Literatura académica sobre el tema "Biometrics"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Biometrics".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Artículos de revistas sobre el tema "Biometrics"

1

Yaacob, Mohd Noorulfakhri, Syed Zulkarnain Syed Idrus, Wan Azani Wan Mustafa, Mohd Aminudin Jamlos y Mohd Helmy Abd Wahab. "Identification of the Exclusivity of Individual’s Typing Style Using Soft Biometric Elements". Annals of Emerging Technologies in Computing 5, n.º 5 (20 de marzo de 2021): 10–26. http://dx.doi.org/10.33166/aetic.2021.05.002.

Texto completo
Resumen
Biometric is used as a main security fence in a computer system. The unique characteristics of a person can be distinguished from each other. Human’s biometrics can be categorized into three types: morphological, biological and behavioural. Morphological biometrics uses physical features for recognition. Biological biometrics used to identify user based on biological features. Behavioural biometrics such as gender, culture, height and weight can be used as an additional security measure within a system. These biometric behavioural features are also known as soft biometric. This study uses soft biometric elements (gender, culture, region of birth and educational level) in the keystroke dynamic study to distinguish typing patterns in each of these categories. The Support Vector Machine (SVM) classification method is used to perform this classification for soft biometric identification. The results of this study have shown that soft biometrics in keystroke dynamic can be used to distinguish group of individuals typing.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

B.R., Rohini y Thippeswamy G. "BIOMETRICS-A PRELIMINARY APPROACH". International Journal of Research -GRANTHAALAYAH 5, n.º 4RACSIT (30 de abril de 2017): 47–52. http://dx.doi.org/10.29121/granthaalayah.v5.i4racsit.2017.3350.

Texto completo
Resumen
Authentication plays a vital role in Information security. The need for identification of legitimate user has increased in the waking concerns for global security. Biometric recognition Systems is a major tool for Authentication mechanism. Biometrics is the ability to identify and authenticate an individual using one or more of their behavioral or physical characteristics. The Study of Different Biometric Modalities gives a better understanding of Biometric Techniques. We focus our Study on Face Biometrics. This paper emphasizes on better understanding of introduction to Biometrics, Biometric Modalities and Face recognition Techniques.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Michelsen, Lea Laura. "Thinking Beyond Biometrics". A Peer-Reviewed Journal About 7, n.º 1 (6 de julio de 2018): 36–49. http://dx.doi.org/10.7146/aprja.v7i1.115063.

Texto completo
Resumen
Today, digital biometrics are proliferating. Based on scans of biological traits – from faces, fingerprints and gait to vein patterns, heart rhythm, brain activity, and body odor – biometrics are known to be able to establish the identity of a human subject. When reading humanities research on biometrics, though, it becomes evident that we are altering a lot more than just our faces. This article proposes a study of a wave of artistic counter-biometrics in order to enable thinking beyond the biometric box, practicing the ‘art of disappearing’ from the biometric gaze. With an outset in Zach Blas’ Face Cages (2013- 16) and his “Fag Face” mask from Facial Weaponization Suite (2011-14) the article argues that biometrics produces an aesthetics, and that it should be treated as such. This shifts our perspective from the technical media to the narratives we inscribe in these media and the aesthetic output enabled by that. Activating a counter- biometric aesthetics is far from naïve. On the contrary, engaging in the aesthetics of biometrics is a valuable and urgently needed research strategy for dealing with the physiognomic renaissance biometrics brings about.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Yang, Wencheng, Song Wang, Hui Cui, Zhaohui Tang y Yan Li. "A Review of Homomorphic Encryption for Privacy-Preserving Biometrics". Sensors 23, n.º 7 (29 de marzo de 2023): 3566. http://dx.doi.org/10.3390/s23073566.

Texto completo
Resumen
The advancement of biometric technology has facilitated wide applications of biometrics in law enforcement, border control, healthcare and financial identification and verification. Given the peculiarity of biometric features (e.g., unchangeability, permanence and uniqueness), the security of biometric data is a key area of research. Security and privacy are vital to enacting integrity, reliability and availability in biometric-related applications. Homomorphic encryption (HE) is concerned with data manipulation in the cryptographic domain, thus addressing the security and privacy issues faced by biometrics. This survey provides a comprehensive review of state-of-the-art HE research in the context of biometrics. Detailed analyses and discussions are conducted on various HE approaches to biometric security according to the categories of different biometric traits. Moreover, this review presents the perspective of integrating HE with other emerging technologies (e.g., machine/deep learning and blockchain) for biometric security. Finally, based on the latest development of HE in biometrics, challenges and future research directions are put forward.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

., Himanshi, Trisha Gulati y Yasha Hasija. "Biometrics in Healthcare". INTERNATIONAL JOURNAL OF ADVANCED PRODUCTION AND INDUSTRIAL ENGINEERING 3, n.º 2 (15 de abril de 2018): 13–17. http://dx.doi.org/10.35121/ijapie201804223.

Texto completo
Resumen
Biometrics is the discipline to measure physical human characteristics for the identification and authentication of an individual. Since ancient times, people have used voice, face, and other characteristics for the identification of an individual. With evolution, we take the individual characteristics like fingerprint scans, retina and iris images, etc., as inputs to the computer systems and then store or verify them with existing records. This report discusses biometrics and its recent roles found in the field of healthcare, medicine, genetics, and biotechnology. It includes the concept of biometrics, the system used for biometric recognition and its working, types of biometric systems, the different system algorithms applied, and system modules which are well illustrated with flow charts and block diagrams. Some of the health institutes in developed countries have started using biometric systems for checking patients and/or doctors. Biometry has enabled the proper organization and storage of the health records of individuals in medical institutes. Biometric authentication is also finding a distinct role in foiling medical claims fraud highlighting the advantages it. Even after processing via a very accurate biometric system, there is a chance of a false result due to some disease or injury to the body part subjected to biometry or faulty system leading to some error. There is also a possibility that the biometric system may harm our bodies. Moreover, biometric records need really tight system security to prevent any kind of misuse. Biometrics has a great potential to find a lot more uses in the field of healthcare. Many ideas are being proposed for implementation. In the future, biometrics can be used to detect potential disease and risks by using methods like adiposity measurement and Gas Discharge Visualization (GDV).
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Sharma, Tushar y Upinder Kaur. "Biometric Security: A Review to Future". Revista Gestão Inovação e Tecnologias 11, n.º 4 (29 de julio de 2021): 3758–68. http://dx.doi.org/10.47059/revistageintec.v11i4.2405.

Texto completo
Resumen
This paper presents the different biometric with their limitations and introduces their alternative in form of brain biometric, Breath biometrics, and Tongue biometrics. Brain biometric uses brain wave while breath biometric uses one’s breath and tongue biometric uses a tongue’s shape and variation to distinguish them and present a good alternative for the presently used biometric like fingerprint, iris recognition, face recognition.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Choudhury, Bismita, Patrick Then, Biju Issac, Valliappan Raman y Manas Kumar Haldar. "A Survey on Biometrics and Cancelable Biometrics Systems". International Journal of Image and Graphics 18, n.º 01 (enero de 2018): 1850006. http://dx.doi.org/10.1142/s0219467818500067.

Texto completo
Resumen
Now-a-days, biometric systems have replaced the password or token based authentication system in many fields to improve the security level. However, biometric system is also vulnerable to security threats. Unlike password based system, biometric templates cannot be replaced if lost or compromised. To deal with the issue of the compromised biometric template, template protection schemes evolved to make it possible to replace the biometric template. Cancelable biometric is such a template protection scheme that replaces a biometric template when the stored template is stolen or lost. It is a feature domain transformation where a distorted version of a biometric template is generated and matched in the transformed domain. This paper presents a review on the state-of-the-art and analysis of different existing methods of biometric based authentication system and cancelable biometric systems along with an elaborate focus on cancelable biometrics in order to show its advantages over the standard biometric systems through some generalized standards and guidelines acquired from the literature. We also proposed a highly secure method for cancelable biometrics using a non-invertible function based on Discrete Cosine Transformation (DCT) and Huffman encoding. We tested and evaluated the proposed novel method for 50 users and achieved good results.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Shopon, Md, Sanjida Nasreen Tumpa, Yajurv Bhatia, K. N. Pavan Kumar y Marina L. Gavrilova. "Biometric Systems De-Identification: Current Advancements and Future Directions". Journal of Cybersecurity and Privacy 1, n.º 3 (31 de agosto de 2021): 470–95. http://dx.doi.org/10.3390/jcp1030024.

Texto completo
Resumen
Biometric de-identification is an emerging topic of research within the information security domain that integrates privacy considerations with biometric system development. A comprehensive overview of research in the context of authentication applications spanning physiological, behavioral, and social-behavioral biometric systems and their privacy considerations is discussed. Three categories of biometric de-identification are introduced, namely complete de-identification, auxiliary biometric preserving de-identification, and traditional biometric preserving de-identification. An overview of biometric de-identification in emerging domains such as sensor-based biometrics, social behavioral biometrics, psychological user profile identification, and aesthetic-based biometrics is presented. The article concludes with open questions and provides a rich avenue for subsequent explorations of biometric de-identification in the context of information privacy.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Sable, Harsh y Divya Bajpai Tripathy. "A Review on Comparative Analysis on Different Sort of Physiological and Behavioral Biometric Framework". International Journal of Advance Research and Innovation 9, n.º 2 (2021): 1–9. http://dx.doi.org/10.51976/ijari.922101.

Texto completo
Resumen
Biometrics as the investigation of seeing an individual ward on their physical or conduct characteristics, biometric have now been conveyed in diverse business, ordinary resident and national security applications. Customarily the usage of biometrics devices has improved our capacity to give approved entry to material foundations. Biometric is the usage of a person's novel physiological, lead, and morphological trademark to give valuable person distinguishing proof. Biometric structures that are starting at now available today break down fingerprints, engravings, iris and retina models, and face. Mechanisms that are similar to biometrics anyway are not named such are lead systems, for instance, voice, imprint and keystroke mechanisms. These days biometrics is in effect effectively executed in numerous fields like measurable, security, recognizable proof and approval frameworks.
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Rajvanshi, Saumya, Shiv Chauhan y Savneet Kaur. "A New Wave in Biometric System: Systematic Study". CGC International Journal of Contemporary Technology and Research 4, n.º 2 (5 de agosto de 2022): 300–305. http://dx.doi.org/10.46860/cgcijctr.2022.07.31.300.

Texto completo
Resumen
Biometric system is a technique used to identify a person using its personal identification methods. The main concept of biometric systems is to provide confidentiality and security to the user. A number of biometric systems are introduced but some systems are widely used and are famous because of their usage and security they provide. Physiological and Behavioral biometrics are the two types of biometric systems. Biometric systems include physiological biometrics like face recognition, fingerprint recognition, iris recognition and behavioral biometrics like signature recognition and voice recognition. All these recognition systems are discussed in this research paper. Biometric systems work on three levels: Enrollment, Verification, and Identification. Enrollment is the process in which patterns are captured from the user and stored in the database. Verification means to confirm that the sample entered by the user belongs to him or not. When the user wants to access the data then the user must use his/her biometrics so that the system checks that the person who wants to access the data is the real owner of the data or not. This process is identification. All three levels are the working levels of the Biometric System. In earlier years, biometrics were used only at ground levels to provide basic security to data but now the tables have turned. It is playing a major role in providing security to our data. Biometrics are not only used in day-to-day life in phone unlocking, phone assistants, attendance systems but also used at advanced levels like in airports, border security, cloud computing etc. In this research paper, we will discuss the future scope of biometric systems and how it could even change the future.
Los estilos APA, Harvard, Vancouver, ISO, etc.

Tesis sobre el tema "Biometrics"

1

Janečka, Petr. "Multimodální biometrický systém kombinující duhovku a sítnici". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2015. http://www.nusl.cz/ntk/nusl-234910.

Texto completo
Resumen
This diploma thesis focuses on multibiometric systems, specifically on biometric fusion. The thesis describes eye biometrics, i.e. recognition based on retina and iris. The key part consists of design and implementation specification of a biometric system based on retina and iris recognition.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Pereira, Tiago de Freitas 1985. "A comparative study of countermeasures to detect spoofing attacks in face authentication systems = Um estudo comparativo de contramedidas para detectar ataques de spoofing em sistemas de autenticação de faces". [s.n.], 2013. http://repositorio.unicamp.br/jspui/handle/REPOSIP/261478.

Texto completo
Resumen
Orientador: José Mario De Martino
Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de Computação
Made available in DSpace on 2018-08-23T20:06:41Z (GMT). No. of bitstreams: 1 Pereira_TiagodeFreitas_M.pdf: 17638731 bytes, checksum: 15a8d07214e3b31accd3218e5bde20cb (MD5) Previous issue date: 2013
Resumo: O Resumo poderá ser visualizado no texto completo da tese digital
Abstract: The complete Abstract is available with the full electronic document.
Mestrado
Engenharia de Computação
Mestre em Engenharia Elétrica
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Hmani, Mohamed Amine. "Use of Biometrics for the Regeneration of Revocable Crypto-biometric Keys". Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAS013.

Texto completo
Resumen
Ce travail de thèse vise à régénérer des clés crypto-biométriques (clés cryptographiques obtenues avec des données biométriques) résistantes aux méthodes de cryptanalyse quantique. Le défi est d'obtenir des clés avec une haute entropie pour avoir un haut niveau de sécurité, sachant que l'entropie contenue dans les références biométriques limite l'entropie de la clé. Notre choix a été d'exploiter la biométrie faciale.Nous avons d'abord créé un système de reconnaissance faciale de pointe basé en utilisant des bases de données publiques. Notre architecture utilise des réseaux de neurones profonds avec une fonction de perte‘Triplet loss'. Nous avons participé à deux Projets européens H2020 pour lesquelles nous avons fournit des adapations de notres systeme de reconnaise de visage. Nous avons également participé au challenge multimédia NIST SRE19 avec la version finale de notre système classique de reconnaissance faciale qui a donnée d'excellents résultats.Pour obtenir des clés crypto-biométriques, il est nécessaire de disposer de références biométriques binaires. Pour obtenir les représentations binaires directement à partir d'images de visage, nous avons proposé une méthode novatrice tirant parti des auto-encodeurs et la biométrie faciale classique précédemment mise en œuvre. Nous avons également exploité les représentations binaires pour créer un système de vérification de visage cancelable.Concernant notre objectif final, générer des clés crypto-biométriques, nous nous sommes concentrés sur les clés symétriques. Le chiffrement symétrique est menacé par l'algorithme Groover parce qu'il réduit la complexité d'une attaque par force brute de 2(N/2).. Pour atténuer le risque introduit par l'informatique quantique, nous devons augmenter la taille des clés. Pour cela, nous avons essayé de faire la représentation binaire plus longue et plus discriminante.Nous avons réussi à régénérer des clés crypto-biométriques de plus de 400 bits grâce à la qualité des plongements binaires. Les clés crypto-biométriques ont une haute entropie et résistent à la cryptanalyse quantique selon le PQCrypto projet car ils satisfont à l'exigence de longueur. Les clés sont régénérées à l'aide d'un schéma de "fuzzy commitment" en utilisant les codes BCH
This thesis aims to regenerate crypto-biometric keys (cryptographic keys obtained with biometric data) that are resistant to quantum cryptanalysis methods. The challenge is to obtain keys with high entropy to have a high level of security, knowing that the entropy contained in biometric references limits the entropy of the key. Our choice was to exploit facial biometrics.We first created a state-of-the-art face recognition system based on public frameworks and publicly available data based on DNN embedding extractor architecture and triplet loss function. We participated in two H2020 projects. For the SpeechXRays project, we provided implementations of classical and cancelable face biometrics. For the H2020 EMPATHIC project, we created a face verification REST API. We also participated in the NIST SRE19 multimedia challenge with the final version of our classical face recognition system.In order to obtain crypto-biometric keys, it is necessary to have binary biometric references. To obtain the binary representations directly from face images, we proposed an original method, leveraging autoencoders and the previously implemented classical face biometrics. We also exploited the binary representations to create a cancelable face verification system.Regarding our final goal, to generate crypto-biometric keys, we focused on symmetric keys. Symmetric encryption is threatened by the Groover algorithm because it reduces the complexity of a brute force attack on a symmetric key from 2N à 2(N/2). To mitigate the risk introduced by quantum computing, we need to increase the size of the keys. To this end, we tried to make the binary representation longer and more discriminative. For the keys to be resistant to quantum computing, they should have double the length.We succeeded in regenerating crypto-biometric keys longer than 400bits (with low false acceptance and false rejection rates) thanks to the quality of the binary embeddings. The crypto-biometric keys have high entropy and are resistant to quantum cryptanalysis, according to the PQCrypto project, as they satisfy the length requirement. The keys are regenerated using a fuzzy commitment scheme leveraging BCH codes
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Holeksa, David. "Návrh audio-vizuální databáze pro extrakci sekundárních biometrických a ne-biometrických znaků". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-220544.

Texto completo
Resumen
The aim of this semester project is to design a suitable database structure for the audio-visual data, parts extracted from the data corresponding to secondary biometric and non-biometric characteristics and description of these characters. The resulting database will be used for research into the identification of audio-visual content of multimedia data.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Gancarčík, Lukáš. "Vicefaktorová autentizace elektronických dokumentů". Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2013. http://www.nusl.cz/ntk/nusl-224008.

Texto completo
Resumen
The aim of the thesis is to provide complete information regarding electronic documents and possibilities of their usage. The focus is concentrated on the area of authentication, which specifies the possibility of obtaining authentication information and describes the authentication processes itself. The diploma thesis also deals with the suggestion of multifactor authentication of electronic documents for the selected company.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Samangooei, Sina. "Semantic biometrics". Thesis, University of Southampton, 2010. https://eprints.soton.ac.uk/153901/.

Texto completo
Resumen
Gait and face biometrics have a unique advantage in that they can be used when images are acquired at a distance and signals are at too low a resolution to be perceived by other biometrics. Given such situations, some traits can be difficult to extract automatically but can still be perceived semantically using human vision. It is contended that such semantic annotations are usable as soft biometric signatures, useful for identification tasks. Feature subset selection techniques are employed to compare the distinguishing ability of individual semantically described physical traits. Their identification ability is also explored, both in isolation and in the improvement of the recognition rates of some associated gait biometric signatures using fusion techniques. This is the first approach to explore semantic descriptions of physiological human traits as used alone or to complement primary biometric techniques to facilitate recognition and analysis of surveillance video. Potential traits to be described are explored and justified against their psychological and practical merits. A novel dataset of semantic annotations is gathered describing subjects in two existing biometric datasets. Two applications of these semantic features and their associated biometric signatures are explored using the data gathered. We also draw on our experiments as a whole to highlight those traits thought to be most useful in assisting biometric recognition overall. Effective analysis of surveillance data by humans relies on semantic retrieval of the data which has been enriched by semantic annotations. A manual annotation process is time-consuming and prone to error due to various factors. We explore the semantic content-based retrieval of surveillance captured subjects. Working under the premise that similarity of the chosen biometric signature implies similarity of certain semantic traits, a set of semantic retrieval experiments are performed using well established Latent Semantic Analysis techniques.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Varadinov, Petr. "Účel a implementace snímání otisků prstů v osobních počítačích". Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-162689.

Texto completo
Resumen
This diploma thesis deals with fingerprint recognition applied in personal computers. The topic is analyzed both chronologically in historical context and in connection with other biometric methods. The thesis provides a comprehensive survey of the topic. It starts with physical layer, goes through hardware parts and ends with software architecture. A special attention is paid to programming fingerprint recognition support into end-user applications. These are the aims of the thesis: to place the silicon fingerprint sensing technology into the historical context and describe its evolution in connection with personal computers till the present times, to provide the results of market research of fingerprint sensors used in personal computers, to work out the summary of the functions the end-users have at their disposal, to present the market research results of fingerprint software, to work out the overview and the comparison of available software development kits (SDKs) and that of application programming interfaces (APIs) used for the described fingerprint sensor devices, and last but not least to develop a demonstration application that communicates with a fingerprint sensor device. Technical literature, market researches together with my own experience from the work in this field were used so as to meet the set aims. As for the demo application of this technology it is my own innovative approach. The thesis is divided into seven chapters where Chapter II -- Chapter VI directly deal with the mentioned topics. The completion of a missing angle of approach to the subject from end-users' and application programmers' perspective is the main asset of this thesis. The work also allows orientation on the silicon fingerprint sensor market and fingerprint software market. Moreover it shows possibilities how to extend this technology, it provides a detailed analysis of the software layer and presents programming samples showing that show how to use this technology. The demo application allowing audio volume control by a fingerprint device is an innovation in the branch of computer input devices.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Ferreira, Iuri Emmanuel de Paula [UNESP]. "Delineamentos D-ótimos para os modelos de Michaelis-Menten e de Hill". Universidade Estadual Paulista (UNESP), 2010. http://hdl.handle.net/11449/87920.

Texto completo
Resumen
Made available in DSpace on 2014-06-11T19:23:03Z (GMT). No. of bitstreams: 0 Previous issue date: 2010-02-16Bitstream added on 2014-06-13T19:08:49Z : No. of bitstreams: 1 ferreira_iep_me_botib.pdf: 634855 bytes, checksum: c96cf169bba179f1ace49fe3a550f384 (MD5)
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Os resultados de muitos experimentos em áreas da biologia, como a farmacologia, a bioquímica e a agronomia, geralmente são analisados por ajustes de modelos não-lineares através dos quais pretende-se explicar a resposta através dos fatores pré-especificados no experimento. As estimações dos parâmetros ou das funções de interesse podem ser imprecisas se os níveis dos fatores não forem adequadamente escolhidos, impossibilitando ao pesquisador a obtenção da informação desejada sobre o objeto de estudo. A construção de um delineamento ótimo, que maximize a informação sobre algum aspecto de interesse, é crucial para o sucesso da prática experimental. O objetivo deste trabalho foi a obtenção de delineamentos D-ótimos exatos para modelos não-lineares utilizados para estudar cinética enzimática e transporte de minerais no organismo, como o de Michaelis-Menten e o de RiU. Para este fim, duas abordagens foram consideradas, a saber, a de delineamentos localmente ótimos e a pseudo-Bayesiana. Com o auxílio dos algoritmos genético e exchange foi possível obter delineamentos D-ótimos exatos para o modelo de Michaelis-Menten, para o modelo de RiU e para ambos, considerando-se valores diferentes e distribuições com diversos coeficientes de variação como informação a priori
The results of many experiments in biological fields, as pharmacology, biochemistry and agriculture, usually are analyzed by fitting nonlinear models, which are supposed to describe well the resp'onse to the pre-specified factors in the experiment. The estimates of the parameters or of their functions of interest could be imprecise if the factor levels are not adequately chosen. The construction of an optimum design, which maximizes the information about some aspect of interest, is crucial for the success of the experimental practice. The aim of this work was constructing exact D-optimal designs for nonlinear models usually used in studies of enzyme kinetics and mineral transport in organisms, such as the Michaelis-Menten and RiU models. Two approaches were considered, the locally optimal and pseudo- Bayesian designs. Genetic and Exchange algorithms were used for getting exact designs aiming at the Michaelis-Menten model, aiming at the RiU model, each one separately, and aiming at both models when considering a composite criterion. Different values and probability distributions with several variation coefficients were considered as prior information
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Martins, Andréa Camila dos Santos [UNESP]. "O método de pontos interiores no planejamento da radioterapia". Universidade Estadual Paulista (UNESP), 2011. http://hdl.handle.net/11449/95056.

Texto completo
Resumen
Made available in DSpace on 2014-06-11T19:27:25Z (GMT). No. of bitstreams: 0 Previous issue date: 2011-02-25Bitstream added on 2014-06-13T19:14:53Z : No. of bitstreams: 1 martins_acs_me_botib.pdf: 559361 bytes, checksum: de5a9b02a1bd741bc6a0e45d2d7a0f21 (MD5)
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Um tratamento do câncer por radioterapia tem como objetivo a eliminação das células do tumor e preservação das células saudáveis, obtendo assim uma melhor homo-geneização da dose administrada e menor possibilidade de complicações clínicas durante o tratamento. O sucesso do tratamento depende de um bom planejamento. Para um planejamento ótimo, técnicas matemáticas estão sendo utilizadas com o objetivo de maximizar a radiação no tumor e minimizar a radiação nas regiões vizinhas, com isto modelos de programação linear têm sido ótimas ferramentas para auxiliar a construção dos planos de tratamento por radioterapia. Assim, este trabalho visa: estudar os principais conceitos envolvidos no planejamento do tratamento do câncer por radioterapia; estudar modelos de programação linear (PL) aplicados ao planejamento ótimo; fazer um amplo estudo sobre a técnica de pontos interiores para PL e apresentar uma aplicação desta técnica para resolução de um problema de planejamento ótimo para o tratamento do câncer por radioterapia
A cancer treatment by radiotherapy aims to eliminate tumor cells and preservation of healthy cells, thus getting a better homogenization of the administered dose and fewer chances of complications during treatment. Treatment success depends on good planning. For an optimal planning, mathematical techniques are being used in order to maximize radiation at tumor and minimize radiation in the surrounding regions, thus linear programming models has been great tools to assist the construction of treatment plans for radiation therapy. Thus, this work aims: studying the key concepts involved in planning the treatment of cancer by radiotherapy; study the models the linear program- ming (PL) applied to optimal planning; make a broad study on the technique of interior point for PL and present an enforcement of this technique for solving a problem of optimal planning for cancer treatment by radiotherapy
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Brobeck, Stefan y Tobias Folkman. "Biometrics : Attitudes and factors influencing a breakthrough in Sweden". Thesis, Jönköping University, JIBS, Business Informatics, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-148.

Texto completo
Resumen

Biometrics is a collection of methods for identifying and authorizing individuals with something they are, or do. It is considered to be one of the most secure technologies for security, both physical and logical. Security is something very important for organizations today, but yet there has been a low interest in investing in biometrics for security in Sweden.

The purpose of this thesis has been to establish factors to why biometrics has not been implementedto any large extent, even though the technology has been around for long. We have evaluated the attitudes and views of individuals, as well as company leaders. Problem and questions with biometrics that often are discussed are privacy concerns, costs and ROI (return on investment) and user acceptance. Foremost there is a concern about the costs of implementing such a solution, although some claim that money can be saved by avoiding the costs in more traditional security methods, such as password administration and in security cards.

There is a range of different technologies to use, such as facial-scan, voice-scan and the most mature and well known technique, finger-scan which has been around for a long time, especially for identifying criminals. All these techniques have there positive and negative sides, often measured in different levels of universality, uniqueness, permanence and collectability, e.g. eye-scan has a high uniqueness, facial-scan has a high universability and signature-scan has a low permanence level.

We have collected our data through interviews with companies and suppliers of biometric systems as well as a questionnaire given to private persons. By interpreting the data in a qualitative way we have made our analysis and reached a conclusion.

Our result shows that a cost related to biometric solutions is the largest reason why investments have been absent. This verifies the results of other authors, that the cost is the largest obstacle. Another important factor is that companies believe that biometrics is for organizations with a very high security need. Further our result show that individuals are positive towards biometrics.


Biometri är ett samlingsnamn för tekniker som identifierar och auktoriserar individer, antingen något de är eller gör. Biometri anses vara en av de säkraste teknologierna för säkerhet, både fysisk och logisk. Säkerhet är något som är mycket viktigt för organisationer i dagens läge, men än så länge så har investeringar i biometriska säkerhetslösningar i Sverige uteblivit. Syftet med denna magisteruppsats har varit att fastställa faktorer som bidrar till att biometriska lösningar inte har blivit implementerade i någon större utsträckning, trots att teknologin har funnits länge. Vi har utvärderat individers samt företagsledares attityder och synsätt angående biometri.

Frågor och problem som ofta relateras till biometri är personligintegritet, kostnader och avkastning på investering samt användaracceptans. Framförallt är det osäkerheten kring kostnaderna av en implementering av en biometrisklösning. Det finns även de som hävdar att biometriska lösningar kan spara pengar jämfört med traditionella system därför att man undviker till exempel lösenordsadministration och passerkort.

Det finns en rad olika tekniker att använda, exempelvis ansiktsavläsning, röstigenkänning och den mest mogna och kända tekniken, fingeravtrycksläsning som har existerat en längre tid, framförallt för att identifiera kriminella. Det finns positiva och negativa sidor med alla dessa tekniker, de mäts oftast i olika nivåer av hur många som kan använda det, hur unikt biometrin är, beständighet och hur biometrin samlas in.

Genom intervjuer med företag och leverantörer av biometriska lösningar samt en utdelad enkät till privat personer har vi samlat in data. Vi har sedan tolkat data kvalitativt och utfört vår analys och slutligen kommit fram till ett resultat.

Vårt resultat har visat att kostnader relaterade till biometriska system är det största skälet till varför investeringar har uteblivit. Detta bekräftar vad många andra författare tidigare har funnit, att kostnaderna är det största hindret. En annan viktig faktor är att företag anser att biometri är något för verksamheter som kräver den allra högsta säkerheten. Vidare har individer en positiv inställning till biometri.

Los estilos APA, Harvard, Vancouver, ISO, etc.

Libros sobre el tema "Biometrics"

1

Boulgouris, Nikolaos V., Konstantinos N. Plataniotis y Evangelia Micheli-Tzanakou, eds. Biometrics. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2009. http://dx.doi.org/10.1002/9780470522356.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Jain, Anil K., Ruud Bolle y Sharath Pankanti, eds. Biometrics. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/b117227.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Keith, McLennan, Chilvers Simon, ARTE France, Films d'ici (Firm) y Films for the Humanities & Sciences (Firm), eds. Biometrics. Princeton, NJ: Films for the Humanities & Sciences, 2008.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

R, Wilson Susan y Burden Conrad John, eds. Biometrics. Oxford, U.K: Eolss Publishers, 2009.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

R, Wilson Susan y Burden Conrad John, eds. Biometrics. Oxford, U.K: Eolss Publishers, 2009.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

D, Woodward John. Biometrics. New York: McGraw-Hill/Osborne, 2003.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Ashbourn, Julian. Practical Biometrics. London: Springer London, 2004. http://dx.doi.org/10.1007/978-0-85729-406-7.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Nait-ali, Amine, ed. Hidden Biometrics. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-13-0956-4.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Kumar, Santosh, Sanjay Kumar Singh, Rishav Singh y Amit Kumar Singh. Animal Biometrics. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-7956-6.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Rattani, Ajita, Reza Derakhshani y Arun Ross, eds. Selfie Biometrics. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-26972-2.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Capítulos de libros sobre el tema "Biometrics"

1

Ding, Sophia, Emilia Nunes, Pascal Bettendorff y Weyde Lin. "Biometrics". En Trends in Data Protection and Encryption Technologies, 121–28. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_22.

Texto completo
Resumen
AbstractIn biometrics, physiological characteristics (e.g., fingerprints, facial features, voices) are measured to identify individuals. Since biometry does not share the same characteristics as other authentication techniques, such as passwords or PIN codes, it is widely used as a second-factor authentication. A fully integrated solution offers significant advantages as it aligns biometric hardware, key generation, validation, and storage with the cryptographic provider, providing a coherent control environment. As a result, designing and implementing secure biometric authentication methods requires highly specialized technical expertise and experience. In addition, as biometrics become prevalent and their integration with artificial intelligence systems increases, ethical and regulatory questions become more pressing.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Mordini, Emilio. "Biometrics". En Handbook of Global Bioethics, 505–26. Dordrecht: Springer Netherlands, 2013. http://dx.doi.org/10.1007/978-94-007-2512-6_101.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Kizza, Joseph Migga. "Biometrics". En Texts in Computer Science, 277–89. London: Springer London, 2010. http://dx.doi.org/10.1007/978-1-84996-038-0_14.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Islam, M. Nazrul. "Biometrics". En Encyclopedia of Security and Emergency Management, 1–7. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_10-1.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Wayman, James L. "Biometrics". En Handbook of Computer Networks, 539–52. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118256107.ch34.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Moallem, Abbas. "Biometrics". En Understanding Cybersecurity Technologies, 27–38. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003038429-4.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Skågeby, Jörgen. "Biometrics". En Encyclopedia of Big Data, 118–20. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-319-32010-6_26.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

ten Have, Henk y Maria do Céu Patrão Neves. "Biometrics". En Dictionary of Global Bioethics, 187. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-54161-3_90.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Islam, M. Nazrul. "Biometrics". En Encyclopedia of Security and Emergency Management, 29–35. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-70488-3_10.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Skågeby, Jörgen. "Biometrics". En Encyclopedia of Big Data, 1–2. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-32001-4_26-1.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Actas de conferencias sobre el tema "Biometrics"

1

Özgür, Hafızullah y Yunus Emre Selçuk. "Authentication in ATM/ITM Machines using Iris Recognition Biometrics". En 10th International Conference on Artificial Intelligence & Applications. Academy & Industry Research Collaboration Center, 2023. http://dx.doi.org/10.5121/csit.2023.131901.

Texto completo
Resumen
Biometric identification is a method that encompasses many types of authentication systems, including iris features and characteristics. The behaviour of the tiny pixels in a person’s iris and pupil can be extracted and uniquely used for authentication in ATM/ITM machines. In this study, achieving higher accuracy and success is the goal. We have found out that the Daugman algorithm can enable the implementation of iris biometrics in a faster and more accurate way compared to other algorithms. This will allow ATM/ITM users can comfortably access their accounts and make transactions without the need for a card or PIN, while authenticating their identity in the machines using their iris biometrics. Such a system can also be used to authenticate national ID entitlement in programmes. Furthermore, such a system can enhance the accessibility of social benefits, subsidies, and other entitlements while minimizing fraudulent activities [1]
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Gaipov, J. B. "DIGITAL PAYMENT TECHNOLOGIES WITH BIOMETRICS". En НОВЫЕ БИЗНЕС-МОДЕЛИ ЦИФРОВОЙ ЭКОНОМИКИ В СУБЪЕКТАХ РФ. ХГУЭП, 2022. http://dx.doi.org/10.38161/978-5-7823-0753-0-2022-131-134.

Texto completo
Resumen
This article focuses on identifying and studying the technology of payment systems with biometrics for further improvement and anticipation of development, in the banking sector of the Republic of Uzbekistan, examines the key problems hindering the development of the innovative payment systems market and analyses the activities of commercial banks in the digital services market of the Republic of Uzbekistan in the context of information technology development and digitalization of the economy in the banking sector. Methodological techniques and methods of evaluation of efficiency of using biometric data of payment systems are investigated. Details of basic payment systems, their development and distribution in different countries are determined. Modern trends in the development of electronic payment systems and services using modern IT-technologies are presented.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Jackson, Aldrewvonte, Kofi Kyei, Yasmin Eady, Brian Dowtin, Bernard Aldrich, Albert Esterline y Joseph Shelton. "Biometric Authentication for the Mitigation of Human Risk on a Social Network". En 15th International Conference on Applied Human Factors and Ergonomics (AHFE 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1004763.

Texto completo
Resumen
The increasing reliance on digital systems in today's interconnected world has brought about a corresponding surge in cyber threats, making cybersecurity a critical concern. While technological advancements have bolstered the defense mechanisms, human factors remain a significant vulnerability. This paper explores the intersection of human factors and cybersecurity, focusing on how biometric authentication can serve as a potent mitigating strategy. The human element in cybersecurity encompasses a range of factors, including user behavior, cognitive biases, and susceptibility to social engineering attacks. Understanding and addressing these aspects is crucial for developing robust and effective cybersecurity measures. Traditional methods such as passwords and PINs, which heavily rely on user memory, are inherently vulnerable to human error, leading to weak access controls and unauthorized access. One key advantage of biometrics is the inherent difficulty in replicating or forging an individual's unique characteristics. Unlike passwords that can be forgotten, shared, or stolen, biometric traits are inherently tied to an individual, providing a more reliable means of authentication. Moreover, the seamless integration of biometrics into daily activities reduces the cognitive burden on users, potentially leading to increased compliance with security protocols.Biometric authentication presents a promising avenue for overcoming the limitations associated with traditional methods. By leveraging unique physiological characteristics, biometrics offer a more secure and user-friendly approach to identity verification. This paper proposes a one-time facial recognition system in conjunction with an online social network, where individuals belonging to the network have their own server participating in the WebID protocol. The WebID protocol enables control of individual identity and representing a network of individuals in a decentralized web of trust. A social network with the WebID protocol consists of trusted individuals, and acceptance can be done through a voting scheme where individuals must be able to vouch for a new member. Controlling the member population of a network can help to prevent against phishing attacks, by restricting communications to only members of the social network. However, this is not a perfect system, and biometrics can be used as an added layer of security to prevent successful attacks spurred on by human factors.Replacing traditional passwords with biometrics can help to mitigate social engineering attacks, though human privacy is still an important consideration for many individuals. Biometrics can compromise privacy, and we propose a scheme to represent biometrics in a one-time fashion that can still preserve a high recognition rate for accurate acceptance/rejection of individual verification. This is done using a combination of the Local Binary Patterns feature extraction technique with evolutionary computation techniques to evolve unique feature extractors (to be used one-time) that also maintain accurate recognition rates. Prior results have shown this technique to be effective on preliminary datasets, the work done in this paper will show the effectiveness of this technique in a social network combined with the WebID protocol to prevent successful cyber-attacks spawned from human error. Additionally, we’ll discuss ways privacy can be compromised, and how the one-time disposable biometrics system can preserve privacy.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Talabi, A. A., O. B. Longe, A. A. Muhammad y K. Olusanya. "Cybersecurity Risk Management in Identity Systems using Biometric-based Multimodal Authentication." En 28th iSTEAMS Multidisciplinary Research Conference AIUWA The Gambia. Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers, 2021. http://dx.doi.org/10.22624/aims/isteams-2021/v28n2p5.

Texto completo
Resumen
This increasing inter-connectivity of systems and dependence on computer and internet-based networks has made Cybersecurity related risks management issues major considerations in designing, developing and managing identity systems. Thus, this paper investigates Cybersecurity and related risk management challenges in Identity Management Systems by undertaking a comparative analysis of different biometric traits. The analysis proved that biometric-based multimodal systems are more secure than uni-modal systems with high accuracy rates. Also, it produced minimal false acceptance and false rejection rates. The biometric-based multi-modal authentication systems will assist organizations to restrict access to authorized users and protect digital assets by ensuring confidentiality, integrity and availability. Keywords: Cybersecurity, Risk, Identity, Biometrics, Multimodal, Behavioural, Fusion
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Pahuja, Gunjan y T. N. Nagabhushan. "Biometric authentication & identification through behavioral biometrics: A survey". En 2015 International Conference on Cognitive Computing and Information Processing (CCIP). IEEE, 2015. http://dx.doi.org/10.1109/ccip.2015.7100681.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Yazdanpanah, Ali Pour, Karim Faez y Rasoul Amirfattahi. "Multimodal biometric system using face, ear and gait biometrics". En 2010 10th International Conference on Information Sciences, Signal Processing and their Applications (ISSPA). IEEE, 2010. http://dx.doi.org/10.1109/isspa.2010.5605477.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Gilady, Erez, Dale Lindskog y Shaun Aghili. "Intent Biometrics: An Enhanced Form of Multimodal Biometric Systems". En 2014 28th International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE, 2014. http://dx.doi.org/10.1109/waina.2014.133.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Bashir, Faisal, David Usher, Pablo Casaverde y Marc Friedman. "Video Surveillance for Biometrics: Long-Range Multi-biometric System". En 2008 IEEE Fifth International Conference on Advanced Video and Signal Based Surveillance (AVSS). IEEE, 2008. http://dx.doi.org/10.1109/avss.2008.28.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Schulz, Douglas A. "Mouse Curve Biometrics". En 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference. IEEE, 2006. http://dx.doi.org/10.1109/bcc.2006.4341626.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Moody, Janette. "Public Perceptions of Biometric Devices:The Effect of Misinformation on Acceptance and Use". En InSITE 2004: Informing Science + IT Education Conference. Informing Science Institute, 2004. http://dx.doi.org/10.28945/2743.

Texto completo
Resumen
Organizations are introducing biometric devices into various sections of the economy for various reasons. What began as a security feature for a limited number of government organizations has been adapted to such diverse uses as paying for school children’s lunches to tracking employees’ work attendance. From an organizational perspective, justifications for use of biometric devices are plentiful. However, the public’s perception of these devices may be quite different. These perceptions in turn will influence public willingness to accept and use biometric devices. Although employee use of biometric devices can be mandated, a more productive alternative might be to understand their perceptions and address those specifically through education and information. This paper describes common types of biometrics, reviews their current use in organizations, presents findings of a recent survey of public perceptions to determine the areas requiring the most education, and concludes with suggestions for providing this education.
Los estilos APA, Harvard, Vancouver, ISO, etc.

Informes sobre el tema "Biometrics"

1

Moore, Brad y Michaela Iorga. Biometrics testing. Gaithersburg, Md.: National Institute of Standards and Technology, julio de 2009. http://dx.doi.org/10.6028/nist.hb.150-25.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

BIOMETRICS TASK FORCE ARLINGTON VA. Biometrics Task Force. Fort Belvoir, VA: Defense Technical Information Center, enero de 2009. http://dx.doi.org/10.21236/ada517637.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Johnston, R. y W. Grace. Bartus Iris biometrics. Office of Scientific and Technical Information (OSTI), julio de 1996. http://dx.doi.org/10.2172/262980.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Garris, Michael D. y Charles L. Wilson. NIST biometrics evaluations and developments. Gaithersburg, MD: National Institute of Standards and Technology, 2005. http://dx.doi.org/10.6028/nist.ir.7204.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Choong, Yee-Yin, Mary Theofanos, Brian Stanton y Patrick Hofmann. Symbols representing biometrics in use. Gaithersburg, MD: National Institute of Standards and Technology, 2009. http://dx.doi.org/10.6028/nist.ir.7645.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Kang, George S. y Yvette Lee. Voice Biometrics for Information Assurance Applications. Fort Belvoir, VA: Defense Technical Information Center, diciembre de 2002. http://dx.doi.org/10.21236/ada408449.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Schulz, Robert Jr H. Prospects of Biometrics at-a-Distance. Fort Belvoir, VA: Defense Technical Information Center, septiembre de 2015. http://dx.doi.org/10.21236/ad1009318.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Milley, Mark A., Gerald B. O'Keefe, Timothy J. Leahy, Willard III M. Burleson, S. A. Stearney, David G. Throop y R. Jr B. Turner. Biometrics: Multi-Service Tactics, Techniques, and Procedures for Tactical Employment of Biometrics in Support of Operations. Fort Belvoir, VA: Defense Technical Information Center, mayo de 2016. http://dx.doi.org/10.21236/ad1013627.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Frenzen, Christopher L. Convolution Methods for Mathematical Problems in Biometrics. Fort Belvoir, VA: Defense Technical Information Center, enero de 1999. http://dx.doi.org/10.21236/ada359925.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Phillips, P. J., H. A. Sahibzada, Patrick J. Flynn, K. W. Bowyer, A. O'Toole, S. Weimer, J. R. Beveridge et al. Overview of the multiple biometrics grand challenge. Gaithersburg, MD: National Institute of Standards and Technology, 2009. http://dx.doi.org/10.6028/nist.ir.7607.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía