800 resultados para utility preserving
Resumo:
El extraordinario auge de las nuevas tecnologías de la información, el desarrollo de la Internet de las Cosas, el comercio electrónico, las redes sociales, la telefonía móvil y la computación y almacenamiento en la nube, han proporcionado grandes beneficios en todos los ámbitos de la sociedad. Junto a éstos, se presentan nuevos retos para la protección y privacidad de la información y su contenido, como la suplantación de personalidad y la pérdida de la confidencialidad e integridad de los documentos o las comunicaciones electrónicas. Este hecho puede verse agravado por la falta de una frontera clara que delimite el mundo personal del mundo laboral en cuanto al acceso de la información. En todos estos campos de la actividad personal y laboral, la Criptografía ha jugado un papel fundamental aportando las herramientas necesarias para garantizar la confidencialidad, integridad y disponibilidad tanto de la privacidad de los datos personales como de la información. Por otro lado, la Biometría ha propuesto y ofrecido diferentes técnicas con el fin de garantizar la autentificación de individuos a través del uso de determinadas características personales como las huellas dáctilares, el iris, la geometría de la mano, la voz, la forma de caminar, etc. Cada una de estas dos ciencias, Criptografía y Biometría, aportan soluciones a campos específicos de la protección de datos y autentificación de usuarios, que se verían enormemente potenciados si determinadas características de ambas ciencias se unieran con vistas a objetivos comunes. Por ello es imperativo intensificar la investigación en estos ámbitos combinando los algoritmos y primitivas matemáticas de la Criptografía con la Biometría para dar respuesta a la demanda creciente de nuevas soluciones más técnicas, seguras y fáciles de usar que potencien de modo simultáneo la protección de datos y la identificacíón de usuarios. En esta combinación el concepto de biometría cancelable ha supuesto una piedra angular en el proceso de autentificación e identificación de usuarios al proporcionar propiedades de revocación y cancelación a los ragos biométricos. La contribución de esta tesis se basa en el principal aspecto de la Biometría, es decir, la autentificación segura y eficiente de usuarios a través de sus rasgos biométricos, utilizando tres aproximaciones distintas: 1. Diseño de un esquema criptobiométrico borroso que implemente los principios de la biometría cancelable para identificar usuarios lidiando con los problemas acaecidos de la variabilidad intra e inter-usuarios. 2. Diseño de una nueva función hash que preserva la similitud (SPHF por sus siglas en inglés). Actualmente estas funciones se usan en el campo del análisis forense digital con el objetivo de buscar similitudes en el contenido de archivos distintos pero similares de modo que se pueda precisar hasta qué punto estos archivos pudieran ser considerados iguales. La función definida en este trabajo de investigación, además de mejorar los resultados de las principales funciones desarrolladas hasta el momento, intenta extender su uso a la comparación entre patrones de iris. 3. Desarrollando un nuevo mecanismo de comparación de patrones de iris que considera tales patrones como si fueran señales para compararlos posteriormente utilizando la transformada de Walsh-Hadarmard. Los resultados obtenidos son excelentes teniendo en cuenta los requerimientos de seguridad y privacidad mencionados anteriormente. Cada uno de los tres esquemas diseñados han sido implementados para poder realizar experimentos y probar su eficacia operativa en escenarios que simulan situaciones reales: El esquema criptobiométrico borroso y la función SPHF han sido implementados en lenguaje Java mientras que el proceso basado en la transformada de Walsh-Hadamard en Matlab. En los experimentos se ha utilizado una base de datos de imágenes de iris (CASIA) para simular una población de usuarios del sistema. En el caso particular de la función de SPHF, además se han realizado experimentos para comprobar su utilidad en el campo de análisis forense comparando archivos e imágenes con contenido similar y distinto. En este sentido, para cada uno de los esquemas se han calculado los ratios de falso negativo y falso positivo. ABSTRACT The extraordinary increase of new information technologies, the development of Internet of Things, the electronic commerce, the social networks, mobile or smart telephony and cloud computing and storage, have provided great benefits in all areas of society. Besides this fact, there are new challenges for the protection and privacy of information and its content, such as the loss of confidentiality and integrity of electronic documents and communications. This is exarcebated by the lack of a clear boundary between the personal world and the business world as their differences are becoming narrower. In both worlds, i.e the personal and the business one, Cryptography has played a key role by providing the necessary tools to ensure the confidentiality, integrity and availability both of the privacy of the personal data and information. On the other hand, Biometrics has offered and proposed different techniques with the aim to assure the authentication of individuals through their biometric traits, such as fingerprints, iris, hand geometry, voice, gait, etc. Each of these sciences, Cryptography and Biometrics, provides tools to specific problems of the data protection and user authentication, which would be widely strengthen if determined characteristics of both sciences would be combined in order to achieve common objectives. Therefore, it is imperative to intensify the research in this area by combining the basics mathematical algorithms and primitives of Cryptography with Biometrics to meet the growing demand for more secure and usability techniques which would improve the data protection and the user authentication. In this combination, the use of cancelable biometrics makes a cornerstone in the user authentication and identification process since it provides revocable or cancelation properties to the biometric traits. The contributions in this thesis involve the main aspect of Biometrics, i.e. the secure and efficient authentication of users through their biometric templates, considered from three different approaches. The first one is designing a fuzzy crypto-biometric scheme using the cancelable biometric principles to take advantage of the fuzziness of the biometric templates at the same time that it deals with the intra- and inter-user variability among users without compromising the biometric templates extracted from the legitimate users. The second one is designing a new Similarity Preserving Hash Function (SPHF), currently widely used in the Digital Forensics field to find similarities among different files to calculate their similarity level. The function designed in this research work, besides the fact of improving the results of the two main functions of this field currently in place, it tries to expand its use to the iris template comparison. Finally, the last approach of this thesis is developing a new mechanism of handling the iris templates, considering them as signals, to use the Walsh-Hadamard transform (complemented with three other algorithms) to compare them. The results obtained are excellent taking into account the security and privacy requirements mentioned previously. Every one of the three schemes designed have been implemented to test their operational efficacy in situations that simulate real scenarios: The fuzzy crypto-biometric scheme and the SPHF have been implemented in Java language, while the process based on the Walsh-Hadamard transform in Matlab. The experiments have been performed using a database of iris templates (CASIA-IrisV2) to simulate a user population. The case of the new SPHF designed is special since previous to be applied i to the Biometrics field, it has been also tested to determine its applicability in the Digital Forensic field comparing similar and dissimilar files and images. The ratios of efficiency and effectiveness regarding user authentication, i.e. False Non Match and False Match Rate, for the schemes designed have been calculated with different parameters and cases to analyse their behaviour.
Resumo:
The Health Services Research Unit receives funding from the Chief Scientist Office of the Scottish Government Health and Social Care Directorates. The opinions expressed in this article are those of the authors alone. The GEOS study was funded by the North of Scotland Planning Group.
Resumo:
The Adult Attachment Projective Picture System (AAP) is the first performance- based measure of adult attachment to be developed. The purpose of the measure is to provide a clinical understanding of an adult client's attachment status and associated coping mechanisms. The AAP is a relatively new measure that has yet to be examined from a utility perspective. In the current study, seven psychologists completed a structured survey in order to identify their perspectives of the AAP and its utility as a clinical instrument. A phenomenological qualitative analysis of the data was conducted to derive themes about the AAP and its clinical utility. Analyses aimed to answer the following: What clinical considerations do clinician's focus on when deciding to use this measure? What are common factors among clinician's who do use the measure as well as those who do not? What aspects of the measure are user-friendly and what aspects are difficult? General themes that emerged include (a) the clinical information provided by the AAP is viewed by those who use it as unique and beneficial; (b) time commitment and cost for the clinician are common considerations when clinician's are deciding whether or not to use the AAP or when pursuing training; (c) the AAP provides an increased understanding of one's relational capacities and defenses; and (d) the coding system and transcription process are difficult aspects of the AAP and influence how and/or when it is used. In addition to these themes, multiple respondents discussed potential changes for the AAP that would increase their future use of the instrument. Finally, the implications of these results are discussed.
Resumo:
Stories, fables, and myths have been used for a long time in human history. They serve as a way for cultures and people to communicate, preserve important cultural values, and create meaning. The use of narratives has been recognized as a helpful technique in the field of psychology and can be found in many orientations and intervention techniques (Dwivedi, 2006; Roberts, 2000). Narrative therapy, bibliotherapy, trauma narratives, and Therapeutic Assessment (TA) are some of the areas in which the benefits of using written stories are incorporated into work with clients. In this paper, the clinical utility of using Therapeutic Assessment style fables in the termination phase of psychotherapy is explored. The termination phase is a challenging time for both therapists and clients. The use of rituals in the process of termination has been found to have a positive impact on the experience (Gutheil, 1993). This paper presents several case studies and examines the subsequent impact and clinical benefits of using termination fables in psychotherapy.
Resumo:
Results of neuropsychological examinations depend on valid data. Whereas clinicians previously believed that clinical skill was sufficient to identify non-credible performance by examinees on standard tests, research demonstrates otherwise. Consequently, studies on measures to detect suspect effort in adults have received tremendous attention in the previous twenty years, and incorporation of validity indicators into neuropsychological examinations is now seen as integral. Few studies exist that validate methods appropriate for the measurement of effort in pediatric populations. Of extant studies, most evaluate standalone measures originally developed for use with adults. The present study examined the utility of indices from the California Verbal Learning Test – Children's Version (CVLT-C) as embedded validity indicators in a pediatric sample. Participants were 225 outpatients aged 8 to 16 years old referred for clinical assessment after mild traumatic brain injury (mTBI). Non-credible performance (n = 39) was defined as failure of the Medical Symptom Validity Test (MSVT). Logistic regression demonstrated that only the Recognition Discriminability index was predictive of MSVT failure (OR = 2.88, p < .001). A cutoff of z ≤ -1.0 was associated with sensitivity of 51% and specificity of 91%. In the current study, CVLT-C Recognition Discriminability was useful in the identification of non-credible performance in a sample of relatively high-functioning pediatric outpatients with mTBI. Thus, this index can be added to the short list of embedded validity indicators appropriate for pediatric neuropsychological assessment.
Resumo:
Comunicación presentada en el 2nd International Workshop on Pattern Recognition in Information Systems, Alicante, April, 2002.
Resumo:
Purpose. We aimed to characterize the distribution of the vector parameters ocular residual astigmatism (ORA) and topography disparity (TD) in a sample of clinical and subclinical keratoconus eyes, and to evaluate their diagnostic value to discriminate between these conditions and healthy corneas. Methods. This study comprised a total of 43 keratoconic eyes (27 patients, 17–73 years) (keratoconus group), 11 subclinical keratoconus eyes (eight patients, 11–54 years) (subclinical keratoconus group) and 101 healthy eyes (101 patients, 15–64 years) (control group). In all cases, a complete corneal analysis was performed using a Scheimpflug photography-based topography system. Anterior corneal topographic data was imported from it to the iASSORT software (ASSORT Pty. Ltd), which allowed the calculation of ORA and TD. Results. Mean magnitude of the ORA was 3.23 ± 2.38, 1.16 ± 0.50 and 0.79 ± 0.43 D in the keratoconus, subclinical keratoconus and control groups, respectively (p < 0.001). Mean magnitude of the TD was 9.04 ± 8.08, 2.69 ± 2.42 and 0.89 ± 0.50 D in the keratoconus, subclinical keratoconus and control groups, respectively (p < 0.001). Good diagnostic performance of ORA (cutoff point: 1.21 D, sensitivity 83.7 %, specificity 87.1 %) and TD (cutoff point: 1.64 D, sensitivity 93.3 %, specificity 92.1 %) was found for the detection of keratoconus. The diagnostic ability of these parameters for the detection of subclinical keratoconus was more limited (ORA: cutoff 1.17 D, sensitivity 60.0 %, specificity 84.2 %; TD: cutoff 1.29 D, sensitivity 80.0 %, specificity 80.2 %). Conclusion. The vector parameters ORA and TD are able to discriminate with good levels of precision between keratoconus and healthy corneas. For the detection of subclinical keratoconus, only TD seems to be valid.
Resumo:
El origen de la normativa escrita sobre el uso de las aguas en el territorio peninsular levantino plantea diversas incógnitas. Las primera de ellas sobre los quienes fueron los protagonistas en la redacción y determinación de ese derecho. La segunda sobre el papel que la costumbre de los sarracenos desempeñó en la preservación de tradiciones jurídicas, mantenimiento de infraestructuras y gestión del agua. La tercera tiene que ver con el modo de aunar intereses de comunidades distintas desde el punto de vista religioso y jurídico sobre el derecho de uso de forma equitativa y proporcional a necesidades no necesariamente coincidentes. Lo cierto es que las fuentes conservadas sobre el proceso de reconquista y población siguen siendo una de las mejores referencias para despejar incógnitas y justificar la tradición y pervivencia de un derecho inmemorial y vigente en algunas de sus formas y manifestaciones, no solo en el marco levantino sino en otros muchos espacios de la cuenca mediterránea con idénticas características medioambientales y geo-climáticas.
Resumo:
no.7(1949)