Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: User fingerprint.

Dissertationen zum Thema „User fingerprint“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-25 Dissertationen für die Forschung zum Thema "User fingerprint" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Vondráček, Tomáš. „Získávání informací o uživatelích na webových stránkách“. Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445554.

Der volle Inhalt der Quelle
Annotation:
The aim of the diploma thesis is to map the information provided by web browsers, which can be used in practice to identify users on websites. The work focuses on obtaining and subsequent analysis of information about devices, browsers and side effects caused by web extensions that mask the identity of users. The acquisition of information is realized by a designed and implemented library in the TypeScript language, which was deployed on 4 commercial websites. The analysis of the obtained information is carried out after a month of operation of the library and focuses on the degree of information obtained, the speed of obtaining information and the stability of information. The dataset shows that up to 94 % of potentially different users have a unique combination of information. The main contribution of this work lies in the created library, design of new methods of obtaining information, optimization of existing methods and the determination of quality and poor quality information based on their level of information, speed of acquisition and stability over time.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Al-Harby, Fahad M. „Biometric authentication systems for secured e-transactions in Saudi Arabia. An empirical investigation of the factors affecting users' acceptance of fingerprint authentication systems to improve online security for e-commerce and e-government websites in Saudi Arabia“. Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4415.

Der volle Inhalt der Quelle
Annotation:
Security is becoming an increasingly important issue for business, and with it comes the need for appropriate authentication; consequently, it is becoming gradually more important to develop secure e-commerce systems. Fraud via the web, identity theft, and phishing are raising concerns for users and financial organisations. In addition, current authentication methods, like passwords, have many problems (e.g. some users write them down, they forget them, or they make them easy to hack). We can overcome these drawbacks by using biometric authentication systems. Biometric systems are being used for personal authentication in response to the rising issue of authentication and security. Biometrics provide much promise, in terms of preserving our identities without the inconvenience of carrying ID cards and/or remembering passwords. This research is important because the securing of e-commerce transactions is becoming increasingly important. Identity theft, hacking and viruses are growing threats to Internet users. As more people use the Internet, more identity theft cases are being reported. This could harm not only the users, but also the reputation of the organisations whose names are used in these illegal acts. For example, in the UK, online banking fraud doubled in 2008 compared to 2007. More users took to e-shopping and online banking, but failed to take necessary protection. For non-western cultures, the figures for web security, in 2008, illustrated that Saudi Arabia was ranked ninth worldwide for users who had been attacked over the web. The above statistics reflect the significance of information security with e-commerce systems. As with any new technology, user acceptance of the new technology is often hard to measure. In this thesis, a study of user acceptance of biometric authentication systems in e-transactions, such as online banking, within Saudi society was conducted. It examined whether Saudis are practically willing to accept this technology. This thesis focuses upon Saudi Arabia, which has developing economy. It has achieved a rapid rate of growth, and therefore makes an interesting and unique case study. From an economist¿s point of view, Saudi Arabia is the powerhouse of the Middle East. It has the leading regional economy, and, even though it is still relatively young. It has a young and rapid growing population; therefore, this makes Saudi Arabia an attractive potential market for all kinds of e-commerce applications. Having said that, with more than half of population under the age of 30 are more to be expected to take the risk of accepting new technology. For this work, 306 Saudi participants were involved in the experiments. A laboratory experiment was created that actively tested a biometric authentication system in combination with a survey. The Technology Acceptance Model (TAM) was adopted in the first experimental phase as the theoretical basis on which to develop the iv research framework, the model has proven its efficiency as a good predictor for the biometric authentication system. Furthermore, in a second experimental phase, the Unified Theory of Acceptance and Use of Technology (UTAUT) with moderating variables such as age, gender and education level was examined as a proposed conceptual framework to overcome the limitations of TAM. The aim of the study was to explore factors affecting users¿ acceptance of biometric authentication systems. The findings from Structural Equation Modelling (SEM) analysis indicate that education level is a significant moderating factor, while gender and age do not record as significant. This thesis added new knowledge to this field and highlighted the importance of the perceptions of users regarding biometric security technologies. It helps determine the factors affecting the acceptance of biometric technology. To our knowledge, this is the first systematic study of this issue carried out by academic and non-biased researchers in Saudi Arabia. Furthermore, the thesis presents security technology companies and developers of information security products with information to help in the determination of what is significant to their user base when taking into account the introduction of new secure systems and products.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Al-Harby, Fahad Mohammed. „Biometric authentication systems for secured e-transactions in Saudi Arabia : an empirical investigation of the factors affecting users' acceptance of fingerprint authentication systems to improve online security for e-commerce and e-government websites in Saudi Arabia“. Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4415.

Der volle Inhalt der Quelle
Annotation:
Security is becoming an increasingly important issue for business, and with it comes the need for appropriate authentication; consequently, it is becoming gradually more important to develop secure e-commerce systems. Fraud via the web, identity theft, and phishing are raising concerns for users and financial organisations. In addition, current authentication methods, like passwords, have many problems (e.g. some users write them down, they forget them, or they make them easy to hack). We can overcome these drawbacks by using biometric authentication systems. Biometric systems are being used for personal authentication in response to the rising issue of authentication and security. Biometrics provide much promise, in terms of preserving our identities without the inconvenience of carrying ID cards and/or remembering passwords. This research is important because the securing of e-commerce transactions is becoming increasingly important. Identity theft, hacking and viruses are growing threats to Internet users. As more people use the Internet, more identity theft cases are being reported. This could harm not only the users, but also the reputation of the organisations whose names are used in these illegal acts. For example, in the UK, online banking fraud doubled in 2008 compared to 2007. More users took to e-shopping and online banking, but failed to take necessary protection. For non-western cultures, the figures for web security, in 2008, illustrated that Saudi Arabia was ranked ninth worldwide for users who had been attacked over the web. The above statistics reflect the significance of information security with e-commerce systems. As with any new technology, user acceptance of the new technology is often hard to measure. In this thesis, a study of user acceptance of biometric authentication systems in e-transactions, such as online banking, within Saudi society was conducted. It examined whether Saudis are practically willing to accept this technology. This thesis focuses upon Saudi Arabia, which has developing economy. It has achieved a rapid rate of growth, and therefore makes an interesting and unique case study. From an economist's point of view, Saudi Arabia is the powerhouse of the Middle East. It has the leading regional economy, and, even though it is still relatively young. It has a young and rapid growing population; therefore, this makes Saudi Arabia an attractive potential market for all kinds of e-commerce applications. Having said that, with more than half of population under the age of 30 are more to be expected to take the risk of accepting new technology. For this work, 306 Saudi participants were involved in the experiments. A laboratory experiment was created that actively tested a biometric authentication system in combination with a survey. The Technology Acceptance Model (TAM) was adopted in the first experimental phase as the theoretical basis on which to develop the iv research framework, the model has proven its efficiency as a good predictor for the biometric authentication system. Furthermore, in a second experimental phase, the Unified Theory of Acceptance and Use of Technology (UTAUT) with moderating variables such as age, gender and education level was examined as a proposed conceptual framework to overcome the limitations of TAM. The aim of the study was to explore factors affecting users' acceptance of biometric authentication systems. The findings from Structural Equation Modelling (SEM) analysis indicate that education level is a significant moderating factor, while gender and age do not record as significant. This thesis added new knowledge to this field and highlighted the importance of the perceptions of users regarding biometric security technologies. It helps determine the factors affecting the acceptance of biometric technology. To our knowledge, this is the first systematic study of this issue carried out by academic and non-biased researchers in Saudi Arabia. Furthermore, the thesis presents security technology companies and developers of information security products with information to help in the determination of what is significant to their user base when taking into account the introduction of new secure systems and products.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Jurek, Jakub. „Biometrické rozpoznání živosti prstu“. Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-242191.

Der volle Inhalt der Quelle
Annotation:
This project deals with general biometrics issues focusing on fingerprint biometrics, with description of dermal papillae and principles of fingerprint sensors. Next this work deals with fingerprint liveness detection issues, including description of methods of detection. Next this work describes chosen features for own detection, used database of fingerprints and own algorithm for image pre-processing. Furthermore neural network classifier for liveness detection with chosen features is decribed followed by statistic evaluation of the chosen features and detection results as well as description of the created graphical user interface.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Ismail, Mahado. „Investigation into the significance of monitoring drug use from a fingerprint“. Thesis, University of Surrey, 2018. http://epubs.surrey.ac.uk/849734/.

Der volle Inhalt der Quelle
Annotation:
The use of chemical analysis of fingerprints as an alternative approach for drug testing has become subject of recent publications. However, the significance of the detection of drugs in fingerprints compared to a background population of non-drug users has not yet been explored. In this research, the main area of research was to determine the forensic potential of detecting cocaine and heroin use through the analysis of fingerprints. Fingerprint samples deposited on paper were extracted using an extraction solution (10% dichloromethane in methanol) and analysed using liquid chromatography - mass spectrometry (LC-MS). This research showed that cocaine and benzoylecgonine were detected in 100 and 94% of natural fingerprint samples (n= 65) collected from drug users, and similarly, heroin and 6-acetylmorphine were detected in 98 and 100% of samples (n = 60). Cocaine and benzoylecgonine were also detected in 13 and 5% of natural fingerprints (n = 98) from a background population of non-drug users. In contrast, heroin and 6-acetylmorphine were detected in 0 and 1% of fingerprints from the background population. For cocaine, a threshold level was required to differentiate fingerprints from drug users and environmental exposure in non-drug users (at a ratio analyte (A) to internal standard (IS) 0.015). The analytes of interest could still be detected in fingerprint samples from drug users after a hand cleaning procedure, however this resulted in a lower detection rate compared to natural fingerprints. In contrast, the analytes were not present in fingerprints collected from non-drug users after handwashing (1% false positive rate for cocaine). Furthermore, cocaine, benzoylecgonine, heroin and 6-acetylmorphine can also be detected in fingerprint samples from dermal contact with the parent drug even after the use of hand cleaning procedures. The detection of illicit drugs in fingerprints is therefore not solely indicative of administration of a drug but does indicate that these analytes are not prevalent in a background population of non-drug users. Additionally, the detection of isoniazid and acetylisoniazid in fingerprint samples from tuberculosis medication showed the potential application of fingerprint testing to monitor adherence to drug treatments. The detection window of isoniazid and acetylisoniazid (< 2 days) suggests that a fingerprint may confirm when a patient stops complying to their treatment. This demonstrates that a fingerprint test could confirm non-adherence to treatment, which can be used to help improve treatment plans for patients and improve success rates. Furthermore, the presence of cocaine and benzoylecgonine in urine and saliva collected from drug users was determined using portable mass spectrometry to show the potential for on-site sample analysis for drug testing. Previous work has shown that illicit drugs can be detected in fingerprints, however the suitability of fingerprints for drug testing (namely cocaine and heroin use) has not yet been explored. This research provides information on the influence of the fingerprint sampling strategy, presence of contact residue and transfer of drugs between individuals. These aspects are important to consider in relation to the stages of fingerprint testing and highlight its strengths and weaknesses for further applications (e.g. workplace drug testing, rehabilitation centres and hospitals). To improve fingerprint testing, further work is required on the standardisation of a fingerprint collection procedure, including validation procedures.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Adelantado, Sánchez Carlos. „Use of aspartic acid racemization in fingerprints as a molecular clock“. Master's thesis, Instituto Superior de Ciências da Saúde Egas Moniz, 2014. http://hdl.handle.net/10400.26/6716.

Der volle Inhalt der Quelle
Annotation:
Dissertação de Erasmus Mundus para obtenção do grau de mestre em Técnicas Laboratoriais Forenses
Aspartic acid is the chemical, amongst amino acids, whose racemization process is considered to be the fastest and the most reliable way to conduct an ageing study in some living-being tissues. Racemization is a natural-occurring event in which L-stereoisomer of aspartic acid is converted into D-stereoisomer in an equilibrium dependent on factors namely pH, environmental conditions and, most critically, on temperature.
The main objective of the current study is to assess the influence of temperature on kinetics of aspartic acid racemization and to implement this methodology in fingermarks. The hypothesis is that different starting points of deposition of a biological specimen will give rise to significant differences in L-/D- racemization after the sample has been heated, allowing to determine time since deposition of a fingerprint. In this way, it would be possible to find the time since build a molecular clock for fingerprints, consisting of time since deposition of fingermarks based on racemization degree of aspartic acid.
Firstly, a calibration curve was built within the concentrations range expected to be quantified in actual samples both with L-aspartic acid (L-Asp) and D-aspartic acid (D-Asp) separately, Gas Chromatography - Flame Ionization Detector (GC-FID) being the chosen technique and detection mode to set up the calibration experiments. Secondly, L-aspartic acid standards were treated at different temperatures during different time periods and were analyzed by GC-FID with a chiral column, aimed for detecting D- isomer, providing with information about racemization rate of aspartic acid.
Eventually a downward trend was observed for L-Asp but not for D-Asp and a pseudo-rate constant could be calculated for the former, demonstrating that temperature degrades this chemical. Fingerprints study was not successful to determine aspartic acid racemization but a simple handling of them and an adequate, sensitive response of the chromatographic system could quantify racemization degree.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Wang, Sean. „Use of GPU architecture to optimize Rabin fingerprint data chunking algorithm by concurrent programming“. Thesis, California State University, Long Beach, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10108186.

Der volle Inhalt der Quelle
Annotation:

Data deduplication is introduced as a popular technique used to increase storage efficiency used in various data centers and corporate backup environments. There are various caching techniques and metadata checking available to prevent excessive file scanning. Due to the nature of content addressable chunking algorithm being a serial operation, the data deduplication chunking process often times become the performance bottleneck. This project introduces a parallelized Rabin fingerprint algorithm suitable for GPU hardware architecture that aims to optimize the performance of the deduplication process.

APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Swift, Benjamin. „The use of radio-isotopes in forensic science : the development of the isotope fingerprint analysis“. Thesis, University of Leicester, 2004. http://hdl.handle.net/2381/29475.

Der volle Inhalt der Quelle
Annotation:
It is generally accepted that remains should be no more than 75 years old to warrant police interest. Therefore any reliable dating method should distinguish bones from within this interval accurately from those lying outside of it. Although archaeologists have reliable tools for dating material, pathologists have been unable to devise a method that caters for their specific needs. Previous work has focused upon the physiochemical properties of bone or its organic constituents, though the results have failed to produce a workable calibration system. The first hypothesis of this thesis has confirmed the existence of a predictable and measurable relationship between specific radioisotope concentrations in human bone and the post-mortem interval (PMI). It is predicted that the relationship is such that, once a calibration system has been created, it is possible to accurately estimate the PMI in a set of remains of unknown antiquity. Though concentrating upon 210Pb activities, the study also evaluated additional commonly occurring nuclides, both natural and man-made, the latter being subsequent to nuclear experimentation. The second confirmed hypothesis is that the geographical region an individual lived within becomes imprinted within their skeletal system, such that recognisable relationships between isotopes exist, creating a radio-isotope fingerprint. Examination of these relationships allows identification of the country in which a decedent lived.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Porubsky, Jakub. „Biometric Authentication in M-Payments : Analysing and improving end-users’ acceptability“. Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79221.

Der volle Inhalt der Quelle
Annotation:
Traditional authentication methods like Personal Identification Number (PIN) are getting obsolete and insecure for electronic-payments while mobile-payments are becoming more and more popular. Biometrics such as fingerprint and face recognition authentication methods seem to be a solution to this security issue as they are becoming a regular and integrated part of an average smartphone end-users purchase. However, for mobile-payments to be authenticated by biometrics, end-users acceptability of both technologies must be high. In this research, fingerprint and face recognition authentication methods are being tested with end-users and their current acceptability level is being determined based on interviews which are conducted upon finishing each testing scenario. The interview is using 39 questions which are determining previous usage of the technologies, their likeability, positives, negatives, and feelings about various features biometrics provide such as ease-of-use, stress-free method of payment, security, and many others. Additionally, one more authentication method is tested, namely two factor authentication consisting of one biometric method (fingerprint) and one traditional method (PIN) of authentication. The main goal for testing this method is to find out whether implementing (as currently it is not available) such technology into mobile-payments would be beneficial and how it scored in user-acceptance next to fingerprint and face recognition authentication methods. Once the user-acceptance level is determined the main reasons for it are presented. Last but not least, suggestions for improvements in this domain are presented so that biometrics are even more accepted by end-users who are performing mobile-payments on their smartphones.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Derakhshani, Reza. „Determination of vitality from a non-invasive biomedical measurement for use in integrated biometric devices“. Morgantown, W. Va. : [West Virginia University Libraries], 1999. http://etd.wvu.edu/templates/showETD.cfm?recnum=1035.

Der volle Inhalt der Quelle
Annotation:
Thesis (M.S.)--West Virginia University, 1999.
Title from document title page. Document formatted into pages; contains x, 126 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. [72]-75).
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Collins, Adrian Loric. „The use of composite fingerprints for tracing the source of suspended sediment in river basins“. Thesis, University of Exeter, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.307312.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Bastos, Ana Catarina. „Microbial volatile fingerprints : potential use for soil/water diagnostics and correlation with traditional microbial parameters“. Thesis, Cranfield University, 2007. https://dspace.lib.cranfield.ac.uk/handle/1826/2412.

Der volle Inhalt der Quelle
Annotation:
This project used an electronic nose (E-nose) system composed of an array of 14 nonspecific conducting polymer sensors for soil and water diagnostics, based on qualitative microbial volatile production patterns. It tested the feasibility of using soil microbial volatile fingerprints for detecting and monitoring changes in microbial activity in three soils, as a response to key environmental factors such as temperature (16, 25, 37°C), water potential (-0.7, -2.8 MPa), and nutrient (glucose and wheat straw) inputs. It also investigated their potential use for atrazine detection when applied to soil at usual field application rates (2.5 ppm) as well as for monitoring its bioremediation using the white-rot fungus Trametes versicolor (R26), for up to 24 weeks. Furthermore, statistical correlations were investigated between soil volatile profiles and traditional microbial parameters for characterising microbial communities and their metabolic activities such as respiration, dehydrogenase (DHA) and laccase (LAC) activities, bacterial and fungal colony counts and fungal community structure under different soil conditions. Finally, this study explored the potential of microbial volatile production patterns for monitoring the activity and differentiation of two Streptomyces species (S. aureofaciens A253 and S. griseus A26) in potable water and in soil, as well as the production of geosmin in both environments. Data in this research has demonstrated that the production of volatile organic compounds (VOC) in soil is likely to arise from microbial metabolism. The E-nose was able to detect variations in the patterns of volatile production from soil according to treatments, functioning as indicators of shifts in microbial activity and community structure. The potential for discrimination between soil types in relation to environmental factors and nutrient addition has been demonstrated for the first time using principle component analysis (PCA). Significant (p<0.05) correlations were also found between soil volatile patterns (through PC1) and traditional soil microbial parameters. The close relationship (r>0.80) between PC1 and soil respiration was particularly relevant, since it indicates that microbial volatile fingerprints, similarly to respiration, respond quickly to changes in soil conditions. The sensor array was also able to detect Streptomyces activity and differentiation as well as discriminate between bacterial species at different concentrations in potable water and in soil. Using this approach, the presence of geosmin was detected in water at 0.5 ppb (below its human odour threshold detection, OTD) and in soil at 100 ppb (OTD not established). This study has, therefore, demonstrated that an E-nose can be employed as a rapid, sensitive, reproducible and non-invasive tool for characterising changes in soil environmental conditions, as well as for monitoring key soil processes such as organic matter decomposition and atrazine degradation. It also suggests that this approach can complement, and perhaps replace, some of these methods for a quick and routine evaluation of the impact of environmental factors on soil microbial communities. Furthermore, this study showed that an E-nose can also be employed for assessing Streptomyces activity and detecting geosmin production at an early stage in water and soil.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Reip, Alexander. „Studies on the synthesis and use of rare earth doped nanophosphors for application on latent fingerprints“. Thesis, Brunel University, 2015. http://bura.brunel.ac.uk/handle/2438/11626.

Der volle Inhalt der Quelle
Annotation:
Nanotechnology has been increasingly employed in forensic science for the detection of latent fingerprints, using multiple techniques from new aluminium nanomaterials for dusting to quantum dot dispersions, to try to increase and enhance areas where prints are likely to be found at scenes of crime. Different substrates use a diverse range of methods to develop prints when they are found and each method has its own drawbacks. It is not viable to use many of these techniques in conditions other than in a laboratory due to the harmful environmental effects they can cause over long term use. With this in mind a new easier to use technique that can be used on any substrate from wood to glass to paper was looked into. A range of nano-sized rare earth phosphor precursors were synthesised using homogeneous precipitation and solid state methods which were then converted to phosphors by firing at 980oC. Eu3+ and Tb3+ doped Y2O3, YVO4 and Y2O2S were chosen for their luminescent intensity. Analysis of each of the phosphors was carried out using multiple techniques and a single host lattice chosen for continuation. Y2O3:Eu3+ and Y2O3:Tb3+ were coated using a modified Stöber process to try and decrease the agglomeration of particles as well as allowing for surface modification to take place. Modifications of the surface were prepared and analysed, and these particles were then used in multiple fingerprint examinations to examine the adherence on fingerprints of different ages. The surface modifications manifested great adherence to the fingerprint residue even after two weeks elapsed and showed great promise after a two year period.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Alrashidi, Mohammad Ibrahim. „The use of surface functionalised silica nano-particulate powders for the identification of gunshot residues from fingerprints“. Thesis, University of Central Lancashire, 2014. http://clok.uclan.ac.uk/10423/.

Der volle Inhalt der Quelle
Annotation:
Gunshot residue (GSR) mixture consists of partially burned particles of propellant and characteristic particles of elements originating from the primer, bullet, propellant and some additives in the propellant. Since Harrison and Gillory [1] drew forensic scientists’ attention to the fact that GSR contained trace amounts of inorganic compounds such as lead, barium and antimony, a number of analytical techniques have been tested trying to find and establish sensitive, selective and reliable methods to identify and analyse gunshot residues. The standard procedure for the analysis of gunshot residues involves imaging these small metallic particles using scanning electron microscopy (SEM) and subsequent compositional analysis using Energy Dispersive X-ray Analysis (EDX). This study focuses on the analysis organic compounds in GSR. It is motivated by the increasing need to overcome the problems with the analysis of lead-free ammunitions. A comprehensive literature review was performed in order to determine the most commonly encountered organic compounds in GSR. These compounds include diphenylamine, methylcentralite, ethylcentralite, nitroglycerine, 2-nitrodiphenylamine and 4-nitrodiphenylamine. It has been clearly demonstrated using standard materials and appropriate calibration curves that gas chromatograph and mass spectrometry (GC/MS) is capable of providing limits of detection that are consistent with the concentrations of the key organic constituents found in gunshot residues. Furthermore, we have demonstrated that the relative concentrations of seven key components can be used to provide branding information on the shotgun cartridges. A strong relationship was found between the chemical composition of fired and unfired powder. Therefore, it is possible to differentiate between two ammunition brands through the analysis of the organic constituents. Traditional fingerprint powders such as titanium dioxide, aluminium, carbon black, iron oxide, lycopodium spores and rosin are used to enhance fingerprint left at the scene of crime. More recently nanoparticles have been demonstrated to be highly effective for the enhancement of the fingerprints [2]. Silica nano-particulates of defined size and shape were synthesised and functionalised with two different functional groups (phenyl and long chain hydrocarbon) using a Tri- phasic Reverse Emulsion (TPRE) method. These nano-particulates were characterised using scan electron microscope (SEM), transmission electron microscopy (TEM), elemental analysis, particles size analyser, BET surface area and solid-state nuclear magnetic resonance (NMR) spectroscopy. These powders were used as an effective agent to visualise latent fingerprints on different surfaces. Furthermore, they have been utilised to absorb any organic materials within the fingerprint from the discharged of weapon. Analyses of the adsorbed organic residues were performed using GC/MS and Raman spectroscopy. The results showed that the synthesised silica nano-particulate fingerprint powder gave better result in term of their ability to absorb organic materials in GSR and enhance the visualisation of the latent fingerprint compared to a single commercial powder.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Levin, Anna. „Att mäta och kommunicera hållbart : en analys av ett svenskt jordbruk“. Licentiate thesis, Uppsala universitet, Kulturgeografiska institutionen, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-153362.

Der volle Inhalt der Quelle
Annotation:
Tools that highlight the human impact on ecosystems and the accelerating depletion of natural resources are essential in the strife towards a more sustainable way of living. Emergy analysis is a scientific and robust method to assess the degree of sustainability of human as well as natural systems. Despite the advantages of the method, its public breakthrough has been slow. One reason could be that the results of an emergy analysis are difficult to grasp. In contrast, ecological footprint is a concept that has a widespread impact, much due to its pedagogical disposition. Ecological footprint made use of the vision to develop a method to well communicate the magnitude of human effect on nature. Another more recently created method suitable in this context is ecosystem services. Ecosystem services as a concept is not yet so well developed methodologically, but its use of mainstream concepts point toward a promising application. The main purpose of this study is to make the emergy analysis and ecosystem services methods more accessible and also to facilitate effective communication of the results from these methods. The second part of the study aims to assess the degree of sustainability ofan agricultural system in central Sweden by means of emergy analysis and ecosystems services. By demonstrating the results of the emergy analysis as a foot- and fingerprint, a better understanding of the outcome may be achieved. The footprint, here called emergy-based footprint, visualizes all resources used in the production system. An emergy-based fingerprint identifies the resources of the most important items in the system. Furthermore, ecosystem services are evaluated from a data matrix and presented by means of a radar diagram. Alternative scenarios for the agricultural system were created in the study, each presented as an emergy-based foot- and fingerprint, as well as by means of a radar diagram to visualize the values of the ecosystem services. Together, these methods demonstrate the sustainability characteristics of the different production systems. Results from this study suggest the agricultural system analysed, as well as the developed scenarios, not to be sustainable. The use of emergy analysis combined with ecosystem services and the visualization methods developed in this study, serve to provide accessible and effective communication methods when aiming to transform agricultural systems towards sustainability. The communication methods developed in this study are alsoapplicable in systems other than agriculture.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Batie, Robert B. „Assessing the Effectiveness of a Fingerprint Biometric and a Biometric Personal Identification Number (BIO-PIN™) when used as a Multi-Factor Authentication Mechanism“. NSUWorks, 2016. http://nsuworks.nova.edu/gscis_etd/992.

Der volle Inhalt der Quelle
Annotation:
The issue of traditional user authentication methods, such as username/passwords, when accessing information systems, the Internet, and Web-based applications still pose significant vulnerabilities. The problem of user authentication including physical and logical access appears to have limited, if any, coverage in research from the perspective of biometric as ‘something the user knows.’ Previous methods of establishing ones’ identity by using a password, or presenting a token or identification (ID) card are vulnerable to circumvention by misplacement or unauthorized sharing. The need for reliable user authentication techniques has increased in the wake of heightened concerns about information security and rapid advancements in networking, communication, and mobility. The main goal of this research study was to examine the role of the authentication method (BIO-PIN™ or username/password) and time, on the effectiveness of authentication, as well as the users’ ability to remember the BIO-PIN™ versus username/password (UN/PW). Moreover, this study compared the BIO-PIN™ with a traditional multi-factor biometric authentication using multiple fingerprints (without sequence) and a numerical PIN sequence (noted as "BIO+PIN"). Additionally, this research study examined the authentication methods when controlled for age, gender, user’s computer experience, and number of accounts. This study used a quasi-experimental multiple baseline design method to evaluate the effectiveness of the BIO-PIN™ authentication method. The independent, dependent, and control variables were addressed using descriptive statistics and Multivariate Analysis of Variance (MANOVA) statistical analysis to compare the BIO-PIN™, the BIO+PIN, and UN/PW authentication methods for research questions (RQs) 1 and 2. Additionally, the Multivariate Analysis of Covariance (MANCOVA) was used to address RQ 3 and RQ4, which seeks to test any differences when controlled by age, gender, user experience, and number of accounts. This research study was conducted over a 10-week period with participant engagement occurring over time including a registration week and in intervals of 2 weeks, 3 weeks, and 5 weeks. This study advances the current research in multi-factor biometric authentication and increases the body of knowledge regarding users’ ability to remember industry standard UN/PWs, the BIO-PIN™ sequence, and traditional BIO+PIN.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Al-Duaij, Ali A. „An investigation of the current use of fingerprints in the Saudi justice system and the barriers to their admission as evidence“. Thesis, University of Huddersfield, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.411897.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Planas, Pont Neus. „Ventilator associated pneumonia : analyses of volatile fingerprints for identification of causative microorganisms, assessment of anti-fungals and use of in vitro models for early clinical sample prediction“. Thesis, Cranfield University, 2011. http://dspace.lib.cranfield.ac.uk/handle/1826/5605.

Der volle Inhalt der Quelle
Annotation:
This study has involved the analysis of volatile fingerprints using a hybrid electronic nose (e-nose) to discriminate between and diagnose the microorganisms which cause ventilator–associated pneumonia (VAP), one of the most important infections in the hospital environment. This infection occurs in hospitalised patients with 48-72 hrs of mechanical ventilation. VAP diagnostics still remains a problem due to the lack of a precise diagnostic tool. The current tests are mostly based on quantitative cultures of samples from the lower lung airways with clinical findings, which do not often result in accurate diagnoses of the disease. Cont/d.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Lai, Yi-Yi, und 賴一毅. „A Study of Fingerprint-based Remote User Authentication Scheme using Smart Cards“. Thesis, 2004. http://ndltd.ncl.edu.tw/handle/14781246410009036955.

Der volle Inhalt der Quelle
Annotation:
碩士
東海大學
資訊工程與科學系碩士在職專班
92
In 2002, Lee, Ryu and Yoo proposed a fingerprint-based remote user authentication scheme by using smart cards and biometrics. Their scheme is novel by introducing a fingerprint-based verification into authentication scheme using smart cards. However, their scheme is vulnerable to masquerade attack. In this thesis, we point out a cryptanalysis of Lee-Ryu-Yoo scheme and propose an improved scheme to enhance the security of their scheme in order to overcome the vulnerability. Our scheme which protects the host system can only be accessed by authorized users. Furthermore, considering the user’s habits and requirements, we propose a more flexible scheme, so that the users can conveniently choose and change their passwords. Both of the proposed schemes can withstand replay attack and masquerade attack.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Kjellén, Oliver, und Jillian Pang. „Privatpersoners användning av biometriteknik : Användbarhet, säkerhet och integritet“. Thesis, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-25462.

Der volle Inhalt der Quelle
Annotation:
Bakgrund Biometriteknik är paraplybegrepp för olika automatiserade tekniker som används vid identifikation av individer. Biometriska identifikationsmetoder såsom fingeravtrycksläsning och ansiktsigenkänning har sedan länge varit reserverade för specifika syften. Idag är situationen förändrad, biometriteknik finns tillgänglig för allmänheten och används i allt större utsträckning. Biometriska metoder för identifikation kan erbjuda säkrare identifiering gentemot vanliga lösenord. Detta är av stor vikt då privatpersoner lagrar allt mer känslig information på sina mobiltelefoner, surfplattor och datorer.  Syfte   Syftet med den här studien är att undersöka hur stor inverkan faktorerna användbarhet, säkerhet och integritet har på privatpersoners användning av biometriska metoder för identifiering på mobiltelefoner, surfplattor och datorer. Efter granskning av tidigare forskning gavs dessa tre faktorer extra fokus. Den första faktorn, säkerhet, identifierades i och med att biometriteknik erbjuder förbättrad säkerhet om tekniken används korrekt. Samt att tidigare forskning pekade på säkerhet som en aspekt privatpersoner må ha i åtanke. Den andra faktorn, användbarhet, återfinns i att forskning visar på att individer värderar användbarhet och enkelhet högt. En tredje faktor, integritet, valdes i och med att viss forsking här hade nått motsägande resultat  Metod Rapporten genomfördes främst med hjälp av en kvantitativ enkätundersökning, svar (n=121) från denna undersökning användes senare för att besvara och reflektera kring forskningsfrågan: Hur stor inverkan har faktorerna användbarhet, säkerhet och integritet på privatpersoners användning av biometriteknik? Ett kapitel som namngavs forskningsöversikt inkluderas också, här har litteratur sållats kvalitativt för att finna relevanta artiklar.  Resultat Den enkätundersökning som genomfördes påvisade att en majoritet av privatpersoner använder sig av biometriska identifieringsmetoder på sina mobiltelefoner, surfplattor samt datorer. Vidare visade det sig att faktorn användbarhet värderades högt, vissa fysiologiska egenskaper som används vid biometrisk identifiering ansågs även som mer eller mindre accepterade. Svar som gavs av respondenter visade också på att privatpersoner ej resonerar speciellt mycket kring integritet och personliga data som lagras vid användning av biometriteknik.  Slutsats Efter genomförd diskussion angående tidigare forskning och de resultat som nåddes utifrån enkätundersökningen konstaterades det att faktorn användbarhet hade stor inverkan på privatpersoners användning av biometriteknik. Säkerhet tas även i åtanke av en mindre del. Faktorn integritet ges ingen eller väldigt liten uppmärksamhet gällande användning av biometriska identifieringsmetoder hos privatpersoner.
Background Biometrics is a field including different automated technologies used for thepurpose of identify individuals. Biometric identification methods such asfingerprint scanning and facial recognition used to be a field reserved forspecific application purposes. Nowadays biometrics are used more frequently,and it is available for the public to use in their everyday life. Biometrics canprovide more secure solutions compared to normal passwords, but to achievethis adoption of said methods is key, especially seeing as users store moresensitive and personal data on their smart devices compared to yesterday’s nonsmartphones. Purpose The purpose of this study is to explore how the factors usability, security andprivacy affect people’s use of biometric solutions on their smartphones,tablets, and computers. After thoroughly reviewing previous literature thesethree main factors gained extra focus. The first factor, security, biometrics dooffer greater security advantages when used the right way. Also, previousresearch points towards security as an aspect people should have in mindwhile using biometrics. The second factor, usability, this aspect is based onprevious research showing that people tend to value functions and features thatare usable. A third factor, privacy, was chosen because research showedconflicting results regarding the importance of this factor.  Method This study was conducted primarily through a quantitative survey, answers(n=121) from this survey was later used to reflect upon the research question:How much of an impact does the factors usability, security and privacy haveover peoples use of biometrics? A chapter providing an overview of previousresearch is also included, for this chapter literature has been reviewed in aqualitative matter to sort out relevant research articles.  Results Results from the survey that was conducted showed that most individuals doindeed use biometrics on their mobile phones, tablets, and computers. Datacollected also indicates that the factor usability had a big impact on peoples useof biometrics. People also responded that they saw some physiological traitsused for biometrics as more, or less accepted to be stored and collected. Otheranswers to the survey showed that individuals generally do not care too muchabout their privacy when using biometrics. Conclusion After concluded discussions regarding previous research and the resultscollected from individuals through the survey a conclusion is reached. Thefactor usability had a big impact on individuals use biometrics. A small part ofindividuals does also consider security to be important. However, the factorprivacy was mostly ignored when it comes to using biometrics on smartphones,tablets and computers.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Chigando, Lesole John. „The use of Automated Fingerprint Identification System in identifying fraudulent voters’ registration in Lesotho“. Diss., 2018. http://hdl.handle.net/10500/26475.

Der volle Inhalt der Quelle
Annotation:
The research was prompted by constant criticism of the Independent Electoral Commission (IEC) because of its poor voter registration and voters’ roll. Free and fair elections are the strong arm of democracy. The identified research problem was investigated by means of qualitative research. A thorough literature study from various sources of information, a case file analysis and structured interviews were used to gather the required data. The interviews were conducted with fingerprint experts, a data processor and constituency electoral assistants from the Lesotho Mounted Police Service, the National Identity and Civil Registry at the Ministry of Home Affairs and the IEC respectively. It was found that using fingerprints and the Automated Fingerprint Identification System (AFIS) can assist in investigations and in combating voter’s fraud, as fingerprints are unique. AFIS can be utilised for various purposes by institutions in the private and public sectors. Like any apparatus, AFIS has its own strengths and weaknesses.
Criminology and Security Science
M. Tech. (Forensic investigation)
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Wei, Hsu Kuo, und 徐國偉. „Advanced Fingerprint Recognition System Used In The Study of Home Automation“. Thesis, 2011. http://ndltd.ncl.edu.tw/handle/44774101970188594353.

Der volle Inhalt der Quelle
Annotation:
碩士
聖約翰科技大學
電機工程系碩士班
99
As technology advances, people demand the quality of life will increase. In order to reduce household energy consumption, the market has begun to appear in many water-saving devices. The wisdom of the living environment has become an important trend in future life, in order to allow people of all ages can be high in a low risk to the wisdom of a comfortable living environment, smart home systems research has become more and more flourishing , but security systems has become increasingly important. This paper presents a ZigBee wireless sensor network's communications platform, combined with the power control parameters to detect and monitor the integration of home automation systems. And this system is mainly divided into four modules, namely the intelligent socket module, the central display-cum-monitoring modules, wireless modules, fingerprint recognition module, and through the fingerprint identification system in a modular design with individual security and intelligent application of anti-theft features a variety of patterns.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Matlala, Mpho Mark. „The use of the Automated Fingerprint Identification System to improve the quality of service rendered by the South African Police Service on the East Rand“. Diss., 2012. http://hdl.handle.net/10500/11865.

Der volle Inhalt der Quelle
Annotation:
The globalisation process that drives the progression and trans-national nature of crime requires that the police should use sophisticated and/or state-of-the art technologies to help them to combat criminality. The use of technology by the police is thus viewed as one of the appropriate responses to deal with the threats posed by crime. In an attempt to ascertain the significance of technology in police work, this research examined the impact that the use of biometric technology such as the Automated Fingerprint Identification System, has had on the quality of seiVices rendered by the South African Police Service. Following the police's task of identifying criminal fingerprints, the problem encountered in this research was that, ever since the introduction of the Automated Fingerprint Identification System, no research had been conducted to assess the impact thereof on the level and quality of seiVices rendered by the South African Police SeiVice. This problem was further intensified by the fact that there was no framework to assess the impact that the utilisation of the Automated Fingerprint Identification System has had on police work in South Africa. Consequently, the problems that were identified in this research compromised not only the quality of seiVices rendered by the police, but also the safety and security within communities. The findings in this research showed that the utilisation of biometric technologies such as the Automated Fingerprint Identification System have helped the police to accurately identify and arrest criminal suspects. However, some of the conclusions reached suggested that the quantitative aspect of the utilisation of biometric systems and the elated portable apparatuses within the South African Police Service was emphasised more than the qualitative aspect thereof. The emphasis was evident in the statistics regarding the use of the Automated Fingerprint Identification System, which focused primarily on police productivity and to a lesser degree on accountability related issues. This study espoused a qualitative paradigm and the investigations in the research were focused on the East Rand policing precinct. The participants who informed this research were selected from the research population using random and purposive sampling techniques. In the same way, the data that informed this research was collected using semi-structured interviews and an in-depth review of the literature on policing and its utilisation of the different technologies. The research espoused social constructivism and phenomenology as the philosophical worldviews of choice to form constructivist phenomenology and to attain theoretical triangulation. Moreover, evaluation research and a case study were espoused as the research designs of choice, to attain methodological triangulation. The various triangulation techniques espoused in this research project were critical in attaining quality assurance in terms of the research methodology applied. In the same way, a myriad of qualitative techniques such as dependability, transferability, confimability and credibility were also employed in order to ensure that the integrity of the data that was collected in this study remained intact. Finally, the data that was collected to inform this research was analysed using the qualitative content analysis technique. Similarly, the measures taken to ensure that the safety of the research participants was delineated in this same research report.
Police Practice
M. Tech. (Police Science)
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

„Application of library search techniques of FTIR fingerprint for the identification of traditional Chinese herbal medicine“. 2003. http://library.cuhk.edu.hk/record=b5891453.

Der volle Inhalt der Quelle
Annotation:
Lo, Yu Ching.
Thesis (M.Phil.)--Chinese University of Hong Kong, 2003.
Includes bibliographical references (leaves 79-82).
Abstracts in English and Chinese.
Acknowledgements --- p.i
Abbreviations --- p.ii
Abstract --- p.iii
Table of Contents --- p.v
Chapter Chapter 1 --- Introduction
Chapter 1.1 --- Basic Theory of FTIR --- p.1
Chapter 1.1.1 --- Infrared Spectroscopy --- p.1
Chapter 1.1.2 --- Dispersive Infrared Spectrometer --- p.2
Chapter 1.1.3 --- Fourier Transform Infrared Spectrometer (FTIR) --- p.3
Chapter 1.1.4 --- Advantages of FTIR --- p.5
Chapter 1.1.4.1 --- Multiplex advantage --- p.5
Chapter 1.1.4.2 --- Throughput advantage --- p.5
Chapter 1.2 --- Traditional Chinese Medicine (TCM) --- p.6
Chapter 1.3 --- Identification of Traditional Chinese Herbal Medicine --- p.8
Chapter 1.3.1 --- Traditional method for the identification of TCM --- p.8
Chapter 1.3.2 --- Instrumental method for the identification of TCM --- p.9
Chapter 1.3.2.1 --- Identification of TCM using fingerprint method --- p.9
Chapter 1.3.3 --- Identification of TCM using FTIR fingerprint method --- p.10
Chapter 1.4 --- Objective --- p.11
Chapter Chapter 2 --- Experimental
Chapter 2.1 --- Outline of the Method --- p.12
Chapter 2.2 --- Reagents and Glassware --- p.13
Chapter 2.3 --- Instrumentation --- p.13
Chapter 2.4 --- Library Search Program --- p.13
Chapter 2.5 --- Samples --- p.14
Chapter 2.6 --- Sample Pretreatment --- p.16
Chapter 2.7 --- Extraction of Ingredients --- p.16
Chapter 2.8 --- Preparation of KBr Pellet --- p.17
Chapter 2.9 --- IR Spectrum Measurement --- p.17
Chapter 2.10 --- Data Processing --- p.18
Chapter 2.11 --- IR Databases --- p.18
Chapter 2.12 --- Reproducibility of Extraction --- p.29
Chapter Chapter 3 --- Application of Library Search Techniques - Results and Disscussion
Chapter 3.1 --- Introduction --- p.31
Chapter 3.2 --- Euclidean Search Method --- p.32
Chapter 3.2.1 --- Similarly score of reference spectra --- p.32
Chapter 3.2.2 --- Similarity score of known sample spectra --- p.37
Chapter 3.3 --- Soft Independent Modeling of Class Analogy (SIMCA) --- p.45
Chapter 3.3.1 --- Verification Diagnostic Report of the Reference flowers --- p.47
Chapter 3.3.2 --- Classification of Flowers --- p.51
Chapter 3.4 --- Performance Limitation --- p.75
Chapter 3.4.1 --- Euclidean Search Method --- p.75
Chapter 3.4.2 --- SIMCA --- p.75
Chapter 3.5 --- Conclusion --- p.77
References --- p.79
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Conceição, Marcos Adriano da Palma. „Fatty acid profiles of Sardina pilchardus muscle over the Iberian Atlantic coast and its potential use as a geographic fingerprint“. Master's thesis, 2020. http://hdl.handle.net/10773/30426.

Der volle Inhalt der Quelle
Annotation:
The sardine (Sardina pilchardus) is a key species in Iberian fisheries due to its cultural and economic value. Finding robust tools allowing to trace their geographic origin is paramount for valorization and sustainable stock management. The objective of this work was to assess if sardine muscle’s fatty acid signature can be used to determine its geographical origin. Seven relevant landing ports in sardine’s fishing were selected along the Iberian Atlantic coast for the sampling of this study. The first analytical step was the optimization of the extraction protocol to analyze fatty acid profiles in different biological tissues of sardines, using GC-MS. These first analyses allowed to select sardine’s white muscle as the most suitable tissue for analysis and employ a simplified extraction process. Statistical analysis of the determined fatty acid profiles resulted in a minimum 90% of accuracy probability of correct geographical origin. Correct allocation increased to, at least, 97% when utilizing an optimal fatty acid selection. The fatty acids that most contributed to discriminate between locations were 22:1 n11, 20:1 n-9, 22:5 n-3, 20:5 n-3, and 16:4 n-1. Fatty acid profiles were used to calculate lipid indexes for sardine from different locations, allowing to discriminate between different geographic origins with a minimum of 57% correct group identification. These results improved when considering only two to three locations of origin. Overall, fatty acid profiling is an efficient tool to discriminate the geographic origin of sardines captured along the Iberian Atlantic coast. There is still, however, future work to be done to analyze the interannual variability and the geographical discrimination using a larger sampling group.
A sardinha (Sardina pilchardus) é uma espécie chave nas pescarias Ibéricas devido ao seu valor cultural e económico. Encontrar ferramentas robustas que permitam rastrear a sua origem geográfica é essencial para a valorização e gestão dum stock sustentável. O objetivo deste trabalho foi avaliar se a assinatura de ácidos gordos do músculo de sardinha pode ser utilizada para determinar a sua origem geográfica. Sete portos de desembarque, relevantes na pescaria de sardinha, foram selecionados ao longo da costa Ibérica Atlântica para realizar a amostragem do presente estudo. O primeiro passo desenvolvido foi a otimização de um protocolo de extração para analisar perfis de ácidos gordos em diferentes tecidos da sardinha, utilizando GC-MS. As análises iniciais permitiram eleger o músculo branco da sardinha como o tecido mais adequado para análise e aplicar um processo simplificado de extração. A análise estatística dos perfis de ácidos gordos determinados resultou numa diferenciação com um mínimo de 90% de probabilidade de classificação de origem geográfica correta. A alocação correta do local de origem aumentou para, pelo menos, 97% quando realizada com uma seleção de ácidos gordos otimizada. Os ácidos gordos que mais contribuíram para a discriminação entre localizações foram 22:1 n-11, 20:1 n-9, 22:5 n-3, 20:5 n-3, e 16:4 n-1 Os perfis de ácidos gordos foram usados para calcular índices lipídicos para sardinhas provenientes de diferentes localizações, permitindo estes distinguir diferentes origens geográficas com um mínimo de 57% de probabilidade de identificação correta. Estes resultados melhoraram quando se consideram apenas duas ou três localizações de origem. A análise dos perfis de ácidos gordos mostrou ser uma ferramenta eficiente para discriminar a origem geográfica de sardinhas capturadas ao longo da costa Ibérica Atlântica, mas há ainda trabalho futuro que deve ser levado a cabo para se analisar a variabilidade anual e a discriminação geográfica com uma maior amostragem.
Mestrado em Biologia Aplicada
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie