• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 14
  • 6
  • 1
  • 1
  • Tagged with
  • 19
  • 19
  • 16
  • 15
  • 11
  • 6
  • 5
  • 5
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Mobile personal authentication using fingerprint.

January 2004 (has links)
Cheng Po Sum. / Thesis submitted in: July 2003. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2004. / Includes bibliographical references (leaves 64-67). / Abstracts in English and Chinese. / List of Figures --- p.i / List of Tables --- p.iii / Acknowledgments --- p.iv / 摘要 --- p.v / Thesis Abstract --- p.vi / Chapter 1. --- Mobile Commerce --- p.1 / Chapter 1.1 --- Introduction to Mobile Commerce --- p.1 / Chapter 1.2 --- Mobile commence payment systems --- p.2 / Chapter 1.3 --- Security in mobile commerce --- p.5 / Chapter 2. --- Mobile authentication using Fingerprint --- p.10 / Chapter 2.1 --- Authentication basics --- p.10 / Chapter 2.2 --- Fingerprint basics --- p.12 / Chapter 2.3 --- Fingerprint authentication using mobile device --- p.15 / Chapter 3. --- Design of Mobile Fingerprint Authentication Device --- p.19 / Chapter 3.1 --- Objectives --- p.19 / Chapter 3.2 --- Hardware and software design --- p.21 / Chapter 3.2.1 --- Choice of hardware platform --- p.21 / Chapter 3.3 --- Experiments --- p.25 / Chapter 3.3.1 --- Design methodology I - DSP --- p.25 / Chapter 3.3.1.1 --- Hardware platform --- p.25 / Chapter 3.3.1.2 --- Software platform --- p.26 / Chapter 3.3.1.3 --- Implementation --- p.26 / Chapter 3.3.1.4 --- Experiment and result --- p.27 / Chapter 3.3.2 --- Design methodology II ´ؤ SoC --- p.28 / Chapter 3.3.2.1 --- Hardware components --- p.28 / Chapter 3.3.2.2 --- Software components --- p.29 / Chapter 3.3.2.3 --- Implementation Department of Computer Science and Engineering --- p.29 / Chapter 3.3.2.4 --- Experiment and result --- p.30 / Chapter 3.4 --- Observation --- p.30 / Chapter 4. --- Implementation of the Device --- p.31 / Chapter 4.1 --- Choice of platforms --- p.31 / Chapter 4.2 --- Implementation Details --- p.31 / Chapter 4.2.1 --- Hardware implementation --- p.31 / Chapter 4.2.1.1 --- Atmel FingerChip --- p.32 / Chapter 4.2.1.2 --- Gemplus smart card and reader --- p.33 / Chapter 4.2.2 --- Software implementation --- p.33 / Chapter 4.2.2.1 --- Operating System --- p.33 / Chapter 4.2.2.2 --- File System --- p.33 / Chapter 4.2.2.3 --- Device Driver --- p.35 / Chapter 4.2.2.4 --- Smart card --- p.38 / Chapter 4.2.2.5 --- Fingerprint software --- p.41 / Chapter 4.2.2.6 --- Graphical user interface --- p.41 / Chapter 4.3 --- Results and observations --- p.44 / Chapter 5. --- An Application Example 一 A Penalty Ticket Payment System (PTPS) --- p.47 / Chapter 5.1 --- Requirement --- p.47 / Chapter 5.2 --- Design Principles --- p.48 / Chapter 5.3 --- Implementation --- p.52 / Chapter 5.4 --- Results and Observation --- p.57 / Chapter 6. --- Conclusions and future work --- p.62 / Chapter 7. --- References --- p.64
12

The statistical evaluation of minutiae-based automatic fingerprint verification systems. / CUHK electronic theses & dissertations collection

January 2006 (has links)
Basic technologies for fingerprint feature extraction and matching have been improved to such a stage that they can be embedded into commercial Automatic Fingerprint Verification Systems (AFVSs). However, the reliability of AFVSs has kept attracting concerns from the society since AFVSs do fail occasionally due to difficulties like problematic fingers, changing environments, and malicious attacks. Furthermore, the absence of a solid theoretical foundation for evaluating AFVSs prevents these failures from been predicted and evaluated. Under the traditional empirical AFVS evaluation framework, repeated verification experiments, which can be very time consuming, have to be performed to test whether an update to an AFVS can really lead to an upgrade in its performance. Also, empirical verification results are often unable to provide deeper understanding of AFVSs. To solve these problems, we propose a novel statistical evaluation model for minutiae-based AFVSs based on the understanding of fingerprint minutiae patterns. This model can predict the verification performance metrics as well as their confidence intervals. The analytical power of our evaluation model, which makes it superior to empirical evaluation methods, can assist system developers to upgrade their AFVSs purposefully. Also, our model can facilitate the theoretical analysis of the advantages and disadvantages of various fingerprint verification techniques. We verify our claims through different and extensive experiments. / Chen, Jiansheng. / "November 2006." / Adviser: Yiu-Sang Moon. / Source: Dissertation Abstracts International, Volume: 68-08, Section: B, page: 5343. / Thesis (Ph.D.)--Chinese University of Hong Kong, 2006. / Includes bibliographical references (p. 110-122). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [200-] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstracts in English and Chinese. / School code: 1307.
13

Fingerprint identification using distributed computing.

Khanyile, Nontokozo Portia. January 2012 (has links)
Biometric systems such as face, palm and fingerprint recognition are very computationally expensive. The ever growing biometric database sizes have posed a need for faster search algorithms. High resolution images are expensive to process and slow down less powerful extraction algorithms. There is an apparent need to improve both the signal processing and the searching algorithms. Researchers have continually searched for new ways of improving the recognition algorithms in order to keep up with the high pace of the scientific and information security world. Most such developments, however, are architecture- or hardware-specific and do not port well to other platforms. This research proposes a cheaper and portable alternative. With the use of the Single Program Multiple Data programming architecture, a distributed fingerprint recognition algorithm is developed and executed on a powerful cluster. The first part in the parallelization of the algorithm is distributing the image enhancement algorithm which comprises of a series of computationally intensive image processing operations. Different processing elements work concurrently on different parts of the same image in order to speed up the processing. The second part of parallelization speeds up searching/ matching through a parallel search. A database is partitioned as evenly as possible amongst the available processing nodes which work independently to search their respective partitions. Each processor returns a match with the highest similarity score and the template with the highest score among those returned is returned as match given that the score is above a certain threshold. The system performance with respect to response time is then formalized in a form of a performance model which can be used to predict the performance of a distributed system given network parameters and number of processing nodes. The proposed algorithm introduces a novel approach to memory distribution of block-wise image processing operations and discusses three different ways to process pixels along the partitioning axes of the distributed images. The distribution and parallelization of the recognition algorithm gains up to as much as 12.5 times performance in matching and 10.2 times in enhancement. / Thesis (M.Sc.Eng.)-University of KwaZulu-Natal, Durban, 2012.
14

CHALLENGES AND OPPORTUNITIES OF ADOPTING MANAGEMENT INFORMATION SYSTEMS (MIS) FOR PASSPORT PROCESSING: COMPARATIVE STUDY BETWEEN LESOTHO AND SOUTH AFRICA

Maime, Ratakane. Baptista. January 2014 (has links)
Thesis ( M. Tech. (Business Administration )) - Central University of Technology, Free State, 2014 / Fast and secure public service delivery is not only a necessity, but a compulsory endeavour. However, it is close to impossible to achieve such objectives without the use of Information Technology (IT). It is correspondingly important to find proper sustainability frameworks of technology. Organisations do not only need technology for efficient public service; the constant upgrading of systems and cautious migration to the newest IT developments is also equally indispensable in today’s dynamic technological world. Conversely, countries in Africa are always lagging behind in technological progresses. Such deficiencies have been identified in the passport processing of Lesotho and South Africa, where to unequal extents, problems related to systems of passport production have contributed to delays and have become fertile grounds for corrupt practices. The study seeks to identify the main impediments in the adoption of Management Information Systems (MIS) for passport processing. Furthermore, the study explores the impact MIS might have in attempting to combat long queues and to avoid long waiting periods – from application to issuance of passports to citizens. The reasonable time frame between passport application and issuance, and specific passport management systems, have been extensively discussed along with various strategies that have been adopted by some of the world’s first movers in modern passport management technologies. In all cases and stages of this research, Lesotho and South Africa are compared. The research approach of the study was descriptive and explorative in nature. As a quantitative design, a structured questionnaire was used to solicit responses in Lesotho and South Africa. It was established that both Lesotho and South Africa have somewhat similar problems – although, to a greater extent, Lesotho needs much more urgent attention. Although the processes of South Africa need to be improved, the Republic releases a passport much faster and more efficiently than Lesotho. Economic issues are also revealed by the study as unavoidable factors that always affect technological developments in Africa. The study reveals that the latest MIS for passport processing has facilitated modern, automated border-control systems and resultant e-passports that incorporate more biometric information of citizens to passports – thanks to modern RFID technologies. One can anticipate that this study will provide simple, affordable and secure IT solutions for passport processing. Key words: Information Technology (IT); Management Information Systems (MIS); E-Government; E-Passport; Biometrics; and RFID.
15

Enhancing the validity of the SAPS gold fingerprinting database through improved sample-collection techniques

Crundwell, Gordon Rhodes 30 April 2008 (has links)
This study's main focus was to analyse the methodology used by gold mines when obtaining reference samples required for gold fingerprinting analysis. Such methodology is also regulated by legislation in that in terms of the Precious Metals Act 37 of 2005 sect 22(1), "Any producer or any person who imports precious metals must submit to the Forensic Science Laboratory (FSL) of the South African Police Service (SAPS) such specimens of any precious metals produced or imported by him or her as may be prescribed". The gold mines are producers of precious metals, specifically gold, and they are therefore required to submit reference samples, which are then used by the SAPS FSL to maintain a database of gold samples. This database can then be used for comparison purposes during the forensic science of gold fingerprinting. The supporting regulations of the Precious Metals Act, Section 19 stipulate seven requirements for the submission of reference samples and this study intends to give guidelines to security officials employed on the gold mines of South Africa to ensure that these requirements are met and that the validity of the SAPS gold fingerprint database is enhanced through improved sample-collection techniques. The use of gold fingerprinting is part of the forensic investigation process used when trying to establish the origin of gold confiscated as an exhibit during police and mining security crime operations and recoveries, and this allows for victim identification in the resultant criminal trial and proper disposal of recovered gold-bearing materials that are recovered. It is important for the mine security official responsible for reference sample collection to keep in mind that the methodology used when obtaining these samples could be challenged in court and that, therefore, definitive guidelines should be followed to ensure that the most representative samples are collected and that the collection and handing over of samples meet chain of evidence requirements. / Criminology / M.Tech (Forensic Investigation)
16

The use of the Automated Fingerprint Identification System to improve the quality of service rendered by the South African Police Service on the East Rand

Matlala, Mpho Mark 2012 November 1900 (has links)
The globalisation process that drives the progression and trans-national nature of crime requires that the police should use sophisticated and/or state-of-the art technologies to help them to combat criminality. The use of technology by the police is thus viewed as one of the appropriate responses to deal with the threats posed by crime. In an attempt to ascertain the significance of technology in police work, this research examined the impact that the use of biometric technology such as the Automated Fingerprint Identification System, has had on the quality of seiVices rendered by the South African Police Service. Following the police's task of identifying criminal fingerprints, the problem encountered in this research was that, ever since the introduction of the Automated Fingerprint Identification System, no research had been conducted to assess the impact thereof on the level and quality of seiVices rendered by the South African Police SeiVice. This problem was further intensified by the fact that there was no framework to assess the impact that the utilisation of the Automated Fingerprint Identification System has had on police work in South Africa. Consequently, the problems that were identified in this research compromised not only the quality of seiVices rendered by the police, but also the safety and security within communities. The findings in this research showed that the utilisation of biometric technologies such as the Automated Fingerprint Identification System have helped the police to accurately identify and arrest criminal suspects. However, some of the conclusions reached suggested that the quantitative aspect of the utilisation of biometric systems and the elated portable apparatuses within the South African Police Service was emphasised more than the qualitative aspect thereof. The emphasis was evident in the statistics regarding the use of the Automated Fingerprint Identification System, which focused primarily on police productivity and to a lesser degree on accountability related issues. This study espoused a qualitative paradigm and the investigations in the research were focused on the East Rand policing precinct. The participants who informed this research were selected from the research population using random and purposive sampling techniques. In the same way, the data that informed this research was collected using semi-structured interviews and an in-depth review of the literature on policing and its utilisation of the different technologies. The research espoused social constructivism and phenomenology as the philosophical worldviews of choice to form constructivist phenomenology and to attain theoretical triangulation. Moreover, evaluation research and a case study were espoused as the research designs of choice, to attain methodological triangulation. The various triangulation techniques espoused in this research project were critical in attaining quality assurance in terms of the research methodology applied. In the same way, a myriad of qualitative techniques such as dependability, transferability, confimability and credibility were also employed in order to ensure that the integrity of the data that was collected in this study remained intact. Finally, the data that was collected to inform this research was analysed using the qualitative content analysis technique. Similarly, the measures taken to ensure that the safety of the research participants was delineated in this same research report. / Police Practice / M. Tech. (Police Science)
17

Enhancing the validity of the SAPS gold fingerprinting database through improved sample-collection techniques

Crundwell, Gordon Rhodes 30 April 2008 (has links)
This study's main focus was to analyse the methodology used by gold mines when obtaining reference samples required for gold fingerprinting analysis. Such methodology is also regulated by legislation in that in terms of the Precious Metals Act 37 of 2005 sect 22(1), "Any producer or any person who imports precious metals must submit to the Forensic Science Laboratory (FSL) of the South African Police Service (SAPS) such specimens of any precious metals produced or imported by him or her as may be prescribed". The gold mines are producers of precious metals, specifically gold, and they are therefore required to submit reference samples, which are then used by the SAPS FSL to maintain a database of gold samples. This database can then be used for comparison purposes during the forensic science of gold fingerprinting. The supporting regulations of the Precious Metals Act, Section 19 stipulate seven requirements for the submission of reference samples and this study intends to give guidelines to security officials employed on the gold mines of South Africa to ensure that these requirements are met and that the validity of the SAPS gold fingerprint database is enhanced through improved sample-collection techniques. The use of gold fingerprinting is part of the forensic investigation process used when trying to establish the origin of gold confiscated as an exhibit during police and mining security crime operations and recoveries, and this allows for victim identification in the resultant criminal trial and proper disposal of recovered gold-bearing materials that are recovered. It is important for the mine security official responsible for reference sample collection to keep in mind that the methodology used when obtaining these samples could be challenged in court and that, therefore, definitive guidelines should be followed to ensure that the most representative samples are collected and that the collection and handing over of samples meet chain of evidence requirements. / Criminology and Security Science / M.Tech (Forensic Investigation)
18

The use of the Automated Fingerprint Identification System to improve the quality of service rendered by the South African Police Service on the East Rand

Matlala, Mpho Mark 11 1900 (has links)
The globalisation process that drives the progression and trans-national nature of crime requires that the police should use sophisticated and/or state-of-the art technologies to help them to combat criminality. The use of technology by the police is thus viewed as one of the appropriate responses to deal with the threats posed by crime. In an attempt to ascertain the significance of technology in police work, this research examined the impact that the use of biometric technology such as the Automated Fingerprint Identification System, has had on the quality of seiVices rendered by the South African Police Service. Following the police's task of identifying criminal fingerprints, the problem encountered in this research was that, ever since the introduction of the Automated Fingerprint Identification System, no research had been conducted to assess the impact thereof on the level and quality of seiVices rendered by the South African Police SeiVice. This problem was further intensified by the fact that there was no framework to assess the impact that the utilisation of the Automated Fingerprint Identification System has had on police work in South Africa. Consequently, the problems that were identified in this research compromised not only the quality of seiVices rendered by the police, but also the safety and security within communities. The findings in this research showed that the utilisation of biometric technologies such as the Automated Fingerprint Identification System have helped the police to accurately identify and arrest criminal suspects. However, some of the conclusions reached suggested that the quantitative aspect of the utilisation of biometric systems and the elated portable apparatuses within the South African Police Service was emphasised more than the qualitative aspect thereof. The emphasis was evident in the statistics regarding the use of the Automated Fingerprint Identification System, which focused primarily on police productivity and to a lesser degree on accountability related issues. This study espoused a qualitative paradigm and the investigations in the research were focused on the East Rand policing precinct. The participants who informed this research were selected from the research population using random and purposive sampling techniques. In the same way, the data that informed this research was collected using semi-structured interviews and an in-depth review of the literature on policing and its utilisation of the different technologies. The research espoused social constructivism and phenomenology as the philosophical worldviews of choice to form constructivist phenomenology and to attain theoretical triangulation. Moreover, evaluation research and a case study were espoused as the research designs of choice, to attain methodological triangulation. The various triangulation techniques espoused in this research project were critical in attaining quality assurance in terms of the research methodology applied. In the same way, a myriad of qualitative techniques such as dependability, transferability, confimability and credibility were also employed in order to ensure that the integrity of the data that was collected in this study remained intact. Finally, the data that was collected to inform this research was analysed using the qualitative content analysis technique. Similarly, the measures taken to ensure that the safety of the research participants was delineated in this same research report. / Police Practice / M. Tech. (Police Science)
19

The use of Automated Fingerprint Identification System in identifying fraudulent voters’ registration in Lesotho

Chigando, Lesole John January 2018 (has links)
The research was prompted by constant criticism of the Independent Electoral Commission (IEC) because of its poor voter registration and voters’ roll. Free and fair elections are the strong arm of democracy. The identified research problem was investigated by means of qualitative research. A thorough literature study from various sources of information, a case file analysis and structured interviews were used to gather the required data. The interviews were conducted with fingerprint experts, a data processor and constituency electoral assistants from the Lesotho Mounted Police Service, the National Identity and Civil Registry at the Ministry of Home Affairs and the IEC respectively. It was found that using fingerprints and the Automated Fingerprint Identification System (AFIS) can assist in investigations and in combating voter’s fraud, as fingerprints are unique. AFIS can be utilised for various purposes by institutions in the private and public sectors. Like any apparatus, AFIS has its own strengths and weaknesses. / Criminology and Security Science / M. Tech. (Forensic investigation)

Page generated in 0.1604 seconds