• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 182
  • 84
  • 25
  • 14
  • 10
  • 7
  • 6
  • 5
  • 4
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 375
  • 179
  • 100
  • 73
  • 60
  • 57
  • 48
  • 45
  • 43
  • 43
  • 41
  • 40
  • 39
  • 37
  • 36
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
121

E-invigilation of e-assessments

Ketab, Salam January 2017 (has links)
E-learning and particularly distance-based learning is becoming an increasingly important mechanism for education. A leading Virtual Learning Environment (VLE) reports a user base of 70 million students and 1.2 million teachers across 7.5 million courses. Whilst e-learning has introduced flexibility and remote/distance-based learning, there are still aspects of course delivery that rely upon traditional approaches. The most significant of these is examinations. The lack of being able to provide invigilation in a remote-mode has restricted the types of assessments, with exams or in-class test assessments proving difficult to validate. Students are still required to attend physical testing centres in order to ensure strict examination conditions are applied. Whilst research has begun to propose solutions in this respect, they fundamentally fail to provide the integrity required. This thesis seeks to research and develop an e-invigilator that will provide continuous and transparent invigilation of the individual undertaking an electronic based exam or test. The analysis of the e-invigilation solutions has shown that the suggested approaches to minimise cheating behaviours during the online test have varied. They have suffered from a wide range of weaknesses and lacked an implementation achieving continuous and transparent authentication with appropriate security restrictions. To this end, the most transparent biometric approaches are identified to be incorporated in an appropriate solution whilst maintaining security beyond the point-of-entry. Given the existing issues of intrusiveness and point-of-entry user authentication, a complete architecture has been developed based upon maintaining student convenience but providing effective identity verification throughout the test, rather than merely at the beginning. It also provides continuous system-level monitoring to prevent cheating, as well as a variety of management-level functionalities for creating and managing assessments including a prioritised and usable interface in order to enable the academics to quickly verify and check cases of possible cheating. The research includes a detailed discussion of the architecture requirements, components, and complete design to be the core of the system which captures, processes, and monitors students in a completely controlled e-test environment. In order to highlight the ease of use and lightweight nature of the system, a prototype was developed. Employing student face recognition as the most transparent multimodal (2D and 3D modes) biometrics, and novel security features through eye tracking, head movements, speech recognition, and multiple faces detection in order to enable a robust and flexible e-invigilation approach. Therefore, an experiment (Experiment 1) has been conducted utilising the developed prototype involving 51 participants. In this experiment, the focus has been mainly upon the usability of the system under normal use. The FRR of those 51 legitimate participants was 0 for every participant in the 2D mode; however, it was 0 for 45 of them and less than 0.096 for the rest 6 in the 3D mode. Consequently, for all the 51 participants of this experiment, on average, the FRR was 0 in 2D facial recognition mode, however, in 3D facial recognition mode, it was 0.048. Furthermore, in order to evaluate the robustness of the approach against targeted misuse 3 participants were tasked with a series of scenarios that map to typical misuse (Experiment 2). The FAR was 0.038 in the 2D mode and 0 in the 3D mode. The results of both experiments support the feasibility, security, and applicability of the suggested system. Finally, a series of scenario-based evaluations, involving the three separate stakeholders namely: Experts, Academics (qualitative-based surveys) and Students (a quantitative-based and qualitative-based survey) have also been utilised to provide a comprehensive evaluation into the effectiveness of the proposed approach. The vast majority of the interview/feedback outcomes can be considered as positive, constructive and valuable. The respondents agree with the idea of continuous and transparent authentication in e-assessments as it is vital for ensuring solid and convenient security beyond the point-of-entry. The outcomes have also supported the feasibility and practicality of the approach, as well as the efficiency of the system management via well-designed and smart interfaces.
122

Federated authentication using the Cloud (Cloud Aura)

Al Abdulwahid, Abdulwahid Abdullah January 2017 (has links)
Individuals, businesses and governments undertake an ever-growing range of activities online and via various Internet-enabled digital devices. Unfortunately, these activities, services, information and devices are the targets of cybercrimes. Verifying the user legitimacy to use/access a digital device or service has become of the utmost importance. Authentication is the frontline countermeasure of ensuring only the authorised user is granted access; however, it has historically suffered from a range of issues related to the security and usability of the approaches. Traditionally deployed in a point-of-entry mode (although a number of implementations also provide for re-authentication), the intrusive nature of the control is a significant inhibitor. Thus, it is apparent that a more innovative, convenient and secure user authentication solution is vital. This thesis reviews the authentication methods along with the current use of authentication technologies, aiming at developing a current state-of-the-art and identifying the open problems to be tackled and available solutions to be adopted. It also investigates whether these authentication technologies have the capability to fill the gap between the need for high security whilst maximising user satisfaction. This is followed by a comprehensive literature survey and critical analysis of the existing research domain on continuous and transparent multibiometric authentication. It is evident that most of the undertaken studies and proposed solutions thus far endure one or more shortcomings; for instance, an inability to balance the trade-off between security and usability, confinement to specific devices, lack or negligence of evaluating users’ acceptance and privacy measures, and insufficiency or absence of real tested datasets. It concludes that providing users with adequate protection and convenience requires innovative robust authentication mechanisms to be utilised in a universal manner. Accordingly, it is paramount to have a high level of performance, scalability, and interoperability amongst existing and future systems, services and devices. A survey of 302 digital device users was undertaken and reveals that despite the widespread interest in more security, there is a quite low number of respondents using or maintaining the available security measures. However, it is apparent that users do not avoid applying the concept of authentication security but avoid the inconvenience of its current common techniques (biometrics are having growing practical interest). The respondents’ perceptions towards Trusted Third-Party (TTP) enable utilising biometrics for a novel authentication solution managed by a TTP working on multiple devices to access multiple services. However, it must be developed and implemented considerately. A series of experimental feasibility analysis studies disclose that even though prior Transparent Authentication Systems (TAS) models performed relatively well in practice on real live user data, an enhanced model utilising multibiometric fusion outweighs them in terms of the security and transparency of the system within a device. It is also empirically established that a centralised federated authentication approach using the Cloud would help towards constructing a better user profile encompassing multibiometrics and soft biometric information from their multiple devices and thus improving the security and convenience of the technique beyond those of unimodal, the Non-Intrusive and Continuous Authentication (NICA), and the Weighted Majority Voting Fusion (WMVF) and what a single device can do by itself. Furthermore, it reduces the intrusive authentication requests by 62%-74% (of the total assumed intrusive requests without operating this model) in the worst cases. As such, the thesis proposes a novel authentication architecture, which is capable of operating in a transparent, continuous and convenient manner whilst functioning across a range of digital devices – bearing in mind it is desirable to work on differing hardware configurations, operating systems, processing capabilities and network connectivity but they are yet to be validated. The approach, entitled Cloud Aura, can achieve high levels of transparency thereby being less dependent on secret-knowledge or any other intrusive login and leveraging the available devices capabilities without requiring any external sensors. Cloud Aura incorporates a variety of biometrics from different types, i.e. physiological, behavioural, and soft biometrics and deploys an on-going identity confidence level based upon them, which is subsequently reflected on the user privileges and mapped to the risk level associated to them, resulting in relevant reaction(s). While in use, it functions with minimal processing overhead thereby reducing the time required for the authentication decision. Ultimately, a functional proof of concept prototype is developed showing that Cloud Aura is feasible and would have the provisions of effective security and user convenience.
123

Caracterização agrotecnológica de cultivares de cana-de-açúcar (Saccharum spp.) na região centro-norte do estado de São Paulo

Tasso Júnior, Luiz Carlos [UNESP] 15 February 2007 (has links) (PDF)
Made available in DSpace on 2014-06-11T19:33:39Z (GMT). No. of bitstreams: 0 Previous issue date: 2007-02-15Bitstream added on 2014-06-13T19:23:53Z : No. of bitstreams: 1 tassojunior_lc_dr_jabo.pdf: 855487 bytes, checksum: 9e7200b0d5704045092d5f7bb8f4cec1 (MD5) / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES) / Estudos de comparação entre cultivares de cana-de-açúcar são importantes especialmente em novas regiões produtoras. O presente trabalho foi conduzido em duas propriedades agrícolas da região centro norte do Estado de São Paulo. Foram cultivadas 20 variedades de cana-de-açúcar. O delineamento experimental foi em blocos ao acaso com 20 tratamentos e 4 repetições. As variedades estudadas foram: IAC91-2195, SP89-1115, RB855453, RB855156, RB835486 (precoces); SP87-365, SP81-3250, SP80-1842, SP80-1816, SP79-1011, RB92-8064, IAC91-5155, IAC87-3396, SP90-3414, SP90-1638 (médias), IACSP93-6006, IAC91- 3186, SP83-2847, RB867515 e RB72454 (tardias). Foram avaliadas variáveis fenotípicas, biométricas, produtividade, tecnológicas além do acúmulo de macro e micronutrientes em colmo e palhada. Concluiu-se que as variedades que apresentaram as melhores performances foram: RB855453, RB835456, RB928064, RB867515 e a IAC91-3186. O acúmulo de nutrientes (colmos, folhas verdes e ponteiros), foi influenciado pelas variedades e pelas condições edafoclimáticas. / Studies about sugarcane cultivars comparison are very important in news sugarcane regions producers. This research was conducted out with the objective to study 20 sugarcane cultivars cropped in two agricultural areas at São Paulo State center-north region. The experimental design was a randomized blocks with 20 treatments and 4 replications. The following cultivars were studied: IAC91-2195, SP89- 1115, RB855453, RB855156, RB835486 (early maturation period); SP87-365, SP81- 3250, SP80-1842, SP80-1816, SP79-1011, RB92-8064, IAC91-5155, IAC87-3396, SP90-3414, SP90-1638 (middle maturation period), IACSP93-6006, IAC91-3186, SP83- 2847, RB867515 e RB72454 (late maturation period). It was concluded that the best behaviors were shown by RB855453, RB835456, RB928064, RB867515 and IAC91- 3186. Stalk, green leaf, dry leaf, heart nutrients accumulation and nutrients exportation changed according the sugarcane cultivars, edaphology and climatologic conditions.
124

Parole de locuteur : performance et confiance en identification biométrique vocale / Speaker in speech : performance and confidence in voice biometric identification

Kahn, Juliette 19 December 2011 (has links)
Ce travail de thèse explore l’usage biométrique de la parole dont les applications sont très nombreuses (sécurité, environnements intelligents, criminalistique, surveillance du territoire ou authentification de transactions électroniques). La parole est soumise à de nombreuses contraintes fonction des origines du locuteur (géographique, sociale et culturelle) mais également fonction de ses objectifs performatifs. Le locuteur peut être considéré comme un facteur de variation de la parole, parmi d’autres. Dans ce travail, nous présentons des éléments de réponses aux deux questions suivantes :– Tous les extraits de parole d’un même locuteur sont-ils équivalents pour le reconnaître ?– Comment se structurent les différentes sources de variation qui véhiculent directement ou indirectement la spécificité du locuteur ? Nous construisons, dans un premier temps, un protocole pour évaluer la capacité humaine à discriminer un locuteur à partir d’un extrait de parole en utilisant les données de la campagne NIST-HASR 2010. La tâche ainsi posée est difficile pour nos auditeurs, qu’ils soient naïfs ou plus expérimentés.Dans ce cadre, nous montrons que ni la (quasi)unanimité des auditeurs ni l’auto-évaluation de leurs jugements ne sont des gages de confiance dans la véracité de la réponse soumise.Nous quantifions, dans un second temps, l’influence du choix d’un extrait de parole sur la performance des systèmes automatiques. Nous avons utilisé deux bases de données, NIST et BREF ainsi que deux systèmes de RAL, ALIZE/SpkDet (LIA) et Idento (SRI). Les systèmes de RAL, aussi bienfondés sur une approche UBM-GMM que sur une approche i-vector montrent des écarts de performances importants mesurés à l’aide d’un taux de variation autour de l’EER moyen, Vr (pour NIST, VrIdento = 1.41 et VrALIZE/SpkDet = 1.47 et pour BREF, Vr = 3.11) selon le choix du fichier d’apprentissage utilisé pour chaque locuteur. Ces variations de performance, très importantes, montrent la sensibilité des systèmes automatiques au choix des extraits de parole, sensibilité qu’il est important de mesurer et de réduire pour rendre les systèmes de RAL plus fiables.Afin d’expliquer l’importance du choix des extraits de parole, nous cherchons les indices les plus pertinents pour distinguer les locuteurs de nos corpus en mesurant l’effet du facteur Locuteur sur la variance des indices (h2). La F0 est fortement dépendante du facteur Locuteur, et ce indépendamment de la voyelle. Certains phonèmes sont plus discriminants pour le locuteur : les consonnes nasales, les fricatives, les voyelles nasales, voyelles orales mi-fermées à ouvertes.Ce travail constitue un premier pas vers une étude plus précise de ce qu’est le locuteur aussi bien pour la perception humaine que pour les systèmes automatiques. Si nous avons montré qu’il existait bien une différence cepstrale qui conduisait à des modèles plus ou moins performants, il reste encore à comprendre comment lier le locuteur à la production de la parole. Enfin, suite à ces travaux, nous souhaitons explorer plus en détail l’influence de la langue sur la reconnaissance du locuteur. En effet, même si nos résultats indiquent qu’en anglais américain et en français, les mêmes catégories de phonèmes sont les plus porteuses d’information sur le locuteur, il reste à confirmer ce point et à évaluer ce qu’il en est pour d’autres langues / This thesis explores the use of biometric speech. Speech is subjected to many constraints based on origins of the speaker (geographical , social and cultural ), but also according to his performative goals. The speaker may be regarded as a factor of variation in the speech , among others. In this work, we present some answers to the following two questions:- Are all speech samples equivalent to recognize a speaker?- How are structured the different acoustic cues carrying information about the speaker ?In a first step, a protocol to assess the human ability to discriminate a speaker from a speech sample using NIST-HASR 2010 data is presented. This task is difficult for our listeners who are naive or experienced. In this context, neither the (quasi) unanimity or the self-assessment do not assure the confidence in the veracity of the submitted answer .In a second step, the influence of the choice of a sample speech on the performance of automatic systems is quantified using two databases, NIST and BREF and two systems RAL , Alize / SpkDet (LIA, UBM-GMM system) and Idento (SRI, i-vector system).The two RAL systems show significant differences in performance measured using a measure of relative variation around the average EER, Vr (for NIST Idento Vr = 1.41 and Vr Alize / SpkDet = 1.47 and BREF, Vr = 3.11) depending on the choice of the training file used for each speaker. These very large variations in performance show the sensitivity of automatic systems to the speech sample. This sensitivity must be measured to make the systems more reliable .To explain the importance of the choice of the speech sample and find the relevant cues, the effect of the speaker on the variance of various acoustics features is measured (η 2) . F0 is strongly dependent of the speaker, independently of the vowel. Some phonemes are more discriminative : nasal consonants, fricatives , nasal vowels, oral half closed to open vowels .This work is a first step towards to understand where is the speaker in speech using as well the human perception as automatic systems . If we have shown that there was a cepstral difference between the more and less efficient models, it remains to understand how to bind the speaker to the speech production. Finally, following this work, we wish to explore more in detail the influence of language on speaker recognition. Even if our results indicate that for American English and French , the same categories of phonemes are the carriers of information about the speaker , it remains to confirm this on other languages ​​.
125

Enhanced usability, resilience, and accuracy in mobile keystroke dynamic biometric authentication

Alshanketi, Faisal 27 September 2018 (has links)
With the progress achieved to this date in mobile computing technologies, mobile devices are increasingly being used to store sensitive data and perform security-critical transactions and services. However, the protection available on these devices is still lagging behind. The primary and often only protection mechanism in these devices is authentication using a password or a PIN. Passwords are notoriously known to be a weak authentication mechanism, no matter how complex the underlying format is. Mobile authentication can be strengthened by extracting and analyzing keystroke dynamic biometric from supplied passwords. In this thesis, I identified gaps in the literature, and investigated new models and mechanisms to improve accuracy, usability and resilience against statistical forgeries for mobile keystroke dynamic biometric authentication. Accuracy is investigated through cost sensitive learning and sampling, and by comparing the strength of different classifiers. Usability is improved by introducing a new approach for typo handling in the authentication model. Resilience against statistical attacks is achieved by introducing a new multimodal approach combining fixed and variable keystroke dynamic biometric passwords, in which two different fusion models are studied. Experimental evaluation using several datasets, some publicly available and others collected locally, yielded encouraging performance results in terms of accuracy, usability, and resistance against statistical attacks. / Graduate / 2019-09-25
126

Caracterização agrotecnológica de cultivares de cana-de-açúcar (Saccharum spp.) na região centro-norte do estado de São Paulo /

Tasso Júnior, Luiz Carlos. January 2007 (has links)
Orientador: Marcos Omir Marques / Banca: Carlos Alberto Mathias Azania / Banca: Marcos Guimarães de Andrade Landell / Banca: Miguel Angelo Mutton / Banca: Ailto Antonio Casagrande / Resumo: Estudos de comparação entre cultivares de cana-de-açúcar são importantes especialmente em novas regiões produtoras. O presente trabalho foi conduzido em duas propriedades agrícolas da região centro norte do Estado de São Paulo. Foram cultivadas 20 variedades de cana-de-açúcar. O delineamento experimental foi em blocos ao acaso com 20 tratamentos e 4 repetições. As variedades estudadas foram: IAC91-2195, SP89-1115, RB855453, RB855156, RB835486 (precoces); SP87-365, SP81-3250, SP80-1842, SP80-1816, SP79-1011, RB92-8064, IAC91-5155, IAC87-3396, SP90-3414, SP90-1638 (médias), IACSP93-6006, IAC91- 3186, SP83-2847, RB867515 e RB72454 (tardias). Foram avaliadas variáveis fenotípicas, biométricas, produtividade, tecnológicas além do acúmulo de macro e micronutrientes em colmo e palhada. Concluiu-se que as variedades que apresentaram as melhores performances foram: RB855453, RB835456, RB928064, RB867515 e a IAC91-3186. O acúmulo de nutrientes (colmos, folhas verdes e ponteiros), foi influenciado pelas variedades e pelas condições edafoclimáticas. / Abstract: Studies about sugarcane cultivars comparison are very important in news sugarcane regions producers. This research was conducted out with the objective to study 20 sugarcane cultivars cropped in two agricultural areas at São Paulo State center-north region. The experimental design was a randomized blocks with 20 treatments and 4 replications. The following cultivars were studied: IAC91-2195, SP89- 1115, RB855453, RB855156, RB835486 (early maturation period); SP87-365, SP81- 3250, SP80-1842, SP80-1816, SP79-1011, RB92-8064, IAC91-5155, IAC87-3396, SP90-3414, SP90-1638 (middle maturation period), IACSP93-6006, IAC91-3186, SP83- 2847, RB867515 e RB72454 (late maturation period). It was concluded that the best behaviors were shown by RB855453, RB835456, RB928064, RB867515 and IAC91- 3186. Stalk, green leaf, dry leaf, heart nutrients accumulation and nutrients exportation changed according the sugarcane cultivars, edaphology and climatologic conditions. / Doutor
127

Parametrização do modelo CANEGRO (DSSAT) e caracterização biométrica de oito variedades de cana-de-açúcar irrigadas por gotejamento / Parameterization of CANEGRO (DSSAT) model and biometric characterization of the eight sugarcane varieties drip irrigated

Daniel Philipe Veloso Leal 29 June 2016 (has links)
O Brasil é um dos países de maior destaque do setor sucroenergético, uma vez que detém a maior produção mundial de cana-de-açúcar e pouco mais de um terço da cana cultivada no mundo. O presente experimento teve como principal finalidade caracterizar detalhadamente oito variedades de cana-de-açúcar, utilizando esta caracterização como suporte para parametrização do modelo CANEGRO/DSSAT que por sua vez é uma importante ferramenta na tomada de decisão dos cultivos de cana-de-açúcar, sendo assim os objetivos neste trabalho foi realizar uma análise agronômica e tecnológica de oito variedades de cana-de-açúcar, mensurar o máximo de parâmetros do modelo CANEGRO/DSSAT; efetuar a parametrização do CANEGRO/DSSAT para oito variedades de cana-de-açúcar; simular o processo de fotossíntese e partição de fotoassimilados, de modo a estabelecer um processo de Benchmarking da produtividade limite das principais variedades de cana-de-açúcar; simular o crescimento e produtividade da cana-de-açúcar no ambiente de produção do Cluster Caçú - GO da Empresa Odebrecht Agroindustrial, Caçu - GO. O experimento base foi conduzido em casa de vegetação, pertencente à área experimental do Departamento de Engenharia de Biossistemas (LEB) da Escola Superior de Agricultura \'Luiz de Queiroz\' (ESALQ/USP) localizada em Piracicaba - SP. O experimento foi delineado com três fontes de variação (FV), sendo: quatro épocas de amostragem, quatro lâminas de irrigação e oito variedades de cana-deaçúcar. As amostragens (épocas) foram realizadas trimestralmente, sendo a primeira, aproximadamente 100 dias após o corte da cana planta. As lâminas avaliadas (L50, L75, L100 e L75*) constituíram na reposição de frações da ETc tomando como referência o tratamento L100, em que se manteve a umidade do solo próximo capacidade de campo (θcc) em todo o experimento. As parametrizações foram realizadas baseadas nos dados coletados nas parcelas submetidas à lâmina L100. A etapa de simulações foi realizada para unidade Agroindustrial Rio Claro localizada em Caçu/GO pertencente a Empresa Odebrecht Agroindustrial. A produtividade de massa fresca de colmo é influenciada pela lâmina de irrigação já na segunda época de amostragem (~205 DAC), neste ponto há redução de 35% entre L100 e L50. Os parâmetros medidos apresentaram grande diferença em relação aos valores padrão do CANEGRO/DSSAT, principalmente CHUPIBASE e TT_POPGROWTH. As variedades que obtiveram menores produtividades observadas em campo foram as que apresentaram os melhores índices estáticos relacionados quando simulado a produtividade de massa fresca. Nas simulações realizadas para Caçu-GO, a maior produtividade (173,9 t ha-1) foi alcançada pela variedade V2 no solo 1 em cultivo irrigado e a menor produtividade de massa fresca (68,4 t ha-1) ocorreu na variedade V7 no plantio de setembro em cultivo sequeiro no solo 3. / Brazil is one of the countries with major sugarcane industry, as it holds the world\'s largest production of sugarcane and just over a third of the sugarcane area grown in the world. This experiment aimed to characterize in detail eight sugarcane varieties, as support for parameterization of CANEGRO model / DSSAT which in turn is an important tool in the decision making process of sugarcane crops , therefore the objectives of this study were to measure the maximum parameters of CANEGRO / DSSAT model; parameterize CANEGRO / DSSAT for eight varieties of sugarcane; simulating the process of photosynthesis and assimilate partitioning in order to establish a benchmarking process productivity limits of the main varieties of sugarcane; simulate the growth and productivity of sugarcane in the Cluster production environment Caçu - GO Agroindustrial Company Odebrecht, Caçu - GO. The basic experiment was conducted at the experimental area of the Department of Biosystems Engineering (LEB) of the Escola Superior de Agricultura \"Luiz de Queiroz\" (ESALQ / USP) located in Piracicaba - SP. The experiment was designed with three sources of variation (PV), as follows: four sampling times, four irrigation levels and eight varieties of sugarcane. Sampling (times) were held quarterly, with the first, approximately 100 days after cutting the plant cane. The evaluated blades (L50, L75, L100 and L75*) were the replacement fractions of ETc with reference to the treatment L100, which kept the soil moisture near field capacity (θcc) throughout the experiment. The parameterization was carried out based on data collected at the 100 % irrigation depth (L100). The simulations were performed to Agroindustrial Rio Claro unit in Caçu / GO (Odebrecht Agroindustrial). The productivity of fresh culms was influenced by water depth in the second time of sampling (~ 205 DAC), at this point there is a reduction of 35% between L100 and L50. The measured parameters showed big difference compared to standard values CANEGRO / DSSAT mainly CHUPIBASE and TT_POPGROWTH. The varieties with smaller yields observed in the field were the ones with the best static indexes related when simulated fresh culm productivity. In simulations performed to Caçu GO, the highest yield (173.9 t ha-1) was accomplished by the V2 array 1 in the soil irrigated and the lowest fresh culm weight yield (68.4 t ha-1) was in the range V7 in September planting in rainfed cultivation in soil 3.
128

Authentication using finger-vein recognition

Vallabh, Hemant 01 May 2013 (has links)
M.Sc. (Information Technology) / Biometrics is a unique method used to identify humans by distinct biological characterises. In recent years biometrics are showing up everywhere from homes, workplaces, schools and banks. This identification method is rapidly replacing existing methods such as passwords since it offers a higher level of security compared to existing methods. Fingerprints are the most common biometric choice. However fingerprint biometrics is showing limitations. Since fingerprints are an external trait, it can be exposed to many situations (cuts, dirt, wear and tear, and skin conditions) that may impact the biometric captured. These factors can cause security and usability issues. There have been a number of successful attempts such as alteration of fingerprints and gummy fingers which are used to bypass fingerprint readers. An emerging biometric called finger-vein recognition was invented to overcome the issues that fingerprint biometrics have. Finger-vein recognition which is based on the vascular patterns that exist inside the finger, claim to have superior usability characteristics where less false acceptance or rejections occur. Since the finger-vein recognition is based on an internal trait it is assumed that external factors such as scars or even dirt will not affect the biometric collected. This dissertation aims to investigate the limitations of fingerprints and to determine whether finger-vein recognition can address these limitations. During the course of the dissertation applicable fields such as construction and mining will be identified for finger-vein recognition where fingerprint recognition has shown weakness. Together, fingerprint and finger-vein technologies will be used in a mining industry to perform minor experiments. The results of these experiments will be used to determine if finger-vein addresses the fundamental limitations of fingerprint biometrics in these industries. The main purposes of the dissertation will be to investigate finger-vein technology, the applicable fields and whether finger-vein recognition can solve the problems fingerprint recognition imposes in certain industries.
129

Template protecting algorithms for face recognition system

Feng, Yicheng 01 January 2007 (has links)
No description available.
130

Combining multiple Iris matchers using advanced fusion techniques to enhance Iris matching performance

Nelufule, Nthatheni Norman 17 September 2014 (has links)
M.Phil. (Electrical And Electronic Engineering) / The enormous increase in technology advancement and the need to secure information e ectively has led to the development and implementation of iris image acquisition technologies for automated iris recognition systems. The iris biometric is gaining popularity and is becoming a reliable and a robust modality for future biometric security. Its wide application can be extended to biometric security areas such as national ID cards, banking systems such as ATM, e-commerce, biometric passports but not applicable in forensic investigations. Iris recognition has gained valuable attention in biometric research due to the uniqueness of its textures and its high recognition rates when employed on high biometric security areas. Identity veri cation for individuals becomes a challenging task when it has to be automated with a high accuracy and robustness against spoo ng attacks and repudiation. Current recognition systems are highly a ected by noise as a result of segmentation failure, and this noise factors increase the biometric error rates such as; the FAR and the FRR. This dissertation reports an investigation of score level fusion methods which can be used to enhance iris matching performance. The fusion methods implemented in this project includes, simple sum rule, weighted sum rule fusion, minimum score and an adaptive weighted sum rule. The proposed approach uses an adaptive fusion which maps feature quality scores with the matcher. The fused scores were generated from four various iris matchers namely; the NHD matcher, the WED matcher, the WHD matcher and the POC matcher. To ensure homogeneity of matching scores before fusion, raw scores were normalized using the tanh-estimators method, because it is e cient and robust against outliers. The results were tested against two publicly available databases; namely, CASIA and UBIRIS using two statistical and biometric system measurements namely the AUC and the EER. The results of these two measures gives the AUC = 99:36% for CASIA left images, the AUC = 99:18% for CASIA right images, the AUC = 99:59% for UBIRIS database and the Equal Error Rate (EER) of 0.041 for CASIA left images, the EER = 0:087 for CASIA right images and with the EER = 0:038 for UBIRIS images.

Page generated in 0.0828 seconds