Auswahl der wissenschaftlichen Literatur zum Thema „User fingerprint“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "User fingerprint" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "User fingerprint"

1

Sharma, Uttam, Pradeep Tomar, Syed Sadaf Ali, Neetesh Saxena und Robin Singh Bhadoria. „Optimized Authentication System with High Security and Privacy“. Electronics 10, Nr. 4 (13.02.2021): 458. http://dx.doi.org/10.3390/electronics10040458.

Der volle Inhalt der Quelle
Annotation:
Authentication and privacy play an important role in the present electronic world. Biometrics and especially fingerprint-based authentication are extremely useful for unlocking doors, mobile phones, etc. Fingerprint biometrics usually store the attributes of the minutia point of a fingerprint directly in the database as a user template. Existing research works have shown that from such insecure user templates, original fingerprints can be constructed. If the database gets compromised, the attacker may construct the fingerprint of a user, which is a serious security and privacy issue. Security of original fingerprints is therefore extremely important. Ali et al. have designed a system for secure fingerprint biometrics; however, their technique has various limitations and is not optimized. In this paper, first we have proposed a secure technique which is highly robust, optimized, and fast. Secondly, unlike most of the fingerprint biometrics apart from the minutiae point location and orientation, we have used the quality of minutiae points as well to construct an optimized template. Third, the template constructed is in 3D shell shape. We have rigorously evaluated the technique on nine different fingerprint databases. The obtained results from the experiments are highly promising and show the effectiveness of the technique.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Jiang, Bin, Yikun Zhao, Hongmei Yi, Yongxue Huo, Haotian Wu, Jie Ren, Jianrong Ge, Jiuran Zhao und Fengge Wang. „PIDS: A User-Friendly Plant DNA Fingerprint Database Management System“. Genes 11, Nr. 4 (30.03.2020): 373. http://dx.doi.org/10.3390/genes11040373.

Der volle Inhalt der Quelle
Annotation:
The high variability and somatic stability of DNA fingerprints can be used to identify individuals, which is of great value in plant breeding. DNA fingerprint databases are essential and important tools for plant molecular research because they provide powerful technical and information support for crop breeding, variety quality control, variety right protection, and molecular marker-assisted breeding. Building a DNA fingerprint database involves the production of large amounts of heterogeneous data for which storage, analysis, and retrieval are time and resource consuming. To process the large amounts of data generated by laboratories and conduct quality control, a database management system is urgently needed to track samples and analyze data. We developed the plant international DNA-fingerprinting system (PIDS) using an open source web server and free software that has automatic collection, storage, and efficient management functions based on merging and comparison algorithms to handle massive microsatellite DNA fingerprint data. PIDS also can perform genetic analyses. This system can match a corresponding capillary electrophoresis image on each primer locus as fingerprint data to upload to the server. PIDS provides free customization and extension of back-end functions to meet the requirements of different laboratories. This system can be a significant tool for plant breeders and can be applied in forensic science for human fingerprint identification, as well as in virus and microorganism research.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Gabryel, Marcin, Konrad Grzanek und Yoichi Hayashi. „Browser Fingerprint Coding Methods Increasing the Effectiveness of User Identification in the Web Traffic“. Journal of Artificial Intelligence and Soft Computing Research 10, Nr. 4 (01.10.2020): 243–53. http://dx.doi.org/10.2478/jaiscr-2020-0016.

Der volle Inhalt der Quelle
Annotation:
AbstractWeb-based browser fingerprint (or device fingerprint) is a tool used to identify and track user activity in web traffic. It is also used to identify computers that are abusing online advertising and also to prevent credit card fraud. A device fingerprint is created by extracting multiple parameter values from a browser API (e.g. operating system type or browser version). The acquired parameter values are then used to create a hash using the hash function. The disadvantage of using this method is too high susceptibility to small, normally occurring changes (e.g. when changing the browser version number or screen resolution). Minor changes in the input values generate a completely different fingerprint hash, making it impossible to find similar ones in the database. On the other hand, omitting these unstable values when creating a hash, significantly limits the ability of the fingerprint to distinguish between devices. This weak point is commonly exploited by fraudsters who knowingly evade this form of protection by deliberately changing the value of device parameters. The paper presents methods that significantly limit this type of activity. New algorithms for coding and comparing fingerprints are presented, in which the values of parameters with low stability and low entropy are especially taken into account. The fingerprint generation methods are based on popular Minhash, the LSH, and autoencoder methods. The effectiveness of coding and comparing each of the presented methods was also examined in comparison with the currently used hash generation method. Authentic data of the devices and browsers of users visiting 186 different websites were collected for the research.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Ju, Seung-hwan, Hee-suk Seo, Sung-hyu Han, Jae-cheol Ryou und Jin Kwak. „A Study on User Authentication Methodology Using Numeric Password and Fingerprint Biometric Information“. BioMed Research International 2013 (2013): 1–7. http://dx.doi.org/10.1155/2013/427542.

Der volle Inhalt der Quelle
Annotation:
The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Agarwal, Rohit, A. S. Jalal und K. V. Arya. „A review on presentation attack detection system for fake fingerprint“. Modern Physics Letters B 34, Nr. 05 (03.02.2020): 2030001. http://dx.doi.org/10.1142/s021798492030001x.

Der volle Inhalt der Quelle
Annotation:
Fingerprint recognition systems are susceptible to artificial spoof fingerprint attacks, like molds manufactured from polymer, gelatin or Play-Doh. Presentation attack is an open issue for fingerprint recognition systems. In a presentation attack, synthetic fingerprint which is reproduced from a real user is submitted for authentication. Different sensors are used to capture the live and fake fingerprint images. A liveness detection system has been designed to defeat different classes of spoof attacks by differentiating the features of live and fake fingerprint images. In the past few years, many hardware- and software-based approaches are suggested by researchers. However, the issues still remain challenging in terms of robustness, effectiveness and efficiency. In this paper, we explore all kinds of software-based solution to differentiate between real and fake fingerprints and present a comprehensive survey of efforts in the past to address this problem.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Diaz Pineda, Mabel Rocio, Maria Alejandra Dueñas und Karen Dayanna Acevedo. „Fingerprints detection using neural networks suitable to physical changes of fingerprint“. Revista CINTEX 22, Nr. 2 (30.12.2017): 35–50. http://dx.doi.org/10.33131/24222208.271.

Der volle Inhalt der Quelle
Annotation:
This working paper shows the results of finished research, using image processing techniques to improve the fingerprint obtained from a database, where the image is normalized and segmented to get only the section of the image with the fingerprint. Then, the Gabor filter is applied, and it corrects defects in ridges and valleys, allowing continuity. That way, if the fingerprint has a physical defect, the filter can correct it as long as the segment orientation to be correct. Once improved, the fingerprint, it is binarized and thinned for minutiae extraction. The false minutiae are filtered and eliminated in order to ensure the operation of the algorithm. Finally, it is necessary training with the minutiae of all fingerprints in the database, to individually determine which user belongs the fingerprint entered. The system has a reliability of 81% of the process, with the pre-processing part being crucial to guarantee the correct extraction of the characteristics of fingerprints.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Alakhras, Marwan, Mousa Hussein und Mourad Oussalah. „Location Fixing and Fingerprint Matching Fingerprint Map Construction for Indoor Localization“. Journal of Sensors 2020 (17.01.2020): 1–14. http://dx.doi.org/10.1155/2020/7801752.

Der volle Inhalt der Quelle
Annotation:
Building the fingerprint map for indoor localization problems is a labour-intensive and time-consuming process. However, due to its direct influence on the location estimation accuracy, finding a proper mechanism to construct the fingerprint map is essential to enhance the position estimation accuracy. Therefore, in this work, we present a fingerprint map construction technique based on location fix determination and fingerprint matching motivated by the availability of advanced sensing capabilities in smartphones to reduce the time and labour cost required for the site survey. The proposed Location Fixing and Finger Matching (LFFM) method use a landmark graph-based localization approach to automatically estimate the location fixes for the Reference Points and matching the collected fingerprints, without requiring active user participation. Experimental results show that the proposed LFFM is faster than the manual fingerprint map construction method and remarkably improves the positioning accuracy.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Sanchez-Reillo, R., L. Mengibar-Pozo und C. Sanchez-Avila. „Microprocessor smart cards with fingerprint user authentication“. IEEE Aerospace and Electronic Systems Magazine 18, Nr. 3 (März 2003): 22–24. http://dx.doi.org/10.1109/maes.2003.1193715.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Cahyaningtiyas, Rizqia, Efy Yosrita und Rakhmat Arianto. „THE AUTOMATIC DOORS INTEGRATED ABSENCE AND USER ACCESS USING FINGERPRINT“. Jurnal Ilmiah FIFO 8, Nr. 2 (01.11.2016): 147. http://dx.doi.org/10.22441/fifo.v8i2.1309.

Der volle Inhalt der Quelle
Annotation:
This research aims to design Accompanied Door Access System Automation Absence and User Access Rights Using Integrated Fingerprint Database on Basic Computer Lab Informatics STT-PLN. What is meant by "Absent Automation and User Access Rights" among other computerized attendance automatically using fingerprint and right into a room on a predetermined schedule of lectures on computer lab space. System design method used is the method of evolutionary prototype, using MySQL database and coding using Visual C # .NET. These results indicate that the Door Access System Automation Accompanied Absence and User Access Rights Using Integrated Fingerprint Database can help assistants in attendance processing, computer lab room becomes more secure and computerized
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Stanton, Brian, Mary Theofanos, Shahram Orandi, Ross Micheals und Nien-Fan Zhang. „Effects of Scanner Height on Fingerprint Capture“. Proceedings of the Human Factors and Ergonomics Society Annual Meeting 51, Nr. 10 (Oktober 2007): 592–96. http://dx.doi.org/10.1177/154193120705101005.

Der volle Inhalt der Quelle
Annotation:
Although the deployment of biometric technologies such as fingerprints is becoming more widespread, little attention is being paid to the human-computer interaction that such technologies involve. Most biometric systems employ both hardware and software measures to maximize the capture quality of the biometric data. The physical presentation of the biometric data by the participant to the system involves many anthropometric and ergonomic factors that have been largely ignored. This study examined the effect of the height of the sensor on the quality and the time required to collect fingerprints. User performance, both fingerprint quality and timing, was impacted by scanner height.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "User fingerprint"

1

Vondráček, Tomáš. „Získávání informací o uživatelích na webových stránkách“. Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445554.

Der volle Inhalt der Quelle
Annotation:
The aim of the diploma thesis is to map the information provided by web browsers, which can be used in practice to identify users on websites. The work focuses on obtaining and subsequent analysis of information about devices, browsers and side effects caused by web extensions that mask the identity of users. The acquisition of information is realized by a designed and implemented library in the TypeScript language, which was deployed on 4 commercial websites. The analysis of the obtained information is carried out after a month of operation of the library and focuses on the degree of information obtained, the speed of obtaining information and the stability of information. The dataset shows that up to 94 % of potentially different users have a unique combination of information. The main contribution of this work lies in the created library, design of new methods of obtaining information, optimization of existing methods and the determination of quality and poor quality information based on their level of information, speed of acquisition and stability over time.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Al-Harby, Fahad M. „Biometric authentication systems for secured e-transactions in Saudi Arabia. An empirical investigation of the factors affecting users' acceptance of fingerprint authentication systems to improve online security for e-commerce and e-government websites in Saudi Arabia“. Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4415.

Der volle Inhalt der Quelle
Annotation:
Security is becoming an increasingly important issue for business, and with it comes the need for appropriate authentication; consequently, it is becoming gradually more important to develop secure e-commerce systems. Fraud via the web, identity theft, and phishing are raising concerns for users and financial organisations. In addition, current authentication methods, like passwords, have many problems (e.g. some users write them down, they forget them, or they make them easy to hack). We can overcome these drawbacks by using biometric authentication systems. Biometric systems are being used for personal authentication in response to the rising issue of authentication and security. Biometrics provide much promise, in terms of preserving our identities without the inconvenience of carrying ID cards and/or remembering passwords. This research is important because the securing of e-commerce transactions is becoming increasingly important. Identity theft, hacking and viruses are growing threats to Internet users. As more people use the Internet, more identity theft cases are being reported. This could harm not only the users, but also the reputation of the organisations whose names are used in these illegal acts. For example, in the UK, online banking fraud doubled in 2008 compared to 2007. More users took to e-shopping and online banking, but failed to take necessary protection. For non-western cultures, the figures for web security, in 2008, illustrated that Saudi Arabia was ranked ninth worldwide for users who had been attacked over the web. The above statistics reflect the significance of information security with e-commerce systems. As with any new technology, user acceptance of the new technology is often hard to measure. In this thesis, a study of user acceptance of biometric authentication systems in e-transactions, such as online banking, within Saudi society was conducted. It examined whether Saudis are practically willing to accept this technology. This thesis focuses upon Saudi Arabia, which has developing economy. It has achieved a rapid rate of growth, and therefore makes an interesting and unique case study. From an economist¿s point of view, Saudi Arabia is the powerhouse of the Middle East. It has the leading regional economy, and, even though it is still relatively young. It has a young and rapid growing population; therefore, this makes Saudi Arabia an attractive potential market for all kinds of e-commerce applications. Having said that, with more than half of population under the age of 30 are more to be expected to take the risk of accepting new technology. For this work, 306 Saudi participants were involved in the experiments. A laboratory experiment was created that actively tested a biometric authentication system in combination with a survey. The Technology Acceptance Model (TAM) was adopted in the first experimental phase as the theoretical basis on which to develop the iv research framework, the model has proven its efficiency as a good predictor for the biometric authentication system. Furthermore, in a second experimental phase, the Unified Theory of Acceptance and Use of Technology (UTAUT) with moderating variables such as age, gender and education level was examined as a proposed conceptual framework to overcome the limitations of TAM. The aim of the study was to explore factors affecting users¿ acceptance of biometric authentication systems. The findings from Structural Equation Modelling (SEM) analysis indicate that education level is a significant moderating factor, while gender and age do not record as significant. This thesis added new knowledge to this field and highlighted the importance of the perceptions of users regarding biometric security technologies. It helps determine the factors affecting the acceptance of biometric technology. To our knowledge, this is the first systematic study of this issue carried out by academic and non-biased researchers in Saudi Arabia. Furthermore, the thesis presents security technology companies and developers of information security products with information to help in the determination of what is significant to their user base when taking into account the introduction of new secure systems and products.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Al-Harby, Fahad Mohammed. „Biometric authentication systems for secured e-transactions in Saudi Arabia : an empirical investigation of the factors affecting users' acceptance of fingerprint authentication systems to improve online security for e-commerce and e-government websites in Saudi Arabia“. Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4415.

Der volle Inhalt der Quelle
Annotation:
Security is becoming an increasingly important issue for business, and with it comes the need for appropriate authentication; consequently, it is becoming gradually more important to develop secure e-commerce systems. Fraud via the web, identity theft, and phishing are raising concerns for users and financial organisations. In addition, current authentication methods, like passwords, have many problems (e.g. some users write them down, they forget them, or they make them easy to hack). We can overcome these drawbacks by using biometric authentication systems. Biometric systems are being used for personal authentication in response to the rising issue of authentication and security. Biometrics provide much promise, in terms of preserving our identities without the inconvenience of carrying ID cards and/or remembering passwords. This research is important because the securing of e-commerce transactions is becoming increasingly important. Identity theft, hacking and viruses are growing threats to Internet users. As more people use the Internet, more identity theft cases are being reported. This could harm not only the users, but also the reputation of the organisations whose names are used in these illegal acts. For example, in the UK, online banking fraud doubled in 2008 compared to 2007. More users took to e-shopping and online banking, but failed to take necessary protection. For non-western cultures, the figures for web security, in 2008, illustrated that Saudi Arabia was ranked ninth worldwide for users who had been attacked over the web. The above statistics reflect the significance of information security with e-commerce systems. As with any new technology, user acceptance of the new technology is often hard to measure. In this thesis, a study of user acceptance of biometric authentication systems in e-transactions, such as online banking, within Saudi society was conducted. It examined whether Saudis are practically willing to accept this technology. This thesis focuses upon Saudi Arabia, which has developing economy. It has achieved a rapid rate of growth, and therefore makes an interesting and unique case study. From an economist's point of view, Saudi Arabia is the powerhouse of the Middle East. It has the leading regional economy, and, even though it is still relatively young. It has a young and rapid growing population; therefore, this makes Saudi Arabia an attractive potential market for all kinds of e-commerce applications. Having said that, with more than half of population under the age of 30 are more to be expected to take the risk of accepting new technology. For this work, 306 Saudi participants were involved in the experiments. A laboratory experiment was created that actively tested a biometric authentication system in combination with a survey. The Technology Acceptance Model (TAM) was adopted in the first experimental phase as the theoretical basis on which to develop the iv research framework, the model has proven its efficiency as a good predictor for the biometric authentication system. Furthermore, in a second experimental phase, the Unified Theory of Acceptance and Use of Technology (UTAUT) with moderating variables such as age, gender and education level was examined as a proposed conceptual framework to overcome the limitations of TAM. The aim of the study was to explore factors affecting users' acceptance of biometric authentication systems. The findings from Structural Equation Modelling (SEM) analysis indicate that education level is a significant moderating factor, while gender and age do not record as significant. This thesis added new knowledge to this field and highlighted the importance of the perceptions of users regarding biometric security technologies. It helps determine the factors affecting the acceptance of biometric technology. To our knowledge, this is the first systematic study of this issue carried out by academic and non-biased researchers in Saudi Arabia. Furthermore, the thesis presents security technology companies and developers of information security products with information to help in the determination of what is significant to their user base when taking into account the introduction of new secure systems and products.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Jurek, Jakub. „Biometrické rozpoznání živosti prstu“. Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-242191.

Der volle Inhalt der Quelle
Annotation:
This project deals with general biometrics issues focusing on fingerprint biometrics, with description of dermal papillae and principles of fingerprint sensors. Next this work deals with fingerprint liveness detection issues, including description of methods of detection. Next this work describes chosen features for own detection, used database of fingerprints and own algorithm for image pre-processing. Furthermore neural network classifier for liveness detection with chosen features is decribed followed by statistic evaluation of the chosen features and detection results as well as description of the created graphical user interface.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Ismail, Mahado. „Investigation into the significance of monitoring drug use from a fingerprint“. Thesis, University of Surrey, 2018. http://epubs.surrey.ac.uk/849734/.

Der volle Inhalt der Quelle
Annotation:
The use of chemical analysis of fingerprints as an alternative approach for drug testing has become subject of recent publications. However, the significance of the detection of drugs in fingerprints compared to a background population of non-drug users has not yet been explored. In this research, the main area of research was to determine the forensic potential of detecting cocaine and heroin use through the analysis of fingerprints. Fingerprint samples deposited on paper were extracted using an extraction solution (10% dichloromethane in methanol) and analysed using liquid chromatography - mass spectrometry (LC-MS). This research showed that cocaine and benzoylecgonine were detected in 100 and 94% of natural fingerprint samples (n= 65) collected from drug users, and similarly, heroin and 6-acetylmorphine were detected in 98 and 100% of samples (n = 60). Cocaine and benzoylecgonine were also detected in 13 and 5% of natural fingerprints (n = 98) from a background population of non-drug users. In contrast, heroin and 6-acetylmorphine were detected in 0 and 1% of fingerprints from the background population. For cocaine, a threshold level was required to differentiate fingerprints from drug users and environmental exposure in non-drug users (at a ratio analyte (A) to internal standard (IS) 0.015). The analytes of interest could still be detected in fingerprint samples from drug users after a hand cleaning procedure, however this resulted in a lower detection rate compared to natural fingerprints. In contrast, the analytes were not present in fingerprints collected from non-drug users after handwashing (1% false positive rate for cocaine). Furthermore, cocaine, benzoylecgonine, heroin and 6-acetylmorphine can also be detected in fingerprint samples from dermal contact with the parent drug even after the use of hand cleaning procedures. The detection of illicit drugs in fingerprints is therefore not solely indicative of administration of a drug but does indicate that these analytes are not prevalent in a background population of non-drug users. Additionally, the detection of isoniazid and acetylisoniazid in fingerprint samples from tuberculosis medication showed the potential application of fingerprint testing to monitor adherence to drug treatments. The detection window of isoniazid and acetylisoniazid (< 2 days) suggests that a fingerprint may confirm when a patient stops complying to their treatment. This demonstrates that a fingerprint test could confirm non-adherence to treatment, which can be used to help improve treatment plans for patients and improve success rates. Furthermore, the presence of cocaine and benzoylecgonine in urine and saliva collected from drug users was determined using portable mass spectrometry to show the potential for on-site sample analysis for drug testing. Previous work has shown that illicit drugs can be detected in fingerprints, however the suitability of fingerprints for drug testing (namely cocaine and heroin use) has not yet been explored. This research provides information on the influence of the fingerprint sampling strategy, presence of contact residue and transfer of drugs between individuals. These aspects are important to consider in relation to the stages of fingerprint testing and highlight its strengths and weaknesses for further applications (e.g. workplace drug testing, rehabilitation centres and hospitals). To improve fingerprint testing, further work is required on the standardisation of a fingerprint collection procedure, including validation procedures.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Adelantado, Sánchez Carlos. „Use of aspartic acid racemization in fingerprints as a molecular clock“. Master's thesis, Instituto Superior de Ciências da Saúde Egas Moniz, 2014. http://hdl.handle.net/10400.26/6716.

Der volle Inhalt der Quelle
Annotation:
Dissertação de Erasmus Mundus para obtenção do grau de mestre em Técnicas Laboratoriais Forenses
Aspartic acid is the chemical, amongst amino acids, whose racemization process is considered to be the fastest and the most reliable way to conduct an ageing study in some living-being tissues. Racemization is a natural-occurring event in which L-stereoisomer of aspartic acid is converted into D-stereoisomer in an equilibrium dependent on factors namely pH, environmental conditions and, most critically, on temperature.
The main objective of the current study is to assess the influence of temperature on kinetics of aspartic acid racemization and to implement this methodology in fingermarks. The hypothesis is that different starting points of deposition of a biological specimen will give rise to significant differences in L-/D- racemization after the sample has been heated, allowing to determine time since deposition of a fingerprint. In this way, it would be possible to find the time since build a molecular clock for fingerprints, consisting of time since deposition of fingermarks based on racemization degree of aspartic acid.
Firstly, a calibration curve was built within the concentrations range expected to be quantified in actual samples both with L-aspartic acid (L-Asp) and D-aspartic acid (D-Asp) separately, Gas Chromatography - Flame Ionization Detector (GC-FID) being the chosen technique and detection mode to set up the calibration experiments. Secondly, L-aspartic acid standards were treated at different temperatures during different time periods and were analyzed by GC-FID with a chiral column, aimed for detecting D- isomer, providing with information about racemization rate of aspartic acid.
Eventually a downward trend was observed for L-Asp but not for D-Asp and a pseudo-rate constant could be calculated for the former, demonstrating that temperature degrades this chemical. Fingerprints study was not successful to determine aspartic acid racemization but a simple handling of them and an adequate, sensitive response of the chromatographic system could quantify racemization degree.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Wang, Sean. „Use of GPU architecture to optimize Rabin fingerprint data chunking algorithm by concurrent programming“. Thesis, California State University, Long Beach, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10108186.

Der volle Inhalt der Quelle
Annotation:

Data deduplication is introduced as a popular technique used to increase storage efficiency used in various data centers and corporate backup environments. There are various caching techniques and metadata checking available to prevent excessive file scanning. Due to the nature of content addressable chunking algorithm being a serial operation, the data deduplication chunking process often times become the performance bottleneck. This project introduces a parallelized Rabin fingerprint algorithm suitable for GPU hardware architecture that aims to optimize the performance of the deduplication process.

APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Swift, Benjamin. „The use of radio-isotopes in forensic science : the development of the isotope fingerprint analysis“. Thesis, University of Leicester, 2004. http://hdl.handle.net/2381/29475.

Der volle Inhalt der Quelle
Annotation:
It is generally accepted that remains should be no more than 75 years old to warrant police interest. Therefore any reliable dating method should distinguish bones from within this interval accurately from those lying outside of it. Although archaeologists have reliable tools for dating material, pathologists have been unable to devise a method that caters for their specific needs. Previous work has focused upon the physiochemical properties of bone or its organic constituents, though the results have failed to produce a workable calibration system. The first hypothesis of this thesis has confirmed the existence of a predictable and measurable relationship between specific radioisotope concentrations in human bone and the post-mortem interval (PMI). It is predicted that the relationship is such that, once a calibration system has been created, it is possible to accurately estimate the PMI in a set of remains of unknown antiquity. Though concentrating upon 210Pb activities, the study also evaluated additional commonly occurring nuclides, both natural and man-made, the latter being subsequent to nuclear experimentation. The second confirmed hypothesis is that the geographical region an individual lived within becomes imprinted within their skeletal system, such that recognisable relationships between isotopes exist, creating a radio-isotope fingerprint. Examination of these relationships allows identification of the country in which a decedent lived.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Porubsky, Jakub. „Biometric Authentication in M-Payments : Analysing and improving end-users’ acceptability“. Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79221.

Der volle Inhalt der Quelle
Annotation:
Traditional authentication methods like Personal Identification Number (PIN) are getting obsolete and insecure for electronic-payments while mobile-payments are becoming more and more popular. Biometrics such as fingerprint and face recognition authentication methods seem to be a solution to this security issue as they are becoming a regular and integrated part of an average smartphone end-users purchase. However, for mobile-payments to be authenticated by biometrics, end-users acceptability of both technologies must be high. In this research, fingerprint and face recognition authentication methods are being tested with end-users and their current acceptability level is being determined based on interviews which are conducted upon finishing each testing scenario. The interview is using 39 questions which are determining previous usage of the technologies, their likeability, positives, negatives, and feelings about various features biometrics provide such as ease-of-use, stress-free method of payment, security, and many others. Additionally, one more authentication method is tested, namely two factor authentication consisting of one biometric method (fingerprint) and one traditional method (PIN) of authentication. The main goal for testing this method is to find out whether implementing (as currently it is not available) such technology into mobile-payments would be beneficial and how it scored in user-acceptance next to fingerprint and face recognition authentication methods. Once the user-acceptance level is determined the main reasons for it are presented. Last but not least, suggestions for improvements in this domain are presented so that biometrics are even more accepted by end-users who are performing mobile-payments on their smartphones.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Derakhshani, Reza. „Determination of vitality from a non-invasive biomedical measurement for use in integrated biometric devices“. Morgantown, W. Va. : [West Virginia University Libraries], 1999. http://etd.wvu.edu/templates/showETD.cfm?recnum=1035.

Der volle Inhalt der Quelle
Annotation:
Thesis (M.S.)--West Virginia University, 1999.
Title from document title page. Document formatted into pages; contains x, 126 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. [72]-75).
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "User fingerprint"

1

Fingerprint detection with lasers. 2. Aufl. New York: M. Dekker, 1999.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Zofka, Adam, Maria Chrysochoou, Iliya Yut, Chad Johnston, Montgomery Shaw, Shih-Po Sun, James Mahoney, Stuart Farquharson und Michael Donahue. Evaluating Applications of Field Spectroscopy Devices to Fingerprint Commonly Used Construction Materials. Washington, D.C.: Transportation Research Board, 2013. http://dx.doi.org/10.17226/22770.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Menzel, E. Roland. An introduction to lasers, forensic lights, and fluorescent fingerprint detection techniques. Salem, Or: Lightning Powder Co., 1991.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Chrysochoou, Maria, Chad Johnston und Iliya Yut. Evaluating Applications of Field Spectroscopy Devices to Fingerprint Commonly Used Construction Materials (Phase IVâ€"Implementation). Washington, D.C.: Transportation Research Board, 2014. http://dx.doi.org/10.17226/22308.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

International Forensic Symposium on Latent Prints (1987 Quantico, Va.). Proceedings of the International Forensic Symposium on Latent Prints. Washington, D.C: Laboratory Division, Federal Bureau of Investigation, United States Dept. of Justice, 1987.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Kötzing, TCM-Klinik Bad, und University Hospital at Beijing University of Chinese Medicine, Hrsg. Chromatographic fingerprint analysis of herbal medicines: Thin-layer and high performance liquid chromatography of Chinese drugs. 2. Aufl. Wien: Springer, 2011.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Science of Fingerprints: Classification and Uses. Diane Books Publishing Company, 1988.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

United States. Federal Bureau of Investigation., Hrsg. The Science of fingerprints: Classification and uses. Washington, D.C: U.S. Dept. of Justice, Federal Bureau of Investigation, 1985.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Center, National Crime Information, Hrsg. The Science of fingerprints: Classification and uses. 1990.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

The Science of Fingerprints: Classification and Uses. US Government Printing Office, 1985.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "User fingerprint"

1

Khokher, Rohit, und Ram Chandra Singh. „A Graphical User Interface-Based Fingerprint Recognition“. In Mathematical Modelling, Optimization, Analytic and Numerical Solutions, 379–98. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-0928-5_19.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Gil, Younhee, Dosung Ahn, Choonwoo Ryu, Sungbum Pan und Yongwha Chung. „User Enrollment Using Multiple Snapshots of Fingerprint“. In Neural Information Processing, 344–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30499-9_52.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Kwan, Paul W. H., Junbin Gao und Graham Leedham. „A User-Centered Framework for Adaptive Fingerprint Identification“. In Intelligence and Security Informatics, 89–100. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01393-5_10.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Dhaked, Devender, Surendra Yadav, Manish Mathuria und Saroj Agrawal. „User Identification Over Digital Social Network Using Fingerprint Authentication“. In Advances in Intelligent Systems and Computing, 11–22. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-2285-3_2.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Yoon, Eun-Jun, und Kee-Young Yoo. „Secure Fingerprint-Based Remote User Authentication Scheme Using Smartcards“. In Lecture Notes in Computer Science, 405–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11600930_40.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Jiang, Xiang, Shikui Wei, Ruizhen Zhao, Ruoyu Liu, Yufeng Zhao und Yao Zhao. „A Visual Perspective for User Identification Based on Camera Fingerprint“. In Lecture Notes in Computer Science, 52–63. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34110-7_5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Corsetti, Barbara, Raul Sanchez-Reillo und Richard M. Guest. „Ergonomics in Mobile Fingerprint Recognition Systems: A User Interaction Evaluation“. In Advances in Intelligent Systems and Computing, 382–89. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51369-6_51.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Firdaus, Noor Azurati Ahmad und Shamsul Sahibuddin. „Adapted WLAN Fingerprint Indoor Positioning System (IPS) Based on User Orientations“. In Recent Trends in Information and Communication Technology, 226–36. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59427-9_25.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Lee, Youngkwon, und Taekyoung Kwon. „An Improved Fingerprint-Based Remote User Authentication Scheme Using Smart Cards“. In Computational Science and Its Applications - ICCSA 2006, 915–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11751588_95.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Riley, Chris, Graham Johnson, Heather McCracken und Ahmed Al-Saffar. „Instruction, Feedback and Biometrics: The User Interface for Fingerprint Authentication Systems“. In Human-Computer Interaction – INTERACT 2009, 293–305. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03658-3_35.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "User fingerprint"

1

Wenzl, Matthias, und Daniel Kluka. „Adding Channel Security to a Fingerprint Verification Chain“. In ASME 2017 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/detc2017-67356.

Der volle Inhalt der Quelle
Annotation:
Authenticating persons using fingerprints is a widely accepted method in the field of access control, border control, prosecution and many others. Today, fingerprint modules with customizable firmware can be bought commercially off the shelf by hobbyists and small companies to be used in their applications and are usually locally separated from a controller implementing the feature extraction and comparison algorithms. As a matter of fact, the communication channel between the sensor and the controller module is susceptible to eavesdropping and man in the middle attacks. Nevertheless, adding communication channel security to such a system has a direct negative impact on the system’s response time, thus directly affecting user acceptance. The aim of this paper is to provide a comprehensive investigation on measures to counter run-time degredation when adding communication channel security on behalf of an existing fingerprint verification chain. We show that a combination of the elliptic curve Diffie-Hellman key exchange together with AES-256 and the use of parallelization using OpenMP on a controller node leads to an acceptable run time making key creation and exchange upon every fingerprint read request a suitable undertaking.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Sugiura, Atsushi, und Yoshiyuki Koseki. „A user interface using fingerprint recognition“. In the 11th annual ACM symposium. New York, New York, USA: ACM Press, 1998. http://dx.doi.org/10.1145/288392.288575.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Pooja, S., und R. Saritha. „Enhanced fingerprint system with user password“. In 2016 International Conference on Circuits, Controls, Communications and Computing (I4C). IEEE, 2016. http://dx.doi.org/10.1109/cimca.2016.8053281.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Abouollo, Ahmed, und Sultan Almuhammadi. „Detecting malicious user accounts using Canvas Fingerprint“. In 2017 8th International Conference on Information and Communication Systems (ICICS). IEEE, 2017. http://dx.doi.org/10.1109/iacs.2017.7921998.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Blanco-Gonzalo, Ramon, Raul Sanchez-Reillo, Rodrigo Ros-Gomez und Belen Fernandez-Saavedra. „User acceptance of planar semiconductor fingerprint sensors“. In 2015 International Carnahan Conference on Security Technology (ICCST). IEEE, 2015. http://dx.doi.org/10.1109/ccst.2015.7389653.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Sebgui, Marouane, Sliman Bah, Abdelaziz Berrado und Belhaj El Graini. „Enhancing primary user detection through radio frequency fingerprint“. In 2014 Fifth International Conference on Next Generation Networks and Services (NGNS). IEEE, 2014. http://dx.doi.org/10.1109/ngns.2014.6990246.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Gupta, P., S. Ravi, A. Raghunathan und N. K. Jha. „Efficient fingerprint-based user authentication for embedded systems“. In 2005 42nd Design Automation Conference. IEEE, 2005. http://dx.doi.org/10.1109/dac.2005.193809.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Gupta, Pallav, Srivaths Ravi, Anand Raghunathan und Niraj K. Jha. „Efficient fingerprint-based user authentication for embedded systems“. In the 42nd annual conference. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1065579.1065643.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Xu, Jing, Wen-Tao Zhu und Deng-Guo Feng. „Improvement of a Fingerprint-Based Remote User Authentication Scheme“. In 2008 International Conference on Information Security and Assurance ISA. IEEE, 2008. http://dx.doi.org/10.1109/isa.2008.62.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Bae, Geuntae, Hojae Lee, Sunghoon Son, Doha Hwang und Jongseok Kim. „Secure and robust user authentication using partial fingerprint matching“. In 2018 IEEE International Conference on Consumer Electronics (ICCE). IEEE, 2018. http://dx.doi.org/10.1109/icce.2018.8326078.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Berichte der Organisationen zum Thema "User fingerprint"

1

Whitus, B. R., J. S. Goddard, W. B. Jatko, W. W. Manges und D. A. Treece. Low-Speed Fingerprint Image Capture System User`s Guide, June 1, 1993. Office of Scientific and Technical Information (OSTI), Juni 1993. http://dx.doi.org/10.2172/10179252.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Stanton, Brian, Mary Theofanos und Charles Sheppard. A study of users with visual disabilities and a fingerprint process. Gaithersburg, MD: National Institute of Standards and Technology, 2008. http://dx.doi.org/10.6028/nist.ir.7484.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Carasso, Alfred S. The Use of ‘Slow Motion’ Levy Stable Fractional Diffusion Smoothing In Alternative Methods of Latent Fingerprint Enhancement. National Institute of Standards and Technology, April 2013. http://dx.doi.org/10.6028/nist.ir.7932.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Nic Daeid, Niamh, Heather Doran, Lucina Hackman und Pauline Mack. The Curse of the Burial Dagger Teacher Materials. University of Dundee, September 2021. http://dx.doi.org/10.20933/100001220.

Der volle Inhalt der Quelle
Annotation:
The Curse of the Burial Dagger is an interactive graphic novel murder mystery, created by the Leverhulme Research Centre for Forensic Science and digital story studio Fast Familiar. Players use maths, logic and critical reasoning skills to assist Susie uncover different types of forensic evidence and weigh up contrasting hypotheses. Can they uncover the events leading up to Lord Hamilton’s death and deduce how he died…before the curse strikes again? These documents are the Teacher/Group lead pack which contain additional resources including: • The Teacher/Group Lead Pack – Teacher walk through – Factsheet – What is Forensic Science? – Factsheet – What is a hypothesis? – Marzipan Calculation – Factsheet and activity – Fingerprint Analysis – Activity – Chromatography investigation • Printable completion certificate • Printable Note paper and fact-sheet
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Singhvi, Punit, Javier García Mainieri, Hasan Ozer und Brajendra Sharma. Rheology-Chemical Based Procedure to Evaluate Additives/Modifiers Used in Asphalt Binders for Performance Enhancements: Phase 2. Illinois Center for Transportation, Juni 2021. http://dx.doi.org/10.36501/0197-9191/21-020.

Der volle Inhalt der Quelle
Annotation:
The increased use of softer binders in Illinois over the past decade is primarily attributed to the increased use of recycled materials in asphalt pavement construction. The shift in demand of using PG 58-28 over PG 64-22 has resulted in potential alternative methods to produce softer binders more economically using proprietary products. However, there are challenges in using these proprietary products for asphalt modification because of uncertainty in their long-term performance and significant variability in binder chemistry. The current SuperPave performance grading specification for asphalt binders is insufficient in differentiating binders produced from these modifiers. Therefore, the objective of this study is to evaluate the performance of various softener-type asphalt binder modifiers using a wide array of rheological and chemistry tests for their integration into the Illinois Department of Transportation’s material specifications. The small-strain rheological tests and their parameters allowed for consistent grouping of modified binders and can be used as surrogates to identify performing and nonperforming asphalt binders. A new parameter, Δ|G*|peak τ, was developed from the linear amplitude sweep test and showed potential to discriminate binders based on their large-strain behavior. Chemistry-based parameters were shown to track aging and formulation changes. The modifier sources were identified using fingerprint testing and were manifested in the modified binder chemical and compositional characteristics. The two sources of base binders blended with the modifiers governed the aging rate of the modified binders. Mixture performance testing using the Illinois Flexibility Index Test and the Hamburg Wheel-Track Test were consistent with the rheological and chemical findings, except for the glycol amine-based modified binder, which showed the worst cracking performance with the lowest flexibility index among the studied modifiers. This was contrary to its superior rheological performance, which may be attributed to lower thermal stability, resulting in high mass loss during mixing. According to the characterization of field-aged binders, laboratory aging of two pressurized aging vessel cycles or more may represent realistic field aging of 10 to 15 years at the pavement surface and is able to distinguish modified binders. Therefore, an extended aging method of two pressurized aging vessel cycles was recommended for modified binders. Two different testing suites were recommended for product approval protocol with preliminary thresholds for acceptable performance validated with field-aged data.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie