Dissertations / Theses on the topic 'Verification and identification'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Verification and identification.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Karamolegkou, Antonia. "Argument Mining: Claim Annotation, Identification, Verification." Thesis, Uppsala universitet, Institutionen för lingvistik och filologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-448855.
Full textCarlton, Zachary M. "System Identification and Verification of Rotorcraft UAVs." University of Cincinnati / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1491899295046484.
Full textDeng, Huimin, and 鄧惠民. "Robust minutia-based fingerprint verification." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2006. http://hub.hku.hk/bib/B37036427.
Full textRaman, Pujita. "Speaker Identification and Verification Using Line Spectral Frequencies." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/52964.
Full textMaster of Science
Ozarkar, Malhar. "Design Parameter Identification and Verification for Thermoplastic Inserts." Thesis, Linköpings universitet, Mekanik och hållfasthetslära, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-170132.
Full textSaid, Huwida E. S. "Personal identification based on handwriting." Thesis, University of Reading, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.299305.
Full textJonsson, K. T. "Robust correlation and support vector machines for face identification." Thesis, University of Surrey, 2000. http://epubs.surrey.ac.uk/799/.
Full textBulacu, Marius Lucian. "Statistical pattern recognition for automatic writer identification and verification." [S.l. : [Groningen : s.n.] ; University Library Groningen] [Host], 2007. http://irs.ub.rug.nl/ppn/300341644.
Full textLack, Steven A. "Cell identification, verification, and classification using shape analysis techniques." Diss., Columbia, Mo. : University of Missouri-Columbia, 2007. http://hdl.handle.net/10355/6017.
Full textThe entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file (viewed on March 11, 2008) Includes bibliographical references.
Chan, Siu Man. "Improved speaker verification with discrimination power weighting /." View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202004%20CHANS.
Full textIncludes bibliographical references (leaves 86-93). Also available in electronic version. Access restricted to campus users.
Duncan-Drake, Natasha. "Exploiting human expert techniques in automated writer identification." Thesis, University of Kent, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.365222.
Full textZhang, Xiaozheng. "Automatic speechreading for improved speech recognition and speaker verification." Diss., Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/13067.
Full textAmayeh, Gholamreza. "A component-based approach to hand-based verification and identification system." abstract and full text PDF (UNR users only), 2009. http://0-gateway.proquest.com.innopac.library.unr.edu/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3387799.
Full textMartinez-Flores, Rene. "DAMAGE ASSESSMENT POTENTIAL OF A NOVEL SYSTEM IDENTIFICATION TECHNIQUE - EXPERIMENTAL VERIFICATION." Diss., Tucson, Arizona : University of Arizona, 2005. http://etd.library.arizona.edu/etd/GetFileServlet?file=file:///data1/pdf/etd/azu%5Fetd%5F1028%5F1%5Fm.pdf&type=application/pdf.
Full textKahn, Steven Phillip. "Experimental verification and development of structural identification techniques on a grid." Thesis, This resource online, 1990. http://scholar.lib.vt.edu/theses/available/etd-03122009-040526/.
Full textMartikainen, Katariina, and Kewser Said. "A facial recognition application for elderly care : Caregiver verification and identification." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-235636.
Full textIntresset för ansiktsigenkänning har ökat snabbt under det senaste decenniet. Detta har gjort ansiktsigenkänning både möjlig och användbar. Biometri och identifiering är vanliga användningssätt för ansiktsigenkänning.Sverige befolkning åldras. De äldre fortsätter dessutom att i hög grad bo ensamma. Detta introducerar nya utmaningar för samhället. Hur kan vi bibehålla de äldres autonomi and stötta deras välmående, trots ålderns krämpor?Denna uppsats presenterar en studie om potentialen för att använda ansiktsigenkänning inom äldrevården. I arbetet identifieras behovet av ett ansiktsigenkänningssystem inom äldrevården, en systemarkitektur för att tillgodose detta behov presenteras, implementeringsprocessen av en prototyp av ett sådant system beskrivs samt genomförbarheten av ett sådant system utvärderas. Ett av studiens resultat indikerar att det finns ett behov inom äldreomsorgen att hjälpa seniorer att identifiera och verifiera den personal som besöker dem. Studien visar att ett ansiktsigenkänningssystem som visar information om besökande personal till seniorerna skulle kunna hjälpa dem i deras dagliga liv.Användargränssnittet i den utvecklade prototypen är användbar, men i dess nuvarande stadie är ansiktsigenkänningsdelen av programmet inte exakt nog för att kunna användas i verkligheten. Metoder för att förbättra ansiktsigenkänningsfunktionen i ett sådant system är ett uppslag för framtida forskning.
Hu, Shouhua. "Pointwise identification for thin shell structures and verification using realistic cerebral aneurysms." Diss., University of Iowa, 2012. https://ir.uiowa.edu/etd/3313.
Full textNeethling, Annika. "Long QT syndrome : the identification and verification of putative KCNE2-interacting proteins." Thesis, Stellenbosch : Stellenbosch University, 2013. http://hdl.handle.net/10019.1/85718.
Full textENGLISH ABSTRACT: Long QT syndrome (LQTS) is a cardiac repolarization disorder affecting every 1:2000-1:3000 individuals. This disease is characterized by a prolonged QT interval on the surface electrocardiogram (ECG) of patients. Symptoms of LQTS range from dizziness and syncope to more severe symptoms such as seizures and sudden cardiac death (SCD). Clinical features of LQTS are a result of the precipitations of Torsades de Pointes, which is a polymorphic form of ventricular tachycardia. A number of genetic forms of LQTS have been identified with more than 700 mutations in 12 different genes leading to disease pathogenesis. However it has been estimated that approximately 25% of patients with compelling LQTS have no mutations within the known LQT genes. This proves to be problematic since treatment regimens depend on the genetic diagnosis of affected individuals. Of the known mutated genes, KCNE2 is associated with LQT6. KCNE2 encodes the beta-subunit of potassium ion channel proteins. These proteins contain cytoplasmic C-terminal domains in which many mutations have been identified. We hypothesize that genes encoding KCNE2-interacting proteins might be identified as disease-causing or modifying genes. The present study aimed to use yeast two-hybrid (Y2H) methodology to screen a pre-transformed cardiac cDNA library in order to identify putative interactors of the C-terminal of KCNE2. Through specific selection methods the number of KCNE2 ligands was reduced from 296 to 83. These interactors were sequenced and 14 were identified as putative interacting proteins. False positive ligands were excluded based on their function and subcellular location. Ultimately three strong candidate ligands were selected for further analysis: Alpha-B crystallin (CRYAB), Filamin C (FLNC) and voltage-dependent anion-selective channel protein 1 (VDAC1). Three-dimensional (3D) co-localization and co-immunoprecipitation were used to verify these proposed interactions and succeeded in doing so. The genes encoding verified interactors will be screened in our SA panel of LQT patients, to potentially identify novel LQT causative or modifying genes. Furthermore, the interactions verified in the present study may shed some light on the mechanism of pathogenesis of LQT causative mutations in KCNE2.
AFRIKAANSE OPSOMMING: Lang QT-sindroom (LQTS) is 'n hart her-polariserende siekte wat elke 1:2000-1:3000 individue affekteer. Hierdie siekte word gekenmerk deur 'n lang QT-interval op die oppervlak elektrokardiogram (EKG) van pasiënte. Simptome van LQTS wissel van duiseligheid en floutes tot meer ernstige simptome soos stuiptrekkings of aanvalle en skielike kardiale dood (SKD). Kliniese kenmerke van LQTS is 'n gevolg van die neerslag van Torsades de Pointes; 'n polimorfiese vorm van ventrikulêre tagikardie. Verskeie genetiese vorms van LQTS is geïdentifiseer met meer as 700 mutasies in 12 verskillende gene wat lei tot siekte patogenese. Dit is ergter beraam dat ongeveer 25% van pasiënte met dwingende LQTS geen mutasies in die bekend LQT gene besit nie. Dit is problematies aangesien siekte behandeling af hang van die genetiese diagnose van geaffekteerde individue. Een van die bekende gemuteerde gene is KCNE2 wat verband hou met LQT6. KCNE2 kodeer die beta-subeenheid van kalium ioonkanaal proteïene. Hierdie proteïene bevat sitoplasmiese C-terminale waarin baie mutasies alreeds geïdentifiseer is. Ons veronderstel dat gene wat proteïene kodeer wat met KCNE2 interaksie toon, geïdentifiseer kan word as siekte veroorsaakende of wysigings gene. Die huidige studie het die gis twee-hibried metode gebruik om 'n vooraf-getransformeerde hart cDNS biblioteek te sif om vermeende protein interaksies van die C-terminaal van KCNE2 te identifiseer. Deur middel van seleksie metodes is die aantal KCNE2 ligande verminder van 296 tot 83. Die identiteit van die proteïene is bekend gemaak deur volgorderbepaling waarna 14 geïdentifiseer is as proteïene wat moontlik interaksie kan toon met KCNE2. Vals positiewe ligande is uitgesluit op grond van hul funksie en subsellulêre lokasering. Drie kandidaat ligande is gekies vir verdere analise: Alfa-B crystallin (CRYAB), Filamin C (FLNC) en spanning-afhanklike anioon-selektiewe kanaal proteïen 1 (VDAC1). Drie-dimensionele (3D) mede-lokalisering en mede-immunopresipitasie tegnieke is gebruik om hierdie voorgestelde interaksies te verifieer en het geslaag om dit te doen. Die gene wat geverifieerde proteïene kodeer, sal gekeur word in ons Suid-Afrikaanse paneel van LQT pasiënte om sodoende potensieel nuwe LQT veroorsakende of wysigings gene te identifiseer. Verder kan die geverifieer interaksies in die huidige studie lig werp op die meganisme van die ontstaan van LQT veroorsakende mutasies in KCNE2.
Harry Crossley Foundation (South Africa)
Stellenbosch University
South African Council for Scientific and Industrial Research
Stella and Paul Loewenstein Charitable and Educational Trust
Johns, Brian Douglas. "Experimental verification of pointwise identification method for capturing heterogeneous properties in membranes." Thesis, University of Iowa, 2010. https://ir.uiowa.edu/etd/824.
Full textKabbara, Yeihya. "Caractérisation des images à Rayon-X de la main par des modèles mathématiques : application à la biométrie." Thesis, Paris Est, 2015. http://www.theses.fr/2015PEST1015/document.
Full textIn its specific context, the term "biometrics" is often associated with the study of the physical and behavioral of individual's characteristics to achieve their identification or verification. Thus, the work developed in this thesis has led us to suggest a robust identification algorithm, taking into account the intrinsic characteristics of the hand phalanges. Considered as hidden biometrics, this new approach can be of high interest, particularly when it comes to ensure a high level of security, robust to various attacks that a biometric system must address. The basis of the proposed techniques requires three phases, namely: (1) the segmentation of the phalanges (2) extracting their characteristics by generating an imprint, called "Phalange-Code" and (3) the identification based on the method of 1-nearest neighbor or the verification based on a similarity metric. This algorithm operates on hierarchical levels allowing the extraction of certain parameters invariant to geometric transformations such as image orientation and translation. Furthermore, the considered algorithm is particularly robust to noise, and can function at different resolutions of images. Thus, we developed three approaches to biometric recognition: the first approach produces individual signature from the spectral information of the contours issued from the hand phalanges, whereas the second approach requires the use of geometric and morphological characteristics of the phalanges (i.e. surface, perimeter, length, width, and capacity). Finally, the third approach requires the generation of a new likelihood ratio between the phalanges, using the geometric probability theory. Furthermore, the construction of a database with the lowest radiation dose was one of the great challenges of our study. We therefore proceeded with the collection of 403 x-ray images of the hand, acquired using the Apollo EZ X-Ray machine. These images are from 115 non-pathological volunteering adult (men and women). The average age is 27.2 years and the standard deviation is 8.5. Thus, the constructed database incorporates images of the right and left hands, acquired at different positions and by considering different resolutions and different radiation doses (i.e. reduced till 98% of the standard dose recommended by radiologists "1 µSv").Our experiments show that individuals can be distinguished by the characteristics of their phalanges, whether those of the right hand or the left hand. This distinction also applies to the kind of individuals (male/female). The study has demonstrated that the approach using the spectral information of the phalanges' contours allows identification by only three phalanges, with an EER (Equal Error Rate) lower than 0.24 %. Furthermore, it was found “Surprisingly” that the technique based on the likelihood ratio between phalanges reaches an identification rate of 100% and an EER of 0.37% with a single phalanx. Apart from the identification/authentication aspect, our study focused on the optimization of the radiation dose in order to offer safe identification of individuals. Thus, it has been shown that it was possible to acquire more than 12,500/year radiographic hand images, without exceeding the administrative control of 0.25 mSv
Yu, Tian. "COMPUTATIONAL IDENTIFICATION AND MOLECULAR VERIFICATION OF MIRNA IN EASTERN SUBTERRANEAN TERMITES (RETICULITERMES FLAVIPES)." UKnowledge, 2014. http://uknowledge.uky.edu/entomology_etds/12.
Full textKumeta, Masahiro. "Dynamic Regulation of Nuclear Architectures - Identification and Experimental Verification of Subcellular Scaffolding Proteins." 京都大学 (Kyoto University), 2010. http://hdl.handle.net/2433/120356.
Full textSalavati, Sadaf. "Biometrics in practice : The security technology of tomorrow's airports." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-874.
Full textThe biometric technology is a method for authentication which has been used since several centuries back. This is a technology which offers several different techniques where the human’s unique characteristics are used for identification and verification of the individual. Biometrics are today at a stage of development that is pointing upwards and many individuals that are well aware of the biometric world believes that this is the technology that will take over the security systems used today.
Ever since the terror attacks against USA at 2001, USA demanded that all 45 countries that today are not required to have visa when entering the United States must until the end of 2006 implement passports that contains biometrics information. The UN’s air traffic group on the other hand thinks that all counties in the world should use passports with biometric data. The biometric data in the passports are going to be stored in a chip and is in the first hand an image of the individuals face in a cryptic jpg format, but can also be complemented with fingerprints or even signature recognition. Sweden is currently using passports which contain biometric data but so far haven’t any machines that can read this passports been bought. Ulf Hägglund at Precise Biometrics AB believes that as soon as the real use of the biometric passports gets going the biometric technique will be used in a greater extension in the airports.
Even though several Swedish airports consider the security technique used in airports today being enough, biometrics can increase the security and at the same time simplify many security processes. Falsification can be reduced when at same time one can be sure that the same passenger who has checked-in is the passenger who boards the airplane and the employee security control can be totally automatized. Generally it can be said that “biometrics is a decent way to increase security in different areas”.
Den biometriska teknologin är en äkthetsbevisningsmetod som har används sedan flera århundraden tillbaka. Detta är en teknologi som erbjuder flera olika tekniker där människans unika karateristiska kännetecken används för identifiering och verifiering av individen. Biometrin befinner sig idag i ett utvecklingsstadie som pekar uppåt och flera personer som är insatta i biometrins värld anser att detta är den teknologi som kommer att ta över det nuvarande säkerhetssystemet.
Sedan terrorattentatet mot USA år 2001 har USA begärt att alla 45 länderna som idag inte behöver visum för att komma in till USA måste innan slutet av år 2006 införa pass som innehåller biometrisk information. FN; s luftfartsgrupp anser däremot att alla världens länder bör införa pass med biometrisk data. Den biometriska data som ska finnas i passen ska lagras i ett chip och är främst en avbildning av individens ansikte i krypterad jpg format men kan även tänkas bli kompletterat med fingeravtryck och eventuellt signatur igenkänning . I dagsläget använder sig Sverige av pass med biometrisk data, men än så länge har inte några maskiner som kan avläsa dessa pass köpts in. Ulf Hägglund på Precise Biometrics AB tror att så snart användandet av de biometriska passen kommer igång på riktigt kommer även den biometiska tekniken att användas i större utsträckning på flygplatser.
Trotts att flera svenska flygplatser idag anser att den säkerhetsteknik som används på flygplatserna idag räcker, kan man genom att använda sig av biometri öka säkerheten samtidigt som man förenklar många säkerhetsprocesser. Falsifieringen minskar samtidigt som man kan försäkra sig om att det alltid är samma passagerare som checkat- in som stiger på planet och säkerhetskontrollerna för de anställda kan bli total automatiserad. I stort kan man säga att ”biometrin är ett hyggligt steg mot att förbättra säkerheten inom olika områden”.
Fotoohi, Leila [Verfasser]. "Dependable Service Robot – from Hazard Identification to Formal Verification of Safety Requirements / Leila Fotoohi." Aachen : Shaker, 2012. http://d-nb.info/1066196958/34.
Full textCrook, Simon. "Identification and verification of genes regulated in breast cancer cells by the antiprogestin, Onapristone." Thesis, University of Nottingham, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.250455.
Full textLau, Kai Kwong Gervas. "A new statistical stroke recovery method and measurement for signature verification." HKBU Institutional Repository, 2005. http://repository.hkbu.edu.hk/etd_ra/661.
Full textSanderson, Conrad, and conradsand@ieee org. "Automatic Person Verification Using Speech and Face Information." Griffith University. School of Microelectronic Engineering, 2003. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20030422.105519.
Full textCorcoran, Maureen Kathleen. "Geomorphic identification and verification of recent sedimentation patterns in the Woonasquatucket River North Providence, Rhode Island /." Full text available from ProQuest UM Digital Dissertations, 2006. http://0-proquest.umi.com.umiss.lib.olemiss.edu/pqdweb?index=0&did=1260796661&SrchMode=1&sid=1&Fmt=2&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1193255862&clientId=22256.
Full textRautenbach, James. "Towards a framework for identity verification of vulnerable children within the Eastern Cape." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/597.
Full textCoutinho, Canuto Jânio. "Biomechanical online signature modeling applied to verification." Thesis, Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0026/document.
Full textThis thesis deals with the modelling and verification of online signatures. The first part has as main theme the biomechanical modelling of hand movements associated to the signing gesture. A model based on the Minimum Jerk (MJ) criterion was chosen amongst the several available motor control theories. Next, the problem of signature trajectory segmentation into strokes that better fit the chosen kinematic model is studied, leading to the development of an iterative segmentation method. Both the choice of the model and the segmentation method are strongly based on the tradeoff between reconstruction quality and compression. On the second part, the polynomial model provided by the MJ criterion is intentionally degraded. The non-Real zeroes of the polynomials are discarded and the effects of this degradation are studied from a biometric verification perspective. This degradation is equivalent to the signal processing technique known as Infinity Clipping, originally applied to speech signals. On signatures, as for speech, the preservation of essential information was observed on signature verification tasks. As a matter of fact, using only the Levenshtein distance over the infinitely clipped representation, verification error rates comparable to those of more elaborate methods were obtained. Furthermore, the symbolic representation yielded by the infinity clipping technique allows for a conceptual relationship between the number of polynomial segments obtained through the Minimum Jerk-Based iterative segmentation and the Lempel-Ziv complexity. This relationship is potentially useful for the analysis of online signature signals and the improvement of recognition systems
Dabbs, Parker, Aruna Kilaru, and Carlee Haas. "Identification and Verification of Plant Transcription Factors That Play a Role in Regulating the Production of Triacylglycerol." Digital Commons @ East Tennessee State University, 2014. https://dc.etsu.edu/etsu-works/4854.
Full textValenti, Giacomo. "Secure, efficient automatic speaker verification for embedded applications." Electronic Thesis or Diss., Sorbonne université, 2019. http://www.theses.fr/2019SORUS471.
Full textThis industrial CIFRE PhD thesis addresses automatic speaker verification (ASV) issues in the context of embedded applications. The first part of this thesis focuses on more traditional problems and topics. The first work investigates the minimum enrolment data requirements for a practical, text-dependent short-utterance ASV system. Contributions in part A of the thesis consist in a statistical analysis whose objective is to isolate text-dependent factors and prove they are consistent across different sets of speakers. For very short utterances, the influence of a specific text content on the system performance can be considered a speaker-independent factor. Part B of the thesis focuses on neural network-based solutions. While it was clear that neural networks and deep learning were becoming state-of-the-art in several machine learning domains, their use for embedded solutions was hindered by their complexity. Contributions described in the second part of the thesis comprise blue-sky, experimental research which tackles the substitution of hand-crafted, traditional speaker features in favour of operating directly upon the audio waveform and the search for optimal network architectures and weights by means of genetic algorithms. This work is the most fundamental contribution: lightweight, neuro-evolved network structures which are able to learn from the raw audio input
McLaren, Simon R. "Reliability of iris recognition as a means of identity verification and future impact on transportation worker identification credential." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://bosun.nps.edu/uhtbin/hyperion-image.exe/08Mar%5FMcLaren.pdf.
Full textThesis Advisor(s): Garfinkel, Simson. "March 2008." Description based on title screen as viewed on May 5, 2008 Includes bibliographical references (p. 109-113). Also available in print.
Aykan, Murat. "Identification Of Localized Nonlinearity For Dynamic Analysis Of Structures." Phd thesis, METU, 2013. http://etd.lib.metu.edu.tr/upload/12615596/index.pdf.
Full textSun, Wei [Verfasser], Thomas [Akademischer Betreuer] Sikora, Thomas [Gutachter] Sikora, Atta [Gutachter] Badii, and Ivo [Gutachter] Keller. "Low complexity embedded fingerprint verification and identification system / Wei Sun ; Gutachter: Thomas Sikora, Atta Badii, Ivo Keller ; Betreuer: Thomas Sikora." Berlin : Technische Universität Berlin, 2016. http://d-nb.info/1156181704/34.
Full textDimitrov, Emanuil. "Fingerprints recognition." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-5522.
Full textNowadays biometric identification is used in a variety of applications-administration, business and even home. Although there are a lot of biometric identifiers, fingerprints are the most widely spread due to their acceptance from the people and the cheap price of the hardware equipment. Fingerprint recognition is a complex image recognition problem and includes algorithms and procedures for image enhancement and binarization, extracting and matching features and sometimes classification. In this work the main approaches in the research area are discussed, demonstrated and tested in a sample application. The demonstration software application is developed by using Verifinger SDK and Microsoft Visual Studio platform. The fingerprint sensor for testing the application is AuthenTec AES2501.
Brown, Philip, and Ida Järlskog. "Identification of Chlorinated Fatty Acids in Standard Samples and Fish Lipids : Verification and Validation of Extraction, Transesterification and GC-MS/XSD." Thesis, Linköpings universitet, Tema Miljöförändring, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-118580.
Full textChen, Ting. "First step of verification of Li's hypothesis : identification of a new vortex structure induced by guide-plate in Three Gorges turbines." Thesis, University of Warwick, 2014. http://wrap.warwick.ac.uk/63284/.
Full textRamos, Pablo D. Jr. "SYSTEM IDENTIFICATION OF A BRIDGE-TYPE BUILDING STRUCTURE." DigitalCommons@CalPoly, 2013. https://digitalcommons.calpoly.edu/theses/944.
Full textAlsulaiman, Fawaz Abdulaziz A. "Towards a Continuous User Authentication Using Haptic Information." Thesis, Université d'Ottawa / University of Ottawa, 2013. http://hdl.handle.net/10393/23946.
Full textKaňok, Tomáš. "Rozpoznávání mluvčího ve Skype hovorech." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-235519.
Full textSandström, Marie. "Liveness Detection in Fingerprint Recognition Systems." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2397.
Full textBiometrics deals with identifying individuals with help of their biological data. Fingerprint scanning is the most common method of the biometric methods available today. The security of fingerprint scanners has however been questioned and previous studies have shown that fingerprint scanners can be fooled with artificial fingerprints, i.e. copies of real fingerprints. The fingerprint recognition systems are evolving and this study will discuss the situation of today.
Two approaches have been used to find out how good fingerprint recognition systems are in distinguishing between live fingers and artificial clones. The first approach is a literature study, while the second consists of experiments.
A literature study of liveness detection in fingerprint recognition systems has been performed. A description of different liveness detection methods is presented and discussed. Methods requiring extra hardware use temperature, pulse, blood pressure, electric resistance, etc., and methods using already existent information in the system use skin deformation, pores, perspiration, etc.
The experiments focus on making artificial fingerprints in gelatin from a latent fingerprint. Nine different systems were tested at the CeBIT trade fair in Germany and all were deceived. Three other different systems were put up against more extensive tests with three different subjects. All systems werecircumvented with all subjects'artificial fingerprints, but with varying results. The results are analyzed and discussed, partly with help of the A/R value defined in this report.
Jerling, Francette. "The identification and verification of optimal reintroduction sites for the Southern Ground Hornbill Bucorvus leadbeateri in the Musina area of the Limpopo Province, South Africa / Francette Jerling." Thesis, North-West University, 2011. http://hdl.handle.net/10394/9170.
Full textThesis (MSc (Zoology))--North-West University, Potchefstroom Campus, 2012.
Kwaa-Aidoo, Ephrem K. "Culturally aligned security in banking. A system for rural banking in Ghana." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4433.
Full textFalade, Joannes Chiderlos. "Identification rapide d'empreintes digitales, robuste à la dissimulation d'identité." Thesis, Normandie, 2020. http://www.theses.fr/2020NORMC231.
Full textBiometrics are increasingly used for identification purposes due to the close relationship between the person and their identifier (such as fingerprint). We focus this thesis on the issue of identifying individuals from their fingerprints. The fingerprint is a biometric data widely used for its efficiency, simplicity and low cost of acquisition. The fingerprint comparison algorithms are mature and it is possible to obtain in less than 500 ms a similarity score between a reference template (enrolled on an electronic passport or database) and an acquired template. However, it becomes very important to check the identity of an individual against an entire population in a very short time (a few seconds). This is an important issue due to the size of the biometric database (containing a set of individuals of the order of a country). Thus, the first part of the subject of this thesis concerns the identification of individuals using fingerprints. Our topic focuses on the identification with N being at the scale of a million and representing the population of a country for example. Then, we use classification and indexing methods to structure the biometric database and speed up the identification process. We have implemented four identification methods selected from the state of the art. A comparative study and improvements were proposed on these methods. We also proposed a new fingerprint indexing solution to perform the identification task which improves existing results. A second aspect of this thesis concerns security. A person may want to conceal their identity and therefore do everything possible to defeat the identification. With this in mind, an individual may provide a poor quality fingerprint (fingerprint portion, low contrast by lightly pressing the sensor...) or provide an altered fingerprint (impression intentionally damaged, removal of the impression with acid, scarification...). It is therefore in the second part of this thesis to detect dead fingers and spoof fingers (silicone, 3D fingerprint, latent fingerprint) used by malicious people to attack the system. In general, these methods use machine learning techniques and deep learning. Secondly, we proposed a new presentation attack detection solution based on the use of statistical descriptors on the fingerprint. Thirdly, we have also build three presentation attacks detection workflow for fake fingerprint using deep learning. Among these three deep solutions implemented, two come from the state of the art; then the third an improvement that we propose. Our solutions are tested on the LivDet competition databases for presentation attack detection
Chihaoui, Takwa. "Système d'identification de personnes basé sur la rétine." Thesis, Paris Est, 2018. http://www.theses.fr/2018PESC1145/document.
Full textOur work is part of the retina biometrics. The retina is the sensory layer of the eye; it has a rich and unique texture even in twins. Its properties have made the retina biometrics an active research area. Indeed, numerous methods have been proposed for the various stages of the biometric method, from pretreatment of the retinal image to its analysis, through its characterization, in order to identify and authenticate an individual. We are interested in this work in these thesis works, the study, design, development and evaluation of a new biometric method based on the retina. This thesis presents our contributions for each stage of the proposed biometric method. Our first contribution lies in the proposition of a healthy and pathological retinal image analysis method, followed by a selection of a region of interest around the optical disc. This method improves the quality of the retinal image and extracts a more stable region of interest from the retina to maintain a satisfactory information density, to ensure a better quality of recognition. Our second contribution consists in proposing a new method for extracting local characteristics based on the standard SIFT descriptor. It applies a new method based on the removal of non-informative points of interest extracted by the standard SIFT descriptor. This new method of extracting local features reduces the number of redundant points of interest while maintaining the quality of the description. We validated, the proposed biometric method on different bases including healthy and pathological images. This biometric method has yielded encouraging results on healthy and pathological retinal images. The results obtained show encouraging performances. These results indicate that the method we have proposed, correctly locates the retinal region of interest. In identification mode, a correct identification rate of approximately 99.8% is reached. In verification mode, we obtained 0.12% as FRR error rate and 0% for the FAR and EER error rates. The comparative study showed that our method is more discriminative than other state-of-the-art methods, especially those based on segmentation and extraction of the vascular tree
Kwaa-Aidoo, Ephrem Kwaku. "Culturally aligned security in banking : a system for rural banking in Ghana." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4433.
Full textPešán, Jan. "Rozpoznávání mluvčího na mobilním telefonu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-237056.
Full textRepp, Birgit [Verfasser], Jerzy [Akademischer Betreuer] Adamski, Heiko [Gutachter] Witt, and Jerzy [Gutachter] Adamski. "Identification and verification of novel disease-causing genes and therapy options for patients with mitochondrial disorders – Focus on ACAD9 / Birgit Repp ; Gutachter: Heiko Witt, Jerzy Adamski ; Betreuer: Jerzy Adamski." München : Universitätsbibliothek der TU München, 2019. http://d-nb.info/1199537624/34.
Full textWaloszek, Vojtěch. "Identifikace a verifikace osob pomocí záznamu EKG." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442492.
Full text