992 resultados para Testicular biometric analysis


Relevância:

40.00% 40.00%

Publicador:

Resumo:

Since the September 11, 2001 terrorist attacks in New York, the use of biometric devices such as fingerprint scans, retina and iris scans and facial recognition in everyday situations for national security and border control, have become commonplace. This has resulted in the biometric industry moving from being a niche technology to one that is ubiquitous. As a result. more and more employers are using biometrics to secure staff access to their facilities as well as for tracking staff work hours, maintaining 'discipline' and carry out surveillance against thefts. detecting work hour abuses and fraud. However, the data thus collected and the technologies themselves are feared of having the potential for and actually being misused - both in terms of the violating staff privacy and discrimination and oppression of targeted workers. This paper examines the issue of using biometric devices in organisational settings their advantages, disadvantages and actual and potential abuses from the point of view of critical theory. From the perspectives of Panoptic surveillance and hegemonic organisational control, the paper examines the issues related to privacy and identification, biometrics and privacy, biometrics and the 'body', and surveillance and modernity. The paper also examines the findings ofa survey carried out in Australia. Malaysia and the USA on respondents' opinions on the use of biometric devices in everyday life including at workplaces. The paper concludes that along with their applications in border control and national security, the use of biometric devices should be covered by relevant laws and regulations. guidelines and codes of practice. in order to balance the rights to privacy and civil liberties of workers with employers' need for improved productivity, reduced costs, safeguards related to occupational health and safety, equal opportunity, and workplace harassment of staff and other matters, that employers are legally responsible for.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The objective of this study was to evaluate the possible use of biometric testicular traits as selection criteria for young Nellore bulls using Bayesian inference to estimate heritability coefficients and genetic correlations. Multitrait analysis was performed including 17,211 records of scrotal circumference obtained during andrological assessment (SCAND) and 15,313 records of testicular volume and shape. In addition, 50,809 records of scrotal circumference at 18 mo (SC18), used as an anchor trait, were analyzed. The (co) variance components and breeding values were estimated by Gibbs sampling using the Gibbs2F90 program under an animal model that included contemporary groups as fixed effects, age of the animal as a linear covariate, and direct additive genetic effects as random effects. Heritabilities of 0.42, 0.43, 0.31, 0.20, 0.04, 0.16, 0.15, and 0.10 were obtained for SC18, SCAND, testicular volume, testicular shape, minor defects, major defects, total defects, and satisfactory andrological evaluation, respectively. The genetic correlations between SC18 and the other traits were 0.84 (SCAND), 0.75 (testicular shape), 0.44 (testicular volume), -0.23 (minor defects), -0.16 (major defects), -0.24 (total defects), and 0.56 (satisfactory andrological evaluation). Genetic correlations of 0.94 and 0.52 were obtained between SCAND and testicular volume and shape, respectively, and of 0.52 between testicular volume and testicular shape. In addition to favorable genetic parameter estimates, SC18 was found to be the most advantageous testicular trait due to its easy measurement before andrological assessment of the animals, even though the utilization of biometric testicular traits as selection criteria was also found to be possible. In conclusion, SC18 and biometric testicular traits can be adopted as a selection criterion to improve the fertility of young Nellore bulls.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The biometric relationship between the weigth and the carapace width in the swimming crab A. cribrarius was compared with the results from other portunid crabs studied previously. During November/1988 to October/1989, a total of 403 specimens (189 males and 214 females) were collected with otter-trawl nets in north coast of the São Paulo State, Brazil. The animals were measured (carapace width excluding lateral spines = LC! and weighed (wet weight = PE). The empiric points of this relation were fit according to the power function (Y = a.X(b)) for each sex, maturation phases and total of individuals. The relation PE x LC indicates that the mole's growth changes during the ontogenesys from isometric (in juvenile phase) to allometric positive (in adult phase). For the females the growth is isometric in the two phases. The weight grows in a higher proportion than the carapace width variable (allometric positive growth). The data can be grouped in a single equation (PE = 7.85.10(-5).LC(3.14)) for the convertion between the variables there was a greater similarity between the equations obtained far each sex. In spite of this, the males present the fattening grade value (''a'') slightly higher than that of the females, possibly because of the greater size reached in its devellopment. The mean weight of the males is greater than the females one (p < 0.01). In the range 80 proves 90mm the males were more abundant, probably due to the females terminal ecdysis is near this size. The females only have the mean weight greater than the males in the 60 proves 70mm range (p < 0.01) when the puberty molt occurs and they present morphological changes in their reproductive system.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The identification of tree species is a key step for sustainable management plans of forest resources, as well as for several other applications that are based on such surveys. However, the present available techniques are dependent on the presence of tree structures, such as flowers, fruits, and leaves, limiting the identification process to certain periods of the year Therefore, this article introduces a study on the application of statistical parameters for texture classification of tree trunk images. For that, 540 samples from five Brazilian native deciduous species were acquired and measures of entropy, uniformity, smoothness, asymmetry (third moment), mean, and standard deviation were obtained from the presented textures. Using a decision tree, a biometric species identification system was constructed and resulted to a 0.84 average precision rate for species classification with 0.83accuracy and 0.79 agreement. Thus, it can be considered that the use of texture presented in trunk images can represent an important advance in tree identification, since the limitations of the current techniques can be overcome.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Pós-graduação em Ciência e Tecnologia Animal - FEIS

Relevância:

30.00% 30.00%

Publicador:

Resumo:

It is possible for the visual attention characteristics of a person to be exploited as a biometric for authentication or identification of individual viewers. The visual attention characteristics of a person can be easily monitored by tracking the gaze of a viewer during the presentation of a known or unknown visual scene. The positions and sequences of gaze locations during viewing may be determined by overt (conscious) or covert (sub-conscious) viewing behaviour. This paper presents a method to authenticate individuals using their covert viewing behaviour, thus yielding a unique behavioural biometric. A method to quantify the spatial and temporal patterns established by the viewer for their covert behaviour is proposed utilsing a principal component analysis technique called `eigenGaze'. Experimental results suggest that it is possible to capture the unique visual attention characteristics of a person to provide a simple behavioural biometric.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We introduce a lightweight biometric solution for user authentication over networks using online handwritten signatures. The algorithm proposed is based on a modified Hausdorff distance and has favorable characteristics such as low computational cost and minimal training requirements. Furthermore, we investigate an information theoretic model for capacity and performance analysis for biometric authentication which brings additional theoretical insights to the problem. A fully functional proof-of-concept prototype that relies on commonly available off-the-shelf hardware is developed as a client-server system that supports Web services. Initial experimental results show that the algorithm performs well despite its low computational requirements and is resilient against over-the-shoulder attacks.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

There are different ways to authenticate humans, which is an essential prerequisite for access control. The authentication process can be subdivided into three categories that rely on something someone i) knows (e.g. password), and/or ii) has (e.g. smart card), and/or iii) is (biometric features). Besides classical attacks on password solutions and the risk that identity-related objects can be stolen, traditional biometric solutions have their own disadvantages such as the requirement of expensive devices, risk of stolen bio-templates etc. Moreover, existing approaches provide the authentication process usually performed only once initially. Non-intrusive and continuous monitoring of user activities emerges as promising solution in hardening authentication process: iii-2) how so. behaves. In recent years various keystroke dynamic behavior-based approaches were published that are able to authenticate humans based on their typing behavior. The majority focuses on so-called static text approaches, where users are requested to type a previously defined text. Relatively few techniques are based on free text approaches that allow a transparent monitoring of user activities and provide continuous verification. Unfortunately only few solutions are deployable in application environments under realistic conditions. Unsolved problems are for instance scalability problems, high response times and error rates. The aim of this work is the development of behavioral-based verification solutions. Our main requirement is to deploy these solutions under realistic conditions within existing environments in order to enable a transparent and free text based continuous verification of active users with low error rates and response times.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In recent years face recognition systems have been applied in various useful applications, such as surveillance, access control, criminal investigations, law enforcement, and others. However face biometric systems can be highly vulnerable to spoofing attacks where an impostor tries to bypass the face recognition system using a photo or video sequence. In this paper a novel liveness detection method, based on the 3D structure of the face, is proposed. Processing the 3D curvature of the acquired data, the proposed approach allows a biometric system to distinguish a real face from a photo, increasing the overall performance of the system and reducing its vulnerability. In order to test the real capability of the methodology a 3D face database has been collected simulating spoofing attacks, therefore using photographs instead of real faces. The experimental results show the effectiveness of the proposed approach.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The method of generalized estimating equations (GEE) is a popular tool for analysing longitudinal (panel) data. Often, the covariates collected are time-dependent in nature, for example, age, relapse status, monthly income. When using GEE to analyse longitudinal data with time-dependent covariates, crucial assumptions about the covariates are necessary for valid inferences to be drawn. When those assumptions do not hold or cannot be verified, Pepe and Anderson (1994, Communications in Statistics, Simulations and Computation 23, 939–951) advocated using an independence working correlation assumption in the GEE model as a robust approach. However, using GEE with the independence correlation assumption may lead to significant efficiency loss (Fitzmaurice, 1995, Biometrics 51, 309–317). In this article, we propose a method that extracts additional information from the estimating equations that are excluded by the independence assumption. The method always includes the estimating equations under the independence assumption and the contribution from the remaining estimating equations is weighted according to the likelihood of each equation being a consistent estimating equation and the information it carries. We apply the method to a longitudinal study of the health of a group of Filipino children.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper makes a formal security analysis of the current Australian e-passport implementation using model checking tools CASPER/CSP/FDR. We highlight security issues in the current implementation and identify new threats when an e-passport system is integrated with an automated processing system like SmartGate. The paper also provides a security analysis of the European Union (EU) proposal for Extended Access Control (EAC) that is intended to provide improved security in protecting biometric information of the e-passport bearer. The current e-passport specification fails to provide a list of adequate security goals that could be used for security evaluation. We fill this gap; we present a collection of security goals for evaluation of e-passport protocols. Our analysis confirms existing security weaknesses that were previously identified and shows that both the Australian e-passport implementation and the EU proposal fail to address many security and privacy aspects that are paramount in implementing a secure border control mechanism. ACM Classification C.2.2 (Communication/Networking and Information Technology – Network Protocols – Model Checking), D.2.4 (Software Engineering – Software/Program Verification – Formal Methods), D.4.6 (Operating Systems – Security and Privacy Protection – Authentication)

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Rat testicular cells in culture produce several metalloproteinases including type IV collagenases (Sang et al. Biol Reprod 1990; 43:946-955, 956-964). We have now investigated the regulation of testicular cell type IV collagenase and other metalloprotemases in vitro. Soluble laminin stimulated Sertoli cell type IV collagenase mRNA levels. However, three peptides corresponding to different domains of the laminin molecule (CSRAKQAASIKVASADR, FALRGDNP, CLQDGDVRV) did not influence type IV collagenase mENA levels. Zyniographic analysis of medium collected from these cultures revealed that neither soluble laminin nor any of the peptides influenced 72-Wa type IV collagenase protein levels. However, peptide FALRGDNP resulted in both, a selective increase in two higher molecular-weight metalloprotemnases (83 kDa and 110 Wa and in an activation of the 72-Wa rat type IV collagenase. Interleukin-1, phorbol ester, testosterone, and FSH did not affect collagenase activation, lmmunocytochemical studies demonstrated that the addition of soluble laminin resulted in a redistribution of type IV collagenase from intracellular vesicles to the cell-substrate region beneath the cells. Peptide FALRGDNP induced a change from a vesicular to peripheral plasma membrane type of staining pattern. Zymography of plasma membrane preparations demonstrated triton-soluble gelatinases of 76 Wa, 83 Wa, and 110 Wa and a triton-insoluble gelatinase of 225 Wa, These results indicate that testicular cell type IV collagenase mRNA levels, enzyme activation, and distribution are influenced by laminin and RGD-containing peptides.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

For users of germplasm collections, the purpose of measuring characterization and evaluation descriptors, and subsequently using statistical methodology to summarize the data, is not only to interpret the relationships between the descriptors, but also to characterize the differences and similarities between accessions in relation to their phenotypic variability for each of the measured descriptors. The set of descriptors for the accessions of most germplasm collections consists of both numerical and categorical descriptors. This poses problems for a combined analysis of all descriptors because few statistical techniques deal with mixtures of measurement types. In this article, nonlinear principal component analysis was used to analyze the descriptors of the accessions in the Australian groundnut collection. It was demonstrated that the nonlinear variant of ordinary principal component analysis is an appropriate analytical tool because subspecies and botanical varieties could be identified on the basis of the analysis and characterized in terms of all descriptors. Moreover, outlying accessions could be easily spotted and their characteristics established. The statistical results and their interpretations provide users with a more efficient way to identify accessions of potential relevance for their plant improvement programs and encourage and improve the usefulness and utilization of germplasm collections.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

BACKGROUND Tilted disc syndrome (TDS) is associated with characteristic ocular findings. The purpose of this study was to evaluate the ocular, refractive, and biometric characteristics in patients with TDS. METHODS This case-control study included 41 eyes of 25 patients who had established TDS and 40 eyes of 20 healthy control subjects. All participants underwent a complete ocular examination, including refraction and analysis using Fourier transformation, slit lamp biomicroscopy, pachymetry, keratometry, and ocular biometry. Corneal topography examinations were performed in the syndrome group only. RESULTS There were no significant differences in spherical equivalent (P = 0.13) and total astigmatism (P = 0.37) between groups. However, mean best spectacle-corrected visual acuity (Log Mar) was significantly worse in TDS patients (P = 0.003). The lenticular astigmatism was greater in the syndrome group, whereas the corneal component was greater in controls (P = 0.059 and P = 0.028, respectively). The measured biometric features were the same in both groups, except for the lens thickness and lens-axial length factor, which were greater in the TDS group (P = 0.007 and P = 0.055, respectively). CONCLUSIONS Clinically significant lenticular astigmatism, more oblique corneal astigmatism, and thicker lenses were characteristic findings in patients with TDS.