• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 360
  • 30
  • 26
  • 13
  • 12
  • 12
  • 12
  • 12
  • 12
  • 12
  • 10
  • 5
  • 2
  • 1
  • 1
  • Tagged with
  • 525
  • 525
  • 511
  • 236
  • 194
  • 140
  • 114
  • 88
  • 76
  • 65
  • 62
  • 59
  • 57
  • 56
  • 49
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
261

A tree grammar-based visual password scheme

Okundaye, Benjamin January 2016 (has links)
A thesis submitted to the Faculty of Science, University of the Witwatersrand, Johannesburg, in fulfilment of the requirements for the degree of Doctor of Philosophy. Johannesburg, August 31, 2015. / Visual password schemes can be considered as an alternative to alphanumeric passwords. Studies have shown that alphanumeric passwords can, amongst others, be eavesdropped, shoulder surfed, or guessed, and are susceptible to brute force automated attacks. Visual password schemes use images, in place of alphanumeric characters, for authentication. For example, users of visual password schemes either select images (Cognometric) or points on an image (Locimetric) or attempt to redraw their password image (Drawmetric), in order to gain authentication. Visual passwords are limited by the so-called password space, i.e., by the size of the alphabet from which users can draw to create a password and by susceptibility to stealing of passimages by someone looking over your shoulders, referred to as shoulder surfing in the literature. The use of automatically generated highly similar abstract images defeats shoulder surfing and means that an almost unlimited pool of images is available for use in a visual password scheme, thus also overcoming the issue of limited potential password space. This research investigated visual password schemes. In particular, this study looked at the possibility of using tree picture grammars to generate abstract graphics for use in a visual password scheme. In this work, we also took a look at how humans determine similarity of abstract computer generated images, referred to as perceptual similarity in the literature. We drew on the psychological idea of similarity and matched that as closely as possible with a mathematical measure of image similarity, using Content Based Image Retrieval (CBIR) and tree edit distance measures. To this end, an online similarity survey was conducted with respondents ordering answer images in order of similarity to question images, involving 661 respondents and 50 images. The survey images were also compared with eight, state of the art, computer based similarity measures to determine how closely they model perceptual similarity. Since all the images were generated with tree grammars, the most popular measure of tree similarity, the tree edit distance, was also used to compare the images. Eight different types of tree edit distance measures were used in order to cover the broad range of tree edit distance and tree edit distance approximation methods. All the computer based similarity methods were then correlated with the online similarity survey results, to determine which ones more closely model perceptual similarity. The results were then analysed in the light of some modern psychological theories of perceptual similarity. This work represents a novel approach to the Passfaces type of visual password schemes using dynamically generated pass-images and their highly similar distractors, instead of static pictures stored in an online database. The results of the online survey were then accurately modelled using the most suitable tree edit distance measure, in order to automate the determination of similarity of our generated distractor images. The information gathered from our various experiments was then used in the design of a prototype visual password scheme. The generated images were similar, but not identical, in order to defeat shoulder surfing. This approach overcomes the following problems with this category of visual password schemes: shoulder surfing, bias in image selection, selection of easy to guess pictures and infrastructural limitations like large picture databases, network speed and database security issues. The resulting prototype developed is highly secure, resilient to shoulder surfing and easy for humans to use, and overcomes the aforementioned limitations in this category of visual password schemes.
262

Contextual Modulation of Competitive Object Candidates in Early Object Recognition

Unknown Date (has links)
Object recognition is imperfect; often incomplete processing or deprived information yield misperceptions (i.e., misidentification) of objects. While quickly rectified and typically benign, instances of such errors can produce dangerous consequences (e.g., police shootings). Through a series of experiments, this study examined the competitive process of multiple object interpretations (candidates) during the earlier stages of object recognition process using a lexical decision task paradigm. Participants encountered low-pass filtered objects that were previously demonstrated to evoke multiple responses: a highly frequented interpretation (“primary candidates”) and a lesser frequented interpretation (“secondary candidates”). When objects were presented without context, no facilitative effects were observed for primary candidates. However, secondary candidates demonstrated evidence for being actively suppressed. / Includes bibliography. / Thesis (M.S.)--Florida Atlantic University, 2017. / FAU Electronic Theses and Dissertations Collection
263

Learning to match faces and voices

Unknown Date (has links)
This study examines whether forming a single identity is crucial to learning to bind faces and voices, or if people are equally able to do so without tying this information to an identity. To test this, individuals learned paired faces and voices that were in one of three different conditions: True voice, Gender Matched, or Gender Mismatched conditions. Performance was measured in a training phase as well as a test phase, and results show that participants were able to learn more quickly and have higher overall performance for learning in the True Voice and Gender Matched conditions. During the test phase, performance was almost at chance in the Gender Mismatched condition which may mean that learning in the training phase was simply memorization of the pairings for this condition. Results support the hypothesis that learning to bind faces and voices is a process that involves forming a supramodal identity from multisensory learning. / by Meredith Davidson. / Thesis (M.A.)--Florida Atlantic University, 2010. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2010. Mode of access: World Wide Web.
264

Automated biometrics of audio-visual multiple modals

Unknown Date (has links)
Biometrics is the science and technology of measuring and analyzing biological data for authentication purposes. Its progress has brought in a large number of civilian and government applications. The candidate modalities used in biometrics include retinas, fingerprints, signatures, audio, faces, etc. There are two types of biometric system: single modal systems and multiple modal systems. Single modal systems perform person recognition based on a single biometric modality and are affected by problems like noisy sensor data, intra-class variations, distinctiveness and non-universality. Applying multiple modal systems that consolidate evidence from multiple biometric modalities can alleviate those problems of single modal ones. Integration of evidence obtained from multiple cues, also known as fusion, is a critical part in multiple modal systems, and it may be consolidated at several levels like feature fusion level, matching score fusion level and decision fusion level. Among biometric modalities, both audio and face modalities are easy to use and generally acceptable by users. Furthermore, the increasing availability and the low cost of audio and visual instruments make it feasible to apply such Audio-Visual (AV) systems for security applications. Therefore, this dissertation proposes an algorithm of face recognition. In addition, it has developed some novel algorithms of fusion in different levels for multiple modal biometrics, which have been tested by a virtual database and proved to be more reliable and robust than systems that rely on a single modality. / by Lin Huang. / Thesis (Ph.D.)--Florida Atlantic University, 2010. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2010. Mode of access: World Wide Web.
265

Proud elastic target discrimination using low-frequency sonar signatures

Unknown Date (has links)
This thesis presents a comparative analysis of various low-frequency sonar signature representations and their ability to discriminate between proud targets of varying physical parameters. The signature representations used include: synthetic aperture sonar (SAS) beamformed images, acoustic color plot images, and bispectral images. A relative Mean-Square Error (rMSE) performance metric and an effective Signal-to-Noise Ratio (SNReff) performance metric have been developed and implemented to quantify the target differentiation. The analysis is performed on a subset of the synthetic sonar stave data provided by the Naval Surface Warfare Center - Panama City Division (NSWC-PCD). The subset is limited to aluminum and stainless steel, thin-shell, spherical targets in contact with the seafloor (proud). It is determined that the SAS signature representation provides the best, least ambiguous, target differentiation with a minimum mismatch difference of 14.5802 dB. The acoustic color plot and bispectrum representations resulted in a minimum difference of 9.1139 dB and 1.8829 dB, respectively / by Brenton Mallen. / Thesis (M.S.C.S.)--Florida Atlantic University, 2012. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2012. Mode of access: World Wide Web.
266

Sistema de visão computacional sobre processadores com arquitetura multi núcleos. / System of computational vision over multicore architecture processors.

Hiramatsu, Roberto Kenji 20 May 2008 (has links)
Esta tese apresenta um estudo sobre a implementação de sistema de detecção e reconhecimento de faces no processador CELL na plataforma CBE, utilizando um sistema Playstation 3. Inicialmente, diversas abordagens para reconhecimento e detecção de faces são estudadas, bem como arquiteturas de processador multi núcleos. São apresentadas três implementação, sendo a segunda implementação premiada com quarto colocado no IBM CELL UNIVERSITY CHALLENGE 2007 para desenvolvimento de programas para plataforma Cell BE. A terceira implementação apresenta os resultados interessantes relacionados a vetorização do processamento dos dados da detecção de objetos e os recursos adotados para obter o melhor desempenho. / This thesis presents a study of face detection implementation on CBE plataform and employ the system with Playstation 3 hardware. Several approaches for face detection and recognition are studied as well as multicore processor architetures. We implemented three versions of system. First implementation was a naive reference implementation with worst performance. Second implementation granted fourth prize in IBM CELL UNIVERSITY CHALLENGE 2007 that incentive development on CBE plataform. Third implementation had most interesting results with vectorized approaches on code of object detection.
267

Peripheral Object Recognition in Naturalistic Scenes

Unknown Date (has links)
Most of the human visual field falls in the periphery, and peripheral processing is important for normal visual functioning. Yet, little is known about peripheral object recognition in naturalistic scenes and factors that modulate this ability. We propose that a critical function of scene and object memory is in order to facilitate visual object recognition in the periphery. In the first experiment, participants identified objects in scenes across different levels of familiarity and contextual information within the scene. We found that familiarity with a scene resulted in a significant increase in the distance that objects were recognized. Furthermore, we found that a semantically consistent scene improved the distance that object recognition is possible, supporting the notion that contextual facilitation is possible in the periphery. In the second experiment, the preview duration of a scene was varied in order to examine how a scene representation is built and how memory of that scene and the objects within it contributes to object recognition in the periphery. We found that the closer participants fixated to the object in the preview, the farther on average they recognized that target object in the periphery. However, only a preview duration of the scenes for 5000 ms produced significantly farther peripheral object recognition compared to not previewing the scene. Overall, these experiments introduce a novel research paradigm for object recognition in naturalistic scenes, and demonstrates multiple factors that have systematic effects on peripheral object recognition. / Includes bibliography. / Dissertation (Ph.D.)--Florida Atlantic University, 2016. / FAU Electronic Theses and Dissertations Collection
268

Signature system for video identification

Unknown Date (has links)
Video signature techniques based on tomography images address the problem of video identification. This method relies on temporal segmentation and sampling strategies to build and determine the unique elements that will form the signature. In this thesis an extension for these methods is presented; first a new feature extraction method, derived from the previously proposed sampling pattern, is implemented and tested, resulting in a highly distinctive set of signature elements, second a robust temporal video segmentation system is used to replace the original method applied to determine shot changes more accurately. Under a very exhaustive set of tests the system was able to achieve 99.58% of recall, 100% of precision and 99.35% of prediction precision. / by Sebastian Possos Medellin. / Thesis (M.S.C.S.)--Florida Atlantic University, 2010. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2010. Mode of access: World Wide Web.
269

A novel NN paradigm for the prediction of hematocrit value during blood transfusion

Unknown Date (has links)
During the Leukocytapheresis (LCAP) process used to treat patients suffering from acute Ulcerative Colitis, medical practitioners have to continuously monitor the Hematocrit (Ht) level in the blood to ensure it is within the acceptable range. The work done, as a part of this thesis, attempts to create an early warning system that can be used to predict if and when the Ht values will deviate from the acceptable range. To do this we have developed an algorithm based on the Group Method of Data Handling (GMDH) and compared it to other Neural Network algorithms, in particular the Multi Layer Perceptron (MLP). The standard GMDH algorithm captures the fluctuation very well but there is a time lag that produces larger errors when compared to MLP. To address this drawback we modified the GMDH algorithm to reduce the prediction error and produce more accurate results. / by Jay Thakkar. / Pagination error. "References" should be leaves 63-67, and pagination end with leaf 67. / Thesis (M.S.C.S.)--Florida Atlantic University, 2011. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2011. Mode of access: World Wide Web.
270

Patterns for secure interactions in social networks in Web 2.0

Unknown Date (has links)
A social network is a structure of individuals and organizations, which are connected by one or more types of interdependency, such as friendship, affinity, common interests or knowledge. Social networks use Web 2.0 technology, which is mostly based on a service-oriented architecture. We are studying patterns for social networks in this environment. A pattern is an encapsulated solution to a software problem in a given context, secure threats are possible in this context. We present a collection of patterns associated with the most important aspects of social networks, with emphasis on controlling the actions of the users of these networks. / by Carolina Marina. / Thesis (M.S.C.S.)--Florida Atlantic University, 2012. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2012. Mode of access: World Wide Web.

Page generated in 0.0958 seconds