To see the other types of publications on this topic, follow the link: Verification and identification.

Dissertations / Theses on the topic 'Verification and identification'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Verification and identification.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Karamolegkou, Antonia. "Argument Mining: Claim Annotation, Identification, Verification." Thesis, Uppsala universitet, Institutionen för lingvistik och filologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-448855.

Full text
Abstract:
Researchers writing scientific articles summarize their work in the abstracts mentioning the final outcome of their study. Argumentation mining can be used to extract the claim of the researchers as well as the evidence that could support their claim. The rapid growth of scientific articles demands automated tools that could help in the detection and evaluation of the scientific claims’ veracity. However, there are neither a lot of studies focusing on claim identification and verification neither a lot of annotated corpora available to effectively train deep learning models. For this reason, we annotated two argument mining corpora and perform several experiments with state-of-the-art BERT-based models aiming to identify and verify scientific claims. We find that using SciBERT provides optimal results regardless of the dataset. Furthermore, increasing the amount of training data can improve the performance of every model we used. These findings highlight the need for large-scale argument mining corpora, as well as domain-specific pre-trained models.
APA, Harvard, Vancouver, ISO, and other styles
2

Carlton, Zachary M. "System Identification and Verification of Rotorcraft UAVs." University of Cincinnati / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1491899295046484.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Deng, Huimin, and 鄧惠民. "Robust minutia-based fingerprint verification." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2006. http://hub.hku.hk/bib/B37036427.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Raman, Pujita. "Speaker Identification and Verification Using Line Spectral Frequencies." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/52964.

Full text
Abstract:
State-of-the-art speaker identification and verification (SIV) systems provide near perfect performance under clean conditions. However, their performance deteriorates in the presence of background noise. Many feature compensation, model compensation and signal enhancement techniques have been proposed to improve the noise-robustness of SIV systems. Most of these techniques require extensive training, are computationally expensive or make assumptions about the noise characteristics. There has not been much focus on analyzing the relative importance, or speaker-discriminative power of different speech zones, particularly under noisy conditions. In this work, an automatic, text-independent speaker identification (SI) system and speaker verification (SV) system is proposed using Line Spectral Frequency (LSF) features. The performance of the proposed SI and SV systems are evaluated under various types of background noise. A score-level fusion based technique is implemented to extract complementary information from static and dynamic LSF features. The proposed score-level fusion based SI and SV systems are found to be more robust under noisy conditions. In addition, we investigate the speaker-discriminative power of different speech zones such as vowels, non-vowels and transitions. Rapidly varying regions of speech such as consonant-vowel transitions are found to be most speaker-discriminative in high SNR conditions. Steady, high-energy vowel regions are robust against noise and are hence most speaker-discriminative in low SNR conditions. We show that selectively utilizing features from a combination of transition and steady vowel zones further improves the performance of the score-level fusion based SI and SV systems under noisy conditions.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
5

Ozarkar, Malhar. "Design Parameter Identification and Verification for Thermoplastic Inserts." Thesis, Linköpings universitet, Mekanik och hållfasthetslära, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-170132.

Full text
Abstract:
Inserts are a crucial part of household and industrial furniture. These small plastic parts which often go unnoticed to the naked eye perform crucial functions like providing a base for the furniture, leveling the furniture, safeguarding the user from edges of the tubes used and providing an aesthetic finish. The inserts have a wing like structure on the exterior which enables them to be inserted and securely held in the tubes. The inserts are assembled into the pipes manually or through machines. The force required to install these inserts in the tube is called a push-in force whereas a pull-out force is the force required for removal of the is called a pull-out force. These forces are experienced by someone who assembles the furniture together. Thus, these forces directly define the ease with which the furniture can be assembled. In the first part of the present thesis, these push-in and pull-out forces are predicted using finite element simulations. These finite element simulations were validated by performing physical assembly and disassembly experiments on these inserts. It was found that the finite element simulations of the insert are useful tool in predicting the push-in forces with a high accuracy.   These push-in and pull-out forces for a single insert vary by 2-5 times when the dimensional variations in the tube are considered. The dimensional variations can be a result of the manufacturing processes from which these tubes are produced. The maximum and minimum dimensions that the tube can have are defined by the maximum material condition (MMC) and the least material condition (LMC). To reduce the variation in push-in and pull out forces, a stricter tolerance control can be applied to the manufacturing process. To avoid this cost while having a lower variation in the push-in and pull out forces, the design of the insert was modified. To achieve this enhanced design of the insert, a metamodel based optimization technique was used in the second part of the thesis. For this optimization, the geometrical parameters - wing height, wing diameter and stem thickness the of the insert were identified as the crucial factors which govern the assembly/disassembly forces. The identification of these parameters was done through a design of experiments. These parameters were then varied simultaneously in a metamodel based optimization which had an objective to minimize the variation in forces observed for an insert when the maximum material condition and the least material conditions are considered. The result for the enhanced design of the insert was then stated in terms of the ratio of these identified parameters. The modified design of the insert not only enables the manufacturer to have better performance, but also reduces the amount of plastic material required for manufacturing of the insert.
APA, Harvard, Vancouver, ISO, and other styles
6

Said, Huwida E. S. "Personal identification based on handwriting." Thesis, University of Reading, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.299305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jonsson, K. T. "Robust correlation and support vector machines for face identification." Thesis, University of Surrey, 2000. http://epubs.surrey.ac.uk/799/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bulacu, Marius Lucian. "Statistical pattern recognition for automatic writer identification and verification." [S.l. : [Groningen : s.n.] ; University Library Groningen] [Host], 2007. http://irs.ub.rug.nl/ppn/300341644.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lack, Steven A. "Cell identification, verification, and classification using shape analysis techniques." Diss., Columbia, Mo. : University of Missouri-Columbia, 2007. http://hdl.handle.net/10355/6017.

Full text
Abstract:
Thesis (Ph. D.)--University of Missouri-Columbia, 2007.
The entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file (viewed on March 11, 2008) Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
10

Chan, Siu Man. "Improved speaker verification with discrimination power weighting /." View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202004%20CHANS.

Full text
Abstract:
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2004.
Includes bibliographical references (leaves 86-93). Also available in electronic version. Access restricted to campus users.
APA, Harvard, Vancouver, ISO, and other styles
11

Duncan-Drake, Natasha. "Exploiting human expert techniques in automated writer identification." Thesis, University of Kent, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.365222.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Zhang, Xiaozheng. "Automatic speechreading for improved speech recognition and speaker verification." Diss., Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/13067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Amayeh, Gholamreza. "A component-based approach to hand-based verification and identification system." abstract and full text PDF (UNR users only), 2009. http://0-gateway.proquest.com.innopac.library.unr.edu/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3387799.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Martinez-Flores, Rene. "DAMAGE ASSESSMENT POTENTIAL OF A NOVEL SYSTEM IDENTIFICATION TECHNIQUE - EXPERIMENTAL VERIFICATION." Diss., Tucson, Arizona : University of Arizona, 2005. http://etd.library.arizona.edu/etd/GetFileServlet?file=file:///data1/pdf/etd/azu%5Fetd%5F1028%5F1%5Fm.pdf&type=application/pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Kahn, Steven Phillip. "Experimental verification and development of structural identification techniques on a grid." Thesis, This resource online, 1990. http://scholar.lib.vt.edu/theses/available/etd-03122009-040526/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Martikainen, Katariina, and Kewser Said. "A facial recognition application for elderly care : Caregiver verification and identification." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-235636.

Full text
Abstract:
Interest in facial recognition has increased rapidly during the past decade. Increased computational power and huge amounts of available data have made facial recognition both possible and useful. Bio-metrical identification is one of the common applications for facial recognition.The population in Sweden is aging. Moreover, many people remain living on their own until old age. This introduces new challenges to society. How do we maintain the autonomy of elderly, and support their well-being despite of the challenges introduced by aging?This thesis presents a study of the potential of facial recognition in elderly care. In the thesis work a need for facial recognition system in elderly care is identified, a system architecture to meet the need is presented, the implementation process of such system’s prototype is described, and the feasibility of the prototype is evaluated.One of the results of the study indicates that there is a need in elderly care to help seniors to verify and identify caregivers who visit them. The study shows that a facial recognition system which presents information about the visiting caregiver to the elderly would support them in their daily life. The user interface of the developed prototype is feasible, but as it is now, the facial recognition part of the program is not accurate enough to be used in a real life context. Ways of improving the facial recognition functionality of such a system should be studied in future research.
Intresset för ansiktsigenkänning har ökat snabbt under det senaste decenniet. Detta har gjort ansiktsigenkänning både möjlig och användbar. Biometri och identifiering är vanliga användningssätt för ansiktsigenkänning.Sverige befolkning åldras. De äldre fortsätter dessutom att i hög grad bo ensamma. Detta introducerar nya utmaningar för samhället. Hur kan vi bibehålla de äldres autonomi and stötta deras välmående, trots ålderns krämpor?Denna uppsats presenterar en studie om potentialen för att använda ansiktsigenkänning inom äldrevården. I arbetet identifieras behovet av ett ansiktsigenkänningssystem inom äldrevården, en systemarkitektur för att tillgodose detta behov presenteras, implementeringsprocessen av en prototyp av ett sådant system beskrivs samt genomförbarheten av ett sådant system utvärderas. Ett av studiens resultat indikerar att det finns ett behov inom äldreomsorgen att hjälpa seniorer att identifiera och verifiera den personal som besöker dem. Studien visar att ett ansiktsigenkänningssystem som visar information om besökande personal till seniorerna skulle kunna hjälpa dem i deras dagliga liv.Användargränssnittet i den utvecklade prototypen är användbar, men i dess nuvarande stadie är ansiktsigenkänningsdelen av programmet inte exakt nog för att kunna användas i verkligheten. Metoder för att förbättra ansiktsigenkänningsfunktionen i ett sådant system är ett uppslag för framtida forskning.
APA, Harvard, Vancouver, ISO, and other styles
17

Hu, Shouhua. "Pointwise identification for thin shell structures and verification using realistic cerebral aneurysms." Diss., University of Iowa, 2012. https://ir.uiowa.edu/etd/3313.

Full text
Abstract:
Identification of material properties for elastic materials is important in mechanics, material sciences, mechanical engineering and biomedical engineering. Although the principle and techniques have been long established, the application in living biology still faces challenges. The biological materials are in general nonlinear, anisotropic, heterogeneous, and subject-specific. The difficulty is compounded sometimes by the requirement of non-destructiveness in medical applications. Recently, the pointwise identification method (PWIM) was proposed to address some of the needs of soft tissue characterization. PWIM is a non-invasive identification method, designed for thin materials; it can sharply characterize arbitrary heterogeneous property distributions. The primary goal of this thesis is to extend the pointwise identification method , originally developed for membranes which by default is of convex shape in pressurized states, to thin structures of arbitrary geometry. This work consists of four parts. The first part investigates the insensitivity of stress solution to material parameters in thin shell structures. This is an important first step, because PWIM hinges on the static determinacy property of the equilibrium problem of membranes. Before introducing the shell element into PWIM, it is necessary to test to what extent the assumption of static determinacy remains reasonable. It is shown that saccular structure which bending stress is small compared to in-plane stress, can still be treated as a statically determined structure. The second part focuses on developing finite element formulations of forward and inverse shell methods for a hyperelastic material model specifically proposed for cerebral aneuryms tissues. This is a preparatory step for the core development. The third part is the development of pointwise identification method for thin shell structures. Methods for stress solution, strain acquisition, and parameter regression will be discussed in detail. The entire process is demonstrated using an example of a geometrically realistic model of aneurysm. The fourth part is testing the applicability on geometrically realistic cerebral aneurysms. Six models were selected in the study; the emphasis is placed on cerebral aneurysm with concave or saddle surface region for which the use of shell theory is a must. The identification results of all six human cerebral aneurysms successfully demonstrate that the shell PWIM can be applied to realistic cerebral aneurysms. Four types of heterogeneous property distributions are considered in the study. It is found that the method can accurately back out the property distributions in all cases. Fiber directions can also be accurately estimated. The robustness of the method at the presentence of numerical noise is also investigated. It is shown that the shell PWIM still works when small perturbations exist in displacements.
APA, Harvard, Vancouver, ISO, and other styles
18

Neethling, Annika. "Long QT syndrome : the identification and verification of putative KCNE2-interacting proteins." Thesis, Stellenbosch : Stellenbosch University, 2013. http://hdl.handle.net/10019.1/85718.

Full text
Abstract:
Thesis (MScMedSc)-- Stellenbosch University, 2013.
ENGLISH ABSTRACT: Long QT syndrome (LQTS) is a cardiac repolarization disorder affecting every 1:2000-1:3000 individuals. This disease is characterized by a prolonged QT interval on the surface electrocardiogram (ECG) of patients. Symptoms of LQTS range from dizziness and syncope to more severe symptoms such as seizures and sudden cardiac death (SCD). Clinical features of LQTS are a result of the precipitations of Torsades de Pointes, which is a polymorphic form of ventricular tachycardia. A number of genetic forms of LQTS have been identified with more than 700 mutations in 12 different genes leading to disease pathogenesis. However it has been estimated that approximately 25% of patients with compelling LQTS have no mutations within the known LQT genes. This proves to be problematic since treatment regimens depend on the genetic diagnosis of affected individuals. Of the known mutated genes, KCNE2 is associated with LQT6. KCNE2 encodes the beta-subunit of potassium ion channel proteins. These proteins contain cytoplasmic C-terminal domains in which many mutations have been identified. We hypothesize that genes encoding KCNE2-interacting proteins might be identified as disease-causing or modifying genes. The present study aimed to use yeast two-hybrid (Y2H) methodology to screen a pre-transformed cardiac cDNA library in order to identify putative interactors of the C-terminal of KCNE2. Through specific selection methods the number of KCNE2 ligands was reduced from 296 to 83. These interactors were sequenced and 14 were identified as putative interacting proteins. False positive ligands were excluded based on their function and subcellular location. Ultimately three strong candidate ligands were selected for further analysis: Alpha-B crystallin (CRYAB), Filamin C (FLNC) and voltage-dependent anion-selective channel protein 1 (VDAC1). Three-dimensional (3D) co-localization and co-immunoprecipitation were used to verify these proposed interactions and succeeded in doing so. The genes encoding verified interactors will be screened in our SA panel of LQT patients, to potentially identify novel LQT causative or modifying genes. Furthermore, the interactions verified in the present study may shed some light on the mechanism of pathogenesis of LQT causative mutations in KCNE2.
AFRIKAANSE OPSOMMING: Lang QT-sindroom (LQTS) is 'n hart her-polariserende siekte wat elke 1:2000-1:3000 individue affekteer. Hierdie siekte word gekenmerk deur 'n lang QT-interval op die oppervlak elektrokardiogram (EKG) van pasiënte. Simptome van LQTS wissel van duiseligheid en floutes tot meer ernstige simptome soos stuiptrekkings of aanvalle en skielike kardiale dood (SKD). Kliniese kenmerke van LQTS is 'n gevolg van die neerslag van Torsades de Pointes; 'n polimorfiese vorm van ventrikulêre tagikardie. Verskeie genetiese vorms van LQTS is geïdentifiseer met meer as 700 mutasies in 12 verskillende gene wat lei tot siekte patogenese. Dit is ergter beraam dat ongeveer 25% van pasiënte met dwingende LQTS geen mutasies in die bekend LQT gene besit nie. Dit is problematies aangesien siekte behandeling af hang van die genetiese diagnose van geaffekteerde individue. Een van die bekende gemuteerde gene is KCNE2 wat verband hou met LQT6. KCNE2 kodeer die beta-subeenheid van kalium ioonkanaal proteïene. Hierdie proteïene bevat sitoplasmiese C-terminale waarin baie mutasies alreeds geïdentifiseer is. Ons veronderstel dat gene wat proteïene kodeer wat met KCNE2 interaksie toon, geïdentifiseer kan word as siekte veroorsaakende of wysigings gene. Die huidige studie het die gis twee-hibried metode gebruik om 'n vooraf-getransformeerde hart cDNS biblioteek te sif om vermeende protein interaksies van die C-terminaal van KCNE2 te identifiseer. Deur middel van seleksie metodes is die aantal KCNE2 ligande verminder van 296 tot 83. Die identiteit van die proteïene is bekend gemaak deur volgorderbepaling waarna 14 geïdentifiseer is as proteïene wat moontlik interaksie kan toon met KCNE2. Vals positiewe ligande is uitgesluit op grond van hul funksie en subsellulêre lokasering. Drie kandidaat ligande is gekies vir verdere analise: Alfa-B crystallin (CRYAB), Filamin C (FLNC) en spanning-afhanklike anioon-selektiewe kanaal proteïen 1 (VDAC1). Drie-dimensionele (3D) mede-lokalisering en mede-immunopresipitasie tegnieke is gebruik om hierdie voorgestelde interaksies te verifieer en het geslaag om dit te doen. Die gene wat geverifieerde proteïene kodeer, sal gekeur word in ons Suid-Afrikaanse paneel van LQT pasiënte om sodoende potensieel nuwe LQT veroorsakende of wysigings gene te identifiseer. Verder kan die geverifieer interaksies in die huidige studie lig werp op die meganisme van die ontstaan van LQT veroorsakende mutasies in KCNE2.
Harry Crossley Foundation (South Africa)
Stellenbosch University
South African Council for Scientific and Industrial Research
Stella and Paul Loewenstein Charitable and Educational Trust
APA, Harvard, Vancouver, ISO, and other styles
19

Johns, Brian Douglas. "Experimental verification of pointwise identification method for capturing heterogeneous properties in membranes." Thesis, University of Iowa, 2010. https://ir.uiowa.edu/etd/824.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Kabbara, Yeihya. "Caractérisation des images à Rayon-X de la main par des modèles mathématiques : application à la biométrie." Thesis, Paris Est, 2015. http://www.theses.fr/2015PEST1015/document.

Full text
Abstract:
Dans son contexte spécifique, le terme « biométrie » est souvent associé à l'étude des caractéristiques physiques et comportementales des individus afin de parvenir à leur identification ou à leur vérification. Ainsi, le travail développé dans cette thèse nous a conduit à proposer un algorithme d'identification robuste, en considérant les caractéristiques intrinsèques des phalanges de la main. Considérée comme une biométrie cachée, cette nouvelle approche peut s'avérer intéressante, notamment lorsqu'il est question d'assurer un niveau de sécurité élevé, robuste aux différentes attaques qu'un système biométrique doit contrer. La base des techniques proposées requière trois phases, à savoir: (1) la segmentation des phalanges, (2) l'extraction de leurs caractéristiques par la génération d'une empreinte, appelée « Phalange-Code » et (3) l'identification basée sur la méthode du 1-plus proche voisin ou la vérification basée sur une métrique de similarité. Ces algorithmes opèrent sur des niveaux hiérarchiques permettant l'extraction de certains paramètres, invariants à des transformations géométriques telles que l'orientation et la translation. De plus, nous avons considéré des techniques robustes au bruit, pouvant opérer à différentes résolutions d'images. Plus précisément, nous avons élaboré trois approches de reconnaissance biométrique : la première approche utilise l'information spectrale des contours des phalanges de la main comme signature individuelle, alors que la deuxième approche nécessite l'utilisation des caractéristiques géométriques et morphologiques des phalanges (i.e. surface, périmètre, longueur, largeur, capacité). Enfin, la troisième approche requière la génération d'un nouveau rapport de vraisemblance entre les phalanges, utilisant la théorie de probabilités géométriques. En second lieu, la construction d'une base de données avec la plus faible dose de rayonnement a été l'un des grands défis de notre étude. Nous avons donc procédé par la collecte de 403 images radiographiques de la main, acquises en utilisant la machine Apollo EZ X-Ray. Ces images sont issues de 115 adultes volontaires (hommes et femmes), non pathologiques. L'âge moyen étant de 27.2 ans et l'écart-type est de 8.5. La base de données ainsi construite intègre des images de la main droite et gauche, acquises à des positions différentes et en considérant des résolutions différentes et des doses de rayonnement différentes (i.e. réduction jusqu'à 98 % de la dose standard recommandée par les radiologues « 1 µSv »).Nos expériences montrent que les individus peuvent être distingués par les caractéristiques de leurs phalanges, que ce soit celles de la main droite ou celles de la main gauche. Cette distinction est également valable pour le genre des individus (homme/femme). L'étude menée a montré que l'approche utilisant l'information spectrale des contours des phalanges permet une identification par seulement trois phalanges, à un taux EER (Equal Error Rate) inférieur à 0.24 %. Par ailleurs, il a été constaté « de manière surprenante » que la technique fondée sur les rapports de vraisemblance entre les phalanges permet d'atteindre un taux d'identification de 100 % et un taux d'EER de 0.37 %, avec une seule phalange. Hormis l'aspect identification/authentification, notre étude s'est penchée sur l'optimisation de la dose de rayonnement permettant une identification saine des individus. Ainsi, il a été démontré qu'il était possible d'acquérir plus de 12500/an d'images radiographiques de la main, sans pour autant dépasser le seuil administratif de 0.25 mSv
In its specific context, the term "biometrics" is often associated with the study of the physical and behavioral of individual's characteristics to achieve their identification or verification. Thus, the work developed in this thesis has led us to suggest a robust identification algorithm, taking into account the intrinsic characteristics of the hand phalanges. Considered as hidden biometrics, this new approach can be of high interest, particularly when it comes to ensure a high level of security, robust to various attacks that a biometric system must address. The basis of the proposed techniques requires three phases, namely: (1) the segmentation of the phalanges (2) extracting their characteristics by generating an imprint, called "Phalange-Code" and (3) the identification based on the method of 1-nearest neighbor or the verification based on a similarity metric. This algorithm operates on hierarchical levels allowing the extraction of certain parameters invariant to geometric transformations such as image orientation and translation. Furthermore, the considered algorithm is particularly robust to noise, and can function at different resolutions of images. Thus, we developed three approaches to biometric recognition: the first approach produces individual signature from the spectral information of the contours issued from the hand phalanges, whereas the second approach requires the use of geometric and morphological characteristics of the phalanges (i.e. surface, perimeter, length, width, and capacity). Finally, the third approach requires the generation of a new likelihood ratio between the phalanges, using the geometric probability theory. Furthermore, the construction of a database with the lowest radiation dose was one of the great challenges of our study. We therefore proceeded with the collection of 403 x-ray images of the hand, acquired using the Apollo EZ X-Ray machine. These images are from 115 non-pathological volunteering adult (men and women). The average age is 27.2 years and the standard deviation is 8.5. Thus, the constructed database incorporates images of the right and left hands, acquired at different positions and by considering different resolutions and different radiation doses (i.e. reduced till 98% of the standard dose recommended by radiologists "1 µSv").Our experiments show that individuals can be distinguished by the characteristics of their phalanges, whether those of the right hand or the left hand. This distinction also applies to the kind of individuals (male/female). The study has demonstrated that the approach using the spectral information of the phalanges' contours allows identification by only three phalanges, with an EER (Equal Error Rate) lower than 0.24 %. Furthermore, it was found “Surprisingly” that the technique based on the likelihood ratio between phalanges reaches an identification rate of 100% and an EER of 0.37% with a single phalanx. Apart from the identification/authentication aspect, our study focused on the optimization of the radiation dose in order to offer safe identification of individuals. Thus, it has been shown that it was possible to acquire more than 12,500/year radiographic hand images, without exceeding the administrative control of 0.25 mSv
APA, Harvard, Vancouver, ISO, and other styles
21

Yu, Tian. "COMPUTATIONAL IDENTIFICATION AND MOLECULAR VERIFICATION OF MIRNA IN EASTERN SUBTERRANEAN TERMITES (RETICULITERMES FLAVIPES)." UKnowledge, 2014. http://uknowledge.uky.edu/entomology_etds/12.

Full text
Abstract:
Reticulitermes flavipes is one of the most common termite species in the world, and has been an intriguing research model due to its ecological and biological and economic significance. The fundamental biological question addressed by this study is to elucidate the role of miRNAs in termite development and how miRNA can influence labor division. miRNAs are short non-coding RNAs that have an important role in gene regulation at post-transcriptional level, and can potentially be involved in the regulation of caste polyphenism. Using a computational approach, I identified 167 conserved and 33 novel miRNAs in the dataset. miR-iab-4 and 19 other miRNAs showed highly differential expression between worker and soldier, and their possible roles in termite biology are discussed. To reliably quantify miRNA expression in experiments, I tested the stability of 10 miRNAs as reference gene using quantitative real-time PCR. miR-8_3, bantam and miR-276a-3p are the most stable miRNAs in different castes, pre-soldier formation, and different tissues, respectively. Lastly, the predicted miRNA expression is verified by the qRT-PCR for 8 miRNAs. Overall, this study shows that miRNA plays a role in mediating the work-soldier transition in R. flavipes.
APA, Harvard, Vancouver, ISO, and other styles
22

Kumeta, Masahiro. "Dynamic Regulation of Nuclear Architectures - Identification and Experimental Verification of Subcellular Scaffolding Proteins." 京都大学 (Kyoto University), 2010. http://hdl.handle.net/2433/120356.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Salavati, Sadaf. "Biometrics in practice : The security technology of tomorrow's airports." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-874.

Full text
Abstract:

The biometric technology is a method for authentication which has been used since several centuries back. This is a technology which offers several different techniques where the human’s unique characteristics are used for identification and verification of the individual. Biometrics are today at a stage of development that is pointing upwards and many individuals that are well aware of the biometric world believes that this is the technology that will take over the security systems used today.

Ever since the terror attacks against USA at 2001, USA demanded that all 45 countries that today are not required to have visa when entering the United States must until the end of 2006 implement passports that contains biometrics information. The UN’s air traffic group on the other hand thinks that all counties in the world should use passports with biometric data. The biometric data in the passports are going to be stored in a chip and is in the first hand an image of the individuals face in a cryptic jpg format, but can also be complemented with fingerprints or even signature recognition. Sweden is currently using passports which contain biometric data but so far haven’t any machines that can read this passports been bought. Ulf Hägglund at Precise Biometrics AB believes that as soon as the real use of the biometric passports gets going the biometric technique will be used in a greater extension in the airports.

Even though several Swedish airports consider the security technique used in airports today being enough, biometrics can increase the security and at the same time simplify many security processes. Falsification can be reduced when at same time one can be sure that the same passenger who has checked-in is the passenger who boards the airplane and the employee security control can be totally automatized. Generally it can be said that “biometrics is a decent way to increase security in different areas”.


Den biometriska teknologin är en äkthetsbevisningsmetod som har används sedan flera århundraden tillbaka. Detta är en teknologi som erbjuder flera olika tekniker där människans unika karateristiska kännetecken används för identifiering och verifiering av individen. Biometrin befinner sig idag i ett utvecklingsstadie som pekar uppåt och flera personer som är insatta i biometrins värld anser att detta är den teknologi som kommer att ta över det nuvarande säkerhetssystemet.

Sedan terrorattentatet mot USA år 2001 har USA begärt att alla 45 länderna som idag inte behöver visum för att komma in till USA måste innan slutet av år 2006 införa pass som innehåller biometrisk information. FN; s luftfartsgrupp anser däremot att alla världens länder bör införa pass med biometrisk data. Den biometriska data som ska finnas i passen ska lagras i ett chip och är främst en avbildning av individens ansikte i krypterad jpg format men kan även tänkas bli kompletterat med fingeravtryck och eventuellt signatur igenkänning . I dagsläget använder sig Sverige av pass med biometrisk data, men än så länge har inte några maskiner som kan avläsa dessa pass köpts in. Ulf Hägglund på Precise Biometrics AB tror att så snart användandet av de biometriska passen kommer igång på riktigt kommer även den biometiska tekniken att användas i större utsträckning på flygplatser.

Trotts att flera svenska flygplatser idag anser att den säkerhetsteknik som används på flygplatserna idag räcker, kan man genom att använda sig av biometri öka säkerheten samtidigt som man förenklar många säkerhetsprocesser. Falsifieringen minskar samtidigt som man kan försäkra sig om att det alltid är samma passagerare som checkat- in som stiger på planet och säkerhetskontrollerna för de anställda kan bli total automatiserad. I stort kan man säga att ”biometrin är ett hyggligt steg mot att förbättra säkerheten inom olika områden”.

APA, Harvard, Vancouver, ISO, and other styles
24

Fotoohi, Leila [Verfasser]. "Dependable Service Robot – from Hazard Identification to Formal Verification of Safety Requirements / Leila Fotoohi." Aachen : Shaker, 2012. http://d-nb.info/1066196958/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Crook, Simon. "Identification and verification of genes regulated in breast cancer cells by the antiprogestin, Onapristone." Thesis, University of Nottingham, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.250455.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Lau, Kai Kwong Gervas. "A new statistical stroke recovery method and measurement for signature verification." HKBU Institutional Repository, 2005. http://repository.hkbu.edu.hk/etd_ra/661.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Sanderson, Conrad, and conradsand@ieee org. "Automatic Person Verification Using Speech and Face Information." Griffith University. School of Microelectronic Engineering, 2003. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20030422.105519.

Full text
Abstract:
Identity verification systems are an important part of our every day life. A typical example is the Automatic Teller Machine (ATM) which employs a simple identity verification scheme: the user is asked to enter their secret password after inserting their ATM card; if the password matches the one prescribed to the card, the user is allowed access to their bank account. This scheme suffers from a major drawback: only the validity of the combination of a certain possession (the ATM card) and certain knowledge (the password) is verified. The ATM card can be lost or stolen, and the password can be compromised. Thus new verification methods have emerged, where the password has either been replaced by, or used in addition to, biometrics such as the person’s speech, face image or fingerprints. Apart from the ATM example described above, biometrics can be applied to other areas, such as telephone & internet based banking, airline reservations & check-in, as well as forensic work and law enforcement applications. Biometric systems based on face images and/or speech signals have been shown to be quite effective. However, their performance easily degrades in the presence of a mismatch between training and testing conditions. For speech based systems this is usually in the form of channel distortion and/or ambient noise; for face based systems it can be in the form of a change in the illumination direction. A system which uses more than one biometric at the same time is known as a multi-modal verification system; it is often comprised of several modality experts and a decision stage. Since a multi-modal system uses complimentary discriminative information, lower error rates can be achieved; moreover, such a system can also be more robust, since the contribution of the modality affected by environmental conditions can be decreased. This thesis makes several contributions aimed at increasing the robustness of single- and multi-modal verification systems. Some of the major contributions are listed below. The robustness of a speech based system to ambient noise is increased by using Maximum Auto-Correlation Value (MACV) features, which utilize information from the source part of the speech signal. A new facial feature extraction technique is proposed (termed DCT-mod2), which utilizes polynomial coefficients derived from 2D Discrete Cosine Transform (DCT) coefficients of spatially neighbouring blocks. The DCT-mod2 features are shown to be robust to an illumination direction change as well as being over 80 times quicker to compute than 2D Gabor wavelet derived features. The fragility of Principal Component Analysis (PCA) derived features to an illumination direction change is solved by introducing a pre-processing step utilizing the DCT-mod2 feature extraction. We show that the enhanced PCA technique retains all the positive aspects of traditional PCA (that is, robustness to compression artefacts and white Gaussian noise) while also being robust to the illumination direction change. Several new methods, for use in fusion of speech and face information under noisy conditions, are proposed; these include a weight adjustment procedure, which explicitly measures the quality of the speech signal, and a decision stage comprised of a structurally noise resistant piece-wise linear classifier, which attempts to minimize the effects of noisy conditions via structural constraints on the decision boundary.
APA, Harvard, Vancouver, ISO, and other styles
28

Corcoran, Maureen Kathleen. "Geomorphic identification and verification of recent sedimentation patterns in the Woonasquatucket River North Providence, Rhode Island /." Full text available from ProQuest UM Digital Dissertations, 2006. http://0-proquest.umi.com.umiss.lib.olemiss.edu/pqdweb?index=0&did=1260796661&SrchMode=1&sid=1&Fmt=2&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1193255862&clientId=22256.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Rautenbach, James. "Towards a framework for identity verification of vulnerable children within the Eastern Cape." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/597.

Full text
Abstract:
This dissertation proposes the development of an identification verification model that can be implemented within the context of the Eastern Cape, South Africa in order to ensure that vulnerable children are provided with the requisite care that they deserve from the state. The dissertation provides both a developed and developing world perspective on the identification verification needs of vulnerable children by providing an overview of relevant South African policy with regard to caring for vulnerable children and presenting an international perspective with specific reference to current legislative developments in the United Kingdom and Malaysia. Chapter 1 provides a motivation for a framework to be used for the identification verification of children in developing countries by emphasising that the provision of basic social services to children is an urgent requirement for poverty eradication and is a necessity as documented in the United Nations Convention on the Rights of the Child. A background to the needs of vulnerable children in South Africa is given and the scope, limitations and research methodology used in the dissertation is presented. Chapter 2 provides an overview of child related policy in the South African Context both from a National Government and Eastern Cape perspective. Although extensive progress has been made in the development of policies aimed at protecting vulnerable children, the practical implementation of these policies has been hampered by numerous issues including the lack of coordination between key entities. Chapter 3 provides an introduction to several noteworthy international developments with regard to the identity verification of vulnerable children. Lessons learnt from identity verification systems from the United Kingdom and Malaysia are analyzed for applicability to the South African context. In addition to this, the use of biometric technology in identity verification systems and a number of biometric identification methodologies available are discussed. Chapter 4 proposes the development and implementation of a biometric identity verification model in the Eastern Cape Province of South Africa based on lessons learnt from the assessment of South African policy and international best practice. The system should be piloted in the Eastern Cape and, if successful, be implemented throughout South Africa with a possible view to future implementation on the African continent. The scope of the system, the technological requirements and a high level implementation plan together with the need to further research certain key aspects e.g. the cost implications are discussed. It is clear that the development of such a model and the implementation of such a system will ensure that vulnerable children are provided with the requisite care that they are constitutionally entitled to. Significant follow up research is required during the development of the model to ensure that all aspects of the model are well documented and during the implementation of the system to ensure that the requirements of the users both within the government and the general public are met.
APA, Harvard, Vancouver, ISO, and other styles
30

Coutinho, Canuto Jânio. "Biomechanical online signature modeling applied to verification." Thesis, Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0026/document.

Full text
Abstract:
Cette thèse porte sur la modélisation et vérification des signatures en ligne. La première partie a pour thème principal la modélisation biomécanique des mouvements de la main. Un modèle basé sur le critère de Minimum de Secousse (MS) a été choisi parmi plusieurs théories du contrôle moteur. Ensuite, le problème de la segmentation des trajectoires en traits qui correspondent au modèle cinématique choisi a été étudié, ce qui a conduit à la mise au point d'une méthode de segmentation itérative. Le choix du modèle et de la méthode de segmentation sont basé sur le compromis entre la qualité de reconstruction et la compression. Dans la deuxième partie, le modèle polynomial issu du critère de MS est volontairement dégradé. Les zéros non-Réels des polynômes sont jetés et les effets de cette dégradation sont étudiés dans une perspective de vérification biométrique. Cette dégradation est équivalente à la technique connue sous le nom d’Infinity Clipping, initialement appliqué à des signaux de parole. Pour les signatures en ligne, comme pour la parole, la préservation de l'information essentielle a été observée sur des tâches de vérification de signature. En fait, en utilisant seulement la distance de Levenshtein sur la représentation dégradée, un taux d'erreur comparable à ceux des méthodes plus élaborées a été obtenu. En outre, la représentation symbolique issue de l’Infinity Clipping permet d’établir une relation conceptuelle entre le nombre de segments obtenus par la segmentation itératif basée sur le MS et la complexité de Lempel-Ziv. Cette relation est potentiellement utile pour l'analyse des signatures en ligne et pour l’amélioration des systèmes de reconnaissance
This thesis deals with the modelling and verification of online signatures. The first part has as main theme the biomechanical modelling of hand movements associated to the signing gesture. A model based on the Minimum Jerk (MJ) criterion was chosen amongst the several available motor control theories. Next, the problem of signature trajectory segmentation into strokes that better fit the chosen kinematic model is studied, leading to the development of an iterative segmentation method. Both the choice of the model and the segmentation method are strongly based on the tradeoff between reconstruction quality and compression. On the second part, the polynomial model provided by the MJ criterion is intentionally degraded. The non-Real zeroes of the polynomials are discarded and the effects of this degradation are studied from a biometric verification perspective. This degradation is equivalent to the signal processing technique known as Infinity Clipping, originally applied to speech signals. On signatures, as for speech, the preservation of essential information was observed on signature verification tasks. As a matter of fact, using only the Levenshtein distance over the infinitely clipped representation, verification error rates comparable to those of more elaborate methods were obtained. Furthermore, the symbolic representation yielded by the infinity clipping technique allows for a conceptual relationship between the number of polynomial segments obtained through the Minimum Jerk-Based iterative segmentation and the Lempel-Ziv complexity. This relationship is potentially useful for the analysis of online signature signals and the improvement of recognition systems
APA, Harvard, Vancouver, ISO, and other styles
31

Dabbs, Parker, Aruna Kilaru, and Carlee Haas. "Identification and Verification of Plant Transcription Factors That Play a Role in Regulating the Production of Triacylglycerol." Digital Commons @ East Tennessee State University, 2014. https://dc.etsu.edu/etsu-works/4854.

Full text
Abstract:
Triacylglycerols (TAG) play vital roles in plant development and are also utilized by humans for consumption, chemical and industrial feed stocks, and production of biofuels. Their primary function in plants is as an energy reserve stored in seeds to allow for the growth of the developing plant after germination. While many plants accumulate significant quantities of TAGs in the developing embryo or other parts of the seed, significant quantities of TAG accumulation also occurs in nonseed tissues such as the mesocarp of avocado and oil palm, the roots of nutsedge, and the fruits of bay berry. In Arabidopsis the transcription factor Wrinkled 1 (WRI1) was shown to be responsible for regulating the accumulation of TAG in seeds, and homologues of WRI1 have been shown to have similar functions in other plants and plant tissues. However, WRI1 likely does not act alone to control the synthesis and accumulation of TAG in plants. This project aims to identify additional transcription factors that are responsible for controlling the synthesis and accumulation of TAG in nonseed tissues by utilizing transcriptome data from a variety of plant species. The transcriptome data also revealed three homologues of WRI1 that are highly expressed in Avocado mesocarp. Their function in Avocado will be determined by complementing Arabidopsis wri1 mutants and examining TAG accumulation in the resulting transgenic plants. This study is aimed at identifying genes that play a role in the accumulation of high levels of TAG in various plant tissues and confirming the function of the WRI homologues in Avocado. Future studies will be able to use this information to better understand regulation of TAG accumulation in plants which will allow increased oil accumulation and yield in plants for various commercial and industrial applications.
APA, Harvard, Vancouver, ISO, and other styles
32

Valenti, Giacomo. "Secure, efficient automatic speaker verification for embedded applications." Electronic Thesis or Diss., Sorbonne université, 2019. http://www.theses.fr/2019SORUS471.

Full text
Abstract:
Cette thèse se concentre uniquement sur la vérification automatique du locuteur, tâche de classification binaire, en deux aspects : l'efficacité et la sécurité. Chacun des aspects sera exploré dans deux itérations : sur l'ASV traditionnel (chapitres II, III et IV) et l'ASV expérimentale (chapitres V, VI et VII). Les chapitres II et V sont des revues de littérature, leur but est de mettre en perspective les contributions dans le chapitres que respectivement les suivent. Chapitre II est centré sur la réduction des donnés nécessaire pour entrainer un modèle de locuteur, dans ce cas l’efficacité est ce qui permet de rendre un système facilement usable par l’utilisateur final dans un contexte des application embarquées. Chapitre III se concentre sur les mots de passe oraux et sur la possibilité de donner une mesure de sécurité en fonction du contenu textuel et de l’énonciation au moment du choix, exactement comme pour les mots de passe écrits. Dans le chapitre V une approche génétique pour l’évolution des topologies neuronaux est appliqué pour la première fois au flux audio brut, pour l’identification du locuteur. Chapitre VI voit cette même approche appliquée à la reconnaissance des attaques de mystification de l’identité
This industrial CIFRE PhD thesis addresses automatic speaker verification (ASV) issues in the context of embedded applications. The first part of this thesis focuses on more traditional problems and topics. The first work investigates the minimum enrolment data requirements for a practical, text-dependent short-utterance ASV system. Contributions in part A of the thesis consist in a statistical analysis whose objective is to isolate text-dependent factors and prove they are consistent across different sets of speakers. For very short utterances, the influence of a specific text content on the system performance can be considered a speaker-independent factor. Part B of the thesis focuses on neural network-based solutions. While it was clear that neural networks and deep learning were becoming state-of-the-art in several machine learning domains, their use for embedded solutions was hindered by their complexity. Contributions described in the second part of the thesis comprise blue-sky, experimental research which tackles the substitution of hand-crafted, traditional speaker features in favour of operating directly upon the audio waveform and the search for optimal network architectures and weights by means of genetic algorithms. This work is the most fundamental contribution: lightweight, neuro-evolved network structures which are able to learn from the raw audio input
APA, Harvard, Vancouver, ISO, and other styles
33

McLaren, Simon R. "Reliability of iris recognition as a means of identity verification and future impact on transportation worker identification credential." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://bosun.nps.edu/uhtbin/hyperion-image.exe/08Mar%5FMcLaren.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2008.
Thesis Advisor(s): Garfinkel, Simson. "March 2008." Description based on title screen as viewed on May 5, 2008 Includes bibliographical references (p. 109-113). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
34

Aykan, Murat. "Identification Of Localized Nonlinearity For Dynamic Analysis Of Structures." Phd thesis, METU, 2013. http://etd.lib.metu.edu.tr/upload/12615596/index.pdf.

Full text
Abstract:
Most engineering structures include nonlinearity to some degree. Depending on the dynamic conditions and level of external forcing, sometimes a linear structure assumption may be justified. However, design requirements of sophisticated structures such as satellites, stabilized weapon systems and radars may require nonlinear behavior to be considered for better performance. Therefore, it is very important to successfully detect, localize and parametrically identify nonlinearity in such cases. In engineering applications, the location of nonlinearity and its type may not be always known in advance. Furthermore, as the structure will be excited from only a few coordinates, the frequency response function matrices will not be complete. In order to parametrically identify more than one type of nonlinearity which may co-exist at the same location with the above mentioned limitations, a method is proposed where restoring force surface plots are used which are evaluated by describing function inversion. Then, by reformulating this method, a second method is proposed which can directly evaluate the total describing function of more than one type of nonlinearity which may co-exist at the same location without using any linear frequency response function matrix. It is also aimed in this study to use the nonlinearity localization formulations for damage localization purposes. The validation of the methods developed in this study is demonstrated with case studies based on simulated experiments, as well as real experiments with nonlinear structures and it is concluded that the methods are very promising to be used in engineering structures.
APA, Harvard, Vancouver, ISO, and other styles
35

Sun, Wei [Verfasser], Thomas [Akademischer Betreuer] Sikora, Thomas [Gutachter] Sikora, Atta [Gutachter] Badii, and Ivo [Gutachter] Keller. "Low complexity embedded fingerprint verification and identification system / Wei Sun ; Gutachter: Thomas Sikora, Atta Badii, Ivo Keller ; Betreuer: Thomas Sikora." Berlin : Technische Universität Berlin, 2016. http://d-nb.info/1156181704/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Dimitrov, Emanuil. "Fingerprints recognition." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-5522.

Full text
Abstract:

Nowadays biometric identification is used in a variety of applications-administration, business and even home. Although there are a lot of biometric identifiers, fingerprints are the most widely spread due to their acceptance from the people and the cheap price of the hardware equipment. Fingerprint recognition is a complex image recognition problem and includes algorithms and procedures for image enhancement and binarization, extracting and matching features and sometimes classification. In this work the main approaches in the research area are discussed, demonstrated and tested in a sample application. The demonstration software application is developed by using Verifinger SDK and Microsoft Visual Studio platform. The fingerprint sensor for testing the application is AuthenTec AES2501.

APA, Harvard, Vancouver, ISO, and other styles
37

Brown, Philip, and Ida Järlskog. "Identification of Chlorinated Fatty Acids in Standard Samples and Fish Lipids : Verification and Validation of Extraction, Transesterification and GC-MS/XSD." Thesis, Linköpings universitet, Tema Miljöförändring, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-118580.

Full text
Abstract:
Chlorine gas bleaching was a common method used in pulp industries. As a consequence, significant amounts of chlorine were discharged into surrounding aquatic ecosystems, affecting the biota. Chlorinated organic pollutants are formed when chlorine react with organic material. Octadecanoic acid (stearic acid) is one of the most common saturated fatty acids in aquatic biota. In a naturally occurring process two and four chlorine atoms, respectively, are added over the unsaturated bonds, forming 9,10-dichloro octadecanoic acid and 9,10,12,13-tetrachloro octadecanoic acid. These are the chlorinated fatty acids (ClFA) under investigation in this Bachelor’s Thesis. The methodological framework for measuring ClFA is investigated in this essay. The scope is to evaluate the method of isolating and quantifying the compounds as described in Åkesson-Nilsson’s (2004) dissertation. The method includes: extraction of the lipid, transesterification (where the fatty acids, including the ClFAs, are separated from the lipids and transformed into their respective methyl esters through two methods, acidic catalysis with BF3 or H2SO4), separation (by solid phase extraction) and determination of ClFA concentration with a halogen specific detector (GC-XSD/MS). Furthermore, the scope is to investigate collected fish samples (from Norrsundet) with the abovementioned method. By making a dilution series with known concentrations it was possible to establish calibration curves, to give in an indication of the effectiveness of the method. BF3 is in need of updating due to being experienced as slower and less stable than the H2SO4-method. However, it was concluded that the H2SO4-method was more effective on the standard samples and that the BF3-method was more effective on the fish lipid samples. In one of the lipid samples (lavaret transesterified with BF3) a detectable concentration of 9,10,12,13-tetrachloro octadecanoic acid was discovered. Therefore, we question SEPAs decision to cancel investigations in Norrsundet. Our results could indicate that ClFAs are still an issue that could affect the ecosystem’s biota.
APA, Harvard, Vancouver, ISO, and other styles
38

Chen, Ting. "First step of verification of Li's hypothesis : identification of a new vortex structure induced by guide-plate in Three Gorges turbines." Thesis, University of Warwick, 2014. http://wrap.warwick.ac.uk/63284/.

Full text
Abstract:
A new type of cavitation (damage) has been recently discovered from the Three Gorges turbines, that suggests a complicated inception mechanism involving the boundary-layer K-mode instability triggering cavitation nucleation. As one of the elements, the level of free-stream turbulence increased by wrongly designed guide-plate on the Three Gorges turbines could be a primary concern in the sense of receptivity and the transient growth of K-mode instability. The investigation focuses on the flow analysis of the on-coming flow influenced by the guide plate in terms of flow structure(s) and turbulence level variation. Firstly, CFD has been performed to obtain the main flow features in the whole turbine passage with more detailed analysis on the free-stream pressure-fluctuations near the lower surface of the guide vanes. The unsteady flow characteristics, especially the pressure fluctuations of low-frequency spectrum have been studied that significantly alternate the turbulence intensities and spectrum in the free-stream flow. The results verify that the addition of the guide-plate increases the free-stream turbulence, particularly contributing to the occurrence of a strongest component of extremely low-frequency pressure-fluctuation (i.e. the 0.336 Hz for the case 2 with opening of 16°). These low-frequency fluctuations readily transmit throughout the entire flow passage of the turbine. An extremely large-scale and united unsteady vortex structure that occupies the whole flow passage of a Francis turbine, has been identified for the first time. That is, a vortex-ring structure triggered by the guide-plate, through the connection of the vortices in the stay-vane and guide-vane channels plus those in the runner channels, further interacts with the helical vortex-rope in the draft tube at part-load conditions (e.g. 16° and 30°), forming such an united giant vortex structure. This extremely large-scale vortex structure is thus responsible for the components of extremely low-frequencies (i.e., 0.336 Hz for 16°, 0.15 Hz for 30°) which have been identified from two part-load conditions. These convincing results have proved how this wrongly designed guide-plate increases the free-stream turbulence by inducing extra unsteadiness with gust-like low-frequency and explained that the flow upstream the cone of draft-tube could affect the cone flow significantly, especially under part-load operation conditions.
APA, Harvard, Vancouver, ISO, and other styles
39

Ramos, Pablo D. Jr. "SYSTEM IDENTIFICATION OF A BRIDGE-TYPE BUILDING STRUCTURE." DigitalCommons@CalPoly, 2013. https://digitalcommons.calpoly.edu/theses/944.

Full text
Abstract:
The Bridge House is a steel building structure located in Poly Canyon, a rural area inside the campus of California Polytechnic State University, San Luis Obispo. The Bridge House is a one story steel structure supported on 4 concrete piers with a lateral force resisting system (LFRS) composed of ordinary moment frames in the N-S direction and braced frames in the E-W direction and vertically supported by a pair of trusses. The dynamic response of the Bridge House was investigated by means of system identification through ambient and forced vibration testing. Interesting findings such as diaphragm flexibility, foundation flexibility and frequency shifts due to thermal effects were all found throughout the mode shape mapping process. Nine apparent mode shapes were experimentally identified, N-S and E-W translational, rotational and 6 vertical modes. A computational model was also created and refined through correlation with the modal parameters obtained through FVTs. When compared to the experimental results, the computational model estimated the experimentally determined building period within 8% and 10% for both N-S and E-W translational modes and within 10% for 4 of the vertical modes.
APA, Harvard, Vancouver, ISO, and other styles
40

Alsulaiman, Fawaz Abdulaziz A. "Towards a Continuous User Authentication Using Haptic Information." Thesis, Université d'Ottawa / University of Ottawa, 2013. http://hdl.handle.net/10393/23946.

Full text
Abstract:
With the advancement in multimedia systems and the increased interest in haptics to be used in interpersonal communication systems, where users can see, show, hear, tell, touch and be touched, mouse and keyboard are no longer dominant input devices. Touch, speech and vision will soon be the main methods of human computer interaction. Moreover, as interpersonal communication usage increases, the need for securing user authentication grows. In this research, we examine a user's identification and verification based on haptic information. We divide our research into three main steps. The first step is to examine a pre-defined task, namely a handwritten signature with haptic information. The user target in this task is to mimic the legitimate signature in order to be verified. As a second step, we consider the user's identification and verification based on user drawings. The user target is predefined, however there are no restrictions imposed on the order or on the level of details required for the drawing. Lastly, we examine the feasibility and possibility of distinguishing users based on their haptic interaction through an interpersonal communication system. In this third step, there are no restrictions on user movements, however a free movement to touch the remote party is expected. In order to achieve our goal, many classification and feature reduction techniques have been discovered and some new ones were proposed. Moreover, in this work we utilize evolutionary computing in user verification and identification. Analysis of haptic features and their significance on distinguishing users is hence examined. The results show a utilization of visual features by Genetic Programming (GP) towards identity verification, with a probability equal to 50% while the remaining haptic features were utilized with a probability of approximately 50%. Moreover, with a handwritten signature application, a verification success rate of 97.93% with False Acceptance Rate (FAR) of 1.28% and @11.54% False Rejection Rate (FRR) is achieved with the utilization of genetic programming enhanced with the random over sampled data set. In addition, with a totally free user movement in a haptic-enabled interpersonal communication system, an identification success rate of 83.3% is achieved when random forest classifier is utilized.
APA, Harvard, Vancouver, ISO, and other styles
41

Kaňok, Tomáš. "Rozpoznávání mluvčího ve Skype hovorech." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-235519.

Full text
Abstract:
This diploma thesis is concerned with machine identification and verification of speaker, it's theory and applications. It evaluates existing implementation of the subject by the Speech@FIT group. It also considers plugins for the Skype program. Then a functioning plugin is proposed which makes possible identification of the speaker. It is implemented and evaluated here. Towards the end of this thesis suggestions of future development are presented.
APA, Harvard, Vancouver, ISO, and other styles
42

Sandström, Marie. "Liveness Detection in Fingerprint Recognition Systems." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2397.

Full text
Abstract:

Biometrics deals with identifying individuals with help of their biological data. Fingerprint scanning is the most common method of the biometric methods available today. The security of fingerprint scanners has however been questioned and previous studies have shown that fingerprint scanners can be fooled with artificial fingerprints, i.e. copies of real fingerprints. The fingerprint recognition systems are evolving and this study will discuss the situation of today.

Two approaches have been used to find out how good fingerprint recognition systems are in distinguishing between live fingers and artificial clones. The first approach is a literature study, while the second consists of experiments.

A literature study of liveness detection in fingerprint recognition systems has been performed. A description of different liveness detection methods is presented and discussed. Methods requiring extra hardware use temperature, pulse, blood pressure, electric resistance, etc., and methods using already existent information in the system use skin deformation, pores, perspiration, etc.

The experiments focus on making artificial fingerprints in gelatin from a latent fingerprint. Nine different systems were tested at the CeBIT trade fair in Germany and all were deceived. Three other different systems were put up against more extensive tests with three different subjects. All systems werecircumvented with all subjects'artificial fingerprints, but with varying results. The results are analyzed and discussed, partly with help of the A/R value defined in this report.

APA, Harvard, Vancouver, ISO, and other styles
43

Jerling, Francette. "The identification and verification of optimal reintroduction sites for the Southern Ground Hornbill Bucorvus leadbeateri in the Musina area of the Limpopo Province, South Africa / Francette Jerling." Thesis, North-West University, 2011. http://hdl.handle.net/10394/9170.

Full text
Abstract:
The Southern Ground Hornbill (SGH) (Bucorvus leadbeateri) has recently been listed globally by the IUCN Red list as Endangered or Critically Endangered. In South Africa, the declining population of the SGH has led it to be listed nationally as Vulnerable and falls under the “Protected Species” legislation. Research into the habitat preferences and identification of suitable reintroduction areas have been few since the initiation of reintroduction attempts, therefore resulting in mixed outcomes of previously-reintroduced SGH. The aim of this study was to identify and verify optimal reintroduction sites for the SGH, in the Musina area in the Limpopo Province. Five main objectives were determined, namely: to identify optimal reintroduction areas; to develop a habitat profile of the designated area; to determine the availability of prey items; to determine the availability of large trees needed for nesting and roosting; to evaluate pre-release sites by involving a number of stakeholders. Three study sites were selected on the farm Greyghost Safaris (Ludwigslust), each made up of a different plant community. Sampling was carried out a total of four times during the year: one sampling bout in each season. A niche-based modelling technique was used to describe the suitability of a particular habitat (“ecological space”) then used to project it onto another geographical space. Floristic and faunal surveys were conducted to determine the species composition of prey items and composition and frequency of the herbaceous and woody layer. High-resolution, natural-colour aerial imagery was used in order to determine the availability of trees for nesting and roosting. Pre-release site evaluations and stakeholder engagements were conducted by means of interviews with landowners on and around the study sites. The Limpopo River Valley and across to the KNP on the eastern border of the Limpopo Province, is suitable re-introduction sites for the SGH. This study site provided a good opportunity to explore what an optimal site for reintroduction should resemble.
Thesis (MSc (Zoology))--North-West University, Potchefstroom Campus, 2012.
APA, Harvard, Vancouver, ISO, and other styles
44

Kwaa-Aidoo, Ephrem K. "Culturally aligned security in banking. A system for rural banking in Ghana." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4433.

Full text
Abstract:
This thesis is an investigation into the unique rural banking system in Ghana and the role of information systems in fraud control. It presents a robust information security and internal control model to deal with fraud for the banking system. The rural banking industry has been noted for poor internal control leading to fraud. This has resulted in poor performance and even the collapse of some banks. The Focus of the study was on the processes used to deliver banking services. To design a protection system, a number of rural banks were visited. This was to understand the environment, regulatory regimes and the structure and banking processes of the industry and banks. Systemic vulnerabilities within the industry which could be exploited for fraud were found. The lack of structures like an address system and unreliable identification documents makes it difficult to use conventional identification processes. Also the lack of adequate controls, small staff numbers and the cross organisational nature of some transactions among other cultural issues reduces the ability to implement transaction controls. Twenty fraud scenarios were derived to illustrate the manifestation of these vulnerabilities. The rural banking integrity model was developed to deal with these observations. This protection model was developed using existing information security models and banking control mechanisms but incorporating the nature of the rural banking industry and culture of its environment. The fraud protection model was tested against the fraud scenarios and was shown to meet the needs of the rural banking industry in dealing with its systemic vulnerabilities. The proposed community-based identification scheme deals with identification weaknesses as an alternative to conventional identity verification mechanisms. The Transaction Authentication Code uses traditional adinkra symbols. Whilst other mechanisms like the Transaction Verification Code design v internal controls into the banking processes. This deals with various process control weaknesses and avoids human discretion in complying with controls. Object based separation of duties is also introduced as a means of controlling conflicting tasks which could lead to fraud.
APA, Harvard, Vancouver, ISO, and other styles
45

Falade, Joannes Chiderlos. "Identification rapide d'empreintes digitales, robuste à la dissimulation d'identité." Thesis, Normandie, 2020. http://www.theses.fr/2020NORMC231.

Full text
Abstract:
La biométrie est de plus en plus utilisée à des fins d’identification compte tenu de la relation étroite entre la personne et son identifiant (comme une empreinte digitale). Nous positionnons cette thèse sur la problématique de l’identification d’individus à partir de ses empreintes digitales. L’empreinte digitale est une donnée biométrique largement utilisée pour son efficacité, sa simplicité et son coût d’acquisition modeste. Les algorithmes de comparaison d’empreintes digitales sont matures et permettent d’obtenir en moins de 500 ms un score de similarité entre un gabarit de référence (stocké sur un passeport électronique ou une base de données) et un gabarit acquis. Cependant, il devient très important de déterminer l'identité d'un individu contre une population entière en un temps très court (quelques secondes). Ceci représente un enjeu important compte tenu de la taille de la base de données biométriques (contenant un ensemble d’individus de l’ordre d’un pays). Par exemple, avant de délivrer un nouveau passeport à un individu qui en fait la demande, il faut faire une recherche d'identification sur la base des données biométriques du pays afin de s'assurer que ce dernier n'en possède pas déjà un autre mais avec les mêmes empreintes digitales (éviter les doublons). Ainsi, la première partie du sujet de cette thèse concerne l’identification des individus en utilisant les empreintes digitales. D’une façon générale, les systèmes biométriques ont pour rôle d’assurer les tâches de vérification (comparaison 1-1) et d’identification (1-N). Notre sujet se concentre sur l’identification avec N étant à l’échelle du million et représentant la population d’un pays par exemple. Dans le cadre de nos travaux, nous avons fait un état de l’art sur les méthodes d’indexation et de classification des bases de données d’empreintes digitales. Nous avons privilégié les représentations binaires des empreintes digitales pour indexation. Tout d’abord, nous avons réalisé une étude bibliographique et rédigé un support sur l’état de l’art des techniques d’indexation pour la classification des empreintes digitales. Ensuite, nous avons explorer les différentes représentations des empreintes digitales, puis réaliser une prise en main et l’évaluation des outils disponibles à l’imprimerie Nationale (IN Groupe) servant à l'extraction des descripteurs représentant une empreinte digitale. En partant de ces outils de l’IN, nous avons implémenté quatre méthodes d’identification sélectionnées dans l’état de l’art. Une étude comparative ainsi que des améliorations ont été proposées sur ces méthodes. Nous avons aussi proposé une nouvelle solution d'indexation d'empreinte digitale pour réaliser la tâche d’identification qui améliore les résultats existant. Les différents résultats sont validés sur des bases de données de tailles moyennes publiques et nous utilisons le logiciel Sfinge pour réaliser le passage à l’échelle et la validation complète des stratégies d’indexation. Un deuxième aspect de cette thèse concerne la sécurité. Une personne peut avoir en effet, la volonté de dissimuler son identité et donc de mettre tout en œuvre pour faire échouer l’identification. Dans cette optique, un individu peut fournir une empreinte de mauvaise qualité (portion de l’empreinte digitale, faible contraste en appuyant peu sur le capteur…) ou fournir une empreinte digitale altérée (empreinte volontairement abîmée, suppression de l’empreinte avec de l’acide, scarification…). Il s'agit donc dans la deuxième partie de cette thèse de détecter les doigts morts et les faux doigts (silicone, impression 3D, empreinte latente) utilisés par des personnes mal intentionnées pour attaquer le système. Nous avons proposé une nouvelle solution de détection d'attaque basée sur l'utilisation de descripteurs statistiques sur l'empreinte digitale. Aussi, nous avons aussi mis en place trois chaînes de détections des faux doigts utilisant les techniques d'apprentissages profonds
Biometrics are increasingly used for identification purposes due to the close relationship between the person and their identifier (such as fingerprint). We focus this thesis on the issue of identifying individuals from their fingerprints. The fingerprint is a biometric data widely used for its efficiency, simplicity and low cost of acquisition. The fingerprint comparison algorithms are mature and it is possible to obtain in less than 500 ms a similarity score between a reference template (enrolled on an electronic passport or database) and an acquired template. However, it becomes very important to check the identity of an individual against an entire population in a very short time (a few seconds). This is an important issue due to the size of the biometric database (containing a set of individuals of the order of a country). Thus, the first part of the subject of this thesis concerns the identification of individuals using fingerprints. Our topic focuses on the identification with N being at the scale of a million and representing the population of a country for example. Then, we use classification and indexing methods to structure the biometric database and speed up the identification process. We have implemented four identification methods selected from the state of the art. A comparative study and improvements were proposed on these methods. We also proposed a new fingerprint indexing solution to perform the identification task which improves existing results. A second aspect of this thesis concerns security. A person may want to conceal their identity and therefore do everything possible to defeat the identification. With this in mind, an individual may provide a poor quality fingerprint (fingerprint portion, low contrast by lightly pressing the sensor...) or provide an altered fingerprint (impression intentionally damaged, removal of the impression with acid, scarification...). It is therefore in the second part of this thesis to detect dead fingers and spoof fingers (silicone, 3D fingerprint, latent fingerprint) used by malicious people to attack the system. In general, these methods use machine learning techniques and deep learning. Secondly, we proposed a new presentation attack detection solution based on the use of statistical descriptors on the fingerprint. Thirdly, we have also build three presentation attacks detection workflow for fake fingerprint using deep learning. Among these three deep solutions implemented, two come from the state of the art; then the third an improvement that we propose. Our solutions are tested on the LivDet competition databases for presentation attack detection
APA, Harvard, Vancouver, ISO, and other styles
46

Chihaoui, Takwa. "Système d'identification de personnes basé sur la rétine." Thesis, Paris Est, 2018. http://www.theses.fr/2018PESC1145/document.

Full text
Abstract:
Notre travail s’inscrit dans le cadre de la biométrie par la rétine. La rétine est la couche sensorielle de l’œil, elle présente une texture riche et unique même chez les jumeaux. Ses propriétés ont fait de la biométrie par la rétine un axe de recherche actif. En effet, de nombreuses méthodes ont été proposées pour les différentes étapes de la méthode biométrique allant du prétraitement de l’image rétinienne à son analyse, en passant par sa caractérisation, afin d’identifier et authentifier un individu. Nous nous intéressons dans ces travaux de thèse, à l’étude, la conception, le développement et l’évaluation d’une nouvelle méthode biométrique basée sur la rétine. Notre première contribution réside dans la conception d’une méthode d’analyse d’image rétinienne saine et pathologique, suivie d’une sélection d’une région d’intérêt autour du disque optique. Cette méthode améliore la qualité de l’image rétinienne et extrait une région d’intérêt la plus stable de la rétine afin de maintenir une densité d’information satisfaisante, pour assurer une meilleure qualité de reconnaissance. Notre deuxième contribution porte sur la proposition d’une nouvelle méthode d’extraction de caractéristiques locales basée sur le descripteur standard SIFT. Elle applique une nouvelle approche reposant sur la suppression des points d’intérêt non informatifs extraits par le descripteur standard SIFT. Cette nouvelle méthode d’extraction des caractéristiques locales réduit le nombre des points d’intérêt redondants tout en maintenant la qualité de la description. Nous avons validé, la méthode biométrique proposée sur différentes bases comprenant des images saines et pathologiques. Les résultats obtenus montrent des performances encourageantes. Ces résultats indiquent, que la méthode que nous avons proposée, localise correctement la région d’intérêt rétinienne. En mode identification, un taux d’identification correcte d’environ 99.8% est atteint. En mode vérification, nous avons obtenu un taux FRR de 0.12% quant aux taux FAR et EER (erreur), ils sont de 0%. L’étude comparative a montré que notre méthode est plus discriminative que d’autres méthodes de l’état de l’art, notamment celles basées sur la segmentation et l’extraction de l’arbre vasculaire
Our work is part of the retina biometrics. The retina is the sensory layer of the eye; it has a rich and unique texture even in twins. Its properties have made the retina biometrics an active research area. Indeed, numerous methods have been proposed for the various stages of the biometric method, from pretreatment of the retinal image to its analysis, through its characterization, in order to identify and authenticate an individual. We are interested in this work in these thesis works, the study, design, development and evaluation of a new biometric method based on the retina. This thesis presents our contributions for each stage of the proposed biometric method. Our first contribution lies in the proposition of a healthy and pathological retinal image analysis method, followed by a selection of a region of interest around the optical disc. This method improves the quality of the retinal image and extracts a more stable region of interest from the retina to maintain a satisfactory information density, to ensure a better quality of recognition. Our second contribution consists in proposing a new method for extracting local characteristics based on the standard SIFT descriptor. It applies a new method based on the removal of non-informative points of interest extracted by the standard SIFT descriptor. This new method of extracting local features reduces the number of redundant points of interest while maintaining the quality of the description. We validated, the proposed biometric method on different bases including healthy and pathological images. This biometric method has yielded encouraging results on healthy and pathological retinal images. The results obtained show encouraging performances. These results indicate that the method we have proposed, correctly locates the retinal region of interest. In identification mode, a correct identification rate of approximately 99.8% is reached. In verification mode, we obtained 0.12% as FRR error rate and 0% for the FAR and EER error rates. The comparative study showed that our method is more discriminative than other state-of-the-art methods, especially those based on segmentation and extraction of the vascular tree
APA, Harvard, Vancouver, ISO, and other styles
47

Kwaa-Aidoo, Ephrem Kwaku. "Culturally aligned security in banking : a system for rural banking in Ghana." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4433.

Full text
Abstract:
This thesis is an investigation into the unique rural banking system in Ghana and the role of information systems in fraud control. It presents a robust information security and internal control model to deal with fraud for the banking system. The rural banking industry has been noted for poor internal control leading to fraud. This has resulted in poor performance and even the collapse of some banks. The Focus of the study was on the processes used to deliver banking services. To design a protection system, a number of rural banks were visited. This was to understand the environment, regulatory regimes and the structure and banking processes of the industry and banks. Systemic vulnerabilities within the industry which could be exploited for fraud were found. The lack of structures like an address system and unreliable identification documents makes it difficult to use conventional identification processes. Also the lack of adequate controls, small staff numbers and the cross organisational nature of some transactions among other cultural issues reduces the ability to implement transaction controls. Twenty fraud scenarios were derived to illustrate the manifestation of these vulnerabilities. The rural banking integrity model was developed to deal with these observations. This protection model was developed using existing information security models and banking control mechanisms but incorporating the nature of the rural banking industry and culture of its environment. The fraud protection model was tested against the fraud scenarios and was shown to meet the needs of the rural banking industry in dealing with its systemic vulnerabilities. The proposed community-based identification scheme deals with identification weaknesses as an alternative to conventional identity verification mechanisms. The Transaction Authentication Code uses traditional adinkra symbols. Whilst other mechanisms like the Transaction Verification Code design v internal controls into the banking processes. This deals with various process control weaknesses and avoids human discretion in complying with controls. Object based separation of duties is also introduced as a means of controlling conflicting tasks which could lead to fraud.
APA, Harvard, Vancouver, ISO, and other styles
48

Pešán, Jan. "Rozpoznávání mluvčího na mobilním telefonu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-237056.

Full text
Abstract:
Tato práce se zaměřuje na implementaci počítačového systému rozpoznávání řečníka do prostředí mobilního telefonu. Je zde popsán princip, funkce, a implementace rozpoznávače na mobilním telefonu Nokia N900.
APA, Harvard, Vancouver, ISO, and other styles
49

Repp, Birgit [Verfasser], Jerzy [Akademischer Betreuer] Adamski, Heiko [Gutachter] Witt, and Jerzy [Gutachter] Adamski. "Identification and verification of novel disease-causing genes and therapy options for patients with mitochondrial disorders – Focus on ACAD9 / Birgit Repp ; Gutachter: Heiko Witt, Jerzy Adamski ; Betreuer: Jerzy Adamski." München : Universitätsbibliothek der TU München, 2019. http://d-nb.info/1199537624/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Waloszek, Vojtěch. "Identifikace a verifikace osob pomocí záznamu EKG." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442492.

Full text
Abstract:
In the past years, utilization of ECG for verification and identification in biometry is investigated. The topic is investigated in this thesis. Recordings from ECG ID database from PhysioNet and our own ECG recordings recorded using Apple Watch 4 are used for training and testing this method. Many of the existing methods have proven the possibility of using ECG for biometry, however they were using clinical ECG devices. This thesis investigates using recordings from wearable devices, specifically smart watch. 16 features are extracted from ECG recordings and a random forest classifier is used for verification and identification. The features include time intervals between fiducial points, voltage difference between fiducial points and PR intervals variability in a recording. The average performance of verification model of 14 people is TRR 96,19 %, TAR 84,25 %.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography