To see the other types of publications on this topic, follow the link: Minutiae.

Dissertations / Theses on the topic 'Minutiae'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Minutiae.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Ström, Bartunek Josef. "FINGERPRINT IMAGE ENHANCEMENT, SEGMENTATION AND MINUTIAE DETECTION." Doctoral thesis, Blekinge Tekniska Högskola, Institutionen för tillämpad signalbehandling, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-11149.

Full text
Abstract:
Prior to 1960's, the fingerprint analysis was carried out manually by human experts and for forensic purposes only. Automated fingerprint identification systems (AFIS) have been developed during the last 50 years. The success of AFIS resulted in that its use expanded beyond forensic applications and became common also in civilian applications. Mobile phones and computers equipped with fingerprint sensing devices for fingerprint-based user identification are common today. Despite the intense development efforts, a major problem in automatic fingerprint identification is to acquire reliable matching features from fingerprint images with poor quality. Images where the fingerprint pattern is heavily degraded usually inhibit the performance of an AFIS system. The performance of AFIS systems is also reduced when matching fingerprints of individuals with large age variations. This doctoral thesis presents contributions within the field of fingerprint image enhancement, segmentation and minutiae detection. The reliability of the extracted fingerprint features is highly dependent on the quality of the obtained fingerprints. Unfortunately, it is not always possible to have access to high quality fingerprints. Therefore, prior to the feature extraction, an enhancement of the quality of fingerprints and a segmentation are performed. The segmentation separates the fingerprint pattern from the background and thus limits possible sources of error due to, for instance, feature outliers. Most enhancement and segmentation techniques are data-driven and therefore based on certain features extracted from the low quality fingerprints at hand. Hence, different types of processing, such as directional filtering, are employed for the enhancement. This thesis contributes by proposing new research both for improving fingerprint matching and for the required pre-processing that improves the extraction of features to be used in fingerprint matching systems. In particular, the majority of enhancement and segmentation methods proposed herein are adaptive to the characteristics of each fingerprint image. Thus, the methods are insensitive towards sensor and fingerprint variability. Furthermore, introduction of the higher order statistics (kurtosis) for fingerprint segmentation is presented. Segmentation of the fingerprint image reduces the computational load by excluding background regions of the fingerprint image from being further processed. Also using a neural network to obtain a more robust minutiae detector with a patch rejection mechanism for speeding up the minutiae detection is presented in this thesis.
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Tuo. "Fingerprint Identification by Improved Method of Minutiae Matching." Miami University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=miami1484672769912832.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Forsythe, Christopher Michael. "Seeing the unseen: revealing invisible and visible minutiae." Thesis, University of Iowa, 2012. https://ir.uiowa.edu/etd/2872.

Full text
Abstract:
Sight is the most important of our five senses. It allows us to navigate our environment, find food and avoid danger. Sight can be used to accurately render a drawing or to recognize nuance in a form. It can also be used in more dynamic ways to parse the complicated social systems and customs that build our societies. Despite all that we can see, we are inundated with what we cannot. This inability to see can be categorized into two subdivisions: items that possess characteristics that are beyond our eye's physical capacity of perception (e.g. microscopic objects or electromagnetic radiation) and items and situations whose exact presence goes unnoticed due to our mind's conditioning from repeated exposure (e.g. glass in a window frame or halftone dots that form a printed picture). Through the use of special instruments or awareness raising techniques these invisible objects can be brought to light. Artists and their art have often played important roles in society by revealing things that go unnoticed and making them plain to see for all. These revelations can be as simple as capturing the beauty of a natural landscape or as controversial as portraying the impact of religion, gender or oppression in our communities. My most recent set of prints investigate "seeing the unseen" by meditating on the minutiae and microscopic organisms that permeate our surroundings yet escape our attention. By utilizing handmade paper's tactile qualities, juxtaposing seemingly dissimilar objects and the use of bold and often times unnatural color, I have attempted to create a space where items of different scales can exist side by side so we can revel in their wonder, discover visual similarities between objects and plainly see them with our own eyes.
APA, Harvard, Vancouver, ISO, and other styles
4

Noor, Azad. "A new algorithm for minutiae extraction and matching in fingerprint." Thesis, Brunel University, 2012. http://bura.brunel.ac.uk/handle/2438/7473.

Full text
Abstract:
A novel algorithm for fingerprint template formation and matching in automatic fingerprint recognition has been developed. At present, fingerprint is being considered as the dominant biometric trait among all other biometrics due to its wide range of applications in security and access control. Most of the commercially established systems use singularity point (SP) or ‘core’ point for fingerprint indexing and template formation. The efficiency of these systems heavily relies on the detection of the core and the quality of the image itself. The number of multiple SPs or absence of ‘core’ on the image can cause some anomalies in the formation of the template and may result in high False Acceptance Rate (FAR) or False Rejection Rate (FRR). Also the loss of actual minutiae or appearance of new or spurious minutiae in the scanned image can contribute to the error in the matching process. A more sophisticated algorithm is therefore necessary in the formation and matching of templates in order to achieve low FAR and FRR and to make the identification more accurate. The novel algorithm presented here does not rely on any ‘core’ or SP thus makes the structure invariant with respect to global rotation and translation. Moreover, it does not need orientation of the minutiae points on which most of the established algorithm are based. The matching methodology is based on the local features of each minutiae point such as distances to its nearest neighbours and their internal angle. Using a publicly available fingerprint database, the algorithm has been evaluated and compared with other benchmark algorithms. It has been found that the algorithm has performed better compared to others and has been able to achieve an error equal rate of 3.5%.
APA, Harvard, Vancouver, ISO, and other styles
5

Hoyle, Kevin. "Minutiae Triplet-based Features with Extended Ridge Information for Determining Sufficiency in Fingerprints." Thesis, Virginia Tech, 2011. http://hdl.handle.net/10919/34010.

Full text
Abstract:
In order to deliver statistical and qualitative backing to latent fingerprint evidence, algorithms are proposed (1) to perform fingerprint matching to aid in quality assessment, and (2) to discover statistically rare features or patterns in fingerprints. These features would help establish an objective minimum-quality baseline for latent prints as well as aid in the latent examination process in making a matching comparison. The proposed methodologies use minutiae triplet-based features in a hierarchical fashion, where not only minutia points are used, but ridge information is used to help establish relations between minutiae. Results show (1) that our triplet-based descriptor is useful in eliminating false matches in the matching algorithm, and (2) that a set of distinctive features can be found that have sufficient discriminatory power to aid in quality assessment.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
6

Burba, Donatas. "Piršto atspaudo naudojimas šifravimo rakto generavimui." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2010. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2010~D_20100813_112757-39181.

Full text
Abstract:
Saugiais gali būti laikomi tik užšifruoti duomenys, o šifravimas neįmanomas be šifravimo rakto. Vienas iš geriausiai žinomų ir plačiausiai naudojamų šifravimo raktų yra slaptažodis, tačiau pagrindinis jo trūkumas tas, kad jį reikia atsiminti. Šioje situacijoje gali padėti biometrija, kadangi praktiškai kiekvienas žmogus turi unikalias charakteristikas. Tačiau pagrindinė problema yra - kaip iš biometrinių charakteristikų suformuoti šifravimo raktą. Pirštų atspaudai yra gerai žinoma biometrinė charakteristika, naudojama žmonių identifikavimui ir tapatybės patvirtinimui, o USB atmintinėse ar nešiojamuosiuose kompiuteriuose integruoti pirštų atspaudų skaitytuvai jau nieko nebestebina. Kiekvienas piršto atspaudas gali būti aprašytas minutiae taškų matrica iš kurios būtų galima generuoti šifravimo raktą. Tačiau netgi to paties piršto atspaudai nėra identiški ir į tai reikia atsižvelgti. Šiame darbe pateikiamas vienas tiesioginių šifravimo raktų generavimo iš pirštų atspaudų metodas. Iš atspaudo suformuojama minutiae taškų matrica, iš jos suformuojami parametrai ir perduodami raktų generatoriams. Matricų formavimui panaudoti du produktai, realizuoti 8 generatoriai, formuojantys 64 ir 128 bitų ilgio šifravimo raktus. Sistema ištestuota su pasiruošta pirštų atspaudų duomenų baze, pateikti gauti rezultatai.
Only encrypted data can be treated as secure data and encryption is impossible without encryption key. One of the best known and widely used encryption keys is password, but the main its drawback is necessity to remember it. Biometrics may help to avoid this situation, because everyone has unique characteristics. But the main question is how to extract encryption key from biometric data. Fingerprints are well known biometric characteristic, used for people identification or authentication and fingerprint readers integrated into USB flash drives or laptops don’t cause surprise any more. Every fingerprint can be described using minutiae points’ matrix and from this matrix encryption key can be generated. But fingerprints of the same finger aren’t identical, so this must be kept in mind as well. In this research one method of direct encryption key generation from fingerprint is introduced. Minutiae matrix is structured from fingerprint image; parameters are formed and passed to encryption key generators. Two products were used for making matrix and eight generators were produced, generating encryption keys length of 64 and 128 bits. This system was tested with prepared fingerprint set and all the results are given.
APA, Harvard, Vancouver, ISO, and other styles
7

Currie, Dayna Frances. "Analysis of nine compound minutiae with respect to race, gender, and specific finger location." Thesis, Boston University, 2012. https://hdl.handle.net/2144/12337.

Full text
Abstract:
Thesis (M.S.)--Boston University PLEASE NOTE: Boston University Libraries did not receive an Authorization To Manage form for this thesis or dissertation. It is therefore not openly accessible, though it may be available by request. If you are the author or principal advisor of this work and would like to request open access for it, please contact us at open-help@bu.edu. Thank you.
The NAS report in 2009 brought to light a number of issues within the field of fingerprint identification resulting in a push for more research into the statistical side of fingerprint identification. (1) Previous research has focused mainly on the most commonly observed minutiae (points of variance) within the fingerprints such as ridge endings, bifurcations and dots, with less focus on compound minutiae, which consist of less common variations of the basic minutia types. (2-13) Nine different types of compound minutiae were chosen for analysis in this study: trifurcations, islands/short ridges, lakes/enclosures, bifurcations opposite a ridge ending, bridges, opposed bifurcations, deviated ridges, handshakes, and hooks/spurs. The fingerprints of one hundred individuals from five different racial/ethnic groups were examined in order to determine whether any correlations were observed between race, gender, or specific finger location and the numbers/type of compound minutiae observed. The data revealed that the largest percentage of total compound minutiae observed (30%) was on the fingerprints obtained from people with a White racial/ethnic background, followed by individuals coming from a White Hispanic background (22%). Islands were the minutia type observed most frequently (34%), followed closely by lakes (31 %); deviated ridges and trifurcations were observed the least (1 %). When the total amounts of compound minutiae were calculated with respect to finger location, the greatest amount of the minutiae points, about 30%, were located on thumbs and the least amount, about 12%, were located on little fingers. With respect to gender, the greatest amount of minutiae (57%) was located on the fingerprints of males. With the exception of lakes, all of the compound minutiae were observed more often on the fingerprints of males than on those of females. Based on Chi-Square analysis, correlations were determined between race/ethnicity and the occurrence of compound minutiae, between finger location and the occurrence of compound minutiae, and between gender and the occurrence of compound minutiae.
APA, Harvard, Vancouver, ISO, and other styles
8

Arakala, Arathi, and arathi arakala@ems rmit edu au. "Secure and Private Fingerprint-based Authentication." RMIT University. Mathematical and Geospatial Sciences, 2008. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20081128.102017.

Full text
Abstract:
This thesis studies the requirements and processes involved in building an authentication system using the fingerprint biometric, where the fingerprint template is protected during storage and during comparison. The principles developed in this thesis can be easily extended to authentication systems using other biometric modalities. Most existing biometric authentication systems store their template securely using an encryption function. However, in order to perform matching, the enrolled template must be decrypted. It is at this point that the authentication system is most vulnerable as the entire enrolled template is exposed. A biometric is irreplaceable if compromised and can also reveal sensitive information about an individual. If biometric systems are taken up widely, the template could also be used as an individual's digital identifier. Compromise in that case, violates an individual's right to privacy as their transactions in all systems where they used that compromised biometric can be tracked. Therefore securing a biometric template during comparison as well as storage in an authentication system is imperative. Eight different fingerprint template representation techniques, where templates were treated as a set of elements derived from the locations and orientations of fingerprint minutiae, were studied. Four main steps to build any biometric based authentication system were identified and each of the eight fingerprint template representations was inducted through the four steps. Two distinct Error Tolerant Cryptographic Constructs based on the set difference metric, were studied for their ability to securely store and compare each of the template types in an authentication system. The first construct was found to be unsuitable for a fundamental reason that would apply to all the template types considered in the research. The second construct did not have the limitation of the first and three algorithms to build authentication systems using the second construct were proposed. It was determined that minutiae-based templates had significant intra sample variation as a result of which a very relaxed matching threshold had to be set in the authentication system. The relaxed threshold caused the authentication systems built using the first two algorithms to reveal enough information about the stored templates to render them insecure. It was found that in cases of such large intra-sample variation, a commonality based match decision was more appropriate. One solution to building a secure authentication system using minutiae-based templates was demonstrated by the third algorithm which used a two stage matching process involving the second cryptographic construct and a commonality based similarity measure in the two stages respectively. This implementation was successful in securing the fingerprint template during comparison as well as storage, with minimal reduction in accuracy when compared to the matching performance without the cryptographic construct. Another solution is to use an efficient commonality based error tolerant cryptographic construct. This thesis lists the desirable characteristics of such a construct as existence of any is unknown to date. This thesis concludes by presenting good guidelines to evaluate the suitability of different cryptographic constructs to protect biometric templates of other modalities in an authentication system.
APA, Harvard, Vancouver, ISO, and other styles
9

Henriksson, Marcus. "Analys av fingeravtryck." Thesis, Linköping University, Department of Electrical Engineering, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1219.

Full text
Abstract:

This report describes a system for verification of fingerprints against a previous created template. It describes how and why a fingerprint image must be processed before it can be used to either identify or verify a person. The method is based on special features of a fingerprint, called minutiae points. The whole process from image to matching is described, every step in the process with image enhancement, binarization, thinning and how to find the minutiae points. Also what false minutiae points are, how they arise, why they deteriorate the result, and how to handle them, is discussed.

Finally a test of the system with a large number of fingerprints is presented, to see how good the system is according to security and reliability about not accepting prints from other fingers or reject the fingerprints, which are from the same finger as the template. Many proposals about how the performance and the security of the system can be improved are also presented.

APA, Harvard, Vancouver, ISO, and other styles
10

Skoupilová, Alena. "Rozpoznávání podobnosti otisků prstu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413028.

Full text
Abstract:
The main goal of this thesis is to introduce the meaning of identification and specific meaning of personal identification and mainly fingerprint identification. There is introduction to the meaning of biometrics as a key field for fingerprint recognition. Thesis also introduces principals and types of automatic processing and automatic detection of fingerprints. An existing and succesful methods are being described in the thesis and an automatic fingerprint identification alghoritm is being realized and described. Reability of the alghoritm is tested within experimental database.
APA, Harvard, Vancouver, ISO, and other styles
11

Hodulíková, Tereza. "Biometrická identifikace otisku prstu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-242031.

Full text
Abstract:
This master's thesis deals with fingerprint verification. The theoretical part consist of biometry identification systems and evaluating their reliability and robustness. After that we focus on fingerprints properties needed to identification. We mention several types of fingerprint sensors, which are generaly in public use. In practical part of thesis we deal with enhancement of fingeprint image and methods of identifications. At last we created software for fingeprint identification in programming environment Matlab.
APA, Harvard, Vancouver, ISO, and other styles
12

Casado, Ricardo Salvino. "Extração de minúcias em imagens de impressões digitais." Universidade de São Paulo, 2008. http://www.teses.usp.br/teses/disponiveis/18/18152/tde-15102008-135808/.

Full text
Abstract:
Este trabalho descreve um método desenvolvido para a extração de minúcias em imagens de impressões digitais, baseado na abordagem clássica de binarização da imagem. O método é composto por três módulos: módulo de pré-processamento, para o aumento da discriminação visual, módulo de extração de minúcias, e módulo de pós-processamento para a remoção de falsas minúcias. As imagens de impressões digitais foram obtidas da base de dados FVC2004 (Fingerprint Verification Competition), e incluem imagens sintéticas e reais. A validação dos testes foi feita através de métodos quantitativos de medida chamados sensibilidade e especificidade. Os melhores resultados do software implementado foram obtidos com as imagens sintéticas seguido das imagens adquiridas com sensor óptico. As imagens obtidas através de sensor térmico apresentaram diferença de resultado considerável em relação às imagens dos demais bancos, pelo fato de conterem maior quantidade de ruído.
In this research a method for minutiae extraction in fingerprints images, based on classical approach of image binarization, is presented. The method is composed by three main modules: preprocessing, minutiae detection and post-processing. It was used fingerprint images from FVC2004 database (Fingerprint Verification Competition) that includes synthetic and real images. The tests validation was made through quantitative methods of measurement called sensitivity and specificity. The best results obtained with the developed software were with synthetic images followed by the images acquired with optical sensor. The results obtained with the thermal sensor images were worse than the ones obtained with synthetic and real images, showing a considerable difference, because they contain more noise.
APA, Harvard, Vancouver, ISO, and other styles
13

Hlavatý, Matej. "Biometrická identifikace otisku prstu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-316819.

Full text
Abstract:
Projekt sa zaoberá spracovaním a porovnaním otlačkov prstov. Preberá obecné princípy biometrie a rôzne metódy analýzy otlačkov prstov. Navrhuje vlastné riešenie problému formou adaptívnych maskových operátorov na detekciu markantov a štatistické spracovanie výsledkov.
APA, Harvard, Vancouver, ISO, and other styles
14

Greening, Daniel John. "Art, landscape and material : subject into media." Thesis, University of Wolverhampton, 2010. http://hdl.handle.net/2436/299209.

Full text
Abstract:
A research investigation that illustrates the development of the European landscape tradition as an unbroken interactive and material movement, through discussion of artists from Annibale Carracci (1560-1609) to Richard Long (1945 –). The contribution of each artist within their respective epoch will be used to propose that the subject of landscape has become an actual creative medium, integral to and consistent with the external Plein-Air technique. Thus, presenting a ‘creative narrative’ from the observed into the articulated that will demonstrate how the examination and representation of actual landscapes have become physically used within creative presentations. The study uses key artworks that have been inspired by landscape to show the shift from documentation into interaction with the reality of the natural world. This entails the chronology of the investigation and commences with the concept of Ideal Landscape, established by Carracci, within the late 16th century, through the development of the Plein-Air tradition and culminating with particular emphasis on European landscape artists’ and movements since 1945 that have interacted with actual sites and natural materials: from the ideal to the actual. Furthermore, the European transfer and diffusion of interactive and material based landscape methods, including drawing and painting outside, the collection of organic items and photography, passed and developed from one generation to the next, informs a body of personal creative work. This is a 50/50 co-dependent strand used to illustrate the practical and creative discourses between practitioner and landscape, involving the articulation of actual land materials, found objects and Plein-Air excursions to the drawing locations of previous practitioners’, sketchbooks and journals. The insights provided, by the personal practice and associated theoretical position, aid the evaluation, analysis and description of the evolution of the creative methods inherent in the development of subject into media, but not presently described in historical accounts, therefore, presenting a Material Chronology and thus the original contribution of knowledge for this investigation.
APA, Harvard, Vancouver, ISO, and other styles
15

Wyant, Rafael Soares. "Implementação de verificações biométricas processadas em cartões inteligentes a multi-aplicações." Universidade do Estado do Rio de Janeiro, 2013. http://www.bdtd.uerj.br/tde_busca/arquivo.php?codArquivo=8139.

Full text
Abstract:
Conselho Nacional de Desenvolvimento Científico e Tecnológico
As biometrias vêm sendo utilizadas como solução de controle de acesso a diversos sistemas há anos, mas o simples uso da biometria não pode ser considerado como solução final e perfeita. Muitos riscos existem e não devem ser ignorados. A maioria dos problemas está relacionada ao caminho de transmissão entre o local onde os usuários requerem seus acessos e os servidores onde são guardados os dados biométricos capturados em seu cadastro. Vários tipos de ataques podem ser efetuados por impostores que desejam usar o sistema indevidamente. Além dos aspectos técnicos, existe o aspecto social. É crescente a preocupação do usuário tanto com o armazenamento quanto o uso indevido de suas biometrias, pois é um identificador único e, por ser invariável no tempo, pode ser perdido para sempre caso seja comprometido. O fato de que várias empresas com seus diferentes servidores guardarem as biometrias está causando incomodo aos usuários, pois as torna mais suscetíveis à ataques. Nesta dissertação, o uso de cartões inteligentes é adotado como possível solução para os problemas supracitados. Os cartões inteligentes preparados para multi-aplicações são usados para realizar as comparações biométricas internamente. Dessa forma, não seria mais necessário utilizar diversos servidores, pois as características biométricas estarão sempre em um único cartão em posse do dono. Foram desenvolvidas e implementadas três diferentes algoritmos de identificação biométrica utilizando diferentes características: impressão digital, impressão da palma da mão e íris. Considerando a memória utilizada, tempo médio de execução e acurácia, a biometria da impressão da palma da mão obteve os melhores resultados, alcançando taxas de erro mínimas e tempos de execução inferiores a meio segundo.
The biometrics have been used as a solution for access control systems for many years, but the simple use of biometrics can not be considered as final and perfect solution. There are many risks that should not be ignored. Most problems are related to the transmission path between the system where the users require access and the servers where the captured biometric data is stored. Various types of attacks can be made by impostors who want to use the system improperly. Besides the technical aspects, there is the social aspect. There is a growing concern of users about both data storage and the misuse of their biometrics, which is an unique identifier and, being invariant in time, may be lost forever if compromised. The fact that several companies keep their biometric data in different servers is causing discomfort to users because it makes their biometric data more susceptible to attacks. In this dissertation, the use of smart cards is adopted as a possible solution to the above problems. Smart cards prepared for multi-applications are used to perform biometric comparisons internally. Thus, it would not be necessary to use different servers as the biometric features will always be kept on a single card in the possession of the owner. In this work, three different algorithms using different biometric identification characteristics are developed and implemented: fingerprint, palmprint and iris. Considering the used memory, average execution time and accuracy, the implementation of palmprint verification achieved the best results, allowing minimum error rates and processing time of at most 0.5s.
APA, Harvard, Vancouver, ISO, and other styles
16

Falguera, Fernanda Pereira Sartori [UNESP]. "Fusão de métodos baseados em minúcias e em cristas para reconhecimento de impressões digitais." Universidade Estadual Paulista (UNESP), 2008. http://hdl.handle.net/11449/98675.

Full text
Abstract:
Made available in DSpace on 2014-06-11T19:29:40Z (GMT). No. of bitstreams: 0 Previous issue date: 2008-07-04Bitstream added on 2014-06-13T19:38:57Z : No. of bitstreams: 1 falguera_fps_me_sjrp.pdf: 3832818 bytes, checksum: 1ca4e6b68ff66693475c6e5caed03e88 (MD5)
Biometria refere-se ao uso de características físicas (impressões digitais, íris, retina) ou comportamentais (assinatura, voz) para a identificação humana. As impressões digitais são formadas por cristas e minúcias. As cristas são linhas distribuídas paralelamente com uma orientação e um espaçamento característico e as minúcias representam os vários modos pelos quais uma crista pode se tornar descontínua. Graças a sua universalidade, unicidade e permanência, as impressões digitais tornaram-se as características biométricas mais amplamente utilizadas. Entretanto, considerar o reconhecimento automático de impressões digitais um problema totalmente resolvido é um erro muito comum. Nenhum sistema de reconhecimento de impressões digitais proposto até hoje é infalível, nenhum garante taxas de erro nulas. Imagens de baixa qualidade e com pequena área de sobreposição entre a imagem template e a imagem de consulta ainda representam um desafio para os métodos de reconhecimento de impressões digitais mais utilizados, os métodos baseados no casamento de pontos de minúcias. Uma das maneiras de superar as limitações e melhorar a acurácia de um sistema biométrico é o uso da multibiometria, isto é, a combinação de diferentes tipos de informação em um sistema de reconhecimento biométrico. Neste contexto, esta dissertação de mestrado objetiva aprimorar a acurácia dos sistemas de reconhecimento de impressões digitais por meio da fusão de métodos baseados em minúcias e em cristas. Para tanto, foram implementadas técnicas de fusão no nível de pontuação, classificação e decisão. No nível de pontuação, a fusão propiciou uma redução na taxa de erro igual (EER) de 42,53% em relação ao método mais preciso. Para o nível de classificação, a fusão significou um aumento de 75% na taxa de recuperação correta...
Biometrics refers to the use of physical (fingerprints, iris, retina) or behavioral (signature, voice) characteristics to determine the identity of a person. Fingerprints are formed by ridges and minutiae. The ridges are lines distributed in parallel with an orientation and a characteristic spacing and the minutiae represent the several ways a ridge can become discontinued. As to its universality, uniqueness and permanence, the fingerprints became the most widely used biometric characteristic. However, it is a common mistake to consider the automatic fingerprint recognition as a totally solved problem. No fingerprint recognition system proposed until now is infallible, none of them guarantee null error rates. Poor quality images and when just a small area of overlap between the template and the query images exists are still a complex challenge to the most used fingerprint recognition methods, the methods based on minutiae points matching. One of the possibilities to overcome the limitations and improve the accuracy of a biometric system is the use of multibiometrics, the combination of different kinds of information in a biometric system. In this context, this master thesis aims to improve the accuracy of fingerprint recognition systems through the fusion of minutiae based and ridge based methods. To achieve this, fusion techniques on score, rank and decision levels were implemented. For the score level, the fusion lead to a reduction of the Equal Error Rate to 42.53% compared to the most precise method. For the rank level, the fusion meant an increase of 75% in the Correct Retrieval Rate. And, in the decision level fusion the Recognition Rate changed from 99.25% to 99.75%. The results have demonstrated that the fusion of minutiae based and ridge based methods can represent a significant accuracy improvement for the fingerprint recognition systems.
APA, Harvard, Vancouver, ISO, and other styles
17

Blommé, Johan. "Evaluation of biometric security systems against artificial fingers." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1145.

Full text
Abstract:

Verification of users’ identities are normally carried out via PIN-codes or ID- cards. Biometric identification, identification of unique body features, offers an alternative solution to these methods.

Fingerprint scanning is the most common biometric identification method used today. It uses a simple and quick method of identification and has therefore been favored instead of other biometric identification methods such as retina scan or signature verification.

In this report biometric security systems have been evaluated based on fingerprint scanners. The evaluation method focuses on copies of real fingers, artificial fingers, as intrusion method but it also mentions currently used algorithms for identification and strengths and weaknesses in hardware solutions used.

The artificial fingers used in the evaluation were made of gelatin, as it resembles the surface of human skin in ways of moisture, electric resistance and texture. Artificial fingers were based on ten subjects whose real fingers and artificial counterpart were tested on three different fingerprint scanners. All scanners tested accepted artificial fingers as substitutes for real fingers. Results varied between users and scanners but the artificial fingers were accepted between about one forth and half of the times.

Techniques used in image enhancement, minutiae analysis and pattern matching are analyzed. Normalization, binarization, quality markup and low pass filtering are described within image enhancement. In minutiae analysis connectivity numbers, point identification and skeletonization (thinning algorithms) are analyzed. Within pattern matching, direction field analysis and principal component analysis are described. Finally combinations of both minutiae analysis and pattern matching, hybrid models, are mentioned.

Based on experiments made and analysis of used techniques a recommendation for future use and development of fingerprint scanners is made.

APA, Harvard, Vancouver, ISO, and other styles
18

Polehňa, Dominik. "Útok hrubou silou na přístupový systém s pomocí syntetických otisků prstů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2020. http://www.nusl.cz/ntk/nusl-417209.

Full text
Abstract:
The work deals with the resistance of the VeriFinger comparison algorithm to synthetic fingerprints. The basics of fingerprints, comparison algorithms and synthetic fingerprint generators are gradually analyzed. In total, three experiments were designed to test the resistance of the algorithm using synthetic fingerprints. An application using the VeriFinger algorithm was implemented to evaluate individual experiments. A total of 2 800 000 synthetic fingerprints were generated across all experiments. The first experiment showed that random fingerprint generation was not effective for real fingerprints, but was somewhat sufficient for synthetic fingerprints. The second experiment proved that comparison and the comparison score could be used to estimate the class of the identified fingerprint, and in the third experiment, by narrowing the generation to one class, it raised the total number of matched fingerprints. The results of individual experiments were written and their possible extension was suggested.
APA, Harvard, Vancouver, ISO, and other styles
19

Mohamed, Abdul Cader Akmal Jahan. "Finger biometric system using bispectral invariants and information fusion techniques." Thesis, Queensland University of Technology, 2019. https://eprints.qut.edu.au/134464/1/Akmal%20Jahan_Mohamed%20Abdul%20Cader_Thesis.pdf.

Full text
Abstract:
Contactless hand biometric systems are better accepted than contact prints as they are hygienic and accelerate data acquisition. This research is one of the few investigating contactless biometrics of the full hand by proposing a novel algorithm based on ridge orientation information along lines connecting key points, higher order spectral features, and fusion. It was investigated with contactless finger images acquired from 81 users, and found to be robust to hand orientation and image size, and provide acceptable performance using two fingers with fusion. The algorithm has potential to use in high throughput applications where contact sensing may be slow.
APA, Harvard, Vancouver, ISO, and other styles
20

Medeiros, Luciano Xavier. "Extração de características de imagens de impressão digital." Universidade Federal de Uberlândia, 2006. https://repositorio.ufu.br/handle/123456789/14544.

Full text
Abstract:
The fingerprints are lines present on fingers of each human and they are unique, in other words, there are not two people with the same distribution of lines on their fingers. For this reason, it has been used for identification of people for many purposes, such as to check the entrancy and exit of workers in a company, the identify criminals and to restrict the access of people to restrict areas of extreme security. The proposal of this work is to improve the characteristic extraction algorithm of fingerprint developed by Jain and others. The goal of this work is to accelerate the processing time in orientation field estimation, in order to get a better quality of images, resulting of binarization process and to decrease the number of spurious minutiae on the images. The time processing of orientation field estimation improved in these work uses the commutative propriety is smaller than the same estimation wich does not use this propriety in 90%. The method of ridges extration developed in this work uses the DDA algorithm, and results in better quality images. Due to this improviment got in binarization process and the ridges break removing, the detection minutiae algorithm implemented in this work find a small quantity of spurious minutae present in the fingerprint images.
As impressões digitais são as linhas presentes nos dedos de cada ser humano e essas são únicas para cada um, ou seja, não existem duas pessoas que possuem a mesma forma com que as linhas da impressão se dispõem em seus dedos. Por esse motivo é que ela vem sendo utilizada para a identificação de pessoas para várias finalidades, como por exemplo, o controle de ponto dos funcionários de uma empresa, a identificação de um criminoso e o acesso de pessoas a áreas restritas de extrema segurança. A proposta deste trabalho é obter melhoramentos no algoritmo de extração de características de impressões digitais desenvolvido por Jain e outros [1]. Os objetivos desta dissertação são: melhorar o tempo de processamento no cálculo da orientação de campo, obter uma melhor qualidade das imagens resultantes no processo de binarização e diminuir o número de minúcias espúrias nessas imagens. O cálculo da orientação de campo aperfeiçoado neste trabalho utiliza a propriedade da comutação e resultou em uma redução no tempo de processamento em torno de 90% em relação ao mesmo cálculo que não utiliza essa propriedade. O método de extração das saliências desenvolvido nesta dissertação utiliza o algoritmo DDA, e resulta em imagens de melhor qualidade. Devido a esse melhoramento obtido no processo de binarização e a remoção de falhas nas saliências, o algoritmo de detecção de minúcias implementado neste trabalho encontra uma menor quantidade de minúcias espúrias presentes nas imagens de impressão digital.
Mestre em Ciências
APA, Harvard, Vancouver, ISO, and other styles
21

Falguera, Fernanda Pereira Sartori. "Fusão de métodos baseados em minúcias e em cristas para reconhecimento de impressões digitais /." São José do Rio Preto : [s.n.], 2008. http://hdl.handle.net/11449/98675.

Full text
Abstract:
Orientador: Aparecido Nilceu Marana
Banca: Fátima de Lourdes dos Santos Nunes Marques
Banca: Marcos Antônio Cavenaghi
Resumo: Biometria refere-se ao uso de características físicas (impressões digitais, íris, retina) ou comportamentais (assinatura, voz) para a identificação humana. As impressões digitais são formadas por cristas e minúcias. As cristas são linhas distribuídas paralelamente com uma orientação e um espaçamento característico e as minúcias representam os vários modos pelos quais uma crista pode se tornar descontínua. Graças a sua universalidade, unicidade e permanência, as impressões digitais tornaram-se as características biométricas mais amplamente utilizadas. Entretanto, considerar o reconhecimento automático de impressões digitais um problema totalmente resolvido é um erro muito comum. Nenhum sistema de reconhecimento de impressões digitais proposto até hoje é infalível, nenhum garante taxas de erro nulas. Imagens de baixa qualidade e com pequena área de sobreposição entre a imagem template e a imagem de consulta ainda representam um desafio para os métodos de reconhecimento de impressões digitais mais utilizados, os métodos baseados no casamento de pontos de minúcias. Uma das maneiras de superar as limitações e melhorar a acurácia de um sistema biométrico é o uso da multibiometria, isto é, a combinação de diferentes tipos de informação em um sistema de reconhecimento biométrico. Neste contexto, esta dissertação de mestrado objetiva aprimorar a acurácia dos sistemas de reconhecimento de impressões digitais por meio da fusão de métodos baseados em minúcias e em cristas. Para tanto, foram implementadas técnicas de fusão no nível de pontuação, classificação e decisão. No nível de pontuação, a fusão propiciou uma redução na taxa de erro igual (EER) de 42,53% em relação ao método mais preciso. Para o nível de classificação, a fusão significou um aumento de 75% na taxa de recuperação correta... (Resumo completo, clicar acesso eletrônico abaixo)
Abstract: Biometrics refers to the use of physical (fingerprints, iris, retina) or behavioral (signature, voice) characteristics to determine the identity of a person. Fingerprints are formed by ridges and minutiae. The ridges are lines distributed in parallel with an orientation and a characteristic spacing and the minutiae represent the several ways a ridge can become discontinued. As to its universality, uniqueness and permanence, the fingerprints became the most widely used biometric characteristic. However, it is a common mistake to consider the automatic fingerprint recognition as a totally solved problem. No fingerprint recognition system proposed until now is infallible, none of them guarantee null error rates. Poor quality images and when just a small area of overlap between the template and the query images exists are still a complex challenge to the most used fingerprint recognition methods, the methods based on minutiae points matching. One of the possibilities to overcome the limitations and improve the accuracy of a biometric system is the use of multibiometrics, the combination of different kinds of information in a biometric system. In this context, this master thesis aims to improve the accuracy of fingerprint recognition systems through the fusion of minutiae based and ridge based methods. To achieve this, fusion techniques on score, rank and decision levels were implemented. For the score level, the fusion lead to a reduction of the Equal Error Rate to 42.53% compared to the most precise method. For the rank level, the fusion meant an increase of 75% in the Correct Retrieval Rate. And, in the decision level fusion the Recognition Rate changed from 99.25% to 99.75%. The results have demonstrated that the fusion of minutiae based and ridge based methods can represent a significant accuracy improvement for the fingerprint recognition systems.
Mestre
APA, Harvard, Vancouver, ISO, and other styles
22

LABATI, R. DONIDA. "CONTACTLESS FINGERPRINT BIOMETRICS: ACQUISITION, PROCESSING, AND PRIVACY PROTECTION." Doctoral thesis, Università degli Studi di Milano, 2013. http://hdl.handle.net/2434/217562.

Full text
Abstract:
Biometrics is defined by the International Organization for Standardization (ISO) as “the automated recognition of individuals based on their behavioral and biological characteristics” Examples of distinctive features evaluated by biometrics, called biometric traits, are behavioral characteristics like the signature, gait, voice, and keystroke, and biological characteristics like the fingerprint, face, iris, retina, hand geometry, palmprint, ear, and DNA. The biometric recognition is the process that permits to establish the identity of a person, and can be performed in two modalities: verification, and identification. The verification modality evaluates if the identity declared by an individual corresponds to the acquired biometric data. Differently, in the identification modality, the recognition application has to determine a person's identity by comparing the acquired biometric data with the information related to a set of individuals. Compared with traditional techniques used to establish the identity of a person, biometrics offers a greater confidence level that the authenticated individual is not impersonated by someone else. Traditional techniques, in fact, are based on surrogate representations of the identity, like tokens, smart cards, and passwords, which can easily be stolen or copied with respect to biometric traits. This characteristic permitted a wide diffusion of biometrics in different scenarios, like physical access control, government applications, forensic applications, logical access control to data, networks, and services. Most of the biometric applications, also called biometric systems, require performing the acquisition process in a highly controlled and cooperative manner. In order to obtain good quality biometric samples, the acquisition procedures of these systems need that the users perform deliberate actions, assume determinate poses, and stay still for a time period. Limitations regarding the applicative scenarios can also be present, for example the necessity of specific light and environmental conditions. Examples of biometric technologies that traditionally require constrained acquisitions are based on the face, iris, fingerprint, and hand characteristics. Traditional face recognition systems need that the users take a neutral pose, and stay still for a time period. Moreover, the acquisitions are based on a frontal camera and performed in controlled light conditions. Iris acquisitions are usually performed at a distance of less than 30 cm from the camera, and require that the user assume a defined pose and stay still watching the camera. Moreover they use near infrared illumination techniques, which can be perceived as dangerous for the health. Fingerprint recognition systems and systems based on the hand characteristics require that the users touch the sensor surface applying a proper and uniform pressure. The contact with the sensor is often perceived as unhygienic and/or associated to a police procedure. This kind of constrained acquisition techniques can drastically reduce the usability and social acceptance of biometric technologies, therefore decreasing the number of possible applicative contexts in which biometric systems could be used. In traditional fingerprint recognition systems, the usability and user acceptance are not the only negative aspects of the used acquisition procedures since the contact of the finger with the sensor platen introduces a security lack due to the release of a latent fingerprint on the touched surface, the presence of dirt on the surface of the finger can reduce the accuracy of the recognition process, and different pressures applied to the sensor platen can introduce non-linear distortions and low-contrast regions in the captured samples. Other crucial aspects that influence the social acceptance of biometric systems are associated to the privacy and the risks related to misuses of biometric information acquired, stored and transmitted by the systems. One of the most important perceived risks is related to the fact that the persons consider the acquisition of biometric traits as an exact permanent filing of their activities and behaviors, and the idea that the biometric systems can guarantee recognition accuracy equal to 100\% is very common. Other perceived risks consist in the use of the collected biometric data for malicious purposes, for tracing all the activities of the individuals, or for operating proscription lists. In order to increase the usability and the social acceptance of biometric systems, researchers are studying less-constrained biometric recognition techniques based on different biometric traits, for example, face recognition systems in surveillance applications, iris recognition techniques based on images captured at a great distance and on the move, and contactless technologies based on the fingerprint and hand characteristics. Other recent studies aim to reduce the real and perceived privacy risks, and consequently increase the social acceptance of biometric technologies. In this context, many studies regard methods that perform the identity comparison in the encrypted domain in order to prevent possible thefts and misuses of biometric data. The objective of this thesis is to research approaches able to increase the usability and social acceptance of biometric systems by performing less-constrained and highly accurate biometric recognitions in a privacy compliant manner. In particular, approaches designed for high security contexts are studied in order improve the existing technologies adopted in border controls, investigative, and governmental applications. Approaches based on low cost hardware configurations are also researched with the aim of increasing the number of possible applicative scenarios of biometric systems. The privacy compliancy is considered as a crucial aspect in all the studied applications. Fingerprint is specifically considered in this thesis, since this biometric trait is characterized by high distinctivity and durability, is the most diffused trait in the literature, and is adopted in a wide range of applicative contexts. The studied contactless biometric systems are based on one or more CCD cameras, can use two-dimensional or three-dimensional samples, and include privacy protection methods. The main goal of these systems is to perform accurate and privacy compliant recognitions in less-constrained applicative contexts with respect to traditional fingerprint biometric systems. Other important goals are the use of a wider fingerprint area with respect to traditional techniques, compatibility with the existing databases, usability, social acceptance, and scalability. The main contribution of this thesis consists in the realization of novel biometric systems based on contactless fingerprint acquisitions. In particular, different techniques for every step of the recognition process based on two-dimensional and three-dimensional samples have been researched. Novel techniques for the privacy protection of fingerprint data have also been designed. The studied approaches are multidisciplinary since their design and realization involved optical acquisition systems, multiple view geometry, image processing, pattern recognition, computational intelligence, statistics, and cryptography. The implemented biometric systems and algorithms have been applied to different biometric datasets describing a heterogeneous set of applicative scenarios. Results proved the feasibility of the studied approaches. In particular, the realized contactless biometric systems have been compared with traditional fingerprint recognition systems, obtaining positive results in terms of accuracy, usability, user acceptability, scalability, and security. Moreover, the developed techniques for the privacy protection of fingerprint biometric systems showed satisfactory performances in terms of security, accuracy, speed, and memory usage.
APA, Harvard, Vancouver, ISO, and other styles
23

Kubiš, Michal. "Snímání otisku prstu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218659.

Full text
Abstract:
Fingerprints are the oldest and most used form of biometric identification. A critical step is reliable extract minutiae from the fingerprint images. However fingerprint images are rarely of perfect quality, they may be degraded and corrupted due to natural variations in skin and sensing conditions. Thus, image enhancement techniques are necessary prior to minutiae extraction. This work includes implementation of three techniques for fingerprint image enhancement, minutiae extraction and consturction of fingerprint reading device. Experiments are realized with two sets of fingerprints to evaluate the performance of implemented techniques.
APA, Harvard, Vancouver, ISO, and other styles
24

Deng, Huimin. "Robust minutia-based fingerprint verification." Click to view the E-thesis via HKUTO, 2006. http://sunzi.lib.hku.hk/hkuto/record/B37036427.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Deng, Huimin, and 鄧惠民. "Robust minutia-based fingerprint verification." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2006. http://hub.hku.hk/bib/B37036427.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Kazík, Martin. "Zpracování otisků prstů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2011. http://www.nusl.cz/ntk/nusl-218978.

Full text
Abstract:
This diploma thesis deals with the identification of persons by their fingerprints. In the beginning, there is a brief overview of biometric methods. The issue of fingerprints and their automatic processing is very extensive and addresses a large amount of literature. This work describes the various stages processing fingerprints from receiving a fingerprint scan through the methods of enhancing fingerprint, binarization, the detection of minutiae to compare two fingerprints. After a short introduction of biometric techniques is briefly introduced the history of fingerprints as an instrument for identification of persons. Subsequently, there is the description of problems of obtaining fingerprints from older methods that require the transmission medium, to methods of obtaining fingerprints directly into a digital format. There are described basic principles of sensors and the principle of their function. Next part deals with methods of processing digital fingerprint images. These are methods for fingerprint image enhancement, methods for image thresholding, thinning of ridge lines, detection of global and local characteristics of the fingerprint. The next section introduces the basic methods of comparison and classification of fingerprints. The practical part describes the specific implementation of fingerprint processing chain. For each processing stage is implemented one selected method. The result is an application that allows displaying the output of each phase, the comparison of fingerprints 1:1 and also finds a fingerprint in the database, by comparing one fingerprint with many.
APA, Harvard, Vancouver, ISO, and other styles
27

Kovář, Martin. "Snímač otisku prstu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-221330.

Full text
Abstract:
This master’s thesis deals with the issue of scanning human fingerprints, which is currently very topical and represents the most widespread biometric technology. The theoretical part of the work acquaints the reader with basics of dactyloscopy and biometrics and concerns technologies used for fingerprinting, image preprocessing methods and commercially available contactless optical scanners. The practical part is a realisation of a contactless optical scanner based on a Raspberry Pi minicomputer, implementation of preprocessing algorithms in Python and testing of the device from the perspective of image quality.
APA, Harvard, Vancouver, ISO, and other styles
28

Jayapal, Ranjith. "Biometric encryption system for increased security." UNF Digital Commons, 2017. http://digitalcommons.unf.edu/etd/746.

Full text
Abstract:
Security is very important in present day life. In this highly-interconnected world, most of our daily activities are computer based, and the data transactions are protected by passwords. These passwords identify various entities such as bank accounts, mobile phones, etc. People might reuse the same password, or passwords related to an individual that can lead to attacks. Indeed, remembering several passwords can become a tedious task. Biometrics is a science that measures an individual’s physical characteristics in a unique way. Thus, biometrics serves as a method to replace the cumbersome use of complex passwords. Our research uses the features of biometrics to efficiently implement a biometric encryption system with a high level of security.
APA, Harvard, Vancouver, ISO, and other styles
29

Chuez, Panta Juan Carlos, Suyo Alyson Michelle Najwa Farromeque, Barron Lengua Javier Guzman, Bayona Valeria Ximena Pool, and Guerrero Adrian Miguel Tello. "Proyecto Five Minute Brownies." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2021. http://hdl.handle.net/10757/656940.

Full text
Abstract:
El presente trabajo de investigación describe a detalle la idea de negocio "Five Minute Brownies" marca creada para la producción y comercialización de premezclas para brownies en presentaciones personales de 75 gr. cuyo propósito es ofrecer practicidad e inmediatez para satisfacer un antojo de brownie preparado con insumos de alta calidad, para un segmento de clientes específico, amantes del chocolate que consumen frecuentemente este tipo de postres y que manejan sus redes sociales personales. Nuestra marca presenta ventajas competitivas al ofrecer presentaciones personales de 75gr. que se adaptan a las tendencias de consumo actuales, los mug cakes, esto hace que se diferencie de las premezclas ya existentes en el mercado. Asimismo, cuenta con un servicio de atención al cliente personalizado vía redes sociales, de modo que el cliente tenga una experiencia agradable desde que solicita el producto hasta que lo recibe. Para lograr poner en marcha el proyecto, se analizó de forma exhaustiva la industria, de modo que pueda obtenerse el perfil del consumidor, posibles proveedores, competidores, entre otros factores. Además, fue preciso desarrollar diversos planes para hacerlo posible, entre los cuales se encuentra el Plan Estratégico, Plan de Operaciones, Plan de Recursos Humanos, Plan de Marketing y finalmente, un Plan financiero. Dentro de estos planes se encuentran detalladas estrategias imprescindibles para que el proyecto sea viable. Gracias a estas proyecciones, se espera que a largo plazo se puedan abrir locales para la atención presencial.
The present work talks about the business idea "Five Minute Brownies", brand who was created for the production and commercialization of premixes for brownies in personal presentations of 75 gr. whose purpose is to offer practicality and immediacy to satisfy a craving for a brownie prepared with high-quality ingredients, for a specific customer segment, chocolate lovers who frequently consume this type of dessert and who manage their personal social networks. Our brand has competitive advantages by offering personal presentations of 75gr. that adapt to current consumer trends, mug cakes, this makes it different from premixes already on the market. Otherwise, it has a personalized customer service via social networks, so that the customer has a satisfying experience from the moment they request the product until they receive it. In order to get the project started, the industry was exhaustively analyzed, so that the profile of the consumer, possible suppliers, competitors, among other factors, can be obtained. In addition, it was necessary to prepare a lot of plans to make it possible, among which is the Strategic Plan, Operations Plan, Human Resources Plan, Marketing Plan and finally, a Financial Plan. Within these plans are detailed essential strategies for the project to be viable. Thanks to these projections, it is expected that in the long term it will be possible to open premises for face-to-face care.
Trabajo de investigación
APA, Harvard, Vancouver, ISO, and other styles
30

CARDOSO, SANDRA CANTON. "DETECTING AND SUBSTUTING DISCONTINUITIES IN MINUTE-BY-MINUTE LOAD DATA VIA BAYES FACTOR." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 1999. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=7462@1.

Full text
Abstract:
COORDENAÇÃO DE APERFEIÇOAMENTO DO PESSOAL DE ENSINO SUPERIOR
No Centro Nacional de Operação dos Sistemas - CNOS, órgão da Eletrobrás, encarregado de controlar o sistema elétrico brasileiro, localizado em Brasília, a varredura é feita de 20 em 20s e depois agregada para o minuto. Na transmissão dos dados há muitos erros de medidas acarretando descontinuidades visíveis. Estes erros podem ser causados por problemas na transmissão dos dados ou problema físico da medida em si. O objetivo desta dissertação é a implementação de um sistema que detecte e corrija estas descontinuidades nas séries de carga minuto a minuto do CNOS via Fator de Bayes.
In the National Center for System Operation (CNOS), the Eletrobrás organ which controls the Brazilian electrical system, readings of load demand are taken every 20 seconds, and then integrated over the minute, to provide ninute-to-minute data. These data are then radio- transmitted via satellite. Many errors occur during the reading or the transmission, and so the data series contains many missing values (which appear as discontinuities in the graph of the series). In this paper, we propose a system that detects and corrects automatically these errors in the demand data, by means of a Bayesian approach using the Bayes factor.
APA, Harvard, Vancouver, ISO, and other styles
31

Polaha, Jodi. "Repurposing Your 50-Minute Skills for the 15-Minute Session in Primary Care." Digital Commons @ East Tennessee State University, 2016. https://dc.etsu.edu/etsu-works/6666.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Busin, Carmen Silvia. "Estudo citogenetico comparativo de Pseudis minuta e de P. sp. (aff. minuta) (Anura, Pseudidae)." [s.n.], 2000. http://repositorio.unicamp.br/jspui/handle/REPOSIP/317979.

Full text
Abstract:
Orientador: Shirlei Maria Recco-Pimentel
Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Biologia
Made available in DSpace on 2018-07-28T15:41:45Z (GMT). No. of bitstreams: 1 Busin_CarmenSilvia_M.pdf: 1966873 bytes, checksum: 3b435fc71d2ce9d0dc597abe0c856497 (MD5) Previous issue date: 2000
Resumo: A família Pseudidae inclui os gêneros Pseudis e Lysapsus, com origem recente na América do Sul e com distribuição no sul e sudeste do Brasil, no Uruguai e na Argentina. o gênero Pseudis, por apresentar singularidades de morfologia e não apresentar afinidade com nenhuma das demais rãs, intrigou durante muito tempo os zoólogos, motivando sucessivas inclusões em diferentes famílias. Pseudis minuta foi anteriormente denominada Lysapsus mantidactylus por apresentar caracteristicas dos dois gêneros. No Estado do Rio Grande do Sul, em Tainhas, ocorre uma população, aqui denominada de Pseudis aff minuta, que difere de P. minuta por apresentar indivíduos mais robustos e pequena diferença na vocalização. Neste trabalho, foi realizada a análise citogenética de espécimes de P. afI minuta, de Tainhas, e de indivíduos de outras duas populações de P. minuta, provenientes de São Jerônimo e Eldorado do Sul, (RS). As preparações cromossômicas, obtidas por suspensão de células de epitélio intestinal e testículos, foram submetidas à coloração com Giemsa, bandamento C e Ag-NOR. As populações de São Jerônimo e Eldorado do Sul apresentaram 2n = 24 cromossomos, classificados como metacêntricos, submetacêntricos e subtelocêntricos. Blocos heterocromáticos foram localizados centromericamente em todos os cromossomos, além de dois segmentos intersticiais nos braços curtos dos cromossomos 2 e um nos braços curtos do par 4. Os homólogos 7 apresentaram blocos heterocromáticos subtelocêntricos nos braços longos, coincidindo com a NOR ativa. A população de Tainhas apresentou 2n = 28 cromossomos, com quatro pares adicionais de cromossomos telocêntricos. Blocos heterocromáticos foram localizados em todas as regiões centroméricas. Além disso, os cromossomos do par 1 apresentaram dois segmentos intersticiais nos braços curtos; o par 9, telocêntrico, um segmento intersticial, e o par 5 apresentou blocos heterocromáticos subtelocêntricos nos braços longos, coincidindo com a NOR ativa. Unindo-se os pares telocêntricos 6/7 e os pares 8/9 da população de Tainhas, obteve-se um cariótipo 2n = 24 semelhante ao das outras duas populações. Comparando-se esse cariótipo artificialmente montado aos das outras duas populações verificou-se uma coincidência de localização de algumas bandas heterocromáticas intersticiais e da NOR, embora a população de Tainhas apresentasse maior quantidade de heterocromatina. Estes resultados sugerem uma origem comum e recente para os dois tipos de cariótipos observados. Há evidências de que a diferenciação desses cariótipos possa ter ocorrido por rearranjos cromossômicos do tipo fissão e por adição de heterocromatina. Os dados confirmam que a população de Tainhas, 2n = 28, deve representar uma nova espécie, o que está de acordo com a análise morfológica e de canto feita por outros pesquisadores
Abstract: The family Pseudidae includes the genera Pseudis and Lysapsus, and is widely distributed in the south, southeastern and central regions of Brazil, as welI as in Uruguay and Argentina. In the present study a cytogenetic analysis was done of two populations of Pseudis minuta occurring in São Jerônimo and Eldorado do Sul, Rio Grande do Sul, Brazil, and a population of closely related animaIs, Pseudis aff minuta, occurring in Tainhas, RS. The later are larger than P. minuta individuaIs and have a slightly different calI. Chromosome preparations obtained from a suspension of intestinal and testis celIs were stained with Giemsa solution or processed for C-banding and NOR detection. Specimens from São Jerônimo and Eldorado do Sul had the same karyotype with 2n=24 chromosomes. The centromeric regions of alI the chromosomes contained C-banded heterochromatin. Two interstitial bands were also observed in the short arms of chromosomes 2 and 4. Chromosome pair 7 had a subtelocentric band on the long arm coincident with an active NOR region. AnimaIs from Tainhas population had 2n=28 chromosomes, with four additional pairs of telocentric chromosomes. Heterochromatic blocks were observed in all centromeric regions. In addition, pair 1 had two distinct interstitial C-bands on the short arms and the telocentric pair 9 had one C-bando In pair 5, the heterochromatic block of the long arm was coincident with the NOR. Combining the telocentric pairs 6 + 7 and 8 + 9 of P. aff minuta yielded a karyotype with 2n=24 chromosomes, similar to that of P minuta. Organized as such, the similarities included the same chromosome number, a similar chromosome morphology, and similar localization of some interstitial heterochomatic bands and NOR. However, there were differences in the amount of heterochromatin, which was larger in the Tainhas population. These findings suggest a common origin for these two karyotypes and that centric fission and heterochromatin addition have been involved in their differentiation. The cytogenetic results indicate that the population from Tainhas with 2n=28 chromosomes, is na undescribed species
Mestrado
Biologia Celular
Mestre em Biologia Celular e Estrutural
APA, Harvard, Vancouver, ISO, and other styles
33

Saldin, Tamiko K. "Assessing Endothelial Dysfunction Estimating the Differences Between 3 Minute and 5 Minute Reactive Hyperemia." DigitalCommons@CalPoly, 2019. https://digitalcommons.calpoly.edu/theses/1984.

Full text
Abstract:
The purpose of this study was to define a lower standard cuff occlusion time to induce reactive hyperemia in assessing endothelial dysfunction. In this study, strong evidence was found by a novel technique that used oscillometric methods, which supported that 3 minute reactive hyperemia was sufficient to elicit a significant difference in arterial compliance from baseline. Twenty healthy Cal Poly students were assessed, (n=12 female, n=8 male) aged 22 years old with a standard deviation of 2.04 years. Arterial compliance was estimated by measuring the peak-to-peak oscillations for baseline, 3 minute reactive hyperemia, and 5 minute reactive hyperemia tests, with the result being statistical evidence of an increase in arterial compliance after 3 minutes of cuff occlusion compared to baseline. The peak-to-peak mean for the 3 minute reactive hyperemia test was significantly greater than the baseline peak-to-peak mean with p-values less than 0.0001. These results support that 3 minute reactive hyperemia is sufficient to assess endothelial dysfunction using oscillometry techniques. Endothelial dysfunction is the most significant predictor of a major adverse cardiovascular event, so this test can be used as an early detection tool for cardiovascular disease and allow patients to find treatment before irreversible damage is done to the body. Implementing this test into routine doctor checkups has the potential to have a significant effect on cardiovascular disease, which is the leading cause of death globally. The currently accepted clinical benchmark performed in hospitals uses high-frequency ultrasound with a standard cuff occlusion time of 5 minutes. Although noninvasive, 5 minutes of cuff occlusion causes slight discomfort to the patient and is not desirable. This test was improved and shortened by using a system based on the oscillometric method of blood pressure measurement. By reducing the duration of the test from 5 minute reactive hyperemia to 3 minute reactive hyperemia, this will make the procedure practical for an increased number of patients, providing a noninvasive option to regularly check for early symptoms of cardiovascular disease.
APA, Harvard, Vancouver, ISO, and other styles
34

Sarasti, Israel A. "An Investigation of the Reliability and Validity of Curriculum-based Measurement Maze Probes: A Comparison of 1-minute, 2-minute, and 3-minute Time Frames." Diss., Temple University Libraries, 2010. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/48811.

Full text
Abstract:
School Psychology
Ph.D.
Prevention science has suggested that universal screening can enhance educational and mental health outcomes in the schools (Greenberg et al., 2003). A three-tier model of prevention has been proposed by Albers, Glover, and Kratochwill (2007) and Brown-Chidsey and Steege (2005) employing universal screening assessments of basic academic skills at Tier-1. Curriculum-based measurement maze (CBM-maze) probes are universal screeners that were developed as measures of reading comprehension. They are characterized as easy to administer, time-efficient, valid, and reliable (Parker, Hasbrouck, & Tindal, 1992). CBM-maze probes are short stories consisting of 400 words where every seventh word is omitted and replaced with three answer choices. Students are given 3-minutes to read the passage silently and select a word from the answer choices that restores the meaning of the story. Maze probes have been utilized as reading comprehension assessments for universal screening (Tier 1) and progress monitoring (Tier 2 and Tier 3; Espin, Deno, Maruyama, & Cohen, 1989; D. Fuchs & Fuchs, 1992). The current research study was conducted to further extend the research on the reliability and validity of CBM-maze probes. More specifically, it investigated if there were any differences between 1-minute, 2-minute, and 3-minute time frames, alternate form reliability, concurrent validity, and social validity of the maze probes. Results indicated differences in correct word selections (CWS) between 1-minute, 2-minute, and 3-minute time frames with significant interaction effects noted for the 2-minute maze probe. Alternate form reliability correlation were statistically significant and moderately strong (r = .47 to .71). Concurrent validity correlations between the STAR Reading norm referenced test (computer adaptive reading comprehension test) and CBM-maze probes yielded statistically significant and moderate correlations (r = .30 to .50). Tabulations of the assessment rating scale indicated that students perceived maze probes as acceptable measures for reading comprehension. Implications for practice, cautions in interpreting the results, and future directions are discussed.
Temple University--Theses
APA, Harvard, Vancouver, ISO, and other styles
35

Garner, Joshua W. "Evaluating the Effects of Timed Practice on Reading Endurance: A Comparison of One-Minute and Three-Minute Practice Conditions." The Ohio State University, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=osu1363782691.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Garner, Joshua. "Evaluating the Effects of Timed Practice on Reading Endurance: A Comparison of One-Minute and Three-Minute Practice Conditions." The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1354550635.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Janus, Lydia Maria. "Transmission of minute virus of mice in mouse populations international PhD program "infection biology"." Giessen DVG-Service, 2009. http://d-nb.info/995700702/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Cornelius, Jennifer. "Five Minute Meditation Used to Impact Workplace Meetings." Thesis, Pepperdine University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10617722.

Full text
Abstract:

The purpose of this research project was to explore the impact of a short-form mindfulness based intervention on the participant perception of workplace meeting effectiveness. Scholarship in the science of meetings estimates that nearly half of meetings in organizations are ineffective. Several reasons may exist for such perceived ineffectiveness but often include individual counterproductive meeting behaviors such as rumination and emotional labor. In a separate stream of emerging scholarship, mindfulness is related to a range of positive outcomes for individuals in organizations; including reductions in emotional labor and rumination. Outcomes were assessed qualitatively with eleven participants in a large technology company who regularly attend meetings. Results of the study demonstrated positive outcomes related to meeting citizenship behaviors, overall perception of meeting effectiveness and antecedents to counterproductive meeting behaviors. Consideration of the evidence on mindfulness as connected to meeting science is explored.

APA, Harvard, Vancouver, ISO, and other styles
39

Garcin, Pierre. "Study of the minute virus of mice cell entry." Thesis, University of British Columbia, 2014. http://hdl.handle.net/2429/50245.

Full text
Abstract:
The minute virus of mice prototype (MVMp) is a non-enveloped single stranded DNA virus of the family Parvoviridae. MVMp is one of the smallest viruses and shows intriguing abilities to preferentially infect and kill cancer cells (oncotropism/oncolytism), suggesting a potential for MVMp as an anti-cancer agent. Unfortunately, there is a lack of knowledge of the early events of MVMp infection cycle, such as binding to the cell surface and subsequent endocytosis. In an attempt to identify cellular partners of MVMp infection, our lab performed a mass spectrometry analysis of MVMp potential binding partners. Following this analysis, the galactose-binding lectin (galectin) 3 (Gal-3) was identified as binding partner for MVMp. Given the involvement of this extra-cellular matrix protein in the clustering and endocytosis of cell surface receptors, and its up-regulation in various aggressive tumor cells, I hypothesized that Gal-3 could play a role in MVMp cell entry, and potentially in its oncotropism. Using siRNA knockdown of Gal-3 in different cells followed by immunofluorescence microscopy analysis, I found that Gal-3 is necessary for an efficient MVMp cell entry and infection in different cells. Moreover, I discovered that the Golgi enzyme β1,6-acetylglucosaminyltransferase 5 (Mgat5), whose role is the addition of complex N-glycosylation to various cell surface receptors for Gal-3 binding, is required for MVMp infection. I also found that cancer cells with higher Gal-3 expression are more susceptible to MVMp infection than cells with lower Gal-3 levels. Next I used a combination of flow cytometry, immuno-fluorescence and transmission electron microscopy to characterize the early events of MVMp infection in various tissue-culture cell lines. My results show that many crucial parameters of the mesenchymal cell migration process regulate MVMp cellular entry and infection. I found that MVMp relies on cell protrusions to cluster at the leading edge of migrating cells rapidly after binding to the plasma membrane, from where it is subsequently endocytosed. Moreover, transmission electron microscopy analysis revealed that MVMp uses various endocytic pathways, which was confirmed using drug inhibitors of endocytosis. Finally, I found that epithelial-mesenchymal transition, an inducer of cancer cell migration, triggers MVMp infection in highly dividing non-permissive cancer cells.
Science, Faculty of
Zoology, Department of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
40

Wenäll, Lovisa. "DNA profiles generated from minute amounts of single cells." Thesis, Linköpings universitet, Institutionen för klinisk och experimentell medicin, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-66950.

Full text
Abstract:
The genetic code in our cells is built up by deoxyribonucleic acid (DNA) with a sequence that is individual and unique to each person. A cell’s origin can be decided by comparing an established DNA profile with a known profile. The most publicly known application is in the forensic field and its use for identification and for establishing a connection between perpetrators and victims or crime scenes. DNA profiling is also commonly used for kinship investigations. The information embedded in the DNA is also used for diagnostic purposes in conventional medicine. Generating DNA profiles is a well-established procedure, which is used daily and for many purposes. An amount of approximately 150-1500 cells is required to be able to establish a full DNA profile using current methods. There are several situations where the amount of material is limited. To enable analysis where the testing material is limited it is of great value to develop a method that can perform these analyses on minute amounts of cells. If there were a method for generating DNA profiles from single cells then mixed samples from crime scenes would be separable. In tumour biology it is also of interest to obtain information from single cells. The aim with the thesis was to establish the smallest amount of cells needed for a full DNA profile. The thesis started with analyses on extracted DNA. During several experiments dilution series were made to investigate the possibilities to establish profiles from minute amounts of extracted DNA. The main methods used during this thesis were polymerase chain reaction (PCR) and capillary gel electrophoresis (CGE). These methods are well-established tools both in biomedical science and at The Department of Forensic Genetics and Forensic Toxicology, National Board of Forensic Medicine. Different factors were optimized and the acquired knowledge resulted in application of DNA on FTA® Micro Cards. The cards are used in the daily routines and are easy to use. Several experiments were then performed on peripheral lymphocytes based on the knowledge acquired during the process. Applying a low amount of lymphocytes on FTA cards proved to be very successful and the method generates DNA profiles at a single cell level. The method is applicable for approximately 5-10 cells.
APA, Harvard, Vancouver, ISO, and other styles
41

Cohen, Sarah. "Nuclear entry of the parvovirus minute virus of mice." Thesis, University of British Columbia, 2010. http://hdl.handle.net/2429/30414.

Full text
Abstract:
In order to promote infection, viruses must target their genomes to specific compartments within the host cell. I have used the parvovirus minute virus of mice (MVM) as a model to study the trafficking of non-enveloped viruses. Parvoviruses are single-stranded DNA viruses which replicate in the nucleus of the cell. Most viruses that replicate in the nucleus transport their genomes through nuclear pore complexes, large protein assemblies that mediate nucleocytoplasmic transport. However, previous studies have shown that MVM can induce disruption of the nuclear membranes, called the nuclear envelope (NE). This led to the hypothesis that MVM enters the nucleus by an unusual mechanism: disruption of the NE and entry through the resulting breaks. The objectives of this thesis were to: (1) characterize the effect of MVM on the NE, (2) define the molecular mechanism used by MVM to induce NE disruption, (3) determine the role of NE disruption in the MVM replication cycle, and (4) identify host proteins involved in MVM infection. I found that MVM causes small, transient disruptions of the NE early during infection. I tested the hypothesis that viral enzymatic activity is necessary for MVM-induced NE disruption and found that this was not the case. Next I tested the hypothesis that MVM hijacks a cellular program for NE breakdown, and found that MVM utilizes apoptotic proteases called caspases to facilitate these disruptions. Caspase inhibition prevents NE disruption in MVM-infected cells, reduces viral gene expression, and prevents entry of MVM capsids into the nucleus. I propose that NE disruption involving caspases facilitates parvovirus genome delivery into the nucleus. NE disruption also alters the compartmentalization of host proteins, which may be favorable for the virus. I have shown that MVM uses a novel nuclear entry strategy, unlike those previously described for any virus or cellular protein. It will be of great interest to determine whether this strategy is shared by other viruses. Parvoviruses are not considered a serious threat as human pathogens. However, they may prove useful as vectors for gene therapy. An understanding of the basic biology of parvoviruses could help in the development of parvovirus-based therapeutics.
APA, Harvard, Vancouver, ISO, and other styles
42

Lodrová, Dana. "Bezpečnost biometrických systémů." Doctoral thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2013. http://www.nusl.cz/ntk/nusl-261226.

Full text
Abstract:
Hlavním přínosem této práce jsou dva nové přístupy pro zvýšení bezpečnosti biometrických systémů založených na rozpoznávání podle otisků prstů. První přístup je z oblasti testování živosti a znemožňuje použití různých typů falešných otisků prstů a jiných metod oklamání senzoru v průběhu procesu snímání otisků. Tento patentovaný přístup je založen na změně barvy a šířky papilárních linií vlivem přitlačení prstu na skleněný podklad. Výsledná jednotka pro testování živosti může být integrována do optických senzorů.  Druhý přístup je z oblasti standardizace a zvyšuje bezpečnost a interoperabilitu procesů extrakce markantů a porovnání. Pro tyto účely jsem vytvořila metodologii, která stanovuje míry sémantické shody pro extraktory markantů otisků prstů. Markanty nalezené testovanými extraktory jsou porovnávány oproti Ground-Truth markantům získaným pomocí shlukování dat poskytnutých daktyloskopickými experty. Tato navrhovaná metodologie je zahrnuta v navrhovaném dodatku k normě ISO/IEC 29109-2 (Amd. 2 WD4).
APA, Harvard, Vancouver, ISO, and other styles
43

Peacock, Jeffrey. "Ten-Minute Playwriting: A Study of Design, Method, and Structure." Honors in the Major Thesis, University of Central Florida, 2014. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/1633.

Full text
Abstract:
The purpose of my research was to discover the most effective ways to write ten-minute plays. I adapted various "suggestions" proposed in the many playwriting books I gathered to find the way that worked best for me as an artist. The majority of the books I read suggest writing ten-minute works before attempting a one-act or even a full-length play. My resources yielded a plethora of information on how to actually write a play. Three of my sources that proved to be enlightening were The Art and Craft of Playwriting by Jeffrey Hatcher, Playwriting for Dummies by Angelo Parra, and Naked Playwriting: The Art, the Craft, and the Life Laid Bare by William Missouri Downs and Robin U. Russin. I also attended a master class with playwright Tim Bauer, and he gave me insight on approaching writing ten-minute plays. Through my research, it became evident that the real problem with writing is not so much the structure or the way a person writes, but the actual writing itself. Each of my resources had valuable information that made my job as an artist easier, but none of them, even the tips Bauer gave me, worked one hundred percent of the time. Some plays were easier to write if I wrote them without stage directions first, as Bauer suggested, but others stalled if I didn't write my vision of the stage before actually writing dialogue. The research I have completed can aid a multitude of future creative artists. My Five Tips for Writing and Three Tips for a First Production are useful insights that would have been invaluable had I known them when I started writing.
B.F.A.
Bachelors
Theatre
Arts and Humanities
APA, Harvard, Vancouver, ISO, and other styles
44

Ingólfsson, Ármann. "Earthquake forecastes--the life-saving poetential of last-minute warnings." Thesis, Massachusetts Institute of Technology, 1994. http://hdl.handle.net/1721.1/38021.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1994.
Includes bibliographical references (p. 209-213).
by Ármann Ingólfsson.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
45

Schueler, Mark. "Hang on a minute : a Bourdieusian perspective on Enterprise 2.0." Thesis, University of Southampton, 2013. https://eprints.soton.ac.uk/364732/.

Full text
Abstract:
Enterprise 2.0 refers to the use of networked social software in organizational practice. Blogs, wikis, social networking sites, and many other kinds of community-oriented computer applications, accessed primarily via the Web, are heavily promoted by software vendors and industry insiders, and are being implemented in organizations around the world. Enterprise 2.0 promoters make broad claims for benefits to be realized from uses of such tools—improvements in communication, collaboration, productivity, and worker satisfaction, for instance—but seldom offer evidence to support their claims. Such unsubstantiated claims suggest simplistic assumptions about the complex, contingent environments in which the tools are used. This thesis uses a mixed method approach to explore the influences of these tools on social and organizational behaviors and outcomes, and vice versa. The research question to be addressed is, “What shapes the uptake, uses, and effects of Enterprise 2.0 in everyday practice?” It applies social theoretics to explain how and why social media practices develop, primarily through the use of Bourdieu’s concepts of field, capital, and habitus. Planned research contributions are: empirical evidence of Enterprise 2.0 effects from everyday uses; the analysis and evaluation of Enterprise 2.0’s impacts on differing organizational structures; understanding of the Web’s contributions to organizational communication via Enterprise 2.0; and deeper understanding of the social processes at the interplay of individuals, organizations, and social media.
APA, Harvard, Vancouver, ISO, and other styles
46

Brunstein, John. "Analysis of the internal replication sequence of minute virus of mice." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp02/NQ27113.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Pankoff, Brenda. "Validation of the six-minute walk test for people with fibromyalgia." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape9/PQDD_0002/MQ42183.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Cantrell, Owen C. ""Born Every Minute": Reworking the Mythology of the American Medicine Show." Digital Archive @ GSU, 2011. http://digitalarchive.gsu.edu/english_theses/106.

Full text
Abstract:
This thesis investigates the historical American medicine show of 1880-1900 through the lens of contemporaneous social and cultural debates, primarily regarding class and race relations. The medicine show pitchmen, the central figure of the medicine show, is the progeny of the confidence man of the mid to late-nineteenth century, best personified through the autobiographies of Benjamin Franklin and P.T. Barnum and novels of Herman Melville and Mark Twain. The confidence man utilized a performative identity directed towards the assumed needs and desires of his audience, which gave him a purely pragmatic orientation. As the confidence man filtered through emerging forms of popular entertainment, he found his place in the traveling medicine show in the figure of the medicine man. In many ways, the medicine show functioned as a cultural arena in which the concerns of rural audiences about the ongoing professionalization of the classes, specifically within the medical profession, were investigated and manipulated.
APA, Harvard, Vancouver, ISO, and other styles
49

Tiburcio, Ricardo Augusto. "Riqueza e variabilidade da flora bacteriana de Tomoplagia minuta (Diptera, Tephritidae)." [s.n.], 2002. http://repositorio.unicamp.br/jspui/handle/REPOSIP/317360.

Full text
Abstract:
Orientadores : Vera Nisaka Solferini, Wanderley Dias da Silveira
Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Biologia
Made available in DSpace on 2018-08-02T23:26:56Z (GMT). No. of bitstreams: 1 Tiburcio_RicardoAugusto_M.pdf: 3912052 bytes, checksum: c75e6175eb1714a61707124a1ec53d62 (MD5) Previous issue date: 2002
Mestrado
APA, Harvard, Vancouver, ISO, and other styles
50

Hagemeier, Nicholas E. "Public Health Minute: Prescription Drug Abuse Prevention and the Community Pharmacist." Digital Commons @ East Tennessee State University, 2014. https://dc.etsu.edu/etsu-works/1486.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography