Gotowa bibliografia na temat „Biometrical method”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Biometrical method”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Biometrical method"

1

Chmielińska, Jolanta, i Jacek Jakubowski. "Biometrical driver face verification". AUTOBUSY – Technika, Eksploatacja, Systemy Transportowe 19, nr 6 (7.09.2018): 68–72. http://dx.doi.org/10.24136/atest.2018.039.

Pełny tekst źródła
Streszczenie:
The paper discusses the problem of face verification in a driver monitoring system for the purpose of traffic safety. Two different methods of face verification were proposed. Both of them are based on a convolutional neural network and were developed with the use of a transfer learning technique. In the paper, the results produced by both proposed method have been presented and compared. Moreover, their advantages and disadvantages have been discussed.
Style APA, Harvard, Vancouver, ISO itp.
2

Salman, Duha D., Raghad A. Azeez i Adul mohssen J. Hossen. "Key Generation from Multibiometric System Using Meerkat Algorithm". Engineering and Technology Journal 38, nr 3B (25.12.2020): 115–27. http://dx.doi.org/10.30684/etj.v38i3b.652.

Pełny tekst źródła
Streszczenie:
Biometrics are short of revocability and privacy while cryptography cannot adjust the user’s identity. By obtaining cryptographic keys using biometrics, one can obtain the features such as revocability, assurance about user’s identity, and privacy. Multi-biometrical based cryptographic key generation approach has been proposed, subsequently, left and right eye and ear of a person are uncorrelated from one to other, and they are treated as two independent biometrics and combine them in our system. None-the-less, the encryption keys are produced with the use of an approach of swarm intelligence. Emergent collective intelligence in groups of simple autonomous agents is collectively termed as a swarm intelligence. The Meerkat Clan Key Generation Algorithm (MCKGA) is a method for the generation of a key stream for the encryption of the plaintext. This method will reduce and distribute the number of keys. Testing of system, it was found that the keys produced by the characteristics of the eye are better than the keys produced by the characteristics of the ear. The advantages of our approach comprise generation of strong and unique keys from users’ biometric data using MCKGA and it is faster and accurate in terms of key generation.
Style APA, Harvard, Vancouver, ISO itp.
3

Salman, Duha D., Raghad A. Azeez i Adul mohssen J. Hossen. "Key Generation from Multibiometric System Using Meerkat Algorithm". Engineering and Technology Journal 38, nr 3B (25.12.2020): 115–27. http://dx.doi.org/10.30684/etj.v38i3b.652.

Pełny tekst źródła
Streszczenie:
Biometrics are short of revocability and privacy while cryptography cannot adjust the user’s identity. By obtaining cryptographic keys using biometrics, one can obtain the features such as revocability, assurance about user’s identity, and privacy. Multi-biometrical based cryptographic key generation approach has been proposed, subsequently, left and right eye and ear of a person are uncorrelated from one to other, and they are treated as two independent biometrics and combine them in our system. None-the-less, the encryption keys are produced with the use of an approach of swarm intelligence. Emergent collective intelligence in groups of simple autonomous agents is collectively termed as a swarm intelligence. The Meerkat Clan Key Generation Algorithm (MCKGA) is a method for the generation of a key stream for the encryption of the plaintext. This method will reduce and distribute the number of keys. Testing of system, it was found that the keys produced by the characteristics of the eye are better than the keys produced by the characteristics of the ear. The advantages of our approach comprise generation of strong and unique keys from users’ biometric data using MCKGA and it is faster and accurate in terms of key generation.
Style APA, Harvard, Vancouver, ISO itp.
4

Philippe, P. "Twinning causative origin investigated by Sartwell's biometrical method". American Journal of Human Biology 2, nr 2 (1990): 107–15. http://dx.doi.org/10.1002/ajhb.1310020203.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Bogdanov, M. A., V. M. Kartak, A. А. Dumchikov i A. I. Fabarisova. "STATISTICAL ASSESSMENT OF BIOMETRICAL SIGNS BY ELECTROCARDIOGRAPHY". Russian Journal of Cardiology, nr 7 (14.08.2018): 84–91. http://dx.doi.org/10.15829/1560-4071-2018-7-84-91.

Pełny tekst źródła
Streszczenie:
Statistical analysis performed, of the informativity of biometric signs of electrocardiogram. It was found that amplitude and time parameters of PQST areas of electrocardiograms show enough dispersion and are not easily distinguished. For reliable biometric personality identification quite a range of such signs is needed. Based on the known signs, novel signs were formulated via the bootstrap method. The novel signs presented much lower dispersion. It was found, that reliable identification of personality is possible with combined usage of the amplitudes in Sand T-areas of cardiocycle.
Style APA, Harvard, Vancouver, ISO itp.
6

Santos, Filipe Martins, David Risco, Nayara Yoshie Sano, Gabriel Carvalho de Macedo, Wanessa Teixeira Gomes Barreto, Pilar Gonçalves, Pedro Fernández-Llario i Heitor Miraglia Herrera. "An alternative method for determining the body condition index of the free-living South American coati". Neotropical Biology and Conservation 15, nr 4 (23.12.2020): 561–69. http://dx.doi.org/10.3897/neotropical.15.e56578.

Pełny tekst źródła
Streszczenie:
Assessing and monitoring the welfare of free-living mammals is not a usual process due to the logistical complications associated with their capture and sedation, collection and storage of biological samples and their release. In this context, non-invasive methods for monitoring wildlife constitute a good alternative approach for in situ conservation. Body condition index, as a measurement of health status, has been used in free-living mammals; its low value may be associated with negative effects on reproduction and survival. The present study aimed to generate an alternative and reliable non-invasive method and then determine the body condition index, based on previously-collected biometric measurements, without the need to capture and immobilise the animals. A total of 178 free-living Nasua nasua Linnaeus, 1766 were trapped, weighed and measured. Statistical methods were used, based on Boosted Regression Trees (BRT) using body mass, biometric measurements (body length, height and chest girth) and gender as explanatory variables. To assess the agreement between the real Body Condition Indices (BCIs) and the predicted values of BCIs, we explored the correlation between each model using the Bland-Altman method. This method showed a strong agreement between the predictive BRT models proposed (standardised residuals from a linear regression between body length and chest girth) and standardised residuals (linear regression between body mass and body length). The results obtained herein showed that BRT modelling, based on biometrical features, is an alternative way to verify the body conditions of coatis without the need to capture and immobilise the animals.
Style APA, Harvard, Vancouver, ISO itp.
7

Zintzaras, E., P. Bouka i A. Kowald. "Biometrical evaluation of bioequivalence trials using a bootstrap individual direct curve comparison method". European Journal of Drug Metabolism and Pharmacokinetics 27, nr 1 (marzec 2002): 11–16. http://dx.doi.org/10.1007/bf03190400.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Stander, Mark, i Julian Stander. "A simple method for correcting for the Will Rogers phenomenon with biometrical applications". Biometrical Journal 62, nr 4 (20.01.2020): 1080–89. http://dx.doi.org/10.1002/bimj.201900199.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Desrosiers, G., B. Vincent, C. Retière i L. Boucher. "Comparaison de critères utilisables pour l'étude de la structure des populations du polychète Nereis virens (Sars)". Canadian Journal of Zoology 66, nr 6 (1.06.1988): 1454–59. http://dx.doi.org/10.1139/z88-212.

Pełny tekst źródła
Streszczenie:
The various biometrical criteria used in the study of the population structure of the annelid polychaete Nereis virens (Sars) are reviewed. This type of study, which requires the examination of large numbers of specimens representing all size classes, is sometimes complicated by the occurrence of autotomy, a phenomenon quite frequent in this species, and by mechanical breaks during sampling and sieving. Measurements such as total length, width of an anterior segment, and total weight are not good criteria. We have used a new biometrical criterium developed at the Laboratoire maritime de Dinard (France). This criterium is based on a partial weight of animals that have been put in formaldehyde and wiped; the weight is determined from an histogram in which breaking points are "ranked". This ponderal measurement has been compared with the linear measurement of the jaw length. The new method allows the manipulation of a larger number of individuals and it is easier and faster to use than the method based on jaw measurements.[Journal translation]
Style APA, Harvard, Vancouver, ISO itp.
10

Wu, Shu-Fei. "Bayesian Interval Estimation for the Two-Parameter Exponential Distribution Based on the Right Type II Censored Sample". Symmetry 14, nr 2 (10.02.2022): 352. http://dx.doi.org/10.3390/sym14020352.

Pełny tekst źródła
Streszczenie:
The Bayesian interval estimation of the scale parameter for two-parameter exponential distribution is proposed based on the right type II censored sample. Under this type of censoring, two methods of Bayesian joint confidence region of the two parameters are also proposed. The simulation results show that the Bayesian method has a higher coverage probability than the existing method, so the Bayesian method is recommended for use. This research is related to the topic of asymmetrical probability distributions and applications across disciplines. The predictive interval of the future observation based on the right type II censored sample is also provided. One biometrical example is given to illustrate the proposed methods for the Bayesian interval estimations and prediction interval.
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "Biometrical method"

1

Holeksa, David. "Návrh audio-vizuální databáze pro extrakci sekundárních biometrických a ne-biometrických znaků". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-220544.

Pełny tekst źródła
Streszczenie:
The aim of this semester project is to design a suitable database structure for the audio-visual data, parts extracted from the data corresponding to secondary biometric and non-biometric characteristics and description of these characters. The resulting database will be used for research into the identification of audio-visual content of multimedia data.
Style APA, Harvard, Vancouver, ISO itp.
2

Fransson, Linda, i Therese Jeansson. "Biometric methods and mobile access control". Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5023.

Pełny tekst źródła
Streszczenie:
Our purpose with this thesis was to find biometric methods that can be used in access control of mobile access. The access control has two parts. Firstly, to validate the identity of the caller and, secondly, to ensure the validated user is not changed during the session that follows. Any solution to the access control problem is not available today, which means that anyone can get access to the mobile phone and the Internet. Therefore we have researched after a solution that can solve this problem but also on how to secure that no one else can take over an already validated session. We began to search for biometric methods that are available today to find them that would be best suited together with a mobile phone. After we had read information about them we did choose three methods for further investigation. These methods were Fingerprint Recognition, Iris Scan and Speaker Verification. Iris Scan is the method that is best suited to solve the authentication problem. The reasons for this are many. One of them is the uniqueness and stability of the iris, not even identical twins or the pair of the same individual has the same iris minutiae. The iris is also very protected behind eyelids, cornea and the aqueous humor and therefore difficult to damage. When it comes to the method itself, is it one of the most secure methods available today. One of the reasons for this is that the equal error rate is better than one in a million. However, this rate can be even better. It all depends on the Hamming Distance, which is a value that show how different the saved and temporarily template are, and what it is set to. To solve our session authentication, which was to make sure that no one else could take over a connected mobile phone, a sensor plate is the answer. This sensor will be able to sense for touch, heat and pulse. These three sensor measurements will together secure a validated session since the mobile phone will disconnect if the sensor looses its sensor data. There are, however, technological and other challenges to be solved before our proposed solutions will become viable. We address some of these issues in our thesis.
Style APA, Harvard, Vancouver, ISO itp.
3

Betschart, Willie. "Applying intelligent statistical methods on biometric systems". Thesis, Blekinge Tekniska Högskola, Avdelningen för signalbehandling, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1694.

Pełny tekst źródła
Streszczenie:
This master’s thesis work was performed at Optimum Biometric Labs, OBL, located in Karlskrona, Sweden. Optimum Biometric Labs perform independent scenario evaluations to companies who develop biometric devices. The company has a product Optimum preConTM which is surveillance and diagnosis tool for biometric systems. This thesis work’s objective was to develop a conceptual model and implement it as an additional layer above the biometric layer with intelligence about the biometric users. The layer is influenced by the general procedure of biometrics in a multimodal behavioural way. It is working in an unsupervised way and performs in an unsupervised manner. While biometric systems are increasingly adopted the technologies have some inherent problems such as false match and false non-match. In practice, a rejected user can not be interpreted as an impostor since the user simply might have problems using his/her biometric feature. The proposed methods in this project are dealing with these problems when analysing biometric usage in runtime. Another fact which may give rise to false rejections is template aging; a phenomenon where the enrolled user’s template is too old compared towards the user’s current biometric feature. A theoretical approach of template aging was known; however since the analysis of template aging detection was correlated with potential system flaws such as device defects or human generated risks such as impostor attacks this task would become difficult to solve in an unsupervised system but when ignoring the definition of template aging, the detection of similar effects was possible. One of the objectives of this project was to detect template aging in a predictive sense; this task failed to be carried out because the absence of basis performing this kind of tasks. The developed program performs abnormality detection at each incoming event from a biometric system. Each verification attempt is assumed to be from a genuine user unless any deviation according to the user's history is found, an abnormality. The possibility of an impostor attack depends on the degree of the abnormality. The application makes relative decisions between fraud possibilities or if genuine user was the source of what caused the deviations. This is presented as an alarm with the degree of impostor possibility. This intelligent layer has increased Optimum preCon´s capacity as a surveillance tool for biometrics. This product is an efficient complement to biometric systems in a steady up-going worldwide market.
Style APA, Harvard, Vancouver, ISO itp.
4

Anderson, Niall Hay. "Methods for the investigation of spatial clustering, with epidemiological applications". Thesis, University of Glasgow, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.364260.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Fakhir, Mahammad Majed. "Biometric fusion methods for adaptive face recognition in computer vision". Thesis, University of Newcastle upon Tyne, 2017. http://hdl.handle.net/10443/4001.

Pełny tekst źródła
Streszczenie:
Face recognition is a biometric method that uses different techniques to identify the individuals based on the facial information received from digital image data. The system of face recognition is widely used for security purposes, which has challenging problems. The solutions to some of the most important challenges are proposed in this study. The aim of this thesis is to investigate face recognition across pose problem based on the image parameters of camera calibration. In this thesis, three novel methods have been derived to address the challenges of face recognition and offer solutions to infer the camera parameters from images using a geomtric approach based on perspective projection. The following techniques were used: camera calibration CMT and Face Quadtree Decomposition (FQD), in order to develop the face camera measurement technique (FCMT) for human facial recognition. Facial information from a feature extraction and identity-matching algorithm has been created. The success and efficacy of the proposed algorithm are analysed in terms of robustness to noise, the accuracy of distance measurement, and face recognition. To overcome the intrinsic and extrinsic parameters of camera calibration parameters, a novel technique has been developed based on perspective projection, which uses different geometrical shapes to calibrate the camera. The parameters used in novel measurement technique CMT that enables the system to infer the real distance for regular and irregular objects from the 2-D images. The proposed system of CMT feeds into FQD to measure the distance between the facial points. Quadtree decomposition enhances the representation of edges and other singularities along curves of the face, and thus improves directional features from face detection across face pose. The proposed FCMT system is the new combination of CMT and FQD to recognise the faces in the various pose. The theoretical foundation of the proposed solutions has been thoroughly developed and discussed in detail. The results show that the proposed algorithms outperform existing algorithms in face recognition, with a 2.5% improvement in main error recognition rate compared with recent studies.
Style APA, Harvard, Vancouver, ISO itp.
6

Iqbal, K. "Image detection and retrieval for biometric security from an image enhancement perspective". Thesis, Coventry University, 2011. http://curve.coventry.ac.uk/open/items/ed5b98d3-84e6-4070-89cb-7ede2f0e9c0b/1.

Pełny tekst źródła
Streszczenie:
Security methods based on biometrics have been gaining importance increasingly in the last few years due to recent advances in biometrics technology and its reliability and efficiency in real world applications. Also, several major security disasters that occurred in the last decade have given a new momentum to this research area. The successful development of biometric security applications cannot only minimise such threats but may also help in preventing them from happening on a global scale. Biometric security methods take into account humans’ unique physical or behavioural traits that help to identify them based on their intrinsic characteristics. However, there are a number of issues related to biometric security, in particular with regard to surveillance images. The first issue is related to the poor visibility of the images produced by surveillance cameras and the second issue is concerned with the effective image retrieval based on user query. This research addresses both issues. This research addresses the first issue of low quality of surveillance images by proposing an integrated image enhancement approach for face detection. The proposed approach is based on contrast enhancement and colour balancing methods. The contrast enhancement method is used to improve the contrast, while the colour balancing method helps to achieve a balanced colour. Importantly, in the colour balancing method, a new process for colour cast adjustment is introduced which relies on statistical calculation. It can adjust the colour cast and maintain the luminance of the whole image at the same level. The research addresses the second issue relating to image retrieval by proposing a content-based image retrieval approach. The approach is based on the three welliii known algorithms: colour histogram, texture and moment invariants. Colour histogram is used to extract the colour features of an image. Gabor filter is used to extract the texture features and the moment invariant is used to extract the shape features of an image. The use of these three algorithms ensures that the proposed image retrieval approach produces results which are highly relevant to the content of an image query, by taking into account the three distinct features of the image and the similarity metrics based on Euclidean measure. In order to retrieve the most relevant images the proposed approach also employs a set of fuzzy heuristics to improve the quality of the results further. The integrated image enhancement approach is applied to the enhancement of low quality images produced by surveillance cameras. The performance of the proposed approach is evaluated by applying three face detection methods (skin colour based face detection, feature based face detection and image based face detection methods) to surveillance images before and after enhancement using the proposed approach. The results show a significant improvement in face detection when the proposed approach was applied. The performance of the content-based image retrieval approach is carried out using the standard Precision and Recall measures, and the results are compared with wellknown existing approaches. The results show the proposed approach perform s better than the well-known existing approaches.
Style APA, Harvard, Vancouver, ISO itp.
7

Mráček, Štěpán. "Biometric Recognition of 3D Faces". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2010. http://www.nusl.cz/ntk/nusl-237237.

Pełny tekst źródła
Streszczenie:
Diplomová práce byla vypracována na studijním pobytu na "Gjovik University College" v Norsku, a je zpracována v angličtině. Tato práce se zabývá rozpoznáváním 3D obličejů. Je zde popsán obecný biometrický systém a také konkrétní postupy používané při rozpoznávání 2D i 3D obličejů. Následně je navžena metoda pro rozpoznávání 3D obličejů. Algoritmus je vyvíjen a testován pomocí databáze Face Recognition Grand Challenge (FRGC). Během předzpracování jsou nalezeny význačné body v obličeji a následně je trojrozměrný model zarovnán do referenční polohy. Dále jsou vstupní data porovnávána s biometrickými šablonami uloženými v databázi, a to je zajištěno využitím tří základních technik pro rozpoznávání obličejů -- metoda eigenface (PCA), rozpoznávání založené na histogramu obličeje a rozpoznávání založené na anatomických rysech. Nakonec jsou jednotlivé metody spojeny do jednoho systému, jehož celková výsledná výkonnost převyšuje výkonnost jednotlivých použitých technik.
Style APA, Harvard, Vancouver, ISO itp.
8

Subramanian, Ravichandran. "Orientation Invariance Methods for Inertial Gait". Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7369.

Pełny tekst źródła
Streszczenie:
Intelligent devices such as smart phones, smart watches, virtual reality (VR) headsets and personal exercise devices have become integral elements of accessories used by many people. The ability of these devices to verify or identify the user could be applied for enhanced security and user experience customization among other things. Almost all these devices have built-in inertial sensors such as accelerometer and gyroscope. These inertial sensors respond to the movements made by the user while performing day to day activities like walking, getting up and sitting down. The response depends on the activity being performed and thus can be used for activity recognition. The response also captures the user's unique way of doing the activity and can be used as a behavioral biometric for verification or identification. The acceleration (accelerometer) and rate of rotation (gyroscope) are recorded in the device coordinate frame. But to determine the user's motion, these need to be converted to a coordinate frame relative to the user. In most situations the orientation of the device relative to the user can neither be controlled nor determined reliably. The solution to this problem requires methods to remove the dependence on device orientation while comparing the signals collected at different times. In a vast of majority of research to date, the performance of authentication algorithms using inertial sensors have been evaluated on small datasets with few tens of subjects, collected under controlled placement of the sensors. Very often stand alone inertial sensors have been used to collect the data. Stand alone sensors afford better calibration, while the sensors built into smart devices offer little or no means of calibration. Due to these limitations of the datasets used, it is difficult to extend the results from these research to realistic performance with a large number subjects and natural placement of off-the-shelf smart devices. This dissertation describes the Kabsch algorithm which is used to achieve orientation invariance of the recorded inertial data, enabling better authentication independent of device orientation. It also presents the Vector Cross Product (VCP) method developed to achieve orientation invariance. Details of a realistic inertial dataset (USF-PDA dataset) collected with commercial smart phones placed in natural positions and orientations using 101 subjects are given. The data includes sessions from different days on a subset of 56 subjects. This would enable realistic evaluation of authentication algorithms. This dataset has been made publicly available. The performance of five methods that address the orientation dependence of signals are compared to a baseline that performs no compensation for orientation of the device. The methods as a part of a overall gait authentication algorithm are evaluated on the USF-PDA dataset mentioned above and another large dataset with more than 400 subjects. The results show that the orientation compensation methods are able to improve the authentication performance on data with uncontrolled orientation to be close to performance on data collected with controlled orientation. The Kabsch method shows the highest improvement.
Style APA, Harvard, Vancouver, ISO itp.
9

Robertson, Joshua. "The application of the human-biometric sensor interaction method to automated border control systems". Thesis, University of Kent, 2017. https://kar.kent.ac.uk/66822/.

Pełny tekst źródła
Streszczenie:
Biometrics components are used in many different systems and technologies to verify that the user is whom they say they are. In Automated Border Control systems, biometrics components used in conjunction with a traveller's documents to make sure the user is whom they say they are so that they can cross into a countries borders. The systems are expected to verify the identity with a higher degree than officers who manually check travellers. Each year the number of travellers crossing through a country borders increases and so systems are expected to handle bigger demands; through improving the user experience to ensuring accuracy and performance standards increase. While the system does bring its benefits through increased speed and higher security, there are drawbacks. One of the main issues with the systems is a lack of standardisation across implementations. Passing through an automated process at Heathrow may be different to Hong Kong. The infrastructure, information, environment and guidance given during the transaction will all greatly differ for the user. Furthermore, the individual components and subsequent processing will be evaluated using a different methodology too. This thesis reports on the contrasts between implementations, looking at solutions which utilise different biometric modalities and travel documents. Several models are devised to establish a process map which can be applied to all systems. Investigating further, a framework is described for a novel assessment method to evaluate the performance of a system. An RGB-D sensor is implemented, to track and locate the user within an interactive environment. By doing so, the user's interaction is assessed in real-time. Studies then report on the effectiveness of the solution within a replicated border control scenario. Several relationships are studied to improve the technologies used within the scenario. Successful implementation of the automated assessment method may improve the user's experience with systems, improving information and guidance, increasing the likelihood of successful interaction while maintaining a high level of security and quicker processing times.
Style APA, Harvard, Vancouver, ISO itp.
10

Bin, Safie Sairul Izwan. "Pulse domain novel feature extraction methods with application to ecg biometric authentication". Thesis, University of Strathclyde, 2012. http://oleg.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=17829.

Pełny tekst źródła
Streszczenie:
This thesis presents the concept of representing finite signals in terms of sequential output pulses called pulse domain to extract Electrocardiogram (ECG) features for biometric authentication systems. Two novel methods based on the pulse domain philosophy namely Pulse Active (PA) and Adaptive Pulse Active (APA) techniques are presented in this thesis. A total of 11 algorithms are derived from these two methods and used to generate novel ECG feature vectors. Six algorithms of the PA technique are named as Pulse Active Bit (PAB), Pulse Active Width (PAW), Pulse Active Area (PAA), Pulse Active Mean (PAM), Pulse Active Ratio (PAR) and Pulse Active Harmonic (PAH). Five APA algorithms are named as Adaptive Pulse Active Bit (APAB), Adaptive Pulse Active Width (APAW), Adaptive Pulse Active Area (APAA), Adaptive Pulse Active Mean (APAM) and Adaptive Pulse Active Harmonic (APAH). The proposed techniques are validated using ECG experimental data from 112 subjects. Simulation results indicate that APAW generates the best biometric performance of all 11 algorithms. Selected ranges of PA and APA parameters are determined in this thesis that generates approximate similar biometric performance. Using this suggested range, these parameters are than used as a personal identification number (PIN) which are a part of the proposed PA-APA ECG based multilevel security biometric authentication system.
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Biometrical method"

1

Derbel, Nabil, i Olfa Kanoun, red. Advanced Methods for Human Biometrics. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81982-8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Harvey, Schuster, i Metzger Wilfred, red. Biometrics: Methods, applications and analyses. Hauppauge, N.Y: Nova Science Publishers, 2009.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Biometrics: Methods, applications and analyses. New York: Nova Science Publishers, 2010.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Biometrics: Theory, methods, and applications. Piscataway, N.J: IEEE Press, 2010.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Ranta, Esa. Biometria: Tilastotiedettä ekologeille. Wyd. 4. Helsinki: Yliopistopaino, 1992.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Schuckers, Michael E. Computational Methods in Biometric Authentication. London: Springer London, 2010. http://dx.doi.org/10.1007/978-1-84996-202-5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Schuckers, Michael E. Computational methods in biometric authentication: Statistical methods for performance evaluation. London: Springer, 2010.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Bilan, Stepan, Mohamed Elhoseny i D. Jude Hemanth, red. Biometric Identification Technologies Based on Modern Data Mining Methods. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-48378-4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Pejaś, Jerzy, i Andrzej Piegat, red. Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems. Boston, MA: Springer US, 2005. http://dx.doi.org/10.1007/b101135.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

1928-, Searle S. R., red. Proceedings of the conference in honor of Shayle R. Searle: August 9-10, 1996, Biometrics Unit, Cornell University. Ithaca, NY: Biometrics Unit, Cornell University, 1998.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Biometrical method"

1

Kumlander, Deniss. "Soft Biometrical Students Identification Method for e-Learning". W Advances in Computer and Information Sciences and Engineering, 114–18. Dordrecht: Springer Netherlands, 2008. http://dx.doi.org/10.1007/978-1-4020-8741-7_21.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Ding, Sophia, Emilia Nunes, Pascal Bettendorff i Weyde Lin. "Biometrics". W Trends in Data Protection and Encryption Technologies, 121–28. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_22.

Pełny tekst źródła
Streszczenie:
AbstractIn biometrics, physiological characteristics (e.g., fingerprints, facial features, voices) are measured to identify individuals. Since biometry does not share the same characteristics as other authentication techniques, such as passwords or PIN codes, it is widely used as a second-factor authentication. A fully integrated solution offers significant advantages as it aligns biometric hardware, key generation, validation, and storage with the cryptographic provider, providing a coherent control environment. As a result, designing and implementing secure biometric authentication methods requires highly specialized technical expertise and experience. In addition, as biometrics become prevalent and their integration with artificial intelligence systems increases, ethical and regulatory questions become more pressing.
Style APA, Harvard, Vancouver, ISO itp.
3

Wen, Mengna, Ziyun Ye i Jinfeng Yang. "Finger Trimodal Features Coding Fusion Method". W Biometric Recognition, 466–74. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-20233-9_47.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Zeng, Junying, Yao Chen, Chuanbo Qin, Fan Wang, Junying Gan, Yikui Zhai i Boyuan Zhu. "A Novel Method for Finger Vein Recognition". W Biometric Recognition, 46–54. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31456-9_6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Zhang, Yongliang, Xiaozhu Chen, Xiao Chen, Dixin Zhou i Erzhe Cao. "An Eye Localization Method for Iris Recognition". W Biometric Recognition, 420–27. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-69923-3_45.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Luo, Qi, Hongxia Wang i Jianyun Chen. "Phase Retrieval by the Inverse Power Method". W Biometric Recognition, 223–30. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-97909-0_24.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Tapiador, Marino, i Juan A. Sigüenza. "Writer Identification Method Based on Forensic Knowledge". W Biometric Authentication, 555–61. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_76.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

He, Xiaofu, Yue Lu i Pengfei Shi. "A New Fake Iris Detection Method". W Advances in Biometrics, 1132–39. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01793-3_114.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Ren, Chunxiao, Yilong Yin i Yanbin Ning. "A Performance Improvement Method for Existing Fingerprint Systems". W Biometric Recognition, 120–27. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35136-5_15.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Hu, Changhui, Xiaobo Lu i Yijun Du. "A Novel Face Recognition Method Using Vector Projection". W Biometric Recognition, 61–69. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12484-1_6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Biometrical method"

1

Kirci, Murvet, i Faezeh Sadat Babmir. "A digest-based method for efficiency improvement of security in biometrical cryptography authentication". W 2017 International Symposium on Computer Science and Software Engineering Conference (CSSE). IEEE, 2017. http://dx.doi.org/10.1109/csicsse.2017.8320113.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

de Araújo, Lúcio B., Manuela M. Oliveira, Carlos Tadeu dos S. Dias, Amílcar Oliveira i Teresa A. Oliveira. "Tucker3 method in biometrical research: Analysis of experiments with three factors, using R". W NUMERICAL ANALYSIS AND APPLIED MATHEMATICS ICNAAM 2012: International Conference of Numerical Analysis and Applied Mathematics. AIP, 2012. http://dx.doi.org/10.1063/1.4756506.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Denisova, Anna. "An improved simple feature set for face presentation attack detection". W WSCG'2022 - 30. International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision'2022. Západočeská univerzita, 2022. http://dx.doi.org/10.24132/csrn.3201.3.

Pełny tekst źródła
Streszczenie:
Presentation attacks are weak points of facial biometrical authentication systems. Although several presentation attack detection methods were developed, the best of them require a sufficient amount of training data and rely on computationally intensive deep learning based features. Thus, most of them have difficulties with adaptation to new types of presentation attacks or new cameras. In this paper, we introduce a method for face presentation attack detection with low requirements for training data and high efficiency for a wide range of spoofing attacks. The method includes feature extraction and binary classification stages. We use a combination of simple statistical and texture features and describe the experimental results of feature adjustment and selection. We validate the proposed method using WMCA dataset. The experiments showed that the proposed features decrease the average classification error in comparison with the RDWT-Haralick-SVM method and demonstrate the best performance among non-CNN-based methods.
Style APA, Harvard, Vancouver, ISO itp.
4

Sarangaraja, A. P., D. Rajagopalan, A. Vignesh i P. Mohamed Fathimal. "Secret Sharing Scheme with Fingerprint Authentication". W International Research Conference on IOT, Cloud and Data Science. Switzerland: Trans Tech Publications Ltd, 2023. http://dx.doi.org/10.4028/p-u6em0l.

Pełny tekst źródła
Streszczenie:
Medical imaging is very important in medical diagnosis. X-rays, ultrasound images, CT scans, brain pictures, and patient mri images are examples of images that contain sensitive information. However, poor communication channels and loopholes in hospital and medical centre storage systems risk accessing these images by unauthorised individuals who utilise them for nefarious purposes other than diagnostics. Image encryption is a common strategy for enhancing the integrity of communication and storage channels for protecting medical images from unauthorized access. This task proposes a biometrics-based method of secret sharing. Instead of sharing secrets between participants as in encryption, the biometric properties of participants create a single biometric configuration. If the biometric vaults are verified for the required number of actual during the authentication process, participants must provide a valid encryption key from the configuration is disclosed.
Style APA, Harvard, Vancouver, ISO itp.
5

Jangua, Daniel, i Aparecido Marana. "A New Method for Gait Recognition Using 2D Poses". W Workshop de Visão Computacional. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/wvc.2020.13483.

Pełny tekst źródła
Streszczenie:
Over the last decades, biometrics has become an important way for human identification in many areas, since it can avoid frauds and increase the security of individuals in society. Nowadays, most popular biometric systems are based on fingerprint and face features. Despite the great development observed in Biometrics, an important challenge lasts, which is the automatic people identification in low-resolution videos captured in unconstrained scenarios, at a distance, in a covert and noninvasive way, with little or none subject cooperation. In these cases, gait biometrics can be the only choice. The goal of this work is to propose a new method for gait recognition using information extracted from 2D poses estimated over video sequences. For 2D pose estimation, our method uses OpenPose, an open-source robust pose estimator, capable of real-time multi-person detection and pose estimation with high accuracy and a good computational performance. In order to assess the new proposed method, we used two public gait datasets, CASIA Gait Dataset-A and CASIA Gait Dataset-B. Both datasets have videos of a number of people walking in different directions and conditions. In our new method, the classification is carried out by a 1-NN classifier. The best results were obtained by using the chi-square distance function, which obtained 95.00% of rank-1 recognition rate on CASIA Gait Dataset-A and 94.22% of rank-1 recognition rate on CASIA Gait Dataset-B, which are comparable to state-of-the-art results.
Style APA, Harvard, Vancouver, ISO itp.
6

Gaipov, J. B. "DIGITAL PAYMENT TECHNOLOGIES WITH BIOMETRICS". W НОВЫЕ БИЗНЕС-МОДЕЛИ ЦИФРОВОЙ ЭКОНОМИКИ В СУБЪЕКТАХ РФ. ХГУЭП, 2022. http://dx.doi.org/10.38161/978-5-7823-0753-0-2022-131-134.

Pełny tekst źródła
Streszczenie:
This article focuses on identifying and studying the technology of payment systems with biometrics for further improvement and anticipation of development, in the banking sector of the Republic of Uzbekistan, examines the key problems hindering the development of the innovative payment systems market and analyses the activities of commercial banks in the digital services market of the Republic of Uzbekistan in the context of information technology development and digitalization of the economy in the banking sector. Methodological techniques and methods of evaluation of efficiency of using biometric data of payment systems are investigated. Details of basic payment systems, their development and distribution in different countries are determined. Modern trends in the development of electronic payment systems and services using modern IT-technologies are presented.
Style APA, Harvard, Vancouver, ISO itp.
7

Rahmes, Mark, Josef DeVaughn Allen, Abdelmoula Elharti i Gnana Bhaskar Tenali. "Fingerprint Reconstruction Method Using Partial Differential Equation and Exemplar-Based Inpainting Methods". W 2007 Biometrics Symposium. IEEE, 2007. http://dx.doi.org/10.1109/bcc.2007.4430539.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Veiga, Rafael, Cristiano B. Both, Iago Medeiros, Denis Rosário i Eduardo Cerqueira. "A Federated Learning Approach for Authentication and User Identification based on Behavioral Biometrics". W Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/sbrc.2023.536.

Pełny tekst źródła
Streszczenie:
A smartphone can collect behavioral data without requiring additional actions on the user’s part and without the need for additional hardware. In an active or continuous user authentication process, information from integrated sensors, such as touch, and gyroscope, is used to monitor the user continuously. These sensors can capture behavioral (touch patterns, accelerometer) or physiological (fingerprint, face) data of the user naturally interacting with the device. However, transferring data from multiple users’ mobile devices to a server is not recommended due to user data privacy concerns. This paper introduces an Federated Learning (FL) approach to define a user’s biometric behavior pattern for continuous user identification and authentication. We also evaluate whether FL can be helpful in behavioral biometrics. Evaluation results compare CNNs in different epochs using FL and a centralized method with low chances of wrong predictions in user identification by the gyroscope.
Style APA, Harvard, Vancouver, ISO itp.
9

Karabat, Cagatay, i Hakan Erdogan. "Trustworthy biometric hashing method". W 2009 IEEE 17th Signal Processing and Communications Applications Conference (SIU). IEEE, 2009. http://dx.doi.org/10.1109/siu.2009.5136333.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

"Entropy based Biometric Template Clustering". W International Conference on Pattern Recognition Applications and Methods. SciTePress - Science and and Technology Publications, 2013. http://dx.doi.org/10.5220/0004266205600563.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Biometrical method"

1

Soller, Moshe (Morris), Hans Cheng i Lyman Crittenden. Mapping the Chicken Genome, Including Loci Affecting Traits of Economic Importance. United States Department of Agriculture, wrzesień 1994. http://dx.doi.org/10.32747/1994.7568779.bard.

Pełny tekst źródła
Streszczenie:
A total of 195 microsatellites were added to the chicken genome map. Mapping of fifty known genes revealed a high degree of conserved linkage order between human and chicken genomes. A new, statistically powerful mapping design, the full-sib intercross line (produced by mating two parents, and intercrossing their progeny over a number of generations), was developed for use in species with high reproductive capacity. The Jerusalem Resource Population (JRP), now at the F12 generation, was established to implement this design i chickens. The biometrical picutre in the JRP is similar to that generally found in chicken populations; inbreeding effects were not observed. The F2 and F3 generations of the JRP were genotyped with respect to twelve production traits, using a battery of 23 microsatellites markers. The number of significant effects was twice that expected on chance alone, validating the high statistical power of the JRP with respect to QTL differentiating the parental lines. Selective DNA pooling, based on estimation of marker allele frequencies in pooled DNA samples, has been proposed to reduce high genotyping costs of QTL mapping. A method to correct for overlapping shadow bands of dinucleotide microsatellite markers in pooled DNA samples was developed and validated. In a retrospective study using this procedure, previously mapped loci affecting Marek's disease were successfully identified.
Style APA, Harvard, Vancouver, ISO itp.
2

Frenzen, Christopher L. Convolution Methods for Mathematical Problems in Biometrics. Fort Belvoir, VA: Defense Technical Information Center, styczeń 1999. http://dx.doi.org/10.21236/ada359925.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Varastehpour, Soheil, Hamid Sharifzadeh, Iman Ardekani i Abdolhossein Sarrafzadeh. Human Biometric Traits: A Systematic Review Focusing on Vascular Patterns. Unitec ePress, grudzień 2020. http://dx.doi.org/10.34074/ocds.086.

Pełny tekst źródła
Streszczenie:
Authentication methods based on human traits, including fingerprint, face, iris, and palm print, have developed significantly, and currently they are mature enough to be reliably considered for human identification purposes. Recently, as a new research area, a few methods based on non-facial skin features such as vein patterns have been developed. This literature review paper explores some key biometric systems such as face recognition, iris recognition, fingerprint, and palm print, and discusses their respective advantages and disadvantages; then by providing a comprehensive analysis of these traits, and their applications, vein pattern recognition is reviewed.
Style APA, Harvard, Vancouver, ISO itp.
4

Cheng, Su Lan, Ross J. Micheals i Z. Q. John Lu. Comparison of confidence intervals for large operational biometric data by parametric and non-parametric methods. Gaithersburg, MD: National Institute of Standards and Technology, 2010. http://dx.doi.org/10.6028/nist.ir.7740.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Тарасова, Олена Юріївна, i Ірина Сергіївна Мінтій. Web application for facial wrinkle recognition. Кривий Ріг, КДПУ, 2022. http://dx.doi.org/10.31812/123456789/7012.

Pełny tekst źródła
Streszczenie:
Facial recognition technology is named one of the main trends of recent years. It’s wide range of applications, such as access control, biometrics, video surveillance and many other interactive humanmachine systems. Facial landmarks can be described as key characteristics of the human face. Commonly found landmarks are, for example, eyes, nose or mouth corners. Analyzing these key points is useful for a variety of computer vision use cases, including biometrics, face tracking, or emotion detection. Different methods produce different facial landmarks. Some methods use only basic facial landmarks, while others bring out more detail. We use 68 facial markup, which is a common format for many datasets. Cloud computing creates all the necessary conditions for the successful implementation of even the most complex tasks. We created a web application using the Django framework, Python language, OpenCv and Dlib libraries to recognize faces in the image. The purpose of our work is to create a software system for face recognition in the photo and identify wrinkles on the face. The algorithm for determining the presence and location of various types of wrinkles and determining their geometric determination on the face is programmed.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii