Dissertationen zum Thema „User fingerprint“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-25 Dissertationen für die Forschung zum Thema "User fingerprint" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Vondráček, Tomáš. „Získávání informací o uživatelích na webových stránkách“. Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445554.
Der volle Inhalt der QuelleAl-Harby, Fahad M. „Biometric authentication systems for secured e-transactions in Saudi Arabia. An empirical investigation of the factors affecting users' acceptance of fingerprint authentication systems to improve online security for e-commerce and e-government websites in Saudi Arabia“. Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4415.
Der volle Inhalt der QuelleAl-Harby, Fahad Mohammed. „Biometric authentication systems for secured e-transactions in Saudi Arabia : an empirical investigation of the factors affecting users' acceptance of fingerprint authentication systems to improve online security for e-commerce and e-government websites in Saudi Arabia“. Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4415.
Der volle Inhalt der QuelleJurek, Jakub. „Biometrické rozpoznání živosti prstu“. Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-242191.
Der volle Inhalt der QuelleIsmail, Mahado. „Investigation into the significance of monitoring drug use from a fingerprint“. Thesis, University of Surrey, 2018. http://epubs.surrey.ac.uk/849734/.
Der volle Inhalt der QuelleAdelantado, Sánchez Carlos. „Use of aspartic acid racemization in fingerprints as a molecular clock“. Master's thesis, Instituto Superior de Ciências da Saúde Egas Moniz, 2014. http://hdl.handle.net/10400.26/6716.
Der volle Inhalt der QuelleAspartic acid is the chemical, amongst amino acids, whose racemization process is considered to be the fastest and the most reliable way to conduct an ageing study in some living-being tissues. Racemization is a natural-occurring event in which L-stereoisomer of aspartic acid is converted into D-stereoisomer in an equilibrium dependent on factors namely pH, environmental conditions and, most critically, on temperature.
The main objective of the current study is to assess the influence of temperature on kinetics of aspartic acid racemization and to implement this methodology in fingermarks. The hypothesis is that different starting points of deposition of a biological specimen will give rise to significant differences in L-/D- racemization after the sample has been heated, allowing to determine time since deposition of a fingerprint. In this way, it would be possible to find the time since build a molecular clock for fingerprints, consisting of time since deposition of fingermarks based on racemization degree of aspartic acid.
Firstly, a calibration curve was built within the concentrations range expected to be quantified in actual samples both with L-aspartic acid (L-Asp) and D-aspartic acid (D-Asp) separately, Gas Chromatography - Flame Ionization Detector (GC-FID) being the chosen technique and detection mode to set up the calibration experiments. Secondly, L-aspartic acid standards were treated at different temperatures during different time periods and were analyzed by GC-FID with a chiral column, aimed for detecting D- isomer, providing with information about racemization rate of aspartic acid.
Eventually a downward trend was observed for L-Asp but not for D-Asp and a pseudo-rate constant could be calculated for the former, demonstrating that temperature degrades this chemical. Fingerprints study was not successful to determine aspartic acid racemization but a simple handling of them and an adequate, sensitive response of the chromatographic system could quantify racemization degree.
Wang, Sean. „Use of GPU architecture to optimize Rabin fingerprint data chunking algorithm by concurrent programming“. Thesis, California State University, Long Beach, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10108186.
Der volle Inhalt der QuelleData deduplication is introduced as a popular technique used to increase storage efficiency used in various data centers and corporate backup environments. There are various caching techniques and metadata checking available to prevent excessive file scanning. Due to the nature of content addressable chunking algorithm being a serial operation, the data deduplication chunking process often times become the performance bottleneck. This project introduces a parallelized Rabin fingerprint algorithm suitable for GPU hardware architecture that aims to optimize the performance of the deduplication process.
Swift, Benjamin. „The use of radio-isotopes in forensic science : the development of the isotope fingerprint analysis“. Thesis, University of Leicester, 2004. http://hdl.handle.net/2381/29475.
Der volle Inhalt der QuellePorubsky, Jakub. „Biometric Authentication in M-Payments : Analysing and improving end-users’ acceptability“. Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79221.
Der volle Inhalt der QuelleDerakhshani, Reza. „Determination of vitality from a non-invasive biomedical measurement for use in integrated biometric devices“. Morgantown, W. Va. : [West Virginia University Libraries], 1999. http://etd.wvu.edu/templates/showETD.cfm?recnum=1035.
Der volle Inhalt der QuelleTitle from document title page. Document formatted into pages; contains x, 126 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. [72]-75).
Collins, Adrian Loric. „The use of composite fingerprints for tracing the source of suspended sediment in river basins“. Thesis, University of Exeter, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.307312.
Der volle Inhalt der QuelleBastos, Ana Catarina. „Microbial volatile fingerprints : potential use for soil/water diagnostics and correlation with traditional microbial parameters“. Thesis, Cranfield University, 2007. https://dspace.lib.cranfield.ac.uk/handle/1826/2412.
Der volle Inhalt der QuelleReip, Alexander. „Studies on the synthesis and use of rare earth doped nanophosphors for application on latent fingerprints“. Thesis, Brunel University, 2015. http://bura.brunel.ac.uk/handle/2438/11626.
Der volle Inhalt der QuelleAlrashidi, Mohammad Ibrahim. „The use of surface functionalised silica nano-particulate powders for the identification of gunshot residues from fingerprints“. Thesis, University of Central Lancashire, 2014. http://clok.uclan.ac.uk/10423/.
Der volle Inhalt der QuelleLevin, Anna. „Att mäta och kommunicera hållbart : en analys av ett svenskt jordbruk“. Licentiate thesis, Uppsala universitet, Kulturgeografiska institutionen, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-153362.
Der volle Inhalt der QuelleBatie, Robert B. „Assessing the Effectiveness of a Fingerprint Biometric and a Biometric Personal Identification Number (BIO-PIN™) when used as a Multi-Factor Authentication Mechanism“. NSUWorks, 2016. http://nsuworks.nova.edu/gscis_etd/992.
Der volle Inhalt der QuelleAl-Duaij, Ali A. „An investigation of the current use of fingerprints in the Saudi justice system and the barriers to their admission as evidence“. Thesis, University of Huddersfield, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.411897.
Der volle Inhalt der QuellePlanas, Pont Neus. „Ventilator associated pneumonia : analyses of volatile fingerprints for identification of causative microorganisms, assessment of anti-fungals and use of in vitro models for early clinical sample prediction“. Thesis, Cranfield University, 2011. http://dspace.lib.cranfield.ac.uk/handle/1826/5605.
Der volle Inhalt der QuelleLai, Yi-Yi, und 賴一毅. „A Study of Fingerprint-based Remote User Authentication Scheme using Smart Cards“. Thesis, 2004. http://ndltd.ncl.edu.tw/handle/14781246410009036955.
Der volle Inhalt der Quelle東海大學
資訊工程與科學系碩士在職專班
92
In 2002, Lee, Ryu and Yoo proposed a fingerprint-based remote user authentication scheme by using smart cards and biometrics. Their scheme is novel by introducing a fingerprint-based verification into authentication scheme using smart cards. However, their scheme is vulnerable to masquerade attack. In this thesis, we point out a cryptanalysis of Lee-Ryu-Yoo scheme and propose an improved scheme to enhance the security of their scheme in order to overcome the vulnerability. Our scheme which protects the host system can only be accessed by authorized users. Furthermore, considering the user’s habits and requirements, we propose a more flexible scheme, so that the users can conveniently choose and change their passwords. Both of the proposed schemes can withstand replay attack and masquerade attack.
Kjellén, Oliver, und Jillian Pang. „Privatpersoners användning av biometriteknik : Användbarhet, säkerhet och integritet“. Thesis, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-25462.
Der volle Inhalt der QuelleBackground Biometrics is a field including different automated technologies used for thepurpose of identify individuals. Biometric identification methods such asfingerprint scanning and facial recognition used to be a field reserved forspecific application purposes. Nowadays biometrics are used more frequently,and it is available for the public to use in their everyday life. Biometrics canprovide more secure solutions compared to normal passwords, but to achievethis adoption of said methods is key, especially seeing as users store moresensitive and personal data on their smart devices compared to yesterday’s nonsmartphones. Purpose The purpose of this study is to explore how the factors usability, security andprivacy affect people’s use of biometric solutions on their smartphones,tablets, and computers. After thoroughly reviewing previous literature thesethree main factors gained extra focus. The first factor, security, biometrics dooffer greater security advantages when used the right way. Also, previousresearch points towards security as an aspect people should have in mindwhile using biometrics. The second factor, usability, this aspect is based onprevious research showing that people tend to value functions and features thatare usable. A third factor, privacy, was chosen because research showedconflicting results regarding the importance of this factor. Method This study was conducted primarily through a quantitative survey, answers(n=121) from this survey was later used to reflect upon the research question:How much of an impact does the factors usability, security and privacy haveover peoples use of biometrics? A chapter providing an overview of previousresearch is also included, for this chapter literature has been reviewed in aqualitative matter to sort out relevant research articles. Results Results from the survey that was conducted showed that most individuals doindeed use biometrics on their mobile phones, tablets, and computers. Datacollected also indicates that the factor usability had a big impact on peoples useof biometrics. People also responded that they saw some physiological traitsused for biometrics as more, or less accepted to be stored and collected. Otheranswers to the survey showed that individuals generally do not care too muchabout their privacy when using biometrics. Conclusion After concluded discussions regarding previous research and the resultscollected from individuals through the survey a conclusion is reached. Thefactor usability had a big impact on individuals use biometrics. A small part ofindividuals does also consider security to be important. However, the factorprivacy was mostly ignored when it comes to using biometrics on smartphones,tablets and computers.
Chigando, Lesole John. „The use of Automated Fingerprint Identification System in identifying fraudulent voters’ registration in Lesotho“. Diss., 2018. http://hdl.handle.net/10500/26475.
Der volle Inhalt der QuelleCriminology and Security Science
M. Tech. (Forensic investigation)
Wei, Hsu Kuo, und 徐國偉. „Advanced Fingerprint Recognition System Used In The Study of Home Automation“. Thesis, 2011. http://ndltd.ncl.edu.tw/handle/44774101970188594353.
Der volle Inhalt der Quelle聖約翰科技大學
電機工程系碩士班
99
As technology advances, people demand the quality of life will increase. In order to reduce household energy consumption, the market has begun to appear in many water-saving devices. The wisdom of the living environment has become an important trend in future life, in order to allow people of all ages can be high in a low risk to the wisdom of a comfortable living environment, smart home systems research has become more and more flourishing , but security systems has become increasingly important. This paper presents a ZigBee wireless sensor network's communications platform, combined with the power control parameters to detect and monitor the integration of home automation systems. And this system is mainly divided into four modules, namely the intelligent socket module, the central display-cum-monitoring modules, wireless modules, fingerprint recognition module, and through the fingerprint identification system in a modular design with individual security and intelligent application of anti-theft features a variety of patterns.
Matlala, Mpho Mark. „The use of the Automated Fingerprint Identification System to improve the quality of service rendered by the South African Police Service on the East Rand“. Diss., 2012. http://hdl.handle.net/10500/11865.
Der volle Inhalt der QuellePolice Practice
M. Tech. (Police Science)
„Application of library search techniques of FTIR fingerprint for the identification of traditional Chinese herbal medicine“. 2003. http://library.cuhk.edu.hk/record=b5891453.
Der volle Inhalt der QuelleThesis (M.Phil.)--Chinese University of Hong Kong, 2003.
Includes bibliographical references (leaves 79-82).
Abstracts in English and Chinese.
Acknowledgements --- p.i
Abbreviations --- p.ii
Abstract --- p.iii
Table of Contents --- p.v
Chapter Chapter 1 --- Introduction
Chapter 1.1 --- Basic Theory of FTIR --- p.1
Chapter 1.1.1 --- Infrared Spectroscopy --- p.1
Chapter 1.1.2 --- Dispersive Infrared Spectrometer --- p.2
Chapter 1.1.3 --- Fourier Transform Infrared Spectrometer (FTIR) --- p.3
Chapter 1.1.4 --- Advantages of FTIR --- p.5
Chapter 1.1.4.1 --- Multiplex advantage --- p.5
Chapter 1.1.4.2 --- Throughput advantage --- p.5
Chapter 1.2 --- Traditional Chinese Medicine (TCM) --- p.6
Chapter 1.3 --- Identification of Traditional Chinese Herbal Medicine --- p.8
Chapter 1.3.1 --- Traditional method for the identification of TCM --- p.8
Chapter 1.3.2 --- Instrumental method for the identification of TCM --- p.9
Chapter 1.3.2.1 --- Identification of TCM using fingerprint method --- p.9
Chapter 1.3.3 --- Identification of TCM using FTIR fingerprint method --- p.10
Chapter 1.4 --- Objective --- p.11
Chapter Chapter 2 --- Experimental
Chapter 2.1 --- Outline of the Method --- p.12
Chapter 2.2 --- Reagents and Glassware --- p.13
Chapter 2.3 --- Instrumentation --- p.13
Chapter 2.4 --- Library Search Program --- p.13
Chapter 2.5 --- Samples --- p.14
Chapter 2.6 --- Sample Pretreatment --- p.16
Chapter 2.7 --- Extraction of Ingredients --- p.16
Chapter 2.8 --- Preparation of KBr Pellet --- p.17
Chapter 2.9 --- IR Spectrum Measurement --- p.17
Chapter 2.10 --- Data Processing --- p.18
Chapter 2.11 --- IR Databases --- p.18
Chapter 2.12 --- Reproducibility of Extraction --- p.29
Chapter Chapter 3 --- Application of Library Search Techniques - Results and Disscussion
Chapter 3.1 --- Introduction --- p.31
Chapter 3.2 --- Euclidean Search Method --- p.32
Chapter 3.2.1 --- Similarly score of reference spectra --- p.32
Chapter 3.2.2 --- Similarity score of known sample spectra --- p.37
Chapter 3.3 --- Soft Independent Modeling of Class Analogy (SIMCA) --- p.45
Chapter 3.3.1 --- Verification Diagnostic Report of the Reference flowers --- p.47
Chapter 3.3.2 --- Classification of Flowers --- p.51
Chapter 3.4 --- Performance Limitation --- p.75
Chapter 3.4.1 --- Euclidean Search Method --- p.75
Chapter 3.4.2 --- SIMCA --- p.75
Chapter 3.5 --- Conclusion --- p.77
References --- p.79
Conceição, Marcos Adriano da Palma. „Fatty acid profiles of Sardina pilchardus muscle over the Iberian Atlantic coast and its potential use as a geographic fingerprint“. Master's thesis, 2020. http://hdl.handle.net/10773/30426.
Der volle Inhalt der QuelleA sardinha (Sardina pilchardus) é uma espécie chave nas pescarias Ibéricas devido ao seu valor cultural e económico. Encontrar ferramentas robustas que permitam rastrear a sua origem geográfica é essencial para a valorização e gestão dum stock sustentável. O objetivo deste trabalho foi avaliar se a assinatura de ácidos gordos do músculo de sardinha pode ser utilizada para determinar a sua origem geográfica. Sete portos de desembarque, relevantes na pescaria de sardinha, foram selecionados ao longo da costa Ibérica Atlântica para realizar a amostragem do presente estudo. O primeiro passo desenvolvido foi a otimização de um protocolo de extração para analisar perfis de ácidos gordos em diferentes tecidos da sardinha, utilizando GC-MS. As análises iniciais permitiram eleger o músculo branco da sardinha como o tecido mais adequado para análise e aplicar um processo simplificado de extração. A análise estatística dos perfis de ácidos gordos determinados resultou numa diferenciação com um mínimo de 90% de probabilidade de classificação de origem geográfica correta. A alocação correta do local de origem aumentou para, pelo menos, 97% quando realizada com uma seleção de ácidos gordos otimizada. Os ácidos gordos que mais contribuíram para a discriminação entre localizações foram 22:1 n-11, 20:1 n-9, 22:5 n-3, 20:5 n-3, e 16:4 n-1 Os perfis de ácidos gordos foram usados para calcular índices lipídicos para sardinhas provenientes de diferentes localizações, permitindo estes distinguir diferentes origens geográficas com um mínimo de 57% de probabilidade de identificação correta. Estes resultados melhoraram quando se consideram apenas duas ou três localizações de origem. A análise dos perfis de ácidos gordos mostrou ser uma ferramenta eficiente para discriminar a origem geográfica de sardinhas capturadas ao longo da costa Ibérica Atlântica, mas há ainda trabalho futuro que deve ser levado a cabo para se analisar a variabilidade anual e a discriminação geográfica com uma maior amostragem.
Mestrado em Biologia Aplicada