Teses / dissertações sobre o tema "Biometrisk Data"

Siga este link para ver outros tipos de publicações sobre o tema: Biometrisk Data.

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Veja os 50 melhores trabalhos (teses / dissertações) para estudos sobre o assunto "Biometrisk Data".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Veja as teses / dissertações das mais diversas áreas científicas e compile uma bibliografia correta.

1

Nytorpe, Piledahl Staffan, e Daniel Dahlberg. "Detektering av stress från biometrisk data i realtid". Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-31248.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
At the time of writing, stress and stress related disease have become the most common reasons for absence in the workplace in Sweden. The purpose of the work presented here is to identify and notify people managing unhealthy levels of stress. Since symptoms of mental stress manifest through functions of the Sympathetic Nervous System (SNS), they are best measured through monitoring of SNS changes and phenomena. In this study, changes in the sympathetic control of heart rate were recorded and analyzed using heart rate variability analysis and a simple runner’s heart rate sensor connected to a smartphone. Mental stress data was collected through stressful video gaming. This was compared to data from non-stressful activities, physical activity and extremely stressful activities such as public speaking events. By using the period between heartbeats and selecting features from the frequency domain, a simple machine learning algorithm could differentiate between the types of data and thus could effectively recognize mental stress. The study resulted in a collection of 100 data points, an algorithm to extract features and an application to continuously collect and classify sequences of heart periods. It also revealed an interesting relationship in the data between different subjects. The fact that continuous stress monitoring can be achieved using minimally intrusive sensors is the greatest benefit of these results, especially when connsidering its potential value in the identification and prevention of stress related disease.
2

Madsen, Angelica, e Carl Nymanson. "Bör du v(AR)a rädd för framtiden? : En studie om The Privacy Paradox och potentiella integritetsrisker med Augmented Reality". Thesis, Malmö universitet, Malmö högskola, Institutionen för datavetenskap och medieteknik (DVMT), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-43868.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
I en tid där digitaliseringen är mer utbredd än någonsin ökar också mängden data som samlas och delas online. I takt med att nya tekniker utvecklas öppnas det upp för nya utmaningar för integritetsfrågor. En aktiv användare online ägnar sig med största sannolikhet också åt ett eller flera sociala medier, där ändamålen ofta innebär att dela med sig av information till andra. Eftersom tekniken Augmented Reality används mer frekvent i några av de största sociala medieapplikationerna blev studiens syfte att undersöka potentiella integritetsproblem med Augmented Reality. Studiens tillvägagångssätt har bestått av en empirisk datainsamling för att skapa ett teoretiskt ramverk för studien. Utifrån detta har det genomförts en digital enkät samt intervjuer för att närmare undersöka användarens beteende online och The Privacy Paradox. Utifrån undersökningens resultat kunde The Privacy Paradox bekräftas och ge en bättre förståelse för hur användaren agerar genom digitala kanaler. I studien behandlas olika aspekter kring integritetsfrågor såsom användarvillkor, sekretessavtal, datamäklare, framtida konsekvenser och vad tekniken möjliggör. Studien kommer fram till att användare, företaget och dagens teknik tillåter att en känsligare information kan utvinnas genom ett dataintrång. Även om det ännu inte har inträffat ett dataintrång som grundat sig i Augmented Reality före denna studie, finns det en risk att det endast handlar om en tidsfråga innan detta sker.
In a time when digitalization is more widespread than ever, the amount of data collected and shared is increasing. As new technologies develop, challenges for privacy concerns arises. An active online user is likely to engage in one or many social media platforms, where the purpose often involves sharing information with others. Since Augmented Reality is more frequently supported in some of the biggest social media applications, the purpose of this study was to investigate potential privacy concerns with Augmented Reality. The study’s approach consisted of an empirical data collection to create a theoretical framework for the study. Based on this, a digital survey and interviews were conducted to further investigate the user's behavior online and The Privacy Paradox. Based on the results of the survey, The Privacy Paradox could be confirmed and a better understanding of how the user interacts through digital channels was achieved. The study treats different aspects of privacy concerns such as user terms, privacy policies, data brokers, future consequences and what technology enables. The study reached the conclusion that users, businesses and today's technology allow a more sensitive type of information to be collected through a data breach. Even if there has not yet occurred a data breach enabled by Augmented Reality prior to this study, there is a risk that it is only a matter of time until this happens.
3

Pisani, Paulo Henrique. "Biometrics in a data stream context". Universidade de São Paulo, 2017. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-08052017-141153/.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
The growing presence of the Internet in day-to-day tasks, along with the evolution of computational systems, contributed to increase data exposure. This scenario highlights the need for safer user authentication systems. An alternative to deal with this is by the use of biometric systems. However, biometric features may change over time, an issue that can affect the recognition performance due to an outdated biometric reference. This effect can be called as template ageing in the area of biometrics and as concept drift in machine learning. It raises the need to automatically adapt the biometric reference over time, a task performed by adaptive biometric systems. This thesis studied adaptive biometric systems considering biometrics in a data stream context. In this context, the test is performed on a biometric data stream, in which the query samples are presented one after another to the biometric system. An adaptive biometric system then has to classify each query and adapt the biometric reference. The decision to perform the adaptation is taken by the biometric system. Among the biometric modalities, this thesis focused on behavioural biometrics, particularly on keystroke dynamics and on accelerometer biometrics. Behavioural modalities tend to be subject to faster changes over time than physical modalities. Nevertheless, there were few studies dealing with adaptive biometric systems for behavioural modalities, highlighting a gap to be explored. Throughout the thesis, several aspects to enhance the design of adaptive biometric systems for behavioural modalities in a data stream context were discussed: proposal of adaptation strategies for the immune-based classification algorithm Self-Detector, combination of genuine and impostor models in the Enhanced Template Update framework and application of score normalization to adaptive biometric systems. Based on the investigation of these aspects, it was observed that the best choice for each studied aspect of the adaptive biometric systems can be different depending on the dataset and, furthermore, depending on the users in the dataset. The different user characteristics, including the way that the biometric features change over time, suggests that adaptation strategies should be chosen per user. This motivated the proposal of a modular adaptive biometric system, named ModBioS, which can choose each of these aspects per user. ModBioS is capable of generalizing several baselines and proposals into a single modular framework, along with the possibility of assigning different adaptation strategies per user. Experimental results showed that the modular adaptive biometric system can outperform several baseline systems, while opening a number of new opportunities for future work.
A crescente presença da Internet nas tarefas do dia a dia, juntamente com a evolução dos sistemas computacionais, contribuiu para aumentar a exposição dos dados. Esse cenário evidencia a necessidade de sistemas de autenticação de usuários mais seguros. Uma alternativa para lidar com isso é pelo uso de sistemas biométricos. Contudo, características biométricas podem mudar com o tempo, o que pode afetar o desempenho de reconhecimento devido a uma referência biométrica desatualizada. Esse efeito pode ser chamado de template ageing na área de sistemas biométricos adaptativos ou de mudança de conceito em aprendizado de máquina. Isso levanta a necessidade de adaptar automaticamente a referência biométrica com o tempo, uma tarefa executada por sistemas biométricos adaptativos. Esta tese estudou sistemas biométricos adaptativos considerando biometria em um contexto de fluxo de dados. Neste contexto, o teste é executado em um fluxo de dados biométrico, em que as amostras de consulta são apresentadas uma após a outra para o sistema biométrico. Um sistema biométrico adaptativo deve então classificar cada consulta e adaptar a referência biométrica. A decisão de executar a adaptação é tomada pelo sistema biométrico. Dentre as modalidades biométricas, esta tese foca em biometria comportamental, em particular em dinâmica da digitação e em biometria por acelerômetro. Modalidades comportamentais tendem a ser sujeitas a mudanças mais rápidas do que modalidades físicas. Entretanto, havia poucos estudos lidando com sistemas biométricos adaptativos para modalidades comportamentais, destacando uma lacuna para ser explorada. Ao longo da tese, diversos aspectos para aprimorar o projeto de sistemas biométricos adaptativos para modalidades comportamentais em um contexto de fluxo de dados foram discutidos: proposta de estratégias de adaptação para o algoritmo de classificação imunológico Self-Detector, combinação de modelos genuíno e impostor no framework do Enhanced Template Update e aplicação de normalização de scores em sistemas biométricos adaptativos. Com base na investigação desses aspectos, foi observado que a melhor escolha para cada aspecto estudado dos sistemas biométricos adaptativos pode ser diferente dependendo do conjunto de dados e, além disso, dependendo dos usuários no conjunto de dados. As diferentes características dos usuários, incluindo a forma como as características biométricas mudam com o tempo, sugerem que as estratégias de adaptação deveriam ser escolhidas por usuário. Isso motivou a proposta de um sistema biométrico adaptativo modular, chamado ModBioS, que pode escolher cada um desses aspectos por usuário. O ModBioS é capaz de generalizar diversos sistemas baseline e propostas apresentadas nesta tese em um framework modular, juntamente com a possibilidade de atribuir estratégias de adaptação diferentes por usuário. Resultados experimentais mostraram que o sistema biométrico adaptativo modular pode superar diversos sistemas baseline, enquanto que abre um grande número de oportunidades para trabalhos futuros.
4

McNulty, Peggy Sue. "Values issues in biometric data collection". Connect to Electronic Thesis (CONTENTdm), 2009. http://worldcat.org/oclc/525070842/viewonline.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Brobeck, Stefan, e Tobias Folkman. "Biometrics : Attitudes and factors influencing a breakthrough in Sweden". Thesis, Jönköping University, JIBS, Business Informatics, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-148.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:

Biometrics is a collection of methods for identifying and authorizing individuals with something they are, or do. It is considered to be one of the most secure technologies for security, both physical and logical. Security is something very important for organizations today, but yet there has been a low interest in investing in biometrics for security in Sweden.

The purpose of this thesis has been to establish factors to why biometrics has not been implementedto any large extent, even though the technology has been around for long. We have evaluated the attitudes and views of individuals, as well as company leaders. Problem and questions with biometrics that often are discussed are privacy concerns, costs and ROI (return on investment) and user acceptance. Foremost there is a concern about the costs of implementing such a solution, although some claim that money can be saved by avoiding the costs in more traditional security methods, such as password administration and in security cards.

There is a range of different technologies to use, such as facial-scan, voice-scan and the most mature and well known technique, finger-scan which has been around for a long time, especially for identifying criminals. All these techniques have there positive and negative sides, often measured in different levels of universality, uniqueness, permanence and collectability, e.g. eye-scan has a high uniqueness, facial-scan has a high universability and signature-scan has a low permanence level.

We have collected our data through interviews with companies and suppliers of biometric systems as well as a questionnaire given to private persons. By interpreting the data in a qualitative way we have made our analysis and reached a conclusion.

Our result shows that a cost related to biometric solutions is the largest reason why investments have been absent. This verifies the results of other authors, that the cost is the largest obstacle. Another important factor is that companies believe that biometrics is for organizations with a very high security need. Further our result show that individuals are positive towards biometrics.


Biometri är ett samlingsnamn för tekniker som identifierar och auktoriserar individer, antingen något de är eller gör. Biometri anses vara en av de säkraste teknologierna för säkerhet, både fysisk och logisk. Säkerhet är något som är mycket viktigt för organisationer i dagens läge, men än så länge så har investeringar i biometriska säkerhetslösningar i Sverige uteblivit. Syftet med denna magisteruppsats har varit att fastställa faktorer som bidrar till att biometriska lösningar inte har blivit implementerade i någon större utsträckning, trots att teknologin har funnits länge. Vi har utvärderat individers samt företagsledares attityder och synsätt angående biometri.

Frågor och problem som ofta relateras till biometri är personligintegritet, kostnader och avkastning på investering samt användaracceptans. Framförallt är det osäkerheten kring kostnaderna av en implementering av en biometrisklösning. Det finns även de som hävdar att biometriska lösningar kan spara pengar jämfört med traditionella system därför att man undviker till exempel lösenordsadministration och passerkort.

Det finns en rad olika tekniker att använda, exempelvis ansiktsavläsning, röstigenkänning och den mest mogna och kända tekniken, fingeravtrycksläsning som har existerat en längre tid, framförallt för att identifiera kriminella. Det finns positiva och negativa sidor med alla dessa tekniker, de mäts oftast i olika nivåer av hur många som kan använda det, hur unikt biometrin är, beständighet och hur biometrin samlas in.

Genom intervjuer med företag och leverantörer av biometriska lösningar samt en utdelad enkät till privat personer har vi samlat in data. Vi har sedan tolkat data kvalitativt och utfört vår analys och slutligen kommit fram till ett resultat.

Vårt resultat har visat att kostnader relaterade till biometriska system är det största skälet till varför investeringar har uteblivit. Detta bekräftar vad många andra författare tidigare har funnit, att kostnaderna är det största hindret. En annan viktig faktor är att företag anser att biometri är något för verksamheter som kräver den allra högsta säkerheten. Vidare har individer en positiv inställning till biometri.

6

Ugail, Hassan, e Eyad Elyan. "Efficient 3D data representation for biometric applications". IOS Press, 2007. http://hdl.handle.net/10454/2683.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Yes
An important issue in many of today's biometric applications is the development of efficient and accurate techniques for representing related 3D data. Such data is often available through the process of digitization of complex geometric objects which are of importance to biometric applications. For example, in the area of 3D face recognition a digital point cloud of data corresponding to a given face is usually provided by a 3D digital scanner. For efficient data storage and for identification/authentication in a timely fashion such data requires to be represented using a few parameters or variables which are meaningful. Here we show how mathematical techniques based on Partial Differential Equations (PDEs) can be utilized to represent complex 3D data where the data can be parameterized in an efficient way. For example, in the case of a 3D face we show how it can be represented using PDEs whereby a handful of key facial parameters can be identified for efficient storage and verification.
7

Lam, Lawrence G. "Digital Health-Data platforms : biometric data aggregation and their potential impact to centralize Digital Health-Data". Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/106235.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, School of Engineering, System Design and Management Program, Engineering and Management Program, 2015.
Cataloged from PDF version of thesis.
Includes bibliographical references (page 81).
Digital Health-Data is being collected at unprecedented rates today as biometric micro sensors continue to diffuse into our lives in the form of smart devices, wearables, and even clothing. From this data, we hope to learn more about preventative health so that we can spend less money on the doctor. To help users aggregate this perpetual growth of biometric "big" data, Apple HealthKit, Google Fit, and Samsung SAMI were each created with the hope of becoming the dominant design platform for Digital Health-Data. The research for this paper consists of citings from technology strategy literature and relevant journalism articles regarding recent and past developments that pertain to the wearables market and the digitization movement of electronic health records (EHR) and protected health information (PHI) along with their rules and regulations. The culmination of these citations will contribute to my hypothesis where the analysis will attempt to support my recommendations for Apple, Google, and Samsung. The ending chapters will encompass discussions around network effects and costs associated with multi-homing user data across multiple platforms and finally ending with my conclusion based on my hypothesis.
by Lawrence G. Lam.
S.M. in Engineering and Management
8

Jašková, Jitka. "Zpracování osobních údajů v rámci EU se zřetelem na policejní a justiční spolupráci". Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-18247.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
The thesis deals with the approach level, meaning, purpose and benefit of personal data protection in their processing within police and judicial cooperation in the EU. In the introduction the fundamental issues of personal data protection in the context of the EU and the Czech republic are defined, focusing on terminology and explanations of current issues, particularly the area of biometric data and data retention. Extra attention is also given to the conflict of the right to privacy, and the related right to personal data protection and protection of public interests and safety. After that the thesis deals with a performing of police and judicial cooperation in the EU through specific subjects, in particular Europol and Eurojust. The final part of the thesis focuses on the practical implementation of personal data protection in police and judicial cooperation in the EU, and secondly the importance of personal data protection in police and judicial cooperation, as a deduced basic human right, and the difficulties with which the personal data protection in police and judicial cooperation in the EU are joined. The final part of this thesis consider the main sections in which we can find area for adjustment towards more effective police and judicial cooperation in the EU, with full respect for the right to personal data protection.
9

Stevenson, Brady Roos. "Analysis of Near-Infrared Phase Effects on Biometric Iris Data". BYU ScholarsArchive, 2006. https://scholarsarchive.byu.edu/etd/1299.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
The purpose of this research is to ascertain potential iris scan data variations from near infrared waves derived from fluorescent illumination. Prior studies of iris data variances from infrared wave interference of halogen, incandescent, and sunlight with iris cameras suggest that similar changes may exist under near infrared wavelengths from fluorescent light. The concern is that the fluorescent energy emission may interfere with the near infrared detection of an iris camera. An iris camera is used to measure human eye characteristics known as biometrics. If such infrared emission is statistically significant, then it can alter the validity of the iris scan data. The experiment utilized nine hundred forty-five (945) scans from sixty-three (63) subjects. Measured results showed increased heat from ambient fluorescent illumination does not statistically alter the biometric readings of human eyes. The test results fail to reject that data loss will not occur as heat is increased in the ambient fluorescent light source.
10

Khanna, Tania. "Low power data acquisition for microImplant biometric monitoring of tremors". Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/78448.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2012.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 97-100).
In recent years, trends in the medical industry have created a growing demand for implantable medical devices. In particular, the need to provide doctors a means to continuously monitor biometrics over long time scales with increased precision is paramount to efficient healthcare. To make medical implants more attractive, there is a need to reduce their size and power consumption. Small medical implants would allow for less invasive procedures, greater comfort for patients, and increased patient compliance. Reductions in power consumption translate to longer battery life. The two primary limitations to the size of small medical implants are the batteries that provide energy to circuit and sensor components and the antennas that enable wireless communication to terminals outside of the body. The theory is applied in the context of the long term monitoring of Parkinson's tremors. This work investigates how to reduce the amount of data needing to acquire a signal by applying compressive sampling thereby alleviating the demand on the energy source. A low energy SAR ADC is designed using adiabatic charging to further reduce energy usage. This application is ideal for adiabatic techniques because of the low frequency of operation and the ease with which we can reclaim energy from discharging the capacitors. Keywords: SAR ADC, adiabatic, compressive sampling, biometric, implants
by Tania Khanna.
Ph.D.
11

Mai, Guangcan. "Biometric system security and privacy: data reconstruction and template protection". HKBU Institutional Repository, 2018. https://repository.hkbu.edu.hk/etd_oa/544.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Biometric systems are being increasingly used, from daily entertainment to critical applications such as security access and identity management. It is known that biometric systems should meet the stringent requirement of low error rate. In addition, for critical applications, the security and privacy issues of biometric systems are required to be concerned. Otherwise, severe consequence such as the unauthorized access (security) or the exposure of identity-related information (privacy) can be caused. Therefore, it is imperative to study the vulnerability to potential attacks and identify the corresponding risks. Furthermore, the countermeasures should also be devised and patched on the systems. In this thesis, we study the security and privacy issues in biometric systems. We first make an attempt to reconstruct raw biometric data from biometric templates and demonstrate the security and privacy issues caused by the data reconstruction. Then, we make two attempts to protect biometric templates from being reconstructed and improve the state-of-the-art biometric template protection techniques.
12

Pratt, Jamie M. "The Effects of Worksite Health Promotion Programs on Employee Biometric Data". BYU ScholarsArchive, 2014. https://scholarsarchive.byu.edu/etd/5752.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
INTRODUCTION: Worksite health promotion programs (WHPP) promote maintenance and changes of health-related behaviors of employees. Some companies opt to contract with a third party provider to implement a WHPP. PURPOSE: This study evaluated the participation rates, availability and use of health coaching, and changes in biometric data over a 2-year time period of employees in 13 companies for whom the WHPP was implemented by Wellness Corporate Solutions (WCS). METHODS: We had 2 years of biometric, health risk appraisal (HRA), or health coaching data on 4,473 employees. The statistical analysis included biometric screening data (percent body fat, body mass index (BMI), total cholesterol (TC), high- and low-density lipoproteins (HDL-C, LDL-C), TC/HDL ratio, triglycerides, glucose, systolic and diastolic blood pressures (SBP and DBP)) from all 13 companies and health coaching data from five companies. RESULTS: Employee participation rates of the 13 companies ranged from 35% to 75%. Five of the 13 companies provided voluntary telephonic health coaching to employees participating in their WHPPs. Of those employees for which we had 2-year data, 125 (12.9%) actually participated in health coaching. Only one of the 13 companies demonstrated improvement in all 10 biometric measurements and 1 company demonstrated improvement in only one biometric measurement. The biometric measurements that showed the greatest improvements over time were triglycerides, blood pressure, BMI, and TC. There was no association found between the number of variables that improved and employee participation rate (p = 0.8814) or the type of incentives offered to employees (p = 0.1389). Availability and use of health coaching did not appear to affect the number of variables that improved. Compared to employees who did not use health coaching, there were significantly greater changes in DBP, HDL-C, and BMI (p < 0.05) in employees who used health coaching. The magnitude of change in variables of interest was dependent, in part, on the baseline value. CONCLUSIONS: Voluntary participation in WHPPs results in positive changes in health-related biometric variables. Health coaching can positively affect the magnitude of change in some biometric variables and the magnitude of change is likely related to the baseline value and the frequency of coaching interactions. Further research should evaluate the benefits of various forms and frequencies of health coaching. Worksite health promotion programs and health coaching may also have a positive impact on other variables (e.g., employee attitudes and morale) not addressed in this study.
13

Maghsoudi, Javid. "A Behavioral Biometrics User Authentication Study Using Motion Data from Android Smartphones". Thesis, Pace University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10690910.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:

This is a study of the behavioral biometric of smartphone motion to determine the potential accuracy of authenticating users on smartphone devices. The study used the application Sensor Kinetics Pro and the Weka machine-learning library to analyze accelerometer and gyroscope data. The study conducted three experiments for the research. They were conducted in spring 2015, fall 2015, and spring 2016. The final experiment in spring 2016 used six Android-based smartphones to capture data from 60 participants and each participant performed 20 trials of two motions: bringing the phone up to eye level for review, and then bringing the phone to the ear, resulting in 1200 runs. The resulting sensor datasets were used for machine learning training and testing. The study used filtering data to remove noise, and then aggregated the data and used them as inputs to the Weka Machine Learning tool. The study used several machine classification algorithms: the Multilayer Perception (MLP), k-Nearest Neighbor (k-NN), Naïve Bayes (N-B), and Support Vector Machine (SVM) machine learning classification algorithms. The study reached authentication accuracies of up to 93% thus supporting the use of behavioral motion biometrics for user authentication. Preliminary studies with smaller numbers of participants in spring 2015 and in fall 2015 also produced 90%+ authentication accuracy.

14

Giesing, Ilse. "User perception related to identification through biometrics within electronic business". Pretoria : [s.n.], 2003. http://upetd.up.ac.za/thesis/available/etd-01092004-141637.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
15

Savaluny, Elly. "Analysis of ordered categorical data : partial proportional odds and stratified models". Thesis, University of Reading, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.326978.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
16

Aronsson, Erik. "Biometric Authentication and Penetration of Smartphones". Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37713.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
This study aims to examine the function and vulnerabilities of biometric systemsintegrated in smartphones, as well as techniques for circumventing the securityof these systems. These techniques are then used against a selection of smart-phones in order to gauge the resilience of their biometric security. The function,vulnerabilities, and techniques associated with these systems are compiled usinga literature study of published papers and books on the subject. The performedexperiments apply these techniques in the form of presentation attacks directed atthe fingerprint-, face- and iris recognition systems of the examined smartphones.The result of the experiments showed significant differences between the differentsmartphones, where some exhibited flawless security and others showed significantsecurity flaws. Both fingerprint and face recognition systems were successfullycircumvented, while none of the iris recognition systems were breached. No clearlink could be observed between the cost of the device and success rate of attacks,while only devices using the Android operating system were breached. The resultsundeniably showed that some smartphones are vulnerable to the employed tech-niques. It also showed that some of the tested devices had managed to implementmeasures to counteract the applied presentation attacks. The root cause of thevulnerabilities showcased in the experiment is due to the fact that biometric traitscan be copied and reproduced, highlighting a basic flaw of such systems.
17

Ara?jo, Rayron Victor Medeiros de. "A probabilistic analysis of the biometrics menagerie existence: case study in fingerprint data". Universidade Federal do Rio Grande do Norte, 2016. http://repositorio.ufrn.br/handle/123456789/21032.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Submitted by Automa??o e Estat?stica (sst@bczm.ufrn.br) on 2016-07-22T15:02:53Z No. of bitstreams: 1 RayronVictorMedeirosDeAraujo_DISSERT.pdf: 4039405 bytes, checksum: 1fdfbf6dd2e57fcc334017f7a3ee24ab (MD5)
Approved for entry into archive by Arlan Eloi Leite Silva (eloihistoriador@yahoo.com.br) on 2016-07-27T00:08:32Z (GMT) No. of bitstreams: 1 RayronVictorMedeirosDeAraujo_DISSERT.pdf: 4039405 bytes, checksum: 1fdfbf6dd2e57fcc334017f7a3ee24ab (MD5)
Made available in DSpace on 2016-07-27T00:08:32Z (GMT). No. of bitstreams: 1 RayronVictorMedeirosDeAraujo_DISSERT.pdf: 4039405 bytes, checksum: 1fdfbf6dd2e57fcc334017f7a3ee24ab (MD5) Previous issue date: 2016-02-18
At? pouco tempo atr?s o uso de biometria se restringia a ambientes de alta seguran?a e aplica??es de identifica??o criminal por raz?es de natureza econ?mica e tecnol?gica. Contudo, nos ?ltimos anos a autentica??o biom?trica come?ou a fazer parte do dia a dia das pessoas. Desde ent?o, alguns problemas de autentica??o entraram em evid?ncia, como a impossibilidade de votar numa elei??o porque o indiv?duo n?o tinha sua impress?o digital reconhecida. Isso acontece, pois os usu?rios de um sistema biom?trico podem ter diferentes graus de acur?cia, principalmente em sistemas de utiliza??o em larga escala. Alguns desses usu?rios podem ter dificuldade na autentica??o, enquanto outros podem ser, particularmente, vulner?veis ? imita??o. Estudos recentes investigaram e identificaram esses tipos de usu?rios, dando-lhes nomes de animais: Sheep, Goats, Lambs, Wolves, Doves, Chameleons, Worms e Phantoms. O objetivo desse trabalho ? avaliar a exist?ncia desses tipos de usu?rios em uma base de dados de impress?es digitais e propor uma nova forma de investig?-los, baseando-se no desempenho das verifica??es entre amostras. Nossos resultados identificaram a presen?a de goats, lambs, wolves, chameleons e phantoms, al?m de demonstrar a aus?ncia de worms e doves, em um sistema biom?trico proposto.
Until recently the use of biometrics was restricted to high-security environments and criminal identification applications, for economic and technological reasons. However, in recent years, biometric authentication has become part of daily lives of people. The large scale use of biometrics has shown that users within the system may have different degrees of accuracy. Some people may have trouble authenticating, while others may be particularly vulnerable to imitation. Recent studies have investigated and identified these types of users, giving them the names of animals: Sheep, Goats, Lambs, Wolves, Doves, Chameleons, Worms and Phantoms. The aim of this study is to evaluate the existence of these users types in a database of fingerprints and propose a new way of investigating them, based on the performance of verification between subjects samples. Once introduced some basic concepts in biometrics and fingerprint, we present the biometric menagerie and how to evaluate them.
18

Deutsche, Gesellschaft für Medizinische Informatik Biometrie und Epidemiologie. "GMS Medizinische Informatik, Biometrie und Epidemiologie". German Medical Science, 2005. https://ul.qucosa.de/id/qucosa%3A12911.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
19

Lodrová, Dana. "Bezpečnost biometrických systémů". Doctoral thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2013. http://www.nusl.cz/ntk/nusl-261226.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Hlavním přínosem této práce jsou dva nové přístupy pro zvýšení bezpečnosti biometrických systémů založených na rozpoznávání podle otisků prstů. První přístup je z oblasti testování živosti a znemožňuje použití různých typů falešných otisků prstů a jiných metod oklamání senzoru v průběhu procesu snímání otisků. Tento patentovaný přístup je založen na změně barvy a šířky papilárních linií vlivem přitlačení prstu na skleněný podklad. Výsledná jednotka pro testování živosti může být integrována do optických senzorů.  Druhý přístup je z oblasti standardizace a zvyšuje bezpečnost a interoperabilitu procesů extrakce markantů a porovnání. Pro tyto účely jsem vytvořila metodologii, která stanovuje míry sémantické shody pro extraktory markantů otisků prstů. Markanty nalezené testovanými extraktory jsou porovnávány oproti Ground-Truth markantům získaným pomocí shlukování dat poskytnutých daktyloskopickými experty. Tato navrhovaná metodologie je zahrnuta v navrhovaném dodatku k normě ISO/IEC 29109-2 (Amd. 2 WD4).
20

Baraldi, Carlo. "La sicurezza dei dati biometrici nella firma grafometrica. Aspetti giuridici e tecnologici". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6682/.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
La firma grafometrica è la sottoscrizione autografa eseguita con uno stilo elettronico su un dispositivo di acquisizione digitale e rappresenta ad oggi nel panorama delle tipologie di firma elettroniche una realtà a tutti gli effetti realizzabile. Questa tipologia di firma elettronica fonda il proprio valore sulle caratteristiche di universalità, unicità, permanenza e collezionabilità dei dati biometrici. Il successo della firma grafometrica è da ricercare invece nella sua stessa natura di firma, in quanto l'uomo da sempre è stato abituato ad eseguire il gesto dell'apposizione della propria firma autografa a dichiarazione della propria volontà. La profonda informatizzazione degli ultimi anni e la recente normativa hanno quindi permesso di trasferire la semplicità di questo gesto dal contesto analogico a quello digitale. I vantaggi derivanti dall'utilizzo della firma grafomentrica sono molteplici: innanzitutto il suo utilizzo comporta la completa dematerializzazione della gestione documentale aziendale con considerevoli risparmi dati dall'annullamento dei costi di stampa ed archiviazione dei documenti stessi, comporta inoltre una maggiore velocità di esecuzione dei processi documentali (dalla realizzazione dei documenti alla ricerca degli stessi) ed infine rende possibile l’ottenimento di documenti già predisposti per la conservazione a norma (con conseguente mantenimento della validità legale nel tempo). Come conseguenza di questa trasposizione dall'analogico al digitale si sono presentate tuttavia problematiche derivanti dalla natura stessa del nuovo contesto; la realizzazione di soluzioni di firma grafometrica richiede quindi una forte attenzione, al fine di evitare che i dati biometrici possano essere utilizzati impropriamente. Questa tesi è quindi volta a descrivere sia a livello normativo che tecnologico questa tipologia di firma elettronica avanzata. Nel corso della trattazione verranno inoltre fornite delle linee guida per la realizzazione di un corretto processo di apposizione della firma grafometrica a tutela della sicurezza dei dati biometrici dell'individuo.
21

Ulmer. "Biometrie und Informatik in Medizin und Biologie". Fischer, 1991. https://ul.qucosa.de/id/qucosa%3A12649.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
22

Deutsche, Gesellschaft für Medizinische Informatik Biometrie und Epidemiologie (GMDS). "Biometrie und Informatik in Medizin und Biologie". Fischer, 2014. https://ul.qucosa.de/id/qucosa%3A12566.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
23

Deutsche, Gesellschaft für Medizinische Informatik Biometrie und Epidemiologie. "Informatik, Biometrie und Epidemiologie in Medizin und Biologie: offizielles Organ der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie (GMDS) e.V". Urban & Fischer, 1995. https://ul.qucosa.de/id/qucosa%3A11661.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
24

Deutsche, Gesellschaft für Medizinische Informatik Biometrie und Epidemiologie. "Informatik, Biometrie und Epidemiologie in Medizin und Biologie: offizielles Organ der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie (GMDS) e.V". Urban & Fischer, 1994. https://ul.qucosa.de/id/qucosa%3A12694.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
25

Deutsche, Gesellschaft für Medizinische Informatik Biometrie und Epidemiologie. "Informatik, Biometrie und Epidemiologie in Medizin und Biologie: offizielles Organ der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie (GMDS) e.V". Urban & Fischer, 1996. https://ul.qucosa.de/id/qucosa%3A12698.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
26

Deutsche, Gesellschaft für Medizinische Informatik Biometrie und Epidemiologie. "Informatik, Biometrie und Epidemiologie in Medizin und Biologie: offizielles Organ der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie (GMDS) e.V". Urban & Fischer, 1997. https://ul.qucosa.de/id/qucosa%3A12700.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
27

Deutsche, Gesellschaft für Medizinische Informatik Biometrie und Epidemiologie. "Informatik, Biometrie und Epidemiologie in Medizin und Biologie: offizielles Organ der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie (GMDS) e.V". Urban & Fischer, 1999. https://ul.qucosa.de/id/qucosa%3A12701.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
28

Deutsche, Gesellschaft für Medizinische Informatik Biometrie und Epidemiologie. "Informatik, Biometrie und Epidemiologie in Medizin und Biologie: offizielles Organ der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie (GMDS) e.V". Urban & Fischer, 2003. https://ul.qucosa.de/id/qucosa%3A12708.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
29

Sinsel, Adam R. "Supporting the maritime information dominance: optimizing tactical network for biometric data sharing in maritime interdiction operations". Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45257.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Approved for public release; distribution is unlimited
This research intends to improve information dominance in the maritime domain by optimizing tactical mobile ad hoc network (MANET) systems for wireless sharing of biometric data in maritime interdiction operations (MIO). Current methods for sharing biometric data in MIO are unnecessarily slow and do not leverage wireless networks at the tactical edge to maximize information dominance. Field experiments allow students to test wireless MANETs at the tactical edge. Analysis is focused on determining optimal MANET design and implementation. It considers various implementations with varied antenna selection, radio power, and frequency specifications, and two specific methods of integrating Department of Defense biometric collection devices to the wireless MANET, which utilizes a single (WR) MPU4 802.11 Wi-Fi access point to connect secure electronic enrollment kit II (SEEK II) biometric devices to the MANET, and tethers each SEEK device to a dedicated WR using a personal Ethernet connection. Biometric data is shared across the tactical network and transmitted to remote servers. Observations and analysis regarding network performance demonstrate that wireless MANETs can be optimized for biometric reach back and integrated with biometric devices to improve biometric data sharing in MIO.
30

Deutsche, Gesellschaft für Medizinische Informatik Biometrie und Epidemiologie. "Informatik, Biometrie und Epidemiologie in Medizin und Biologie: offizielles Organ der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie (GMDS) e.V". Urban & Fischer, 2000. https://ul.qucosa.de/id/qucosa%3A12705.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
31

Deutsche, Gesellschaft für Medizinische Informatik Biometrie und Epidemiologie. "Informatik, Biometrie und Epidemiologie in Medizin und Biologie: offizielles Organ der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie (GMDS) e.V". Urban & Fischer, 1993. https://ul.qucosa.de/id/qucosa%3A12689.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
32

Deutsche, Gesellschaft für Medizinische Informatik Biometrie und Epidemiologie. "Informatik, Biometrie und Epidemiologie in Medizin und Biologie: offizielles Organ der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie (GMDS) e.V". Urban & Fischer, 1998. https://ul.qucosa.de/id/qucosa%3A12720.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
33

Deutsche, Gesellschaft für Medizinische Informatik Biometrie und Epidemiologie. "Informatik, Biometrie und Epidemiologie in Medizin und Biologie: offizielles Organ der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie (GMDS) e.V". Urban & Fischer, 2001. https://ul.qucosa.de/id/qucosa%3A12737.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
34

Leonard, Dwayne Christopher. "A Framework for the Creation of a Unified Electronic Medical Record Using Biometrics, Data Fusion and Belief Theory". Scholarly Repository, 2007. http://scholarlyrepository.miami.edu/oa_dissertations/246.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
The technology exists for the migration of healthcare data from its archaic paper-based system to an electronic one and once in digital form, to be transported anywhere in the world in a matter of seconds. The advent of universally accessible healthcare data benefits all participants, but one of the outstanding problems that must be addressed is how to uniquely identify and link a patient to his or her specific medical data. To date, a few solutions to this problem have been proposed that are limited in their effectiveness. We propose the use of biometric technology within our FIRD framework in solving the unique association of a patient to his or her medical data distinctively. This would allow a patient to have real time access to all of his or her recorded healthcare information electronically whenever it is necessary, securely with minimal effort, greater effectiveness, and ease.
35

Deutsche, Gesellschaft für Medizinische Informatik Biometrie und Epidemiologie. "Informatik, Biometrie und Epidemiologie in Medizin und Biologie: offizielles Organ der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie (GMDS) e.V". Elsevier, Urban & Fischer, 2004. https://ul.qucosa.de/id/qucosa%3A12725.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
36

Deutsche, Gesellschaft für Medizinische Informatik Biometrie und Epidemiologie. "Informatik, Biometrie und Epidemiologie in Medizin und Biologie: offizielles Organ der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie (GMDS) e.V". Urban & Fischer, 2002. https://ul.qucosa.de/id/qucosa%3A12707.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
37

Li, Jiawei. "Person re-identification with limited labeled training data". HKBU Institutional Repository, 2018. https://repository.hkbu.edu.hk/etd_oa/541.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
With the growing installation of surveillance video cameras in both private and public areas, it is an immediate requirement to develop intelligent video analysis system for the large-scale camera network. As a prerequisite step of person tracking and person retrieval in intelligent video analysis, person re-identification, which targets in matching person images across camera views is an important topic in computer vision community and has been received increasing attention in the recent years. In the supervised learning methods, the person re-identification task is formulated as a classification problem to extract matched person images/videos (positives) from unmatched person images/videos (negatives). Although the state-of-the-art supervised classification models could achieve encouraging re-identification performance, the assumption that label information is available for all the cameras, is impractical in large-scale camera network. That is because collecting the label information of every training subject from every camera in the large-scale network can be extremely time-consuming and expensive. While the unsupervised learning methods are flexible, their performance is typically weaker than the supervised ones. Though sufficient labels of the training subjects are not available from all the camera views, it is still reasonable to collect sufficient labels from a pair of camera views in the camera network or a few labeled data from each camera pair. Along this direction, we address two scenarios of person re-identification in large-scale camera network in this thesis, i.e. unsupervised domain adaptation and semi-supervised learning and proposed three methods to learn discriminative model using all available label information and domain knowledge in person re-identification. In the unsupervised domain adaptation scenario, we consider data with sufficient labels as the source domain, while data from the camera pair missing label information as the target domain. A novel domain adaptive approach is proposed to estimate the target label information and incorporate the labeled data from source domain with the estimated target label information for discriminative learning. Since the discriminative constraint of Support Vector Machines (SVM) can be relaxed into a necessary condition, which only relies on the mean of positive pairs (positive mean), a suboptimal classification model learning without target positive data can be those using target positive mean. A reliable positive mean estimation is given by using both the labeled data from the source domain and potential positive data selected from the unlabeled data in the target domain. An Adaptive Ranking Support Vector Machines (AdaRSVM) method is also proposed to improve the discriminability of the suboptimal mean based SVM model using source labeled data. Experimental results demonstrate the effectiveness of the proposed method. Different from the AdaRSVM method that using source labeled data, we can also improve the above mean based method by adapting it onto target unlabeled data. In more general situation, we improve a pre-learned classifier by adapting it onto target unlabeled data, where the pre-learned classifier can be domain adaptive or learned from only source labeled data. Since it is difficult to estimate positives from the imbalanced target unlabeled data, we propose to alternatively estimate positive neighbors which refer to data close to any true target positive. An optimization problem for positive neighbor estimation from unlabeled data is derived and solved by aligning the cross-person score distributions together with optimizing for multiple graphs based label propagation. To utilize the positive neighbors to learn discriminative classification model, a reliable multiple region metric learning method is proposed to learn a target adaptive metric using regularized affine hulls of positive neighbors as positive regions. Experimental results demonstrate the effectiveness of the proposed method. In the semi-supervised learning scenario, we propose a discriminative feature learning using all available information from the surveillance videos. To enrich the labeled data from target camera pair, image sequences (videos) of the tagged persons are collected from the surveillance videos by human tracking. To extract the discriminative and adaptable video feature representation, we propose to model the intra-view variations by a video variation dictionary and a video level adaptable feature by multiple sources domain adaptation and an adaptability-discriminability fusion. First, a novel video variation dictionary learning is proposed to model the large intra-view variations and solved as a constrained sparse dictionary learning problem. Second, a frame level adaptable feature is generated by multiple sources domain adaptation using the variation modeling. By mining the discriminative information of the frames from the reconstruction error of the variation dictionary, an adaptability-discriminability (AD) fusion is proposed to generate the video level adaptable feature. Experimental results demonstrate the effectiveness of the proposed method.
38

Costa, Leandro Garcia da. "Crescimento, desenvolvimento e consumo hídrico de cana-de-açúcar sob dois sistemas de manejo da palha". Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/11/11152/tde-23012017-150113/.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
A determinação da quantidade ideal de palha sobre o solo é uma das questões mais discutidas pelo setor sucroenergético, visto que este resíduo vegetal pode ser considerado um subproduto da cana-de-açúcar destinado à produção de etanol celulósico e cogeração de energia elétrica. Para estabelecer estes valores é necessário considerar as necessidades da cultura, juntamente com características físico-químicas e biológicas do solo. Os modelos de culturas baseados em processos (MCPs), especificamente o APSIM-Sugar, capaz de simular a matéria orgânica sobre o solo, pode ser utilizado em conjunto com experimentos de campo, para auxiliar as tomadas de decisão sobre quais as quantidades ideais de palha em cada sistema de produção de cana-de-açúcar no Brasil. Os MCPs devem ser utilizados para simular o desenvolvimento e o crescimento da cultura, além do balanço de água, nitrogênio e carbono no solo, o que possibilitaria a aplicação dos resultados experimentais em outras regiões de interesse, permitindo visão e compreensão mais amplas das principais questões do setor. Neste contexto, este estudo comparou dois tratamentos: manutenção de 100% da palha (CP) e remoção de 100% da palha (SP) em um experimento irrigado conduzido com a primeira soca da cultivar RB867515, cultivada na região meridional do Brasil, no município de Piracicaba, Estado de São Paulo, Lat. 22,67° S and Long. 47,64° W. Foram realizadas avaliações biométricas mensais, referentes as variáveis, perfilhamento, altura e diâmetro de colmos, índice de área foliar (IAF) e número de folhas verdes, assim como avaliações sobre as massas frescas e secas de folhas, colmos e palmitos. A evapotranspiração da cultura (ETc), foi obtida pelo método da razão de Bowen (MRB) e a partir da reflectometria no domínio da frequência (FDR). O fluxo de seiva pelo método do balanço de calor foi assumido como a transpiração (Tp). Comparando os tratamentos, observou-se diferenças significativas apenas para no IAF e na massa seca de folhas (MSF). A ETc mostrou valores entre 3 e 8 mm dia-1, dependendo das condições climáticas e do estágio da cultura. O coeficiente de cultivo (Kc) apresentou relação inversa com a evapotranspiração de referência (ETo), de tal forma que quando ETo < 2 mm, o Kc(SP) = 1,8 e o Kc(CP) = 1,5, e para situações com ETo > 6mm foram observados Kc(CP) = 1,3 e Kc(SP) = 1,2. O modelo de cultura APSIM-Sugar foi aplicado para diferentes regiões brasileiras, visando a determinação das melhores estratégias de manejo, tanto de água, quanto de solo. As simulações mostraram que, para todas as regiões, a manutenção de no mínimo 50% da palha e a reposição de 25% do total de irrigação, resultou nas maiores taxas de incremento da produtividade da cana-de-açúcar.
Determining the optimal amount of trash blankets above ground is one of the most discussed issues by the sugarcane industry, since this residue can be considered a byproduct of sugarcane due to cellulosic ethanol and electricity cogeneration. To establish these values, it is necessary to consider the crop needs together with physical, chemical and biological soil characteristics. The process based crop models (PBCMs), specifically APSIM-Sugar, able to simulate the soil organic matter, can be used in conjunction with field experiments to support the decision making about the optimum amounts of trash blanket for Brazilian sugarcane farming systems. PBCMs might be used to simulate the crop development and growth, water, nitrogen and carbon soil balances, and make the experiment data applicable for other regions allowing for a broader view and understanding on the key questions. In this context, this study compared two treatments: maintenance of 100% of the trash (CP) and removal of 100% of the trash (SP) in an experiment carried out with an irrigated first ratoon of RB867515 cultivar in Southern Brazil, at city of Piracicaba, State of São Paulo, Lat. 22,67° S and Long. 47,64° W. Monthly biometric evaluations were performed regarding the variables, tillering, stalk\'s height and diameter, leaf area index (LAI) and number of green leaves, as well as fresh and dry mass of leaves, cabbages and stalks. Crop evapotranspiration (ETc) were assessed by Bowen ratio method (MRB) and frequency domain reflectometry (FDR). Sap flow measured by heat balance method was assumed to be the crop transpiration (Tp). APSIM-Sugar crop model was calibrated based on these experimental data, and such model was applied for different Brazilian regions for evaluating the best water-trash management strategies for each region. Comparing both treatments there were just significant differences for leaf area index (LAI) and leaves dry mass (MSF). ETc was ranged from 3 to 8 mm day-1, depending on the weather conditions and crop stage. Crop coefficient (Kc) showed an inverse linear relationship with reference evapotranspiration (ETo), in such way that when ETo < 2 mm, the Kc(SP) = 1,8 and Kc(CP) = 1,5, and for ETo > 6mm it was observed Kc(CP) = 1,3 and Kc(SP) = 1,2. APSIM-Sugar simulations showed that, in the most part of cases, the keeping at least 50% of trash blanket and 25% of total irrigation requirement, resulted on the highest yield rates.
39

Blommé, Johan. "Evaluation of biometric security systems against artificial fingers". Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1145.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:

Verification of users’ identities are normally carried out via PIN-codes or ID- cards. Biometric identification, identification of unique body features, offers an alternative solution to these methods.

Fingerprint scanning is the most common biometric identification method used today. It uses a simple and quick method of identification and has therefore been favored instead of other biometric identification methods such as retina scan or signature verification.

In this report biometric security systems have been evaluated based on fingerprint scanners. The evaluation method focuses on copies of real fingers, artificial fingers, as intrusion method but it also mentions currently used algorithms for identification and strengths and weaknesses in hardware solutions used.

The artificial fingers used in the evaluation were made of gelatin, as it resembles the surface of human skin in ways of moisture, electric resistance and texture. Artificial fingers were based on ten subjects whose real fingers and artificial counterpart were tested on three different fingerprint scanners. All scanners tested accepted artificial fingers as substitutes for real fingers. Results varied between users and scanners but the artificial fingers were accepted between about one forth and half of the times.

Techniques used in image enhancement, minutiae analysis and pattern matching are analyzed. Normalization, binarization, quality markup and low pass filtering are described within image enhancement. In minutiae analysis connectivity numbers, point identification and skeletonization (thinning algorithms) are analyzed. Within pattern matching, direction field analysis and principal component analysis are described. Finally combinations of both minutiae analysis and pattern matching, hybrid models, are mentioned.

Based on experiments made and analysis of used techniques a recommendation for future use and development of fingerprint scanners is made.

40

Zvak, Martin. "Získávání dat z tabletu". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218576.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Reliable authorization and authentication is now becoming necessary for many everyday activities such as boarding an aircraft, doing financial transactions etc. This work deals with the possibility of proposing an appropriate method of acquisition, processing and evaluation of data from the tablet itself, focusing on the possibility of obtaining data from the graphics tablet used in conjunction with a personal computer, for the purpose of verifying identity. It contains an overview of biometrics, as independent developing science over the last decades of the 20th century to the present, a summary of the development of a graphics tablet, the current situation, a brief overview of the most popular technologies used in their construction and distribution. Furthermore, it focuses on the design and implementation of appropriate procedures to obtain data provided by the Trust tablet TB - 7300, using available software development kit for the Microsoft Tablet PC, and a comparison of WinForms and WPF model (.NET Framework), with the declaration of suitability for the use of the second one. Last but not least, according to the response from the available set of users, this work focuses on the design of appropriate types of input data, test patterns, method and application for collecting and processing data from the graphic tablet, as well as their use for the verification of the identity of the individual. Ultimately, it is possible to discuss the accuracy of the method on a set of users, its suitability for use and shortcomings. Based on the analysis of the issue, the proposed method can be declared as under-optimal - it is safe, but inaccurate with low stability and repeatability. It is also important to accent that this is just the initial proposal, the use of applications in everyday life is for current phase impossible and the transition from laboratory conditions would require further development and improvement of the process.
41

Boyanapally, Deepthi. "MERGING OF FINGERPRINT SCANS OBTAINED FROM MULTIPLE CAMERAS IN 3D FINGERPRINT SCANNER SYSTEM". UKnowledge, 2008. http://uknowledge.uky.edu/gradschool_theses/510.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Fingerprints are the most accurate and widely used biometrics for human identification due to their uniqueness, rapid and easy means of acquisition. Contact based techniques of fingerprint acquisition like traditional ink and live scan methods are not user friendly, reduce capture area and cause deformation of fingerprint features. Also, improper skin conditions and worn friction ridges lead to poor quality fingerprints. A non-contact, high resolution, high speed scanning system has been developed to acquire a 3D scan of a finger using structured light illumination technique. The 3D scanner system consists of three cameras and a projector, with each camera producing a 3D scan of the finger. By merging the 3D scans obtained from the three cameras a nail to nail fingerprint scan is obtained. However, the scans from the cameras do not merge perfectly. The main objective of this thesis is to calibrate the system well such that 3D scans obtained from the three cameras merge or align automatically. This error in merging is reduced by compensating for radial distortion present in the projector of the scanner system. The error in merging after radial distortion correction is then measured using the projector coordinates of the scanner system.
42

Giersberg, Mona Franziska [Verfasser]. "Collection of biometric data as an animal based approach for the assessment of minimum space requirements in livestock farming / Mona Franziska Giersberg". Hannover : Bibliothek der Tierärztlichen Hochschule Hannover, 2017. http://d-nb.info/1136159762/34.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
43

Karlsson, Andreas. "Estimation and Inference for Quantile Regression of Longitudinal Data : With Applications in Biostatistics". Doctoral thesis, Uppsala : Acta Universitatis Upsaliensis, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-7186.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
44

Oskarsson, Tim. "Digital incursion: Breaching the android lock screen and liberating data". Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44939.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Android is the most used operating system in the world, because of this the probability of an android device being acquired in an investigation is high. To begin to extract data from an android device you first need to gain access to it. Mechanisms like full system encryption can make this very difficult. In this paper, the advantages and disadvantages of different methods of gaining access and extracting data from an android device with an unlocked bootloader are discussed. Many users unlock the bootloader of their android device to gain a much greater level of control over it. Android forensics on a device without a unlocked bootloader is very limited. It is therefore interesting to study how you can extract data from an android device that doesn’t have this limitation to android forensics. A literature study is done on previous related research to gather methods for gaining access and extracting data. The methods collected are then tested by performing experiments on a Oneplus 3 android 9 and Oneplus 8 android 11. The research of this paper found that it is possible to perform a brute force attack within a reasonable time against a PIN of length 4-5 or pattern of length 4-6 on the lock screen of an android device. It found that you can optimise the attack by performing a dictionary attack by using public lists of the most used PIN codes. A list of all possible pattern combinations sorted and optimised for a dictionary attack is generated based on statistics of pattern starting location and length. A proof of concept is made by creating a copy of a fingerprint with common cheap materials to gain access through the fingerprint sensor. A device image were able to be extracted by using a root shell through Android Debug Bridge and common command-line tools. Memory forensics were performed by using Frida and was able to extract usernames, passwords, and emails from Google Chrome and Gmail. The custom recovery image TWRP was used to boot the device, gain root access, and was able to extract a full device image with common command-line tools. The results of the TWRP backup feature is also analysed. The results of the data extraction is then analysed manually and with Autopsy.
45

Giesa, Anette Isabella. "Play for the Black Box — Using Critical Play to raise awareness of data privacy issues". Thesis, Malmö universitet, Fakulteten för kultur och samhälle (KS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-23959.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
In the development of digitally connected solutions that require the use of personal data, the issue of data privacy is an important factor that must be taken into account. Simply informing users about how data is used and getting their consent with a simple click is not enough to create awareness of the issue of data privacy and let them make a conscious decision about the use of their personal data. Furthermore, there is a big gap in knowledge about what personal data is and what is considered sensitive data. Especially the knowledge about what biometric identifiers that they are used in a variety of everyday life applications and in which sense the handling can be problematic is unknown.This thesis project explores how the use of critical play in form of an activist game can create awareness of the issue of data privacy, inform about the value of biometric data and foster self-reflection of handling one’s own personal data. Through the simulation of dependencies between personal data, the motivation to share them and the aggregation of personal data in combination with real and prospective use cases, players are empowered to reflect on their behaviour and to critically deal with the topic of data privacy.
46

Banerjea-Brodeur, Nicolas Paul. "Advance passenger information passenger name record : privacy rights and security awareness". Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=80909.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
An in-depth study of Advance Passenger Information and Passenger Name Record has never been accomplished prior to the events of September 11 th. It is of great importance to distinguish both of these concepts as they entail different legal consequence. API is to be understood as a data transmission that Border Control Authorities possess in advance in order to facilitate the movements of passengers. It is furthermore imperative that harmonization and inter-operability between States be achieved in order for this system to work. Although the obligations seem to appear for air carriers to be extraneous, the positive impact is greater than the downfalls.
Passenger Name Record access permits authorities to have additional data that could identify individuals requiring more questioning prior to border control clearance. This data does not cause in itself privacy issues other than perhaps the potential retention and manipulation of information that Border Control Authorities may acquire. In essence, bilateral agreements between governments should be sought in order to protect national legislation.
The common goal of the airline industry is to ensure safe and efficient air transport. API and PNR should be viewed as formalities that can facilitate border control clearance and prevent the entrance of potentially high-risk individuals.
47

Suutala, J. (Jaakko). "Learning discriminative models from structured multi-sensor data for human context recognition". Doctoral thesis, Oulun yliopisto, 2012. http://urn.fi/urn:isbn:9789514298493.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Abstract In this work, statistical machine learning and pattern recognition methods were developed and applied to sensor-based human context recognition. More precisely, we concentrated on an effective discriminative learning framework, where input-output mapping is learned directly from a labeled dataset. Non-parametric discriminative classification and regression models based on kernel methods were applied. They include support vector machines (SVM) and Gaussian processes (GP), which play a central role in modern statistical machine learning. Based on these established models, we propose various extensions for handling structured data that usually arise from real-life applications, for example, in a field of context-aware computing. We applied both SVM and GP techniques to handle data with multiple classes in a structured multi-sensor domain. Moreover, a framework for combining data from several sources in this setting was developed using multiple classifiers and fusion rules, where kernel methods are used as base classifiers. We developed two novel methods for handling sequential input and output data. For sequential time-series data, a novel kernel based on graphical presentation, called a weighted walk-based graph kernel (WWGK), is introduced. For sequential output labels, discriminative temporal smoothing (DTS) is proposed. Again, the proposed algorithms are modular, so different kernel classifiers can be used as base models. Finally, we propose a group of techniques based on Gaussian process regression (GPR) and particle filtering (PF) to learn to track multiple targets. We applied the proposed methodology to three different human-motion-based context recognition applications: person identification, person tracking, and activity recognition, where floor (pressure-sensitive and binary switch) and wearable acceleration sensors are used to measure human motion and gait during walking and other activities. Furthermore, we extracted a useful set of specific high-level features from raw sensor measurements based on time, frequency, and spatial domains for each application. As a result, we developed practical extensions to kernel-based discriminative learning to handle many kinds of structured data applied to human context recognition
Tiivistelmä Tässä työssä kehitettiin ja sovellettiin tilastollisen koneoppimisen ja hahmontunnistuksen menetelmiä anturipohjaiseen ihmiseen liittyvän tilannetiedon tunnistamiseen. Esitetyt menetelmät kuuluvat erottelevan oppimisen viitekehykseen, jossa ennustemalli sisääntulomuuttujien ja vastemuuttujan välille voidaan oppia suoraan tunnetuilla vastemuuttujilla nimetystä aineistosta. Parametrittomien erottelevien mallien oppimiseen käytettiin ydinmenetelmiä kuten tukivektorikoneita (SVM) ja Gaussin prosesseja (GP), joita voidaan pitää yhtenä modernin tilastollisen koneoppimisen tärkeimmistä menetelmistä. Työssä kehitettiin näihin menetelmiin liittyviä laajennuksia, joiden avulla rakenteellista aineistoa voidaan mallittaa paremmin reaalimaailman sovelluksissa, esimerkiksi tilannetietoisen laskennan sovellusalueella. Tutkimuksessa sovellettiin SVM- ja GP-menetelmiä moniluokkaisiin luokitteluongelmiin rakenteellisen monianturitiedon mallituksessa. Useiden tietolähteiden käsittelyyn esitetään menettely, joka yhdistää useat opetetut luokittelijat päätöstason säännöillä lopulliseksi malliksi. Tämän lisäksi aikasarjatiedon käsittelyyn kehitettiin uusi graafiesitykseen perustuva ydinfunktio sekä menettely sekventiaalisten luokkavastemuuttujien käsittelyyn. Nämä voidaan liittää modulaarisesti ydinmenetelmiin perustuviin erotteleviin luokittelijoihin. Lopuksi esitetään tekniikoita usean liikkuvan kohteen seuraamiseen. Menetelmät perustuvat anturitiedosta oppivaan GP-regressiomalliin ja partikkelisuodattimeen. Työssä esitettyjä menetelmiä sovellettiin kolmessa ihmisen liikkeisiin liittyvässä tilannetiedon tunnistussovelluksessa: henkilön biometrinen tunnistaminen, henkilöiden seuraaminen sekä aktiviteettien tunnistaminen. Näissä sovelluksissa henkilön asentoa, liikkeitä ja astuntaa kävelyn ja muiden aktiviteettien aikana mitattiin kahdella erilaisella paineherkällä lattia-anturilla sekä puettavilla kiihtyvyysantureilla. Tunnistusmenetelmien laajennuksien lisäksi jokaisessa sovelluksessa kehitettiin menetelmiä signaalin segmentointiin ja kuvaavien piirteiden irroittamiseen matalantason anturitiedosta. Tutkimuksen tuloksena saatiin parannuksia erottelevien mallien oppimiseen rakenteellisesta anturitiedosta sekä erityisesti uusia menettelyjä tilannetiedon tunnistamiseen
48

Gustavsson, Linnéa. "Ansiktsrekonstruktion : Mannen från den medeltida kyrkoruinen S:t Hans, Visby". Thesis, Uppsala universitet, Arkeologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-386062.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Facial reconstructions, like archaeology, consists of many layers that one must get through to understand the whole picture. The development of the methods that reconstructions rely on, occurred during the 20th century. By focusing on the various elements such as studies of tissue depth, chemical processes (DNA and isotope analysis), solid craftsmanship and the development of computer technology, researchers around the world have been able to build a method that can give us an extended understanding of history. However, a lot of opinions have risen for the subject, people begin to question it ́s accuracy and what the real purpose really is. Besides the reliability of facial reconstruction, the experience of how a facial reconstruction is perceived by another person is equally important, the ethical principles have been brought up to discussion because it involves human remains. Discussions may occur during cases when facial reconstructions are inevitable, one example could be with minority groups that have a different view on how a body should be handled and treated after death. These scenarios are more likely to develop in the identification in forensic contexts, but the problem may also increase in archaeological contexts if the remains are from more recent times and the individuals as a population group has suffered repression. Therefore, this paper aims to discuss such questions but also embark on a mission to perform a facial reconstruction of an individual from the medieval church of St. Hans and the challenges that may occur during the way. The American method used in this essay shows that you can get a good result by following the instructions and guidelines that are displayed in various books and articles.
49

Silva, Pedro Alexandre Baptista da. "Estágio em gestão de dados e estatística numa CRO". Master's thesis, Universidade de Aveiro, 2014. http://hdl.handle.net/10773/14012.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Mestrado em Biomedicina Farmacêutica
This report aims to describe my internship in Data Management and Biostatistics in Keypoint. This internship was a practical complement to my theoretical education in the Masters in Pharmaceutical Medicine and this reports serves as a thesis to the 2nd year of the mentioned Masters. This 9 months internship in Keypoint focused in activities of all stages of the services of Data Management and Biostatistics provided by Keypoint, in several different types of projects. These projects covered clinical trials and observational studies, with medicines and food supplements, and a post-graduation thesis in an area not related to clinical research. The internship also included a project that was based on the conduction of interviews. There was the chance to several trainings in the areas of medical writing, medical devices and conduction of interviews. This experience allow me to not only develop hard skills in Data Management and Biostatistics but also to further soft-skills and to better understand the reality of clinical research in Portugal.
Este relatório tem como objectivo descrever o meu estágio em Gestão de Dados e Bioestatística na Keypoint. Este estágio foi um complemento prático do Mestrado em Biomedicina Farmacêutica e este relatório de estágio serve como tese do segundo ano curricular do referido mestrado. Este estágio de 9 meses na Keypoint incluiu actividades de todas as fases dos serviços de Gestão de Dados e Estatística, em diferentes projectos. Estes projectos abrageram ensaios clínicos e estudos observacionais, com medicamentos e suplementos alimentares, e ainda uma tese de pós-graduação não relacionada com investigação clínica. Incluiu também um projecto que tinha como base a realização de entrevistas. Foi possível ainda participar em várias formações, nas áreas de medical writing, dispositivos médicos e entrevistas. Esta experiência permitiu não só desenvolver competências técnicas em Gestão de Dados e Estatística mas também ajudou a desenvolver soft-skills e perceber melhor a realidade da investigação clínica em Portugal.
50

Bezerra, Júnior Murilo Alves. "Pré-processamento dos intervalos de tempos observados na dinâmica de digitação (KeyStroke) de senhas curtas". Pós-Graduação em Ciência da Computação, 2013. https://ri.ufs.br/handle/riufs/3344.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
In 2006, a method was proposed concerning the use of time interval equalization to improve performances of some biometric methods based on typing dynamics (or keystroke). In the paper where that method was first proposed, relatively small databases were used for showing, in terms of error rates, the effect of time equalization applied as a preprocessing step before the use of classical methods. In 2009, a much larger large database for keystroke research was made publicly available, through the Internet. This database is based on a single hypothetical password, typed by 51 volunteers through 8 sessions (50 samples per session). In this dissertation, the preprocessing method is adapted to this large public database of short typing patterns. Thus, by using the same biometric detectors already used by the owners of the database, we obtain new experimental results which clearly show an outstanding performance gain when the equalization interval (preprocessing) is applied. It is also studied the performance gain as a function of the password length (in number of symbols), and the stability of typing pattern against changes in the order of typed symbol pairs. Finally, the last study was carried to a new database we acquired with both direct and inverted sequence of symbols, allows for the analysis of keyboard layout changes on biometric performances.
Em 2006, um método foi proposto sobre o uso da equalização de intervalos de tempos, como forma de melhorar o desempenho de alguns métodos biométricos baseados em dinâmica de digitação (keystroke). Naquele artigo, pequenas bases de dados, com textos estáticos e livres, foram usadas para mostrar, em termos de taxas de erros, os ganhos quando a equalização era aplicada antes do uso de métodos clássicos. Em 2009, lançou-se uma base pública grande, correspondente a uma única senha hipotética curta, digitada por 51 voluntários, usada pelos autores do trabalho e, posteriormente, disponibilizada, publicamente, para novos experimentos. Nesta dissertação utilizou-se essa grande base pública, para a qual adapta-se a equalização de intervalos. Utilizando os mesmos métodos usados pelos proprietários da base experimental, obtém-se resultados que mostram, claramente, um notável ganho de desempenho para todos os métodos testados quando a equalização de intervalos é usada no pré-processamento dos dados. É observado também o desempenho no tocante ao tamanho da senha, e analisa-se a estabilização do padrão de digitação. Por fim, foi realizada a montagem de uma nova base, a partir da qual foi possível verificar e analisar o efeito produzido no ritmo de digitação do usuário devido à troca de caracteres da senha, bem como a influência do seu modo de digitação.

Vá para a bibliografia