To see the other types of publications on this topic, follow the link: BIOMETRIC TOOL.

Journal articles on the topic 'BIOMETRIC TOOL'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'BIOMETRIC TOOL.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

B.R., Rohini, and Thippeswamy G. "BIOMETRICS-A PRELIMINARY APPROACH." International Journal of Research -GRANTHAALAYAH 5, no. 4RACSIT (April 30, 2017): 47–52. http://dx.doi.org/10.29121/granthaalayah.v5.i4racsit.2017.3350.

Full text
Abstract:
Authentication plays a vital role in Information security. The need for identification of legitimate user has increased in the waking concerns for global security. Biometric recognition Systems is a major tool for Authentication mechanism. Biometrics is the ability to identify and authenticate an individual using one or more of their behavioral or physical characteristics. The Study of Different Biometric Modalities gives a better understanding of Biometric Techniques. We focus our Study on Face Biometrics. This paper emphasizes on better understanding of introduction to Biometrics, Biometric Modalities and Face recognition Techniques.
APA, Harvard, Vancouver, ISO, and other styles
2

Kostyuk, Nataliya, Phyadragren Cole, Natarajan Meghanathan, Raphael D. Isokpehi, and Hari H. P. Cohly. "Gas Discharge Visualization: An Imaging and Modeling Tool for Medical Biometrics." International Journal of Biomedical Imaging 2011 (2011): 1–7. http://dx.doi.org/10.1155/2011/196460.

Full text
Abstract:
The need for automated identification of a disease makes the issue of medical biometrics very current in our society. Not all biometric tools available provide real-time feedback. We introduce gas discharge visualization (GDV) technique as one of the biometric tools that have the potential to identify deviations from the normal functional state at early stages and in real time. GDV is a nonintrusive technique to capture the physiological and psychoemotional status of a person and the functional status of different organs and organ systems through the electrophotonic emissions of fingertips placed on the surface of an impulse analyzer. This paper first introduces biometrics and its different types and then specifically focuses on medical biometrics and the potential applications of GDV in medical biometrics. We also present our previous experience with GDV in the research regarding autism and the potential use of GDV in combination with computer science for the potential development of biological pattern/biomarker for different kinds of health abnormalities including cancer and mental diseases.
APA, Harvard, Vancouver, ISO, and other styles
3

Ali, Nadir, M. Asghar Khattak, Samina Kanwal, Noreen Farid, Shehrbano Batool, and Mufassar Nishat. "Comparison of Forensic Value of Biometric Analysis in Face & Ear Recognition in the Punjabi Population, Pakistan." Pakistan Journal of Medical and Health Sciences 16, no. 12 (December 31, 2022): 614–16. http://dx.doi.org/10.53350/pjmhs20221612614.

Full text
Abstract:
Background: The use of face biometrics is very prevalent in forensic investigations for the identification of the perpetrators of crime due to the excessive use of CCTV footage that is usually available at the scene of a crime in urban settings. Ear biometric analysis of ear prints is also in vogue as a result of research advancements in the fields of biometrics. Keeping in view this scenario, it is the need of the hour to analyze the forensic value of this type of forensic evidence and compare these two tools of forensic biometrics. Purpose: To analyze and compare the forensic value of biometric analysis of face and ear print recognitions in the Punjabi population, in Punjab, Pakistan. Study design: This study is conducted by collecting the data from 100 samples of different people belonging to different backgrounds from different cities in Punjab, Pakistan after their informed consent and ethical approval. Their facial photographs and ear prints were collected for proceeding biometric analysis to form a database for comparison and recognition. Method and materials: After collecting data, the comparison is done to see whether we can recognize a person by only using ear print analysis or face biometrics after running a search in our own created database. Moreover, we also calculated the forensic values of this biometric analysis separately on its own and combined these two i.e., face and ear biometrics. . Furthermore, standard deviation, F-statistics, and Chitest p-value were also applied to see the power of discrimination of these two biometric methods of identification Results: In 100 samples, face recognition was proved to be 80 % recognition of identity as compared with only ear prints which showed 56 % accuracy in identifying the individuals who participated in this research. Furthermore, the combined result of both face recognition and ear biometrics showed 90 % recognition of the identity of the individuals. Statistical analysis proved that biometric analysis of the face for recognition of the identity of individuals was more valued as compared with ear print recognition. Also, it was found that if we combine these two methods of biometrics, the forensic value of recognition of individuals has increased and showed good results. Conclusion: The forensic value of biometric evidence of face and ear recognition is a very important tool for the forensic identification of individuals in crime scene investigations. Biometric facial recognition is better as compared to only ear print biometric analysis. Furthermore, using face and ear biometrics enhances the forensic value of biometric analysis. Keywords: Biometric analysis, Forensic value, face recognition, ear print recognition,
APA, Harvard, Vancouver, ISO, and other styles
4

Singh, Bhanu, and Nirvisha Singh. "MoLaBSS: Server-Specific Add-On Biometric Security Layer Model to Enhance the Usage of Biometrics." Information 11, no. 6 (June 8, 2020): 308. http://dx.doi.org/10.3390/info11060308.

Full text
Abstract:
With high-paced growth in biometrics, and its easy availability to capture various biometric features, it is emerging as one of the most valuable technologies for multifactor authentication to verify a user’s identity, for data security. Organizations encourage their members to use biometrics, but they are hesitant to use them due to perceived security risks. Because of its low usage rate, many medium and small segment organizations find it unfeasible to deploy robust biometric systems. We propose a server-specific add-on biometric security layer model (MoLaBSS) to enhance confidence in the usage of biometrics. We tested this model via a biometric mobile app, and the survey showed a favorable response of 80%. The innovative mobile app was tested for its usability and got a score of more than 71%. For test tool reliability, we examined the equal error rate (EER) of the app and got a reasonably low score of 6%. The results show good potential of this framework to enhance users’ confidence level in the usage of biometrics. Higher usage rates may make deployment of biometrics more cost-effective for many organizations to decrease their information security risk.
APA, Harvard, Vancouver, ISO, and other styles
5

Medina Salgado, César. "Biometric identification systems. An organizational control tool." Gestión y Estrategia 30 (July 1, 2006): 35–46. http://dx.doi.org/10.24275/uam/azc/dcsh/gye/2006n30/medina.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Garg, Kriti, Rohan Sachdev, Garima Singh, Pawan Jeet Singh, and Shiv Singh Chauhan. "Tongue Prints: An Emerging Biometric Forensic Tool." Indian Journal of Forensic Medicine & Toxicology 13, no. 4 (2019): 88. http://dx.doi.org/10.5958/0973-9130.2019.00267.6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Deserti, Maria I., and Mauricio O. Zamponi. "Biometric and statistical investigations on the cnidoma of the genus Hydra (Cnidaria, Hydrozoa)." Iheringia. Série Zoologia 102, no. 3 (September 2012): 298–302. http://dx.doi.org/10.1590/s0073-47212012000300008.

Full text
Abstract:
This paper deals about the nematocysts like a source of biometric information for comparison between the species Hydra vulgaris Pallas, 1766, Hydra vulgaris pedunculata Deserti et al., 2011 and Hydra pseudoligactis (Hyman, 1931). This biometric tool lets us carry out statistical comparisons and adding these results to the identification of specimens from different classificatory groups. In this particular study, we obtained significant differences between species, individuals of each species and nematocysts type when compared the biometry of its nematocysts. Another result was the variation in of particular nematocysts, like atrichous isorhiza and holotrichous isorhiza for the species H. vulgaris in relation to the column size.
APA, Harvard, Vancouver, ISO, and other styles
8

Sehrawat, J. S., and D. Sankhyan. "Iris Patterns As A Biometric Tool For Forensic Identifications: A Review." Brazilian Journal of Forensic Sciences, Medical Law and Bioethics 5, no. 4 (2016): 431–40. http://dx.doi.org/10.17063/bjfs5(4)y2016431.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lissin, Polina, Arnold Hamapa, Misaki Kobayashi, Joshua Smith-Sreen, Lauren Etter, Rachel Pieciak, Euphrasia Mukuka, et al. "Relative advantages and compatibility of a biometric patient identification tool in Zambia: a qualitative analysis." Gates Open Research 5 (July 15, 2021): 102. http://dx.doi.org/10.12688/gatesopenres.13265.1.

Full text
Abstract:
Background: The Scanning Ears for Child Health (SEARCH) system is a biometric patient identification tool which uses a pattern recognition algorithm to translate an image of the ear into a unique identifier. If integrated into an electronic medical records (EMR) system, it would provide a patient identification solution that replaces unreliable paper, under-five card (UFC), or number-based identifiers. This study aims to understand the relative advantage of the biometric system, the sociocultural and pragmatic compatibility, and the extent of UFC deterioration over time. Methods: Interviews on impressions of the novel biometric patient identification tool were conducted in urban and rural settings in Zambia. Focus group discussions included 59 participants and key informant interviews included 5 healthcare workers and 2 government officials. Transcripts were coded into thematic categories for analysis. We sought to understand 1) the perceived relative advantage of a biometric system over the traditional UFCs among Zambian mothers, 2) the perceived sociocultural compatibility of a biometric system in the healthcare setting, and 3) pragmatic compatibility of the proposed system. Results: We found that the current UFC system presents issues for continuity of care and quality of data management, therefore posing disadvantages relative to the proposed system. Sociocultural and pragmatic barriers to acceptance included the existing fear of Satanism and electrical power issues throughout Zambia. Mothers and healthcare workers expressed that adoption of the biometric system could be successful given efforts to sensitize the community. Conclusions: Switching to an EMR backed by biometric identification would fill a critical gap in Zambian healthcare information systems and has numerous perceived advantages in both urban and rural settings. We determine that strategies for implementation should be localized, context informed, and conducted by trusted community members with knowledge of best approaches to diffusing information and a deep understanding of the novel biometric system.
APA, Harvard, Vancouver, ISO, and other styles
10

Sayoud, Halim. "Biometrics." International Journal of Technoethics 2, no. 1 (January 2011): 19–34. http://dx.doi.org/10.4018/jte.2011010102.

Full text
Abstract:
The term biometrics is derived from the Greek words: bio (life) and metrics (to measure). “Biometric technologies” are defined as automated methods of verifying or recognizing the identity of a living person based on a physiological or behavioral characteristic. Several techniques and features were used over time to recognize human beings several years before the birth of Christ. Today, this research field has become very employed in many applications such as security applications, multimedia applications and banking applications. Also, many methods have been developed to strengthen the biometric accuracy and reduce the imposture errors by using several features such as face, speech, iris, finger vein, etc. From a security purpose and economic point of view, biometrics has brought a great benefit and has become an important tool for governments and institutions. However, citizens are expressing their thorough worry, which is due to the freedom limitations and loss of privacy. This paper briefly presents some new technologies that have recently been proposed in biometrics with their levels of reliability, and discusses the different social and ethic problems that may result from the abusive use of these technologies.
APA, Harvard, Vancouver, ISO, and other styles
11

Kaul, Bhavna, Shivam Gupta, Vasu Vaid, and Sambhav Kaul. "Forensic Odontological Parameters as Biometric Tool: A Review." International Journal of Clinical Pediatric Dentistry 14, no. 3 (September 17, 2021): 416–19. http://dx.doi.org/10.5005/jp-journals-10005-1967.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Kot, Edyta. "Development of a technologically advanced IT system enabling automated processing of information collected in forensic biometric databases in order to combat crime or identify people." Issues of Forensic Science 308 (2020): 69–74. http://dx.doi.org/10.34836/pk.2020.308.5.

Full text
Abstract:
Forensic biometric databases are an out of court tool to support the work of law enforcement agencies. They are used to detect the perpetrators of crimes, indicate the connections of a person with previously committed crimes, and allow the identification of living persons and corpses with unknown identity or individuals trying to hide their identity. In police practice, among the methods of identification of living persons and corpses, fingerprint and DNA tests are mainly used. These two forensic areas are supported by such tools such as AFIS (Automatic Fingerprint Identification System) and CODIS (Combined DNA Index System). These are the main police systems operating within two datasets, namely the dactyloscopic dataset and the DNA dataset. The systems are operating in two different locations of the Central Forensic Laboratory of the Police (CFLP). This results in the processing of individual biometric data independently of each other at different times and locations (Fingerprint Examination Department and Biology Department). Currently, there is no comprehensive approach to the collection and processing of biometric data such as fingerprints, DNA or facial images. To improve the exchange of information between police authorities, in July 2019, the Central Forensic Laboratory of the Police submitted a project application, and on 25 November 2019 signed with the National Center for Research and Development the grant agreement no. DOB – BIO10/09/01/2019 for the implementation and financing of the project in the area of state defense and security (competition no. 10/2019) entitled “Development of a technologically advanced information system enabling automated processing of information collected in forensic biometric databases for the purpose of combating crime or identifying people – acronym “BIOMETRIA”.
APA, Harvard, Vancouver, ISO, and other styles
13

Etter, Lauren, Alinani Simukanga, Wenda Qin, Rachel Pieciak, Lawrence Mwananyanda, Margrit Betke, Jackson Phiri, Caroline Carbo, Arnold Hamapa, and Chris Gill. "Project SEARCH (Scanning EARs for Child Health): validating an ear biometric tool for patient identification in Zambia." Gates Open Research 4 (November 6, 2020): 168. http://dx.doi.org/10.12688/gatesopenres.13197.1.

Full text
Abstract:
Patient identification in low- to middle-income countries is one of the most pressing public health challenges of our day. Given the ubiquity of mobile phones, their use for health-care coupled with a biometric identification method, present a unique opportunity to address this challenge. Our research proposes an Android-based solution of an ear biometric tool for reliable identification. Unlike many popular biometric approaches (e.g., fingerprints, irises, facial recognition), ears are noninvasive and easily accessible on individuals across a lifespan. Our ear biometric tool uses a combination of hardware and software to identify a person using an image of their ear. The hardware supports an image capturing process that reduces undesired variability. The software uses a pattern recognition algorithm to transform an image of the ear into a unique identifier. We created three cross-sectional datasets of ear images, each increasing in complexity, with the final dataset representing our target use-case population of Zambian infants (N=224, aged 6days-6months). Using these datasets, we conducted a series of validation experiments, which informed iterative improvements to the system. Results of the improved system, which yielded high recognition rates across the three datasets, demonstrate the feasibility of an Android ear biometric tool as a solution to the persisting patient identification challenge.
APA, Harvard, Vancouver, ISO, and other styles
14

Radhika, T., Nadeem Jeddy, and S. Nithya. "Tongue prints: A novel biometric and potential forensic tool." Journal of Forensic Dental Sciences 8, no. 3 (2016): 117. http://dx.doi.org/10.4103/0975-1475.195119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Shalsabila, Atsila, and Riki Mukhaiyar. "Perancangan Alat Pendeteksi Iris Mata Menggunakan Metode Wavelet Filter." JTEV (Jurnal Teknik Elektro dan Vokasional) 8, no. 2 (October 17, 2022): 433. http://dx.doi.org/10.24036/jtev.v8i2.118360.

Full text
Abstract:
The development of biometric technolgy is growing so that many recognition systems use biometrics in the form of physical characteristics and behavioral characteristics. Physical characteristics such as fingerprints, retina of the eye, face, and iris. While the behavioral characteristics include signatures, gait, and voice. One of the biometric parts used as an identifier is iris recognition using mathematical techniques. The iris of the eye has a unique and distinct pattern for each individual with stable identification and tends to remain unchanged. This study aims to design a tool that is able to detect a person's iris with a feature extraction method, namely Gabor wavelet with a classification method, namely K-Nearest Neighbor (K-NN). The results of the experiments carried out, the system succeeded in recognizing the iris image according to the selected image. However, if the selected image is not in the database, the results will show the name of the image that has the closest predictive value.
APA, Harvard, Vancouver, ISO, and other styles
16

Bansal, Neha, and Richa Bansal. "Tongue prints – Are they true?" Science Progress and Research 1, no. 1 (January 1, 2021): 24–26. http://dx.doi.org/10.52152/spr/2021.103.

Full text
Abstract:
Tongue is a vital organ situated in the oral cavity. Tongue has unique features of its shape, size as well as has sexual dimorphism. No two individuals have same features of tongue not even identical twins! This idea prompted to consider tongue prints as an innovative and new research tool in forensic sciences for individual identification. Along with other biometric identification tools used in forensic sciences, tongue prints are also playing an important role and a promising tool in human identification. This is a small review illustrating the importance of tongue prints in identification.The main basic threat to Indian society is identification fraud. Innovative and efficient identification systems are an urgent need to combat this social issue. In India, this system of identification is still in the grassroot level and needs more efficient ways of research and planning to implement the same. Studies have found it to be beneficial and comparable to other biometric tools. So research on the potential of tongue prints as a forensic tool iswarranted.
APA, Harvard, Vancouver, ISO, and other styles
17

Syabila Zabidi, Nur, Noris Mohd Norowi, and Rahmita Wirza O.K. Rahmat. "A Survey of User Preferences on Biometric Authentication for Smartphones." International Journal of Engineering & Technology 7, no. 4.15 (October 7, 2018): 491. http://dx.doi.org/10.14419/ijet.v7i4.15.25763.

Full text
Abstract:
The search for improving users’ security needs, awareness and concerns in the context of mobile phones still has been conducting in today’s society. Biometric systems identify a person or verify the identity of a person using purportedly unique physical traits or behaviour of that individual. In order to understand user requirements for biometric authentication, it is important to focus on several key issues, including the importance of smartphones in implementing biometric authentication, users’ general knowledge and perception towards biometric authentication, and users’ trust and practice when using different biometric technology for securing their smartphone’s data. A preliminary study in the form of an online survey was conducted. The idea of this study was to conduct a survey on users about their general knowledge and perceptions towards different biometric authentication on smartphones. The results of the study indicate that smartphone is an important tool in implementing biometric authentication. Moreover, users knew what biometric technology is and they are not reluctant to use them. Furthermore, users knew how to protect their smartphone’s data and practice the related preventions. The results are expected to give an insight of deploying biometric technology into mobile devices and further researching onto others biometric authentication.
APA, Harvard, Vancouver, ISO, and other styles
18

Ferrag, Mohamed Amine, Leandros Maglaras, and Abdelouahid Derhab. "Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends." Security and Communication Networks 2019 (May 5, 2019): 1–20. http://dx.doi.org/10.1155/2019/5452870.

Full text
Abstract:
Biofeatures are fast becoming a key tool to authenticate the IoT devices; in this sense, the purpose of this investigation is to summarise the factors that hinder biometrics models’ development and deployment on a large scale, including human physiological (e.g., face, eyes, fingerprints-palm, or electrocardiogram) and behavioral features (e.g., signature, voice, gait, or keystroke). The different machine learning and data mining methods used by authentication and authorization schemes for mobile IoT devices are provided. Threat models and countermeasures used by biometrics-based authentication schemes for mobile IoT devices are also presented. More specifically, we analyze the state of the art of the existing biometric-based authentication schemes for IoT devices. Based on the current taxonomy, we conclude our paper with different types of challenges for future research efforts in biometrics-based authentication schemes for IoT devices.
APA, Harvard, Vancouver, ISO, and other styles
19

Usha, S., S. Kuppuswami, and M. Karthik. "A New Enhanced Authentication Mechanism Using Session Key Agreement Protocol." Cybernetics and Information Technologies 18, no. 4 (November 1, 2018): 61–74. http://dx.doi.org/10.2478/cait-2018-0048.

Full text
Abstract:
Abstract Cryptographic protocols are the backbone of information security. Unfortunately the security of several important components of these protocols can be neglected. This causes violation of personal privacy and threats to democracy. Integration of biometrics with cryptography can overcome this problem. In this paper an enhanced session key agreement protocol which uses the data derived from iris signature is suggested to improve the security of biometric based applications like e-Passport, e-Driving license, etc. The authenticity and security properties of the proposed protocol are analyzed using ProVerif tool and demonstrate it satisfies the intended properties.
APA, Harvard, Vancouver, ISO, and other styles
20

Bogicevic Sretenovic, Milenkovic, Jovanovic, Simic, Minovic, and Milovanovic. "Bringing Biometric Sensors to the Classroom: A Fingerprint Acquisition Laboratory for Improving Student Motivation and Commitment." Applied Sciences 10, no. 3 (January 28, 2020): 880. http://dx.doi.org/10.3390/app10030880.

Full text
Abstract:
This paper presents a research study conducted in a specially developed laboratory for biometric engineering education. The laboratory gives students an opportunity to learn more about fingerprint acquisition and analyze the impact of acquisition on other parts of the biometric authentication process. An IoT approach was used, as different types of sensors (biometric sensors, thermometer, and humidity sensor) and components (heaters and workstations) were included in setting up a working surface for biometric data acquisition. Working surfaces create a network where data collected from each working station is recorded in a database. In parallel with biometric data acquisition, environmental condition parameters are recorded. Collected data is available to students for later analysis through the use of a specially developed visualization tool. In order to fully utilize the possibilities the laboratory provides, a flipped classroom approach was used. An evaluation study was done as a part of the course of Biometric technology held at the University of Belgrade. Research results show improvements in student learning outcomes and motivation.
APA, Harvard, Vancouver, ISO, and other styles
21

López, M. A. G., N. G. Posada, J. R. Gadelha, and F. Morgado. "Deformable models as a tool for biometric and histopathological applications." Microscopy and Microanalysis 19, S4 (August 2013): 75–76. http://dx.doi.org/10.1017/s1431927613000998.

Full text
Abstract:
Mathematical morphology is a novel geometry-based technique for image processing and analysis, originally developed to process binary images, based on the use of simple concepts from set theory and geometry such as set inclusion, intersection, union, complementation, and translation Geometry is used to represent object shape, physics inflict constraints on how the shape may vary over space and time, and optimal approximation theory make available the formal underpinnings of mechanisms for fitting the models to measured data. Deformable curve, surface, and solid models gained popularity after they were proposed by Terzopoulos for use in computer vision and computer graphics in the mid 1980’s introducing the theory of continuous (multidimensional) deformable models in a Lagrangian dynamics setting, based on deformation energies in the form of generalized splines. The deformable model that has attracted the most attention to date is popularly known as “snakes”, planar deformable contours that are useful in several image analysis tasks. They are often used to approximate the locations and shapes of object boundaries in images based on the reasonable assumption that boundaries are piecewise continuous or smooth.This work presents a novel approach since it joins (and, indeed, reinforces) the index framework with the evaluation of the same biological samples by a suitable combination of deformable models. Nucleus contour is identified through Active Shape Models techniques, and cytoplasm contour’s detected through parametric Snakes, with prior image preprocessing based on statistical and mathematical morphology techniques. Morphometric parameters such as nucleus and cytoplasm area and ratio between them are then easily computed. Biometry was performed using an ocular micrometer and nucleus/cytoplasm ratios were obtained characterizing each of the three identified stages: Immature, Vitellogenic and Mature. This resulted in a collection of tools, called morphological operators, which are eminently suited for the analysis of shape and structure in binary images. Acartia tonsa was used as model to establish an index for oocyte maturity determination based in citometry and histochemical evaluation of gonadic masses. It was validated the application of a methodology with a realistic background and a new, more accurate and ecologically realistic index for oocyte staging emerged.
APA, Harvard, Vancouver, ISO, and other styles
22

Norval, Aletta, and Elpida Prasopoulou. "Public faces? A critical exploration of the diffusion of face recognition technologies in online social networks." New Media & Society 19, no. 4 (February 19, 2017): 637–54. http://dx.doi.org/10.1177/1461444816688896.

Full text
Abstract:
In recent years, we have witnessed a rapid spread of biometric technologies from the security domain to commercial and social media applications. In this article, we critically explore the repercussions of this diffusion of face recognition to everyday contexts with an in-depth analysis of Facebook’s “tag suggestions” tool which first introduced the technology to on-line social networks. We use Nissenbaum’s framework of contextual integrity to show how the informational norms associated with biometrics in security and policing - their contexts of emergence - are grafted on-line social networks onto their context of iteration. Our analysis reveals a process that has inadvertently influenced the way users understand face recognition, precluding critical questioning of its wider use. It provides an important deepening of contextually-driven approaches to privacy by showing the process through which contexts are co-constitutive of informational norms. Citizens are also offered a critical tool for understanding the trajectory of biometrics and reflect on the data practices associated with the use of face recognition in social media and society at large.
APA, Harvard, Vancouver, ISO, and other styles
23

Nita, Stefania, Marius Mihailescu, and Valentin Pau. "Security and Cryptographic Challenges for Authentication Based on Biometrics Data." Cryptography 2, no. 4 (December 6, 2018): 39. http://dx.doi.org/10.3390/cryptography2040039.

Full text
Abstract:
Authentication systems based on biometrics characteristics and data represents one of the most important trend in the evolution of the society, e.g., Smart City, Internet-of-Things (IoT), Cloud Computing, Big Data. In the near future, biometrics systems will be everywhere in the society, such as government, education, smart cities, banks etc. Due to its uniqueness, characteristic, biometrics systems will become more and more vulnerable, privacy being one of the most important challenges. The classic cryptographic primitives are not sufficient to assure a strong level of secureness for privacy. The current paper has several objectives. The main objective consists in creating a framework based on cryptographic modules which can be applied in systems with biometric authentication methods. The technologies used in creating the framework are: C#, Java, C++, Python, and Haskell. The wide range of technologies for developing the algorithms give the readers the possibility and not only, to choose the proper modules for their own research or business direction. The cryptographic modules contain algorithms based on machine learning and modern cryptographic algorithms: AES (Advanced Encryption System), SHA-256, RC4, RC5, RC6, MARS, BLOWFISH, TWOFISH, THREEFISH, RSA (Rivest-Shamir-Adleman), Elliptic Curve, and Diffie Hellman. As methods for implementing with success the cryptographic modules, we will propose a methodology which can be used as a how-to guide. The article will focus only on the first category, machine learning, and data clustering, algorithms with applicability in the cloud computing environment. For tests we have used a virtual machine (Virtual Box) with Apache Hadoop and a Biometric Analysis Tool. The weakness of the algorithms and methods implemented within the framework will be evaluated and presented in order for the reader to acknowledge the latest status of the security analysis and the vulnerabilities founded in the mentioned algorithms. Another important result of the authors consists in creating a scheme for biometric enrollment (in Results). The purpose of the scheme is to give a big overview on how to use it, step by step, in real life, and how to use the algorithms. In the end, as a conclusion, the current work paper gives a comprehensive background on the most important and challenging aspects on how to design and implement an authentication system based on biometrics characteristics.
APA, Harvard, Vancouver, ISO, and other styles
24

Gu, Datong, Minh Nguyen, and Weiqi Yan. "Cross Models for Twin Recognition." International Journal of Digital Crime and Forensics 8, no. 4 (October 2016): 26–36. http://dx.doi.org/10.4018/ijdcf.2016100103.

Full text
Abstract:
Nowadays, Biometrics has become a popular tool in personal identification as it can use physiological or behavioral characteristics to identify individuals. Recent advances in information technology has increased the accuracy of biometric to another level, there is still a slew of problems existed, such as complex environment, aging and unique problems. Among many classes of identifications, recognizing twins is one of the most difficult tasks as they resemble each other. This affects the use of biometrics in general cases and raises potential risks of biometrics in access control. In this paper, the authors manage to distinguish twins using four different models, namely, face recognition, ear recognition, voice recognition and lip movement recognition. Their results show that voice recognition has the best performance in twin recognition with 100% accuracy. This is much higher than that of face recognition and ear recognition (with 58% and 53% respectively); and lip movement recognition that yields 76% accuracy.
APA, Harvard, Vancouver, ISO, and other styles
25

Stylios, Ioannis, Spyros Kokolakis, Andreas Skalkos, and Sotirios Chatzis. "BioGames: a new paradigm and a behavioral biometrics collection tool for research purposes." Information & Computer Security 30, no. 2 (December 7, 2021): 243–54. http://dx.doi.org/10.1108/ics-12-2020-0196.

Full text
Abstract:
Purpose The purpose of this paper is to present a new paradigm, named BioGames, for the extraction of behavioral biometrics (BB) conveniently and entertainingly. To apply the BioGames paradigm, the authors developed a BB collection tool for mobile devices named BioGames App. The BioGames App collects keystroke dynamics, touch gestures, and motion modalities and is available on GitHub. Interested researchers and practitioners may use it to create their datasets for research purposes. Design/methodology/approach One major challenge for BB and continuous authentication (CA) research is the lack of actual BB datasets for research purposes. The compilation and refinement of an appropriate set of BB data constitute a challenge and an open problem. The issue is aggravated by the fact that most users are reluctant to participate in long demanding procedures entailed in the collection of research biometric data. As a result, they do not complete the data collection procedure, or they do not complete it correctly. Therefore, the authors propose a new paradigm and introduce a BB collection tool, which they call BioGames, for the extraction of biometric features in a convenient way. The BioGames paradigm proposes a methodology where users play games without participating in an experimental painstaking process. The BioGames App collects keystroke dynamics, touch gestures, and motion modalities. Findings The authors proposed a new paradigm for the collection of BB on mobile devices and created the BioGames application. The BioGames App is an Android application that collects BB data on mobile devices and sends them to a database. The database design allows multiple users to store their sensor data at any time. Thus, there is no concern about data separation and synchronization. BioGames App is General Data Protection Regulation (GDPR) compliant as it collects and processes only anonymous data. Originality/value The BioGames App is a publicly available tool that combines the keystroke dynamics, touch gestures, and motion modalities. In addition, it uses a methodology where users play games without participating in an experimental painstaking process.
APA, Harvard, Vancouver, ISO, and other styles
26

Fitriya, Fitriya. "Perancangan Sistem Deteksi Vena Pada Punggung Tangan Berbasis Inframerah Untuk Sistem Biometrik." Jurnal Biosains Pascasarjana 21, no. 1 (April 1, 2019): 48. http://dx.doi.org/10.20473/jbp.v21i1.2019.48-56.

Full text
Abstract:
AbstractVein detection is one of the imaging techniques required for biometric authentication purposes. The vein is chosen as an object because of its strength in terms of universality and uniqueness especially in adults because the venous pattern will only change slightly with age and each person has a different pattern, besides from the object side, the veins have no influence from temperature and humidity, and physical contactless with the other user. The purpose of this research is to create design that can visualize the veins as well and determine the optimum parameters to produce a better quality of vein image than the original image. The data for this research were obtained from 10 naracoba people who were varied of Boddy Mass Index and skin pigment. From the research, dorsal hand vein visualization tool for biometric system has been successfully designed using 726 nm infrared LED and image processing by convert of image to grayscale, image sharpening, histogram equalisation until segmentation by local thresholding method and the optimum parameters obtained to obtain a good image based on contrast analysis in this study is with a distance of 6 cm exposure.Keyword : Vein Detection, Biometrik, Near Infrared, Segmentation
APA, Harvard, Vancouver, ISO, and other styles
27

Sam Okeke Doris C, Ekwonwune Emmanuel Nwabueze,. "Biometric Database – A Tool to Fight Corruption in a Developing Nation." International Journal of Innovative Research in Science, Engineering and Technology 5, no. 7 (July 15, 2016): 12048–54. http://dx.doi.org/10.15680/ijirset.2016.0507006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Bai, Yiwen, Xubo Wu, Raymond CC Tsang, Ruisheng Yun, Yan Lu, Elizabeth Dean, and Alice YM Jones. "A Randomised Controlled Trial to Evaluate the Administration of the Health Improvement Card as a Health Promotion Tool: A Physiotherapist-Led Community-Based Initiative." International Journal of Environmental Research and Public Health 17, no. 21 (November 2, 2020): 8065. http://dx.doi.org/10.3390/ijerph17218065.

Full text
Abstract:
A randomised controlled trial was conducted to evaluate the administration of the Health Improvement Card (HIC) on lifestyle practices and biometric variables in community-dwelling Chinese participants. Adults living in Shanghai were randomly assigned to either the HIC-intervention or control group. Measurements/assessments were conducted at baseline and three-month follow-up. Supervised physiotherapy students administered the HIC and four standardised questionnaires related to health and wellbeing. Both groups received a health promotion education pamphlet. Based on participants’ HIC biometric and lifestyle scores, students prescribed lifestyle, and exercise advice to the HIC-intervention group. 171 individuals (39 men, 132 women) (mean age 68.4 ± 9.7 y) participated. At follow-up, body mass index (BMI) and waist circumference decreased significantly in the HIC-intervention group. Furthermore, the number of participants in the HIC-intervention group categorised as low risk regarding their physical activity and dietary practices, increased by 32.2% and 20%, respectively. Changes in standardised questionnaire scores did not meet minimum clinically importance differences in either group. This is the first study to demonstrate that HIC-informed health promotion education can improve people’s lifestyle practices, thereby, objective biometric variables. Evaluation of the effect of HIC-informed lifestyle education on some biometric parameters (blood pressure and BMI) may warrant a longer timeframe.
APA, Harvard, Vancouver, ISO, and other styles
29

Gonzalez Viejo, Claudia, Carmen Hernandez-Brenes, Raul Villarreal-Lara, Irma C. De Anda-Lobo, Perla A. Ramos-Parra, Esther Perez-Carrillo, Jorge A. Clorio-Carrillo, Eden Tongson, and Sigfredo Fuentes. "Effects of Different Beer Compounds on Biometrically Assessed Emotional Responses in Consumers." Fermentation 9, no. 3 (March 9, 2023): 269. http://dx.doi.org/10.3390/fermentation9030269.

Full text
Abstract:
The study of emotional responses from consumers toward beer products is an important digital tool to obtain novel information about the acceptability of beers and their optimal physicochemical composition. This research proposed the use of biometrics to assess emotional responses from Mexican beer consumers while tasting top- and bottom-fermented samples. Furthermore, a novel emotional validation assessment using proven evoking images for neutral, negative, and positive emotions was proposed. The results showed that emotional responses obtained from self-reported emoticons and biometrics are correlated to the specific emotions evoked by the visual, aroma, and taste aspects of beers. Consumers preferred bottom-fermentation beers and disliked the wheat-based and higher-bitterness samples. Chemical compounds and concentrations were in accordance to previously reported research for similar beer styles. However, the levels of hordenine were not high enough to evoke positive emotions in the biometric assessment, which opens additional research opportunities to assess higher concentrations of this alkaloid to increase the happiness perception of low or non-alcoholic beers.
APA, Harvard, Vancouver, ISO, and other styles
30

Hu, Jian Feng, and Zhen Dong Mu. "Authentication System for Biometric Applications Using Mobile Devices." Applied Mechanics and Materials 457-458 (October 2013): 1224–27. http://dx.doi.org/10.4028/www.scientific.net/amm.457-458.1224.

Full text
Abstract:
Mobile equipment has now become a new platform for information exchange, spend a lot of information exchange, how to effectively protect the mobile platform information security? Research has shown that, EEG signal can be used as identification tool, the user's information protection and good, this paper to protect the information security of mobile devices to research how to use EEG; the EEG signal is feasible for mobile equipment identification.
APA, Harvard, Vancouver, ISO, and other styles
31

Streckenbach, Felix, Gundram Leifert, Thomas Beyer, Anita Mesanovic, Hanna Wäscher, Daniel Cantré, Sönke Langner, Marc-André Weber, and Tobias Lindner. "Application of a Deep Learning Approach to Analyze Large-Scale MRI Data of the Spine." Healthcare 10, no. 11 (October 26, 2022): 2132. http://dx.doi.org/10.3390/healthcare10112132.

Full text
Abstract:
With its standardized MRI datasets of the entire spine, the German National Cohort (GNC) has the potential to deliver standardized biometric reference values for intervertebral discs (VD), vertebral bodies (VB) and spinal canal (SC). To handle such large-scale big data, artificial intelligence (AI) tools are needed. In this manuscript, we will present an AI software tool to analyze spine MRI and generate normative standard values. 330 representative GNC MRI datasets were randomly selected in equal distribution regarding parameters of age, sex and height. By using a 3D U-Net, an AI algorithm was trained, validated and tested. Finally, the machine learning algorithm explored the full dataset (n = 10,215). VB, VD and SC were successfully segmented and analyzed by using an AI-based algorithm. A software tool was developed to analyze spine-MRI and provide age, sex, and height-matched comparative biometric data. Using an AI algorithm, the reliable segmentation of MRI datasets of the entire spine from the GNC was possible and achieved an excellent agreement with manually segmented datasets. With the analysis of the total GNC MRI dataset with almost 30,000 subjects, it will be possible to generate real normative standard values in the future.
APA, Harvard, Vancouver, ISO, and other styles
32

Alvez, Carlos, Ernesto Miranda, Graciela Etchart, and Silvia Ruiz. "Efficient Iris Recognition Management in Object-Related Databases." Journal of Computer Science and Technology 18, no. 02 (October 4, 2018): e12. http://dx.doi.org/10.24215/16666038.18.e12.

Full text
Abstract:
Biometric applications have grown significantly in recent years, particularly iris-based systems. In the present work, an extension of an Object Relational Database Management System for the integral management of a biometric system based on the human iris was presented. Although at present, there are many database extensions for different domains, in no case for biometric applications. The proposed extension includes both the extension of the type system and the definition of domain indexes for performance improvement. The aim of this work is to provide a tool that facilitates the development of biometric applications based on the iris feature. Its development is based on a reference architecture that includes both the management of images of the iris trait, its associated metadata and the necessary methods for both manipulation and queries. An implementation of the extension is performed for PostgreSQL DBMS, and SP-GiST framework is used in the implementation of a domain index. Experiments were carried out to evaluate the performance of the proposed index, which shows improvements in query execution times.
APA, Harvard, Vancouver, ISO, and other styles
33

Alharbi, Abrar, Fahad Alharbi, and Eiji Kamioka. "Skeleton based gait recognition for long and baggy clothes." MATEC Web of Conferences 277 (2019): 03005. http://dx.doi.org/10.1051/matecconf/201927703005.

Full text
Abstract:
Human gait is a significant biometric feature used for the identification of people by their style of walking. Gait offers recognition from a distance at low resolution while requiring no user interaction. On the other hand, other biometrics are likely to require a certain level of interaction. In this paper, a human gait recognition method is presented to identify people who are wearing long baggy clothes like Thobe and Abaya. Microsoft Kinect sensor is used as a tool to establish a skeleton based gait database. The skeleton joint positions are obtained and used to create five different datasets. Each dataset contained different combination of joints to explore their effectiveness. An evaluation experiment was carried out with 20 walking subjects, each having 25 walking sequences in total. The results achieved good recognition rates up to 97%.
APA, Harvard, Vancouver, ISO, and other styles
34

Salingaros, Nikos A., and Ann Sussman. "Biometric Pilot-Studies Reveal the Arrangement and Shape of Windows on a Traditional Façade to be Implicitly “Engaging”, Whereas Contemporary Façades are Not." Urban Science 4, no. 2 (May 18, 2020): 26. http://dx.doi.org/10.3390/urbansci4020026.

Full text
Abstract:
The human brain evolved to implicitly approach or avoid objects in its surroundings. Requisite for survival, this behavior happens without conscious awareness or control, honed over 60 million years of primate evolution. Biometric technologies, including eye tracking, reveal these unconscious behaviors at work and allow us to predict the initial response of a design experience. This paper shows how a biometric tool, 3M-VAS (Visual Attention Software), can be effectively used in architecture. This tool aggregates 30 years of eye-tracking data, and is commonly applied in website and signage design. A pilot-study uses simplified drawings of building elevations to show 3M-VAS’s predictive power in revealing implicit human responses of engagement and disengagement to buildings. The implications on the impact of a structure in creating the public realm suggest recommendations for approving new architecture.
APA, Harvard, Vancouver, ISO, and other styles
35

Bhering, Leonardo Lopes. "Rbio: A tool for biometric and statistical analysis using the R platform." Crop Breeding and Applied Biotechnology 17, no. 2 (June 2017): 187–90. http://dx.doi.org/10.1590/1984-70332017v17n2s29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

González Ariza, Antonio, Ander Arando Arbulu, José Manuel León Jurado, Francisco Javier Navas González, Juan Vicente Delgado Bermejo, and María Esperanza Camacho Vallejo. "Discriminant Canonical Tool for Differential Biometric Characterization of Multivariety Endangered Hen Breeds." Animals 11, no. 8 (July 26, 2021): 2211. http://dx.doi.org/10.3390/ani11082211.

Full text
Abstract:
This study aimed to develop a tool to perform the morphological characterization of Sureña and Utrerana breeds, two endangered autochthonous breeds ascribed to the Mediterranean trunk of Spanish autochthonous hens and their varieties (n = 608; 473 females and 135 males). Kruskal–Wallis H test reported sex dimorphism pieces of evidence (p < 0.05 at least). Multicollinearity analysis reported (variance inflation factor (VIF) >5 variables were discarded) white nails, ocular ratio, and back length (Wilks’ lambda values of 0.191, 0.357, and 0.429, respectively) to have the highest discriminant power in female morphological characterization. For males, ocular ratio and black/corneous and white beak colors (Wilks’ lambda values of 0.180, 0.210, and 0.349, respectively) displayed the greatest discriminant potential. The first two functions explained around 90% intergroup variability. A stepwise discriminant canonical analysis (DCA) was used to determine genotype clustering patterns. Interbreed and varieties proximity was evaluated through Mahalanobis distances. Despite the adaptability capacity to alternative production systems ascribed to both avian breeds, Sureña and Utrerana morphologically differ. Breed dimorphism may evidence differential adaptability mechanisms linked to their aptitude (dual purpose/egg production). The present tool may serve as a model for the first stages of breed protection to be applicable in other endangered avian breeds worldwide.
APA, Harvard, Vancouver, ISO, and other styles
37

Khan, Tanha, Arpan Manna, Ahmed Mohammed Saaduddin Sapri, Taseer Bashir, and Naeem Ahmad. "Tongue prints- Unique as well as potential forensic tool for biometric authentication." Archives of Dental Research 13, no. 1 (July 15, 2023): 10–14. http://dx.doi.org/10.18231/j.adr.2023.002.

Full text
Abstract:
Forensic odontology proves to be an important branch of science when it comes to solve various criminal cases as well as in person identification by providing dental expertise in the court of law so that proper justice can be delivered. Tongue is an important vital organ of human body which is protected from outer environment as it is well encased within the oral cavity. Tongue has very unique features which differs from individual to individual, even in identical twins. For this reason, tongue prints can be used nowadays as a method of biometric authentication in Forensic Odontology. It also aids in identification of person as tongue exhibits sexual dimorphism. As a result of all this, tongue prints has emerged as a promising forensic tool nowadays.
APA, Harvard, Vancouver, ISO, and other styles
38

Dixit, Shivam. "Management of Teaching and Learning Resources Application." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 5024–26. http://dx.doi.org/10.22214/ijraset.2023.52804.

Full text
Abstract:
Abstract: This paper focuses on the effective management of teaching and learning resources in classrooms using mobile learning and biometric attendance systems. With the creation of mobile applications, learning has become more flexible and accessible. Mobile learning is a strong tool for supporting and increasing learning. Classroom management is also crucial for providing an environment that is favorable to learning, and the integration of proper note-taking strategies can aid in effective learning. Additionally, using biometric attendance can produce precise and trustworthy attendance records, guaranteeing the attendance of all students. Overall, developing a successful learning environment that encourages student engagement and achievement depends on effective management of teaching and learning resources
APA, Harvard, Vancouver, ISO, and other styles
39

Chintiroglou, Chariton C., and Panagiotis Karalis. "Biometric investigations on the cnidae of the Aegean colour morphs of Anemonia viridis." Journal of the Marine Biological Association of the United Kingdom 80, no. 3 (June 2000): 543–44. http://dx.doi.org/10.1017/s0025315400002241.

Full text
Abstract:
The sea anemone Anemonia viridis is one of the most common species of the North Aegean Sea. The variety in colour morphs exhibited by this species, causes problems to taxonomy and ecology, and suggests that A. viridis should be subdivided into two distinct species according to the colour of the individuals. The approach used in this study was based on the biometrical cnidae characteristics of the two colour morphs (rustica and smaragdina), as it is known that cnidae biometry has been used as a taxonomic tool for the phylum Cnidaria. More than 20,000 nematocysts were measured to try and find a correlation between these measurements and some body parameters indicative of the maturity grade of the individuals, as potential taxonomic characteristics. Stable cnidae characteristics of the two different colour morphs were compared. However, they differed only in the biometry of the tentacles' a-basitrichs. This slight difference does not support the proposal to subdivide Anemonia viridis into two different species.
APA, Harvard, Vancouver, ISO, and other styles
40

VB, Chaitanya Krishna, Bhaskar Reddy PV, Chethan Kumar A, Salman Ahmed, and Sampath M. "Face Recognition Based Attendance Management System using DLIB." International Journal of Engineering and Advanced Technology 8, no. 5s (June 29, 2019): 57–61. http://dx.doi.org/10.35940/ijeat.e1012.0585s19.

Full text
Abstract:
Real time face recognition technology has become a prominent tool for addressing solutions to many complex problems. Such as identification and the verification of identity. Face recognition technology also addresses the time consumption issue that arises in other biometric systems. Taking Attendances manually is always a monotonous job and it additionally consumes heap of our time. The prevailing biometric attendances wastes a great deal of our time and these systems can be cheated easily. In our proposed system the attendance is recorded by using a camera that is attached in front of classroom which is continuously recording but the system will never store any recorded files. And the features obtained from the detected images are compared with the features stored in the database and the system mark’s the attendance. This paper aims at automating the whole process and implementing a system that can’t be cheated. The entire system is built by using a machine learning tool called DLIB.
APA, Harvard, Vancouver, ISO, and other styles
41

Wibowo, Dwi Basuki, Agus Suprihanto, Wahyu Caesarendra, Slamet Khoeron, Adam Glowacz, and Muhammad Irfan. "A Simple Foot Plantar Pressure Measurement Platform System Using Force-Sensing Resistors." Applied System Innovation 3, no. 3 (August 4, 2020): 33. http://dx.doi.org/10.3390/asi3030033.

Full text
Abstract:
Generally, there are two types of working style, i.e., some people work in sitting conditions, and the remaining work mostly in a standing position. For people working in a standing position, they can spend hours in a day doing their work standing. These people do not realize that it can cause medical issues, especially for the feet, namely biometric problems. In addition, several doctors in Indonesia are already aware of this issue and state that the biometric problems faced by those kinds of people can be predicted from the load distribution on the foot. However, the tool used by the doctors in Indonesia to measure biometric problems is not a digital tool. Therefore it is very difficult to measure and predict the biometric problems quantitatively. This study aims to develop a low-cost static load measuring device using force-sensing resistor (FSR) sensors. The measuring instrument is designed in the form of a pressure plate platform which consist of 30 FSR 402 sensors. The sensors are placed right underneath the display area of the foot, 15 sensors on the soles of the left and right feet. Ten students from the Department of Mechanical Engineering, Diponegoro University (five men and five women) were asked to stand on the platform. Each subject also measured foot length (FL) to estimate shoe size, foot area contact (FAC) for validation between genders, and foot type using the digital footprint tools. From the results of measurements obtained for the left foot in the medial mid foot area, i.e., in sensors 5 and 7, not exposed to the load, on almost all subjects except subject number 3 with a load of 0.196 kg on sensor 7. The highest average load occurs in the heel area i.e., sensor 1 measured 0.713 kg and the smallest average load occurs in the five sensors, with 0 kg. A static load gauge that is designed to be used to measure each leg area for subjects with a shoe size of 40–42 with low price to be held in hospital-orthopedic hospitals and biomechanical research centers.
APA, Harvard, Vancouver, ISO, and other styles
42

Frąckowiak, Hieronim, Mateusz Brylewski, Katarzyna Pęzińska-Kijak, and Maciej Zdun. "Preliminary biometric characteristics of Greyster dogs." Roczniki Naukowe Polskiego Towarzystwa Zootechnicznego 17, no. 1 (June 30, 2021): 1–9. http://dx.doi.org/10.5604/01.3001.0015.0614.

Full text
Abstract:
<b>The aim of the study was to record and analyse selected biometric data based on the results of measurements of Greyster dogs actively involved in sports. The results of our study were compared with the biometric indices of other breeds of dogs, including the original breeds from which Greysters derive, and the indices of Polish native breeds. The study showed that the Greysters were characterised by intermediate height, as compared with their original breeds, i.e. they were shorter than Greyhounds and taller than German Shorthaired Pointers, and their height index was lower than one. This means that the height at the withers dominated over the diagonal body length in the rectangular shape of the Greyster body. The massiveness index showed that the advantage of the chest girth over the height at the withers was similar to that of the Polish Greyhound. The Greyster eurysomy index was also similar to that of the Polish Greyhound. The biometric parameters of Greysters incline them to run fast. This inclination was also indicated by the leg length index and the proportions of the length of the sections of the pelvic limb. Further research is necessary to obtain full biometric characteristics of Greysters. The results obtained at this stage of the research can be used as an auxiliary tool to select these animals for reproduction or sport competitions. If a breed standard is to be established for Greyster dogs and they are classified as an FCI breed, any information with biometric data may help to set this standard.
APA, Harvard, Vancouver, ISO, and other styles
43

Frąckowiak, Hieronim, Ewa Kiryk, Szymon Graczyk, and Maciej Zdun. "Preliminary biometric characteristics of Border Collies and their dependence on sport activity." Roczniki Naukowe Polskiego Towarzystwa Zootechnicznego 17, no. 4 (December 27, 2021): 25–36. http://dx.doi.org/10.5604/01.3001.0015.6860.

Full text
Abstract:
<b>Biometric measurements were taken on 40 dogs of both sexes, 20 females and 20 males of Border Collies. Half of the population of each sex, i.e. 10 animals (active dogs), were either currently participating in dog frisbee competitions or had recently finished their sporting careers due to age. The other half (part) of the examined Border Collies, i.e. 10 females and 10 males, were animals that were not active in sports (non-active dogs). Most of the dogs came from Polish kennels but there were also Border Collies from other countries. The following measurements were taken: trunk length, height at withers, chest girth, fore limb (metacarpal) girth, thigh length, shank length, foot length and body weight. The collected results were processed statistically and indexes of trunk length, massiveness, eurysomia and boniness were calculated. It was found that Border Collie are characterized by some biometric traits (indexes) similar to Polish hunting dogs and Polish hounds and some of their indexes are also similar to the domestic breeds of Polish sheepdogs and Polish charts. Conducted biometric analysis showed only few, i.e. concerning height at withers of females and body weight of males statistically significant differences between examined groups of Border Collies. Consequently, there was no positive verification of the research hypothesis, which assumed that the value of traits and biometric indicators of Border Collie is different in jumping dogs in connection with their participation in various disciplines of dog competition. However, it can be assumed that for the needs of the developing sports cynology, there will be a need to select dogs with predispositions for athletic performance, and a useful tool to achieve this goal will be the analysis of biometric traits of dogs. The results of measurements collected in this study and the indices calculated on their basis also extend the biometric database of Border Collie dogs.
APA, Harvard, Vancouver, ISO, and other styles
44

Lintz, François, Matthew Welck, Alessio Bernasconi, James Thornton, Nicholas P. Cullen, Dishan Singh, and Andy Goldberg. "3D Biometrics for Hindfoot Alignment Using Weightbearing CT." Foot & Ankle International 38, no. 6 (February 9, 2017): 684–89. http://dx.doi.org/10.1177/1071100717690806.

Full text
Abstract:
Background: Hindfoot alignment on 2D radiographs can present anatomical and operator-related bias. In this study, software designed for weightbearing computed tomography (WBCT) was used to calculate a new 3D biometric tool: the Foot and Ankle Offset (FAO). We described the distribution of FAO in a series of data sets from clinically normal, varus, and valgus cases, hypothesizing that FAO values would be significantly different in the 3 groups. Methods: In this retrospective cohort study, 135 data sets (57 normal, 38 varus, 40 valgus) from WBCT (PedCAT; CurveBeam LLC, Warrington, PA) were obtained from a specialized foot and ankle unit. 3D coordinates of specific anatomical landmarks (weightbearing points of the calcaneus, of the first and fifth metatarsal heads and the highest and centermost point on the talar dome) were collected. These data were processed with the TALAS system (CurveBeam), which resulted in an FAO value for each case. Intraobserver and interobserver reliability were also assessed. Results: In normal cases, the mean value for FAO was 2.3% ± 2.9%, whereas in varus and valgus cases, the mean was −11.6% ± 6.9% and 11.4% ± 5.7%, respectively, with a statistically significant difference among groups ( P < .001). The distribution of the normal population was Gaussian. The inter- and intraobserver reliability were 0.99 +/- 0.00 and 0.97 +/-0.02 Conclusions: This pilot study suggests that the FAO is an efficient tool for measuring hindfoot alignment using WBCT. Previously published research in this field has looked at WBCT by adapting 2D biometrics. The present study introduces the concept of 3D biometrics and describes an efficient, semiautomatic tool for measuring hindfoot alignment. Level of Evidence: Level III, retrospective comparative study.
APA, Harvard, Vancouver, ISO, and other styles
45

Anna, Ilyenko, Ilyenko Sergii, and Herasymenko Marharyta. "A Biometric AsymmetricCryptosystem Software Module Based on Convolutional Neural Networks." International Journal of Computer Network and Information Security 13, no. 6 (December 8, 2021): 1–12. http://dx.doi.org/10.5815/ijcnis.2021.06.01.

Full text
Abstract:
During the research, the analysis of the existing biometric cryptographic systems was carried out. Some methods that help to generate biometric features were considered and compared with a cryptographic key. For comparing compact vectors of biometric images and cryptographic keys, the following methods are analyzed: designing and training of bidirectional associative memory; designing and training of single-layer and multilayer neural networks. As a result of comparative analysis of algorithms for extracting primary biometric features and comparing the generated image to a private key within the proposed authentication system, it was found that deep convolutional networks and neural network bidirectional associative memory are the most effective approach to process the data. In the research, an approach based on the integration of a biometric system and a cryptographic module was proposed, which allows using of a generated secret cryptographic key based on a biometric sample as the output of a neural network. The RSA algorithm is chosen to generate a private cryptographic key by use of convolutional neural networks and Python libraries. The software authentication module is implemented based on the client-server architecture using various internal Python libraries. Such authentication system should be used in systems where the user data and his valuable information resources are stored or where the user can perform certain valuable operations for which a cryptographic key is required. Proposed software module based on convolutional neural networks will be a perfect tool for ensuring the confidentiality of information and for all information-communication systems, because protecting information system from unauthorized access is one of the most pressing problems. This approach as software module solves the problem of secure generating and storing the secret key and author propose combination of the convolutional neural network with bidirectional associative memory, which is used to recognize the biometric sample, generate the image, and match it with a cryptographic key. The use of this software approach allows today to reduce the probability of errors of the first and second kind in authentication system and absolute number of errors was minimized by an average of 1,5 times. The proportion of correctly recognized images by the comparating together convolutional networks and neural network bidirectional associative memory in the authentication software module increased to 96,97%, which is on average from 1,08 times up to 1,01 times The authors further plan a number of scientific and technical solutions to develop and implement effective methods, tools to meet the requirements, principles and approaches to cybersecurity and cryptosystems for provide integrity and confidentiality of information in experimental computer systems and networks.
APA, Harvard, Vancouver, ISO, and other styles
46

M., Maitreyee. "Pinna of ear: a potential biometric identifier." International Journal of Research in Medical Sciences 5, no. 9 (August 26, 2017): 3843. http://dx.doi.org/10.18203/2320-6012.ijrms20173640.

Full text
Abstract:
Background: Individual differences in morphometric and somatoscopic observations of pinna of ear were studied to explore the potential of pinna of ear as a biometric tool.Methods: Morphometric and somatoscopic data of right ear of 350 Indian individuals (Age: 17-25 years) was collected. Measurements of pinna length, pinna width, pinna root, pinna projection, intertragic distance, ear lobe length, and ear lobe width were taken. Observations were done for presence or absence of Darwin tubercle, flat or rolled helix, and attached or free ear lobe. Probability statistics was extrapolated to assess the variations in ear pinna characters.Results: All measurements showed a wide range. There was statistically significant difference between male and female pinna measurements. The somatoscopic observations showed 82.9% individuals with presence of Darwin tubercle, 99.1% with rolled helix, and 65.4% with free ear lobes. On the basis of extrapolation of ten different morphometric and somatoscopic parameters, the statistics showed the probability of any two individuals having exactly same observations to be 0.0008%.Conclusions: The wide range of measurements in the present study suggested a high possibility of variations amongst the population. If all the parameters including both morphometric and somatoscopic, are taken into consideration, the pinna of ear of each individual is a very distinctive structure, which makes it a potential biometric identifier and with the use of proper technologies, it will be a widely used biometric tool in the future.
APA, Harvard, Vancouver, ISO, and other styles
47

Bajpai, V. K., and M. Madhusudhan. "Library Software Skills: a case study of college libraries of Delhi." World Digital Libraries: An International Journal 14, no. 2 (2021): 139–56. http://dx.doi.org/10.18329/09757597/2021/14208.

Full text
Abstract:
The article accentuates the information communication tools (ICTs) skills of library and information science (LIS) professionals working in the 74 college libraries affiliated with the University of Delhi. In the present study, the respondents gathered the information through a structured questionnaire using the survey method. The questionnaires were distributed among 196 LIS professionals, and 171 filled-in questionnaires were collected personally and elicited 87.1%. The findings demonstrated that most LIS professionals are deficient regarding skills in burglar systems, electromagnetic security systems (ESS), access control system, quick response (QR) codes, biometric technology, content management systems, reference creation and management, R software in statistical package. On account of semi-professionals, it was revealed that they need to enhance ICT tool skills in digital library software, ESS, QR codes, biometric technology, content management system (CMS), reference management, and statistical software. The ICT tool skills will be at the centre of the necessary skills and fundamental to advancing learning skills, problem-solving, and critical, innovative, and systemic thinking towards improving their library services. The authors advocate that college libraries have to cross alongside technological adjustments that are taking location to continue to include value to higher learning establishments. It is also necessary to continue constructing LIS professional potential to ensure that they add value to college libraries. The study is noteworthy because it accentuates the ICT tools skills of LIS professionals and helps the University of Delhi authorities include courses for ICT skills in the academic/ professional curriculum, which would help the working LIS professionals to get capable in different ICT skills.
APA, Harvard, Vancouver, ISO, and other styles
48

Key, Alastair J. M., and Stephen J. Lycett. "Investigating interrelationships between Lower Palaeolithic stone tool effectiveness and tool user biometric variation: implications for technological and evolutionary changes." Archaeological and Anthropological Sciences 10, no. 5 (November 14, 2016): 989–1006. http://dx.doi.org/10.1007/s12520-016-0433-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Petrosyan, G. R., L. A. Ter-Vardanyan, and A. V. Gaboutchian. "MODELING OF BIOMETRIC IDENTIFICATION SYSTEM USING THE COLORED PETRI NETS." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XL-5/W6 (May 18, 2015): 37–42. http://dx.doi.org/10.5194/isprsarchives-xl-5-w6-37-2015.

Full text
Abstract:
In this paper we present a model of biometric identification system transformed into Petri Nets. Petri Nets, as a graphical and mathematical tool, provide a uniform environment for modelling, formal analysis, and design of discrete event systems. The main objective of this paper is to introduce the fundamental concepts of Petri Nets to the researchers and practitioners, both from identification systems, who are involved in the work in the areas of modelling and analysis of biometric identification types of systems, as well as those who may potentially be involved in these areas. In addition, the paper introduces high-level Petri Nets, as Colored Petri Nets (CPN). In this paper the model of Colored Petri Net describes the identification process much simpler.
APA, Harvard, Vancouver, ISO, and other styles
50

Motato Toro, Óscar Fernando, and Humberto Loaiza Correa. "Biometric identification using infrared dorsum hand vein images." Ingeniería e Investigación 29, no. 1 (January 1, 2009): 90–100. http://dx.doi.org/10.15446/ing.investig.v29n1.15148.

Full text
Abstract:
The evident need for improving access and safety controls has orientated the development of new personal identification systems towards using biometric, physiological and behavioral features guaranteeing increasing greater levels of performance. Motivated by this trend, the development and implementation of a computational tool for recording and validating people’s identity using dorsum hand vein images is presented here. A low-cost hardware module for acquiring infrared images was thus designed; it consisted of a conventional video-camera, optical lenses, controlled infrared illumination sources and a frame grabber. The accompanying software module was concerned with visualizing and capturing images, selecting regions of interest, pattern segmentation in the region and extracting, describing and classifying these features. An artificial neuron network approach was implemented for pattern recognition, resulting in it proving the biometric indicator to be sufficiently discriminating, and a correlation-based approach using a 100 image database for static characterisation, determined the system’s maximum efficiency to be 95.72% at a threshold equal to 65. False acceptance rate (FAR) was 8.57% and false rejection rate (FRR) was 0% at this threshold.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography