368 resultados para biometrics


Relevância:

10.00% 10.00%

Publicador:

Resumo:

We report on a revisit in 2009 to sites where vegetation was recorded in 1967 and 1970 on Disko Island, West Greenland. Re-sampling of the same clones of the grass Phleum alpinum after 39 years showed complete stability in biometrics but dramatic earlier onset of various phenological stages that were not related to changes in population density. In a fell-field community, there was a net species loss, but in a herb-slope community, species losses balanced those that were gained. The type of species establishing and increasing in frequency and/or cover abundance at the fell-field site, particularly prostrate dwarf shrubs, indicates a possible start of a shift towards a heath, rather than a fell-field community. At the herb-slope site, those species that established or increased markedly in frequency and/or cover abundance indicate a change to drier conditions. This is confirmed both by the decrease in abundance of Alchemilla glomerulans and Epilobium hornemanii, and the drying of a nearby pond. The causes of these changes are unknown, although mean annual temperature has risen since 1984.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Applying biometrics to daily scenarios involves demanding requirements in terms of software and hardware. On the contrary, current biometric techniques are also being adapted to present-day devices, like mobile phones, laptops and the like, which are far from meeting the previous stated requirements. In fact, achieving a combination of both necessities is one of the most difficult problems at present in biometrics. Therefore, this paper presents a segmentation algorithm able to provide suitable solutions in terms of precision for hand biometric recognition, considering a wide range of backgrounds like carpets, glass, grass, mud, pavement, plastic, tiles or wood. Results highlight that segmentation accuracy is carried out with high rates of precision (F-measure 88%)), presenting competitive time results when compared to state-of-the-art segmentation algorithms time performance

Relevância:

10.00% 10.00%

Publicador:

Resumo:

New trends in biometrics are oriented to mobile devices in order to increase the overall security in daily actions like bank account access, e-commerce or even document protection within the mobile. However, applying biometrics to mobile devices imply challenging aspects in biometric data acquisition, feature extraction or private data storage. Concretely, this paper attempts to deal with the problem of hand segmentation given a picture of the hand in an unknown background, requiring an accurate result in terms of hand isolation. For the sake of user acceptability, no restrictions are done on background, and therefore, hand images can be taken without any constraint, resulting segmentation in an exigent task. Multiscale aggregation strategies are proposed in order to solve this problem due to their accurate results in unconstrained and complicated scenarios, together with their properties in time performance. This method is evaluated with a public synthetic database with 480000 images considering different backgrounds and illumination environments. The results obtained in terms of accuracy and time performance highlight their capability of being a suitable solution for the problem of hand segmentation in contact-less environments, outperforming competitive methods in literature like Lossy Data Compression image segmentation (LDC).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

En esta tesis doctoral se propone una técnica biométrica de verificación en teléfonos móviles consistente en realizar una firma en el aire con la mano que sujeta el teléfono móvil. Los acelerómetros integrados en el dispositivo muestrean las aceleraciones del movimiento de la firma en el aire, generando tres señales temporales que pueden utilizarse para la verificación del usuario. Se proponen varios enfoques para la implementación del sistema de verificación, a partir de los enfoques más utilizados en biometría de firma manuscrita: correspondencia de patrones, con variantes de los algoritmos de Needleman-Wusch (NW) y Dynamic Time Warping (DTW), modelos ocultos de Markov (HMM) y clasificador estadístico basado en Máquinas de Vector Soporte (SVM). Al no existir bases de datos públicas de firmas en el aire y con el fin de evaluar los métodos propuestos en esta tesis doctoral, se han capturado dos con distintas características; una con falsificaciones reales a partir del estudio de las grabaciones de usuarios auténticos y otra con muestras de usuarios obtenidas en diferentes sesiones a lo largo del tiempo. Utilizando estas bases de datos se han evaluado una gran cantidad de algoritmos para implementar un sistema de verificación basado en firma en el aire. Esta evaluación se ha realizado de acuerdo con el estándar ISO/IEC 19795, añadiendo el caso de verificación en mundo abierto no incluido en la norma. Además, se han analizado las características que hacen que una firma sea suficientemente segura. Por otro lado, se ha estudiado la permanencia de las firmas en el aire a lo largo del tiempo, proponiendo distintos métodos de actualización, basados en una adaptación dinámica del patrón, para mejorar su rendimiento. Finalmente, se ha implementado un prototipo de la técnica de firma en el aire para teléfonos Android e iOS. Los resultados de esta tesis doctoral han tenido un gran impacto, generando varias publicaciones en revistas internacionales, congresos y libros. La firma en el aire ha sido nombrada también en varias revistas de divulgación, portales de noticias Web y televisión. Además, se han obtenido varios premios en competiciones de ideas innovadoras y se ha firmado un acuerdo de explotación de la tecnología con una empresa extranjera. ABSTRACT This thesis proposes a biometric verification technique on mobile phones consisting on making a signature in the air with the hand holding a mobile phone. The accelerometers integrated in the device capture the movement accelerations, generating three temporal signals that can be used for verification. This thesis suggests several approaches for implementing the verification system, based on the most widely used approaches in handwritten signature biometrics: template matching, with a lot of variations of the Needleman- Wusch (NW) and Dynamic Time Warping (DTW) algorithms, Hidden Markov Models (HMM) and Supported Vector Machines (SVM). As there are no public databases of in-air signatures and with the aim of assessing the proposed methods, there have been captured two databases; one. with real falsification attempts from the study of recordings captured when genuine users made their signatures in front of a camera, and other, with samples obtained in different sessions over a long period of time. These databases have been used to evaluate a lot of algorithms in order to implement a verification system based on in-air signatures. This evaluation has been conducted according to the standard ISO/IEC 19795, adding the open-set verification scenario not included in the norm. In addition, the characteristics of a secure signature are also investigated, as well as the permanence of in-air signatures over time, proposing several updating strategies to improve its performance. Finally, a prototype of in-air signature has been developed for iOS and Android phones. The results of this thesis have achieved a high impact, publishing several articles in SCI journals, conferences and books. The in-air signature deployed in this thesis has been also referred in numerous media. Additionally, this technique has won several awards in the entrepreneurship field and also an exploitation agreement has been signed with a foreign company.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

El extraordinario auge de las nuevas tecnologías de la información, el desarrollo de la Internet de las Cosas, el comercio electrónico, las redes sociales, la telefonía móvil y la computación y almacenamiento en la nube, han proporcionado grandes beneficios en todos los ámbitos de la sociedad. Junto a éstos, se presentan nuevos retos para la protección y privacidad de la información y su contenido, como la suplantación de personalidad y la pérdida de la confidencialidad e integridad de los documentos o las comunicaciones electrónicas. Este hecho puede verse agravado por la falta de una frontera clara que delimite el mundo personal del mundo laboral en cuanto al acceso de la información. En todos estos campos de la actividad personal y laboral, la Criptografía ha jugado un papel fundamental aportando las herramientas necesarias para garantizar la confidencialidad, integridad y disponibilidad tanto de la privacidad de los datos personales como de la información. Por otro lado, la Biometría ha propuesto y ofrecido diferentes técnicas con el fin de garantizar la autentificación de individuos a través del uso de determinadas características personales como las huellas dáctilares, el iris, la geometría de la mano, la voz, la forma de caminar, etc. Cada una de estas dos ciencias, Criptografía y Biometría, aportan soluciones a campos específicos de la protección de datos y autentificación de usuarios, que se verían enormemente potenciados si determinadas características de ambas ciencias se unieran con vistas a objetivos comunes. Por ello es imperativo intensificar la investigación en estos ámbitos combinando los algoritmos y primitivas matemáticas de la Criptografía con la Biometría para dar respuesta a la demanda creciente de nuevas soluciones más técnicas, seguras y fáciles de usar que potencien de modo simultáneo la protección de datos y la identificacíón de usuarios. En esta combinación el concepto de biometría cancelable ha supuesto una piedra angular en el proceso de autentificación e identificación de usuarios al proporcionar propiedades de revocación y cancelación a los ragos biométricos. La contribución de esta tesis se basa en el principal aspecto de la Biometría, es decir, la autentificación segura y eficiente de usuarios a través de sus rasgos biométricos, utilizando tres aproximaciones distintas: 1. Diseño de un esquema criptobiométrico borroso que implemente los principios de la biometría cancelable para identificar usuarios lidiando con los problemas acaecidos de la variabilidad intra e inter-usuarios. 2. Diseño de una nueva función hash que preserva la similitud (SPHF por sus siglas en inglés). Actualmente estas funciones se usan en el campo del análisis forense digital con el objetivo de buscar similitudes en el contenido de archivos distintos pero similares de modo que se pueda precisar hasta qué punto estos archivos pudieran ser considerados iguales. La función definida en este trabajo de investigación, además de mejorar los resultados de las principales funciones desarrolladas hasta el momento, intenta extender su uso a la comparación entre patrones de iris. 3. Desarrollando un nuevo mecanismo de comparación de patrones de iris que considera tales patrones como si fueran señales para compararlos posteriormente utilizando la transformada de Walsh-Hadarmard. Los resultados obtenidos son excelentes teniendo en cuenta los requerimientos de seguridad y privacidad mencionados anteriormente. Cada uno de los tres esquemas diseñados han sido implementados para poder realizar experimentos y probar su eficacia operativa en escenarios que simulan situaciones reales: El esquema criptobiométrico borroso y la función SPHF han sido implementados en lenguaje Java mientras que el proceso basado en la transformada de Walsh-Hadamard en Matlab. En los experimentos se ha utilizado una base de datos de imágenes de iris (CASIA) para simular una población de usuarios del sistema. En el caso particular de la función de SPHF, además se han realizado experimentos para comprobar su utilidad en el campo de análisis forense comparando archivos e imágenes con contenido similar y distinto. En este sentido, para cada uno de los esquemas se han calculado los ratios de falso negativo y falso positivo. ABSTRACT The extraordinary increase of new information technologies, the development of Internet of Things, the electronic commerce, the social networks, mobile or smart telephony and cloud computing and storage, have provided great benefits in all areas of society. Besides this fact, there are new challenges for the protection and privacy of information and its content, such as the loss of confidentiality and integrity of electronic documents and communications. This is exarcebated by the lack of a clear boundary between the personal world and the business world as their differences are becoming narrower. In both worlds, i.e the personal and the business one, Cryptography has played a key role by providing the necessary tools to ensure the confidentiality, integrity and availability both of the privacy of the personal data and information. On the other hand, Biometrics has offered and proposed different techniques with the aim to assure the authentication of individuals through their biometric traits, such as fingerprints, iris, hand geometry, voice, gait, etc. Each of these sciences, Cryptography and Biometrics, provides tools to specific problems of the data protection and user authentication, which would be widely strengthen if determined characteristics of both sciences would be combined in order to achieve common objectives. Therefore, it is imperative to intensify the research in this area by combining the basics mathematical algorithms and primitives of Cryptography with Biometrics to meet the growing demand for more secure and usability techniques which would improve the data protection and the user authentication. In this combination, the use of cancelable biometrics makes a cornerstone in the user authentication and identification process since it provides revocable or cancelation properties to the biometric traits. The contributions in this thesis involve the main aspect of Biometrics, i.e. the secure and efficient authentication of users through their biometric templates, considered from three different approaches. The first one is designing a fuzzy crypto-biometric scheme using the cancelable biometric principles to take advantage of the fuzziness of the biometric templates at the same time that it deals with the intra- and inter-user variability among users without compromising the biometric templates extracted from the legitimate users. The second one is designing a new Similarity Preserving Hash Function (SPHF), currently widely used in the Digital Forensics field to find similarities among different files to calculate their similarity level. The function designed in this research work, besides the fact of improving the results of the two main functions of this field currently in place, it tries to expand its use to the iris template comparison. Finally, the last approach of this thesis is developing a new mechanism of handling the iris templates, considering them as signals, to use the Walsh-Hadamard transform (complemented with three other algorithms) to compare them. The results obtained are excellent taking into account the security and privacy requirements mentioned previously. Every one of the three schemes designed have been implemented to test their operational efficacy in situations that simulate real scenarios: The fuzzy crypto-biometric scheme and the SPHF have been implemented in Java language, while the process based on the Walsh-Hadamard transform in Matlab. The experiments have been performed using a database of iris templates (CASIA-IrisV2) to simulate a user population. The case of the new SPHF designed is special since previous to be applied i to the Biometrics field, it has been also tested to determine its applicability in the Digital Forensic field comparing similar and dissimilar files and images. The ratios of efficiency and effectiveness regarding user authentication, i.e. False Non Match and False Match Rate, for the schemes designed have been calculated with different parameters and cases to analyse their behaviour.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

No Estado do Maranhão, na região da Baixada Maranhense, presenta na fauna silvestre o réptil Kinosternon scorpioides, um quelônio de água doce popularmente conhecido como jurará e que possui valor social, econômico e ambiental para os ribeirinhos da cidade de São Bento. Este estudo contempla suas características biológicas reprodutivas baseadas em seu ambiente natural, com o intuito de permitir a preservação e o estabelecimento de planos de manejo reprodutivo e de uso sustentável da espécie. Recentemente poucos estudos em todo o mundo tratam sobre os aspectos do ciclo reprodutivo de tartarugas em face das características endócrinas, na América do Sul estudos desse tipo são recentes e escassos, sendo assim este é o primeiro estudo, que se tem conhecimento, que elucida um padrão sazonal reprodutivo da espécie K. scorpioides, associando hormônios gonadais com aspectos comportamentais. Trinta e oito animais adultos tiveram seus órgãos reprodutivos caracterizados para as enzimas esteroidogênicas P450 aromatase, P450c17 e PNADPH redutase através de imunomarcação e blotting, além de índice gonadossomático, morfometria e concentração de testosterona, corticosterona e estradiol pela técnica de radioimunoensaio. As mudanças biométricas, morfometria celular e a esteroidogênese testicular entre os períodos chuvoso e seco sugerem que o estrógeno produzido pelas células de leydig podem afetar a produção e a apoptose de células germinais durante o processo de espermatogênese, e a presença das enzimas P450aromatase e P450c17 em células de leydig acompanhados com a recrudescência testicular também reforça a ideia, de que elas podem desempenhar um papel na quiescência testicular. Esse trabalho evidenciou que as enzimas citocromo P450, citocromo P450c17 e NADPH-citocromo P450-redutase estão presentes no testículo e epidídimo nos diferentes períodos climáticos e podem estar relacionados à síntese de testosterona em tartarugas concordando com os diferentes achados para biometria e espermiogênese nos períodos chuvoso e seco, o que, nos leva a sugerir um estado de quiescência durante o período seco e atividade espermatogênica no período chuvoso, semelhante ao que ocorre com as espécies que apresentam comportamento reprodutivo sazonal

Relevância:

10.00% 10.00%

Publicador:

Resumo:

his Essay attempts to take a step back from the tragic event in the first week of October 2013, when a boat capsized off the Italian island of Lampedusa and some 300 persons drowned seeking safe harbour. It sets out to examine the issue of EU border controls from the perspectives of the technologies, new and old, building on a variety of scholarly disciplines to understand what is happening to border controls on the movement of persons in the EU and why the results are so deadly. The Essay opens with an overview of what actually happens at the EU’s external borders. It then moves on to assess the old and new set of border control technologies that are deployed at the EU external borders, and how new technologies such as those based on automated controls and biometrics, are transforming the classical principles of European border controls. It then covers the reasons why people are refused admission at the EU’s external borders and the extent to which new border and surveillance technologies would assist in the effective controls in light of EU border law. Conclusions are finally offered on the articulation between the facts of EU border controls on persons and the claims and proposals for new technologies that are emerging from the EU institutions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cover title: Outpatient psychiatric clinics, special statistical report, 1961.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Issues for 1948- published as United States Public Health Service publication.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The thesis investigates the relationship between the biomechanical properties of the anterior human sclera and cornea in vivo using Schiotz tonometry (ST), rebound tonometry (RBT, iCare) and the Ocular Response Analyser (ORA, Reichert). Significant differences in properties were found to occur between scleral quadrants. Structural correlates for the differences were examined using Partial Coherent Interferometry (IOLMaster, Zeiss), Optical Coherent tomography (Visante OCT), rotating Scheimpflug photography (Pentacam, Oculus) and 3-D Magnetic Resonance Imaging (MRI). Subject groups were employed that allowed investigation of variation pertaining to ethnicity and refractive error. One hundred thirty-five young adult subjects were drawn from three ethnic groups: British-White (BW), British-South-Asian (BSA) and Hong-Kong-Chinese (HKC) comprising non-myopes and myopes. Principal observations: ST demonstrated significant regional variation in scleral resistance a) with lowest levels at quadrant superior-temporal and highest at inferior-nasal; b) with distance from the limbus, anterior locations showing greater resistance. Variations in resistance using RBT were similar to those found with ST; however the predominantly myopic HKC group had a greater overall mean resistance when compared to the BW-BSA group. OCT-derived scleral thickness measurements indicated the sclera to be thinner superiorly than inferiorly. Thickness varied with distance from the corneolimbal junction, with a decline from 1 to 2 mm followed by a successive increase from 3 to 7 mm. ORA data varied with ethnicity and refractive status; whilst axial length (AL) was associated with corneal biometrics for BW-BSA individuals it was associated with IOP in the HKC individuals. Complex interrelationships were found between ORA Additional-Waveform-Parameters and biometric data provided by the Pentacam. OCT indicated ciliary muscle thickness to be greater in myopia and more directly linked to posterior ocular volume (from MRI) than AL. Temporal surface areas (SAs, from MRI) were significantly smaller than nasal SAs in myopic eyes; globe bulbosity (from MRI) was constant across quadrants.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Conventionally, biometrics resources, such as face, gait silhouette, footprint, and pressure, have been utilized in gender recognition systems. However, the acquisition and processing time of these biometrics data makes the analysis difficult. This letter demonstrates for the first time how effective the footwear appearance is for gender recognition as a biometrics resource. A footwear database is also established with reprehensive shoes (footwears). Preliminary experimental results suggest that footwear appearance is a promising resource for gender recognition. Moreover, it also has the potential to be used jointly with other developed biometrics resources to boost performance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper briefly reviews CMOS image sensor technology and its utilization in security and medical applications. The role and future trends of image sensors in each of the applications are discussed. To provide the reader deeper understanding of the technology aspects the paper concentrates on the selected applications such as surveillance, biometrics, capsule endoscopy and artificial retina. The reasons for concentrating on these applications are due to their importance in our daily life and because they present leading-edge applications for imaging systems research and development. In addition, review of image sensors implementation in these applications allows the reader to investigate image sensor technology from the technical and from other views as well.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Using ecological data compiled from scientific literature on pest, pathogen and weed species characteristic in maize cultures in Hungary, we defined monthly climate profile indicators and applied them to complete a comparative analysis of the historical and modelled climate change scenario meteorological data of the city of Debrecen. Our results call attention to a drastic decline of the competitive ability of maize as compared to several C4 and especially C3 plants. According to the stricter scenarios, the frequency of potential pest and pathogen damage emergency situations will grow significantly by the end of the century.