca em biometria comportamental, em particular em dinâmica da digitação e em biometria por acelerômetro. Modalidades comportamentais tendem a ser sujeitas a mudanças mais rápidas do que modalidades físicas. Entretanto, havia poucos estudos lidando com sistemas biométricos adaptativos para modalidades comportamentais, destacando uma lacuna para ser explorada. Ao longo da tese, diversos aspectos para aprimorar o projeto de sistemas biométricos adaptativos para modalidades comportamentais em um contexto de fluxo de dados foram discutidos: proposta de estratégias de adaptação para o algoritmo de classificação imunológico Self-Detector, combinação de modelos genuíno e impostor no framework do Enhanced Template Update e aplicação de normalização de scores em sistemas biométricos adaptativos. Com base na investigação desses aspectos, foi observado que a melhor escolha para cada aspecto estudado dos sistemas biométricos adaptativos pode ser diferente dependendo do conjunto de dados e, além disso, dependendo dos usuários no conjunto de dados. As diferentes características dos usuários, incluindo a forma como as características biométricas mudam com o tempo, sugerem que as estratégias de adaptação deveriam ser escolhidas por usuário. Isso motivou a proposta de um sistema biométrico adaptativo modular, chamado ModBioS, que pode escolher cada um desses aspectos por usuário. O ModBioS é capaz de generalizar diversos sistemas baseline e propostas apresentadas nesta tese em um framework modular, juntamente com a possibilidade de atribuir estratégias de adaptação diferentes por usuário. Resultados experimentais mostraram que o sistema biométrico adaptativo modular pode superar diversos sistemas baseline, enquanto que abre um grande número de oportunidades para trabalhos futuros.
McNulty, Peggy Sue. „Values issues in biometric data collection“. Connect to Electronic Thesis (CONTENTdm), 2009. http://worldcat.org/oclc/525070842/viewonline.
Brobeck, Stefan, und Tobias Folkman. „Biometrics : Attitudes and factors influencing a breakthrough in Sweden“. Thesis, Jönköping University, JIBS, Business Informatics, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-148.
Biometrics is a collection of methods for identifying and authorizing individuals with something they are, or do. It is considered to be one of the most secure technologies for security, both physical and logical. Security is something very important for organizations today, but yet there has been a low interest in investing in biometrics for security in Sweden.
The purpose of this thesis has been to establish factors to why biometrics has not been implementedto any large extent, even though the technology has been around for long. We have evaluated the attitudes and views of individuals, as well as company leaders. Problem and questions with biometrics that often are discussed are privacy concerns, costs and ROI (return on investment) and user acceptance. Foremost there is a concern about the costs of implementing such a solution, although some claim that money can be saved by avoiding the costs in more traditional security methods, such as password administration and in security cards.
There is a range of different technologies to use, such as facial-scan, voice-scan and the most mature and well known technique, finger-scan which has been around for a long time, especially for identifying criminals. All these techniques have there positive and negative sides, often measured in different levels of universality, uniqueness, permanence and collectability, e.g. eye-scan has a high uniqueness, facial-scan has a high universability and signature-scan has a low permanence level.
We have collected our data through interviews with companies and suppliers of biometric systems as well as a questionnaire given to private persons. By interpreting the data in a qualitative way we have made our analysis and reached a conclusion.
Our result shows that a cost related to biometric solutions is the largest reason why investments have been absent. This verifies the results of other authors, that the cost is the largest obstacle. Another important factor is that companies believe that biometrics is for organizations with a very high security need. Further our result show that individuals are positive towards biometrics.
Biometri är ett samlingsnamn för tekniker som identifierar och auktoriserar individer, antingen något de är eller gör. Biometri anses vara en av de säkraste teknologierna för säkerhet, både fysisk och logisk. Säkerhet är något som är mycket viktigt för organisationer i dagens läge, men än så länge så har investeringar i biometriska säkerhetslösningar i Sverige uteblivit. Syftet med denna magisteruppsats har varit att fastställa faktorer som bidrar till att biometriska lösningar inte har blivit implementerade i någon större utsträckning, trots att teknologin har funnits länge. Vi har utvärderat individers samt företagsledares attityder och synsätt angående biometri.
Frågor och problem som ofta relateras till biometri är personligintegritet, kostnader och avkastning på investering samt användaracceptans. Framförallt är det osäkerheten kring kostnaderna av en implementering av en biometrisklösning. Det finns även de som hävdar att biometriska lösningar kan spara pengar jämfört med traditionella system därför att man undviker till exempel lösenordsadministration och passerkort.
Det finns en rad olika tekniker att använda, exempelvis ansiktsavläsning, röstigenkänning och den mest mogna och kända tekniken, fingeravtrycksläsning som har existerat en längre tid, framförallt för att identifiera kriminella. Det finns positiva och negativa sidor med alla dessa tekniker, de mäts oftast i olika nivåer av hur många som kan använda det, hur unikt biometrin är, beständighet och hur biometrin samlas in.
Genom intervjuer med företag och leverantörer av biometriska lösningar samt en utdelad enkät till privat personer har vi samlat in data. Vi har sedan tolkat data kvalitativt och utfört vår analys och slutligen kommit fram till ett resultat.
Vårt resultat har visat att kostnader relaterade till biometriska system är det största skälet till varför investeringar har uteblivit. Detta bekräftar vad många andra författare tidigare har funnit, att kostnaderna är det största hindret. En annan viktig faktor är att företag anser att biometri är något för verksamheter som kräver den allra högsta säkerheten. Vidare har individer en positiv inställning till biometri.
Ugail, Hassan, und Eyad Elyan. „Efficient 3D data representation for biometric applications“. IOS Press, 2007. http://hdl.handle.net/10454/2683.
An important issue in many of today's biometric applications is the development of efficient and accurate techniques for representing related 3D data. Such data is often available through the process of digitization of complex geometric objects which are of importance to biometric applications. For example, in the area of 3D face recognition a digital point cloud of data corresponding to a given face is usually provided by a 3D digital scanner. For efficient data storage and for identification/authentication in a timely fashion such data requires to be represented using a few parameters or variables which are meaningful. Here we show how mathematical techniques based on Partial Differential Equations (PDEs) can be utilized to represent complex 3D data where the data can be parameterized in an efficient way. For example, in the case of a 3D face we show how it can be represented using PDEs whereby a handful of key facial parameters can be identified for efficient storage and verification.
Lam, Lawrence G. „Digital Health-Data platforms : biometric data aggregation and their potential impact to centralize Digital Health-Data“. Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/106235.
Cataloged from PDF version of thesis.
Includes bibliographical references (page 81).
Digital Health-Data is being collected at unprecedented rates today as biometric micro sensors continue to diffuse into our lives in the form of smart devices, wearables, and even clothing. From this data, we hope to learn more about preventative health so that we can spend less money on the doctor. To help users aggregate this perpetual growth of biometric "big" data, Apple HealthKit, Google Fit, and Samsung SAMI were each created with the hope of becoming the dominant design platform for Digital Health-Data. The research for this paper consists of citings from technology strategy literature and relevant journalism articles regarding recent and past developments that pertain to the wearables market and the digitization movement of electronic health records (EHR) and protected health information (PHI) along with their rules and regulations. The culmination of these citations will contribute to my hypothesis where the analysis will attempt to support my recommendations for Apple, Google, and Samsung. The ending chapters will encompass discussions around network effects and costs associated with multi-homing user data across multiple platforms and finally ending with my conclusion based on my hypothesis.
by Lawrence G. Lam.
S.M. in Engineering and Management
Jašková, Jitka. „Zpracování osobních údajů v rámci EU se zřetelem na policejní a justiční spolupráci“. Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-18247.
Stevenson, Brady Roos. „Analysis of Near-Infrared Phase Effects on Biometric Iris Data“. BYU ScholarsArchive, 2006. https://scholarsarchive.byu.edu/etd/1299.
Khanna, Tania. „Low power data acquisition for microImplant biometric monitoring of tremors“. Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/78448.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 97-100).
In recent years, trends in the medical industry have created a growing demand for implantable medical devices. In particular, the need to provide doctors a means to continuously monitor biometrics over long time scales with increased precision is paramount to efficient healthcare. To make medical implants more attractive, there is a need to reduce their size and power consumption. Small medical implants would allow for less invasive procedures, greater comfort for patients, and increased patient compliance. Reductions in power consumption translate to longer battery life. The two primary limitations to the size of small medical implants are the batteries that provide energy to circuit and sensor components and the antennas that enable wireless communication to terminals outside of the body. The theory is applied in the context of the long term monitoring of Parkinson's tremors. This work investigates how to reduce the amount of data needing to acquire a signal by applying compressive sampling thereby alleviating the demand on the energy source. A low energy SAR ADC is designed using adiabatic charging to further reduce energy usage. This application is ideal for adiabatic techniques because of the low frequency of operation and the ease with which we can reclaim energy from discharging the capacitors. Keywords: SAR ADC, adiabatic, compressive sampling, biometric, implants
by Tania Khanna.
Ph.D.
Mai, Guangcan. „Biometric system security and privacy: data reconstruction and template protection“. HKBU Institutional Repository, 2018. https://repository.hkbu.edu.hk/etd_oa/544.
Pratt, Jamie M. „The Effects of Worksite Health Promotion Programs on Employee Biometric Data“. BYU ScholarsArchive, 2014. https://scholarsarchive.byu.edu/etd/5752.
Maghsoudi, Javid. „A Behavioral Biometrics User Authentication Study Using Motion Data from Android Smartphones“. Thesis, Pace University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10690910.
This is a study of the behavioral biometric of smartphone motion to determine the potential accuracy of authenticating users on smartphone devices. The study used the application Sensor Kinetics Pro and the Weka machine-learning library to analyze accelerometer and gyroscope data. The study conducted three experiments for the research. They were conducted in spring 2015, fall 2015, and spring 2016. The final experiment in spring 2016 used six Android-based smartphones to capture data from 60 participants and each participant performed 20 trials of two motions: bringing the phone up to eye level for review, and then bringing the phone to the ear, resulting in 1200 runs. The resulting sensor datasets were used for machine learning training and testing. The study used filtering data to remove noise, and then aggregated the data and used them as inputs to the Weka Machine Learning tool. The study used several machine classification algorithms: the Multilayer Perception (MLP), k-Nearest Neighbor (k-NN), Naïve Bayes (N-B), and Support Vector Machine (SVM) machine learning classification algorithms. The study reached authentication accuracies of up to 93% thus supporting the use of behavioral motion biometrics for user authentication. Preliminary studies with smaller numbers of participants in spring 2015 and in fall 2015 also produced 90%+ authentication accuracy.
Giesing, Ilse. „User perception related to identification through biometrics within electronic business“. Pretoria : [s.n.], 2003. http://upetd.up.ac.za/thesis/available/etd-01092004-141637.
Savaluny, Elly. „Analysis of ordered categorical data : partial proportional odds and stratified models“. Thesis, University of Reading, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.326978.
Aronsson, Erik. „Biometric Authentication and Penetration of Smartphones“. Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37713.
Ara?jo, Rayron Victor Medeiros de. „A probabilistic analysis of the biometrics menagerie existence: case study in fingerprint data“. Universidade Federal do Rio Grande do Norte, 2016. http://repositorio.ufrn.br/handle/123456789/21032.
Approved for entry into archive by Arlan Eloi Leite Silva (eloihistoriador@yahoo.com.br) on 2016-07-27T00:08:32Z (GMT) No. of bitstreams: 1 RayronVictorMedeirosDeAraujo_DISSERT.pdf: 4039405 bytes, checksum: 1fdfbf6dd2e57fcc334017f7a3ee24ab (MD5)
Made available in DSpace on 2016-07-27T00:08:32Z (GMT). No. of bitstreams: 1 RayronVictorMedeirosDeAraujo_DISSERT.pdf: 4039405 bytes, checksum: 1fdfbf6dd2e57fcc334017f7a3ee24ab (MD5) Previous issue date: 2016-02-18
At? pouco tempo atr?s o uso de biometria se restringia a ambientes de alta seguran?a e aplica??es de identifica??o criminal por raz?es de natureza econ?mica e tecnol?gica. Contudo, nos ?ltimos anos a autentica??o biom?trica come?ou a fazer parte do dia a dia das pessoas. Desde ent?o, alguns problemas de autentica??o entraram em evid?ncia, como a impossibilidade de votar numa elei??o porque o indiv?duo n?o tinha sua impress?o digital reconhecida. Isso acontece, pois os usu?rios de um sistema biom?trico podem ter diferentes graus de acur?cia, principalmente em sistemas de utiliza??o em larga escala. Alguns desses usu?rios podem ter dificuldade na autentica??o, enquanto outros podem ser, particularmente, vulner?veis ? imita??o. Estudos recentes investigaram e identificaram esses tipos de usu?rios, dando-lhes nomes de animais: Sheep, Goats, Lambs, Wolves, Doves, Chameleons, Worms e Phantoms. O objetivo desse trabalho ? avaliar a exist?ncia desses tipos de usu?rios em uma base de dados de impress?es digitais e propor uma nova forma de investig?-los, baseando-se no desempenho das verifica??es entre amostras. Nossos resultados identificaram a presen?a de goats, lambs, wolves, chameleons e phantoms, al?m de demonstrar a aus?ncia de worms e doves, em um sistema biom?trico proposto.
Until recently the use of biometrics was restricted to high-security environments and criminal identification applications, for economic and technological reasons. However, in recent years, biometric authentication has become part of daily lives of people. The large scale use of biometrics has shown that users within the system may have different degrees of accuracy. Some people may have trouble authenticating, while others may be particularly vulnerable to imitation. Recent studies have investigated and identified these types of users, giving them the names of animals: Sheep, Goats, Lambs, Wolves, Doves, Chameleons, Worms and Phantoms. The aim of this study is to evaluate the existence of these users types in a database of fingerprints and propose a new way of investigating them, based on the performance of verification between subjects samples. Once introduced some basic concepts in biometrics and fingerprint, we present the biometric menagerie and how to evaluate them.
Deutsche, Gesellschaft für Medizinische Informatik Biometrie und Epidemiologie. „GMS Medizinische Informatik, Biometrie und Epidemiologie“. German Medical Science, 2005. https://ul.qucosa.de/id/qucosa%3A12911.
Lodrová, Dana. „Bezpečnost biometrických systémů“. Doctoral thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2013. http://www.nusl.cz/ntk/nusl-261226.
Baraldi, Carlo. „La sicurezza dei dati biometrici nella firma grafometrica. Aspetti giuridici e tecnologici“. Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6682/.
Ulmer. „Biometrie und Informatik in Medizin und Biologie“. Fischer, 1991. https://ul.qucosa.de/id/qucosa%3A12649.
Deutsche, Gesellschaft für Medizinische Informatik Biometrie und Epidemiologie (GMDS). „Biometrie und Informatik in Medizin und Biologie“. Fischer, 2014. https://ul.qucosa.de/id/qucosa%3A12566.
Deutsche, Gesellschaft für Medizinische Informatik Biometrie und Epidemiologie. „Informatik, Biometrie und Epidemiologie in Medizin und Biologie: offizielles Organ der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie (GMDS) e.V“. Urban & Fischer, 1995. https://ul.qucosa.de/id/qucosa%3A11661.
Deutsche, Gesellschaft für Medizinische Informatik Biometrie und Epidemiologie. „Informatik, Biometrie und Epidemiologie in Medizin und Biologie: offizielles Organ der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie (GMDS) e.V“. Urban & Fischer, 1994. https://ul.qucosa.de/id/qucosa%3A12694.
Deutsche, Gesellschaft für Medizinische Informatik Biometrie und Epidemiologie. „Informatik, Biometrie und Epidemiologie in Medizin und Biologie: offizielles Organ der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie (GMDS) e.V“. Urban & Fischer, 1996. https://ul.qucosa.de/id/qucosa%3A12698.
Deutsche, Gesellschaft für Medizinische Informatik Biometrie und Epidemiologie. „Informatik, Biometrie und Epidemiologie in Medizin und Biologie: offizielles Organ der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie (GMDS) e.V“. Urban & Fischer, 1997. https://ul.qucosa.de/id/qucosa%3A12700.
Deutsche, Gesellschaft für Medizinische Informatik Biometrie und Epidemiologie. „Informatik, Biometrie und Epidemiologie in Medizin und Biologie: offizielles Organ der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie (GMDS) e.V“. Urban & Fischer, 1999. https://ul.qucosa.de/id/qucosa%3A12701.
Deutsche, Gesellschaft für Medizinische Informatik Biometrie und Epidemiologie. „Informatik, Biometrie und Epidemiologie in Medizin und Biologie: offizielles Organ der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie (GMDS) e.V“. Urban & Fischer, 2003. https://ul.qucosa.de/id/qucosa%3A12708.
Sinsel, Adam R. „Supporting the maritime information dominance: optimizing tactical network for biometric data sharing in maritime interdiction operations“. Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45257.
This research intends to improve information dominance in the maritime domain by optimizing tactical mobile ad hoc network (MANET) systems for wireless sharing of biometric data in maritime interdiction operations (MIO). Current methods for sharing biometric data in MIO are unnecessarily slow and do not leverage wireless networks at the tactical edge to maximize information dominance. Field experiments allow students to test wireless MANETs at the tactical edge. Analysis is focused on determining optimal MANET design and implementation. It considers various implementations with varied antenna selection, radio power, and frequency specifications, and two specific methods of integrating Department of Defense biometric collection devices to the wireless MANET, which utilizes a single (WR) MPU4 802.11 Wi-Fi access point to connect secure electronic enrollment kit II (SEEK II) biometric devices to the MANET, and tethers each SEEK device to a dedicated WR using a personal Ethernet connection. Biometric data is shared across the tactical network and transmitted to remote servers. Observations and analysis regarding network performance demonstrate that wireless MANETs can be optimized for biometric reach back and integrated with biometric devices to improve biometric data sharing in MIO.
Deutsche, Gesellschaft für Medizinische Informatik Biometrie und Epidemiologie. „Informatik, Biometrie und Epidemiologie in Medizin und Biologie: offizielles Organ der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie (GMDS) e.V“. Urban & Fischer, 2000. https://ul.qucosa.de/id/qucosa%3A12705.
Deutsche, Gesellschaft für Medizinische Informatik Biometrie und Epidemiologie. „Informatik, Biometrie und Epidemiologie in Medizin und Biologie: offizielles Organ der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie (GMDS) e.V“. Urban & Fischer, 1993. https://ul.qucosa.de/id/qucosa%3A12689.
Deutsche, Gesellschaft für Medizinische Informatik Biometrie und Epidemiologie. „Informatik, Biometrie und Epidemiologie in Medizin und Biologie: offizielles Organ der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie (GMDS) e.V“. Urban & Fischer, 1998. https://ul.qucosa.de/id/qucosa%3A12720.
Deutsche, Gesellschaft für Medizinische Informatik Biometrie und Epidemiologie. „Informatik, Biometrie und Epidemiologie in Medizin und Biologie: offizielles Organ der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie (GMDS) e.V“. Urban & Fischer, 2001. https://ul.qucosa.de/id/qucosa%3A12737.
Leonard, Dwayne Christopher. „A Framework for the Creation of a Unified Electronic Medical Record Using Biometrics, Data Fusion and Belief Theory“. Scholarly Repository, 2007. http://scholarlyrepository.miami.edu/oa_dissertations/246.
Deutsche, Gesellschaft für Medizinische Informatik Biometrie und Epidemiologie. „Informatik, Biometrie und Epidemiologie in Medizin und Biologie: offizielles Organ der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie (GMDS) e.V“. Elsevier, Urban & Fischer, 2004. https://ul.qucosa.de/id/qucosa%3A12725.
Deutsche, Gesellschaft für Medizinische Informatik Biometrie und Epidemiologie. „Informatik, Biometrie und Epidemiologie in Medizin und Biologie: offizielles Organ der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie (GMDS) e.V“. Urban & Fischer, 2002. https://ul.qucosa.de/id/qucosa%3A12707.
Li, Jiawei. „Person re-identification with limited labeled training data“. HKBU Institutional Repository, 2018. https://repository.hkbu.edu.hk/etd_oa/541.
Costa, Leandro Garcia da. „Crescimento, desenvolvimento e consumo hídrico de cana-de-açúcar sob dois sistemas de manejo da palha“. Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/11/11152/tde-23012017-150113/.
Determining the optimal amount of trash blankets above ground is one of the most discussed issues by the sugarcane industry, since this residue can be considered a byproduct of sugarcane due to cellulosic ethanol and electricity cogeneration. To establish these values, it is necessary to consider the crop needs together with physical, chemical and biological soil characteristics. The process based crop models (PBCMs), specifically APSIM-Sugar, able to simulate the soil organic matter, can be used in conjunction with field experiments to support the decision making about the optimum amounts of trash blanket for Brazilian sugarcane farming systems. PBCMs might be used to simulate the crop development and growth, water, nitrogen and carbon soil balances, and make the experiment data applicable for other regions allowing for a broader view and understanding on the key questions. In this context, this study compared two treatments: maintenance of 100% of the trash (CP) and removal of 100% of the trash (SP) in an experiment carried out with an irrigated first ratoon of RB867515 cultivar in Southern Brazil, at city of Piracicaba, State of São Paulo, Lat. 22,67° S and Long. 47,64° W. Monthly biometric evaluations were performed regarding the variables, tillering, stalk\'s height and diameter, leaf area index (LAI) and number of green leaves, as well as fresh and dry mass of leaves, cabbages and stalks. Crop evapotranspiration (ETc) were assessed by Bowen ratio method (MRB) and frequency domain reflectometry (FDR). Sap flow measured by heat balance method was assumed to be the crop transpiration (Tp). APSIM-Sugar crop model was calibrated based on these experimental data, and such model was applied for different Brazilian regions for evaluating the best water-trash management strategies for each region. Comparing both treatments there were just significant differences for leaf area index (LAI) and leaves dry mass (MSF). ETc was ranged from 3 to 8 mm day-1, depending on the weather conditions and crop stage. Crop coefficient (Kc) showed an inverse linear relationship with reference evapotranspiration (ETo), in such way that when ETo < 2 mm, the Kc(SP) = 1,8 and Kc(CP) = 1,5, and for ETo > 6mm it was observed Kc(CP) = 1,3 and Kc(SP) = 1,2. APSIM-Sugar simulations showed that, in the most part of cases, the keeping at least 50% of trash blanket and 25% of total irrigation requirement, resulted on the highest yield rates.
Blommé, Johan. „Evaluation of biometric security systems against artificial fingers“. Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1145.
Verification of users’ identities are normally carried out via PIN-codes or ID- cards. Biometric identification, identification of unique body features, offers an alternative solution to these methods.
Fingerprint scanning is the most common biometric identification method used today. It uses a simple and quick method of identification and has therefore been favored instead of other biometric identification methods such as retina scan or signature verification.
In this report biometric security systems have been evaluated based on fingerprint scanners. The evaluation method focuses on copies of real fingers, artificial fingers, as intrusion method but it also mentions currently used algorithms for identification and strengths and weaknesses in hardware solutions used.
The artificial fingers used in the evaluation were made of gelatin, as it resembles the surface of human skin in ways of moisture, electric resistance and texture. Artificial fingers were based on ten subjects whose real fingers and artificial counterpart were tested on three different fingerprint scanners. All scanners tested accepted artificial fingers as substitutes for real fingers. Results varied between users and scanners but the artificial fingers were accepted between about one forth and half of the times.
Techniques used in image enhancement, minutiae analysis and pattern matching are analyzed. Normalization, binarization, quality markup and low pass filtering are described within image enhancement. In minutiae analysis connectivity numbers, point identification and skeletonization (thinning algorithms) are analyzed. Within pattern matching, direction field analysis and principal component analysis are described. Finally combinations of both minutiae analysis and pattern matching, hybrid models, are mentioned.
Based on experiments made and analysis of used techniques a recommendation for future use and development of fingerprint scanners is made.
Zvak, Martin. „Získávání dat z tabletu“. Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218576.
Boyanapally, Deepthi. „MERGING OF FINGERPRINT SCANS OBTAINED FROM MULTIPLE CAMERAS IN 3D FINGERPRINT SCANNER SYSTEM“. UKnowledge, 2008. http://uknowledge.uky.edu/gradschool_theses/510.
Giersberg, Mona Franziska [Verfasser]. „Collection of biometric data as an animal based approach for the assessment of minimum space requirements in livestock farming / Mona Franziska Giersberg“. Hannover : Bibliothek der Tierärztlichen Hochschule Hannover, 2017. http://d-nb.info/1136159762/34.
Karlsson, Andreas. „Estimation and Inference for Quantile Regression of Longitudinal Data : With Applications in Biostatistics“. Doctoral thesis, Uppsala : Acta Universitatis Upsaliensis, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-7186.
Oskarsson, Tim. „Digital incursion: Breaching the android lock screen and liberating data“. Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44939.
Giesa, Anette Isabella. „Play for the Black Box — Using Critical Play to raise awareness of data privacy issues“. Thesis, Malmö universitet, Fakulteten för kultur och samhälle (KS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-23959.
Banerjea-Brodeur, Nicolas Paul. „Advance passenger information passenger name record : privacy rights and security awareness“. Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=80909.
Passenger Name Record access permits authorities to have additional data that could identify individuals requiring more questioning prior to border control clearance. This data does not cause in itself privacy issues other than perhaps the potential retention and manipulation of information that Border Control Authorities may acquire. In essence, bilateral agreements between governments should be sought in order to protect national legislation.
The common goal of the airline industry is to ensure safe and efficient air transport. API and PNR should be viewed as formalities that can facilitate border control clearance and prevent the entrance of potentially high-risk individuals.
Suutala, J. (Jaakko). „Learning discriminative models from structured multi-sensor data for human context recognition“. Doctoral thesis, Oulun yliopisto, 2012. http://urn.fi/urn:isbn:9789514298493.
Tiivistelmä Tässä työssä kehitettiin ja sovellettiin tilastollisen koneoppimisen ja hahmontunnistuksen menetelmiä anturipohjaiseen ihmiseen liittyvän tilannetiedon tunnistamiseen. Esitetyt menetelmät kuuluvat erottelevan oppimisen viitekehykseen, jossa ennustemalli sisääntulomuuttujien ja vastemuuttujan välille voidaan oppia suoraan tunnetuilla vastemuuttujilla nimetystä aineistosta. Parametrittomien erottelevien mallien oppimiseen käytettiin ydinmenetelmiä kuten tukivektorikoneita (SVM) ja Gaussin prosesseja (GP), joita voidaan pitää yhtenä modernin tilastollisen koneoppimisen tärkeimmistä menetelmistä. Työssä kehitettiin näihin menetelmiin liittyviä laajennuksia, joiden avulla rakenteellista aineistoa voidaan mallittaa paremmin reaalimaailman sovelluksissa, esimerkiksi tilannetietoisen laskennan sovellusalueella. Tutkimuksessa sovellettiin SVM- ja GP-menetelmiä moniluokkaisiin luokitteluongelmiin rakenteellisen monianturitiedon mallituksessa. Useiden tietolähteiden käsittelyyn esitetään menettely, joka yhdistää useat opetetut luokittelijat päätöstason säännöillä lopulliseksi malliksi. Tämän lisäksi aikasarjatiedon käsittelyyn kehitettiin uusi graafiesitykseen perustuva ydinfunktio sekä menettely sekventiaalisten luokkavastemuuttujien käsittelyyn. Nämä voidaan liittää modulaarisesti ydinmenetelmiin perustuviin erotteleviin luokittelijoihin. Lopuksi esitetään tekniikoita usean liikkuvan kohteen seuraamiseen. Menetelmät perustuvat anturitiedosta oppivaan GP-regressiomalliin ja partikkelisuodattimeen. Työssä esitettyjä menetelmiä sovellettiin kolmessa ihmisen liikkeisiin liittyvässä tilannetiedon tunnistussovelluksessa: henkilön biometrinen tunnistaminen, henkilöiden seuraaminen sekä aktiviteettien tunnistaminen. Näissä sovelluksissa henkilön asentoa, liikkeitä ja astuntaa kävelyn ja muiden aktiviteettien aikana mitattiin kahdella erilaisella paineherkällä lattia-anturilla sekä puettavilla kiihtyvyysantureilla. Tunnistusmenetelmien laajennuksien lisäksi jokaisessa sovelluksessa kehitettiin menetelmiä signaalin segmentointiin ja kuvaavien piirteiden irroittamiseen matalantason anturitiedosta. Tutkimuksen tuloksena saatiin parannuksia erottelevien mallien oppimiseen rakenteellisesta anturitiedosta sekä erityisesti uusia menettelyjä tilannetiedon tunnistamiseen
Gustavsson, Linnéa. „Ansiktsrekonstruktion : Mannen från den medeltida kyrkoruinen S:t Hans, Visby“. Thesis, Uppsala universitet, Arkeologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-386062.
Silva, Pedro Alexandre Baptista da. „Estágio em gestão de dados e estatística numa CRO“. Master's thesis, Universidade de Aveiro, 2014. http://hdl.handle.net/10773/14012.
This report aims to describe my internship in Data Management and Biostatistics in Keypoint. This internship was a practical complement to my theoretical education in the Masters in Pharmaceutical Medicine and this reports serves as a thesis to the 2nd year of the mentioned Masters. This 9 months internship in Keypoint focused in activities of all stages of the services of Data Management and Biostatistics provided by Keypoint, in several different types of projects. These projects covered clinical trials and observational studies, with medicines and food supplements, and a post-graduation thesis in an area not related to clinical research. The internship also included a project that was based on the conduction of interviews. There was the chance to several trainings in the areas of medical writing, medical devices and conduction of interviews. This experience allow me to not only develop hard skills in Data Management and Biostatistics but also to further soft-skills and to better understand the reality of clinical research in Portugal.
Este relatório tem como objectivo descrever o meu estágio em Gestão de Dados e Bioestatística na Keypoint. Este estágio foi um complemento prático do Mestrado em Biomedicina Farmacêutica e este relatório de estágio serve como tese do segundo ano curricular do referido mestrado. Este estágio de 9 meses na Keypoint incluiu actividades de todas as fases dos serviços de Gestão de Dados e Estatística, em diferentes projectos. Estes projectos abrageram ensaios clínicos e estudos observacionais, com medicamentos e suplementos alimentares, e ainda uma tese de pós-graduação não relacionada com investigação clínica. Incluiu também um projecto que tinha como base a realização de entrevistas. Foi possível ainda participar em várias formações, nas áreas de medical writing, dispositivos médicos e entrevistas. Esta experiência permitiu não só desenvolver competências técnicas em Gestão de Dados e Estatística mas também ajudou a desenvolver soft-skills e perceber melhor a realidade da investigação clínica em Portugal.
Bezerra, Júnior Murilo Alves. „Pré-processamento dos intervalos de tempos observados na dinâmica de digitação (KeyStroke) de senhas curtas“. Pós-Graduação em Ciência da Computação, 2013. https://ri.ufs.br/handle/riufs/3344.
Em 2006, um método foi proposto sobre o uso da equalização de intervalos de tempos, como forma de melhorar o desempenho de alguns métodos biométricos baseados em dinâmica de digitação (keystroke). Naquele artigo, pequenas bases de dados, com textos estáticos e livres, foram usadas para mostrar, em termos de taxas de erros, os ganhos quando a equalização era aplicada antes do uso de métodos clássicos. Em 2009, lançou-se uma base pública grande, correspondente a uma única senha hipotética curta, digitada por 51 voluntários, usada pelos autores do trabalho e, posteriormente, disponibilizada, publicamente, para novos experimentos. Nesta dissertação utilizou-se essa grande base pública, para a qual adapta-se a equalização de intervalos. Utilizando os mesmos métodos usados pelos proprietários da base experimental, obtém-se resultados que mostram, claramente, um notável ganho de desempenho para todos os métodos testados quando a equalização de intervalos é usada no pré-processamento dos dados. É observado também o desempenho no tocante ao tamanho da senha, e analisa-se a estabilização do padrão de digitação. Por fim, foi realizada a montagem de uma nova base, a partir da qual foi possível verificar e analisar o efeito produzido no ritmo de digitação do usuário devido à troca de caracteres da senha, bem como a influência do seu modo de digitação.