854 resultados para Web based information system
Resumo:
Technological innovations, the development of the internet, and globalization have increased the number and complexity of web applications. As a result, keeping web user interfaces understandable and usable (in terms of ease-of-use, effectiveness, and satisfaction) is a challenge. As part of this, designing userintuitive interface signs (i.e., the small elements of web user interface, e.g., navigational link, command buttons, icons, small images, thumbnails, etc.) is an issue for designers. Interface signs are key elements of web user interfaces because ‘interface signs’ act as a communication artefact to convey web content and system functionality, and because users interact with systems by means of interface signs. In the light of the above, applying semiotic (i.e., the study of signs) concepts on web interface signs will contribute to discover new and important perspectives on web user interface design and evaluation. The thesis mainly focuses on web interface signs and uses the theory of semiotic as a background theory. The underlying aim of this thesis is to provide valuable insights to design and evaluate web user interfaces from a semiotic perspective in order to improve overall web usability. The fundamental research question is formulated as What do practitioners and researchers need to be aware of from a semiotic perspective when designing or evaluating web user interfaces to improve web usability? From a methodological perspective, the thesis follows a design science research (DSR) approach. A systematic literature review and six empirical studies are carried out in this thesis. The empirical studies are carried out with a total of 74 participants in Finland. The steps of a design science research process are followed while the studies were designed and conducted; that includes (a) problem identification and motivation, (b) definition of objectives of a solution, (c) design and development, (d) demonstration, (e) evaluation, and (f) communication. The data is collected using observations in a usability testing lab, by analytical (expert) inspection, with questionnaires, and in structured and semi-structured interviews. User behaviour analysis, qualitative analysis and statistics are used to analyze the study data. The results are summarized as follows and have lead to the following contributions. Firstly, the results present the current status of semiotic research in UI design and evaluation and highlight the importance of considering semiotic concepts in UI design and evaluation. Secondly, the thesis explores interface sign ontologies (i.e., sets of concepts and skills that a user should know to interpret the meaning of interface signs) by providing a set of ontologies used to interpret the meaning of interface signs, and by providing a set of features related to ontology mapping in interpreting the meaning of interface signs. Thirdly, the thesis explores the value of integrating semiotic concepts in usability testing. Fourthly, the thesis proposes a semiotic framework (Semiotic Interface sign Design and Evaluation – SIDE) for interface sign design and evaluation in order to make them intuitive for end users and to improve web usability. The SIDE framework includes a set of determinants and attributes of user-intuitive interface signs, and a set of semiotic heuristics to design and evaluate interface signs. Finally, the thesis assesses (a) the quality of the SIDE framework in terms of performance metrics (e.g., thoroughness, validity, effectiveness, reliability, etc.) and (b) the contributions of the SIDE framework from the evaluators’ perspective.
Resumo:
This study examines information security as a process (information securing) in terms of what it does, especially beyond its obvious role of protector. It investigates concepts related to ‘ontology of becoming’, and examines what it is that information securing produces. The research is theory driven and draws upon three fields: sociology (especially actor-network theory), philosophy (especially Gilles Deleuze and Félix Guattari’s concept of ‘machine’, ‘territory’ and ‘becoming’, and Michel Serres’s concept of ‘parasite’), and information systems science (the subject of information security). Social engineering (used here in the sense of breaking into systems through non-technical means) and software cracker groups (groups which remove copy protection systems from software) are analysed as examples of breaches of information security. Firstly, the study finds that information securing is always interruptive: every entity (regardless of whether or not it is malicious) that becomes connected to information security is interrupted. Furthermore, every entity changes, becomes different, as it makes a connection with information security (ontology of becoming). Moreover, information security organizes entities into different territories. However, the territories – the insides and outsides of information systems – are ontologically similar; the only difference is in the order of the territories, not in the ontological status of entities that inhabit the territories. In other words, malicious software is ontologically similar to benign software; they both are users in terms of a system. The difference is based on the order of the system and users: who uses the system and what the system is used for. Secondly, the research shows that information security is always external (in the terms of this study it is a ‘parasite’) to the information system that it protects. Information securing creates and maintains order while simultaneously disrupting the existing order of the system that it protects. For example, in terms of software itself, the implementation of a copy protection system is an entirely external addition. In fact, this parasitic addition makes software different. Thus, information security disrupts that which it is supposed to defend from disruption. Finally, it is asserted that, in its interruption, information security is a connector that creates passages; it connects users to systems while also creating its own threats. For example, copy protection systems invite crackers and information security policies entice social engineers to use and exploit information security techniques in a novel manner.
Resumo:
If electricity users adjusted their consumption patterns according to time-variable electricity prices or other signals about the state of the power system, generation and network assets could be used more efficiently, and matching intermittent renewable power generation with electricity demand would be facilitated. This kind of adjustment of electricity consumption, or demand response, may be based on consumers’ decisions to shift or reduce electricity use in response to time-variable electricity prices or on the remote control of consumers’ electric appliances. However, while demand response is suggested as a solution to many issues in power systems, actual experiences from demand response programs with residential customers are mainly limited to short pilots with a small number of voluntary participants, and information about what kinds of changes consumers are willing and able to make and what motivates these changes is scarce. This doctoral dissertation contributes to the knowledge about what kinds of factors impact on residential consumers’ willingness and ability to take part in demand response. Saving opportunities calculated with actual price data from the Finnish retail electricity market are compared with the occurred supplier switching to generate a first estimate about how large savings could trigger action also in the case of demand response. Residential consumers’ motives to participate in demand response are also studied by a web-based survey with 2103 responses. Further, experiences of households with electricity consumption monitoring systems are discussed to increase knowledge about consumers’ interest in getting more information on their electricity use and adjusting their behavior based on it. Impacts of information on willingness to participate in demand response programs are also approached by a survey for experts of their willingness to engage in demand response activities. Residential customers seem ready to allow remote control of electric appliances that does not require changes in their everyday routines. Based on residents’ own activity, the electricity consuming activities that are considered shiftable are very limited. In both cases, the savings in electricity costs required to allow remote control or to engage in demand response activities are relatively high. Nonmonetary incentives appeal to fewer households.
Resumo:
Kuluttajat käyttävät sisältöpohjaisia digitaalisia palveluita jatkuvasti saadakseen lisää tietoa terveydestään. Samalla he arvioivat käyttämiensä palveluiden laatua. Jotta yritykset voisivat suunnitella ja tarjota parhaita mahdollisia digitaalisia palveluita kuluttajille, yritysten tulisi tunnistaa ja analysoida kuluttajien kokemuksia ja käyttötarkoituksia heidän palveluissaan. Tämän tutkimuksen tarkoituksena on kuvailla kuluttajien näkemyksiä Masennusinfo.fi:stä, joka on sisältöpohjainen digitaalinen palvelu, ja joka tarjoaa käyttäjilleen tietoa masennuksesta. Päämääränä on selvittää, kuinka kuluttajat kokevat lääkeyrityksen tarjoaman palvelun laadun ja mihin tarkoituksiin sitä käytetään. Tutkimuksen tarkoitus voidaan jakaa kolmeen osa-ongelmaan: Mihin tarkoituksiin kuluttajat käyttävät sisältöpohjaisia digitaalisia palveluita? Miten kuluttajat kokevat näiden palveluiden laadun? Kuinka käyttötarkoitus ja koettu laatu eroavat eri käyttäjäryhmissä? Tutkimus toteutetaan web-pohjaisella kyselytutkimuksella. Mittarit tehdään teoreettisen viitekehyksen pohjalta, joka perustuu aikaisempaan tutkimukseen. Tutkimuksen empiirinen osuus suoritetaan pop-up tutkimuksella, joka sijoitetaan tutkittavalle sivustolle antaen näin kaikille palvelun käyttäjille mahdollisuuden vastata kyselyyn. Tulokset osoittavat, että palvelua käyttävät suurimmaksi osaksi naiset, suhteellisen nuoret 16−29- vuotiaat, tai yli keski-ikäiset 50−65-vuotiaat henkilöt, jotka ovat joko työssäkäyviä tai opiskelijoita ja korkeasti koulutettuja. Masennusinfo.fi nähdään laadukkaana palveluna kaikissa käyttäjäryhmissä sekä sen käytettävyyden että sisällön perusteella. Käyttötarkoituksetkin ovat jokseenkin samankaltaisia eri käyttäjäryhmissä. Yleensä palvelua käytetään tiedon hakemiseen sairauden alkuvaiheessa. Löydöksien perusteella esitetään, että palvelua muokataan vastaamaan yhä paremmin sen käyttötarkoituksia ja tyypillistä käyttäjäprofiilia. Koska muutamia pieniä eroja käyttäjäryhmien näkemyksissä havaittiin, palveluiden tuottaja päättää, minkä ryhmän mieltymyksiä se noudattaa.
Resumo:
There is an increasing demand for individualized, genotype-based health advice. The general population-based dietary recommendations do not always motivate people to change their life-style, and partly following this, cardiovascular diseases (CVD) are a major cause of death in worldwide. Using genotype-based nutrition and health information (e.g. nutrigenetics) in health education is a relatively new approach, although genetic variation is known to cause individual differences in response to dietary factors. Response to changes in dietary fat quality varies, for example, among different APOE genotypes. Research in this field is challenging, because several non-modifiable (genetic, age, sex) and modifiable (e.g. lifestyle, dietary, physical activity) factors together and with interaction affect the risk of life-style related diseases (e.g. CVD). The other challenge is the psychological factors (e.g. anxiety, threat, stress, motivation, attitude), which also have an effect on health behavior. The genotype-based information is always a very sensitive topic, because it can also cause some negative consequences and feelings (e.g. depression, increased anxiety). The aim of this series of studies was firstly to study how individual, genotype-based health information affects an individual’s health form three aspects, and secondly whether this could be one method in the future to prevent lifestyle-related diseases, such as CVD. The first study concentrated on the psychological effects; the focus of the second study was on health behavior effects, and the third study concentrated on clinical effects. In the fourth study of this series, the focus was on all these three aspects and their associations with each other. The genetic risk and health information was the APOE gene and its effects on CVD. To study the effect of APOE genotype-based health information in prevention of CVD, a total of 151 volunteers attended the baseline assessments (T0), of which 122 healthy adults (aged 20 – 67 y) passed the inclusion criteria and started the one-year intervention. The participants (n = 122) were randomized into a control group (n = 61) and an intervention group (n = 61). There were 21 participants in the intervention Ɛ4+ group (including APOE genotypes 3/4 and 4/4) and 40 participants in the intervention Ɛ4- group (including APOE genotypes 2/3 and 3/3). The control group included 61 participants (including APOE genotypes 3/4, 4/4, 2/3, 3/3 and 2/2). The baseline (T0) and follow-up assessments (T1, T2, T3) included detailed measurements of psychological (threat and anxiety experience, stage of change), and behavioral (dietary fat quality, consumption of vegetables, - high fat/sugar foods and –alcohol, physical activity and health and taste attitudes) and clinical factors (total-, LDL- HDL cholesterol, triglycerides, blood pressure, blood glucose (0h and 2h), body mass index, waist circumference and body fat percentage). During the intervention six different communication sessions (lectures on healthy lifestyle and nutrigenomics, health messages by mail, and personal discussion with the doctor) were arranged. The intervention groups (Ɛ4+ and Ɛ4-) received their APOE genotype information and health message at the beginning of the intervention. The control group received their APOE genotype information after the intervention. For the analyses in this dissertation, the results for 106/107 participants were analyzed. In the intervention, there were 16 participants in the high-risk (Ɛ4+) group and 35 in the low-risk (Ɛ4-) group. The control group had 55 participants in studies III-IV and 56 participants in studies I-II. The intervention had both short-term (≤ 6 months) and long-term (12 months) effects on health behavior and clinical factors. The short-term effects were found in dietary fat quality and waist circumference. Dietary fat quality improved more in the Ɛ4+ group than the Ɛ4- and the control groups as the personal, genotype-based health information and waist circumference lowered more in the Ɛ4+ group compared with the control group. Both these changes differed significantly between the Ɛ4+ and control groups (p<0.05). A long-term effect was found in triglyceride values (p<0.05), which lowered more in Ɛ4+ compared with the control group during the intervention. Short-term effects were also found in the threat experience, which increased mostly in the Ɛ4+ group after the genetic feedback (p<0.05), but it decreased after 12 months, although remaining at a higher level compared to the baseline (T0). In addition, Study IV found that changes in the psychological factors (anxiety and threat experience, motivation), health and taste attitudes, and health behaviors (dietary, alcohol consumption, and physical activity) did not directly explain the changes in triglyceride values and waist circumference. However, change caused by a threat experience may have affected the change in triglycerides through total- and HDL cholesterol. In conclusion, this dissertation study has given some indications that individual, genotypebased health information could be one potential option in the future to prevent lifestyle-related diseases in public health care. The results of this study imply that personal genetic information, based on APOE, may have positive effects on dietary fat quality and some cardiovascular risk markers (e.g., improvement in triglyceride values and waist circumference). This study also suggests that psychological factors (e.g. anxiety and threat experience) may not be an obstacle for healthy people to use genotype-based health information to promote healthy lifestyles. However, even in the case of very personal health information, in order to achieve a permanent health behavior change, it is important to include attitudes and other psychological factors (e.g. motivation), as well as intensive repetition and a longer intervention duration. This research will serve as a basis for future studies and its information can be used to develop targeted interventions, including health information based on genotyping that would aim at preventing lifestyle diseases. People’s interest in personalized health advices has increased, while also the costs of genetic screening have decreased. Therefore, generally speaking, it can be assumed that genetic screening as a part of the prevention of lifestyle-related diseases may become more common in the future. In consequence, more research is required about how to make genetic screening a practical tool in public health care, and how to efficiently achieve long-term changes.
Resumo:
Production of a new system in any range is expanding dramatically and new ideas are there upon introduced, the logic stands behind the matter is the growth of application of the internet and granting web-based systems. Before producing a system and distribute to the customer, various aspects should be studied which multiple the profit of the system. The process of productizing a new system from being unprocessed idea until delivers to the final user has been unambiguous. In this thesis, the systematize service in a way that benefits both the customer and provider, along with an effort to establish trust and diminish customer’s risk and increase service productivity are in detail presented. Characteristics of Servitization and Productization as two faces of one coin have been interpreted. Apart from the abovementioned issues state of art, service-oriented architecture (SOA) and New Service Development (NSD) has been included in this report for solving the problem of gradually decline in value of companies.
Resumo:
Internet of Things or IoT is revolutionizing the world we are living in, similarly the way Internet and the web did few decades ago. It is changing how we interact with the things surrounding us. Electronic health and remote patient monitoring are the ways of utilizing these technological improvements towards the healthcare. There are many applications of IoT in eHealth such as, it will open the gate to provide healthcare to the remote areas of the world, where healthcare through traditional hospital systems cannot be provided. To connect these new eHealth IoT systems with the existing healthcare information systems, we can use the existing interoperability standards commonly used in healthcare information systems. In this thesis we implemented an eHealth IoT system based on Health Level 7 interoperability standard for continuous data transmission. There is not much previous work done in implementing the HL7 for continuous sensor data transmission. Some of the previous work was limited to sensors which are not continuous in nature and some of it is only theatrical architecture. This thesis aims to prove that it is possible to implement an eHealth IoT system by using sensors which require continues data transmission, such as respiratory sensors, and to connect it with the existing eHealth information system semantically by using HL7 interoperability standard. This system will be beneficial in implementing eHealth IoT systems for those patients, who requires continuous healthcare personal monitoring. This includes elderly people and patients, whose health need to be monitored constantly. To implement the architecture, HL7 v2.5 is selected due to its ease of implementation and low size. We selected some open source technologies because of their open licenses and large developer community. We will also review the most efficient technology available in every layer of eHealth IoT system and will propose an efficient system.
Resumo:
Quand le E-learning a émergé il ya 20 ans, cela consistait simplement en un texte affiché sur un écran d'ordinateur, comme un livre. Avec les changements et les progrès dans la technologie, le E-learning a parcouru un long chemin, maintenant offrant un matériel éducatif personnalisé, interactif et riche en contenu. Aujourd'hui, le E-learning se transforme de nouveau. En effet, avec la prolifération des systèmes d'apprentissage électronique et des outils d'édition de contenu éducatif, ainsi que les normes établies, c’est devenu plus facile de partager et de réutiliser le contenu d'apprentissage. En outre, avec le passage à des méthodes d'enseignement centrées sur l'apprenant, en plus de l'effet des techniques et technologies Web2.0, les apprenants ne sont plus seulement les récipiendaires du contenu d'apprentissage, mais peuvent jouer un rôle plus actif dans l'enrichissement de ce contenu. Par ailleurs, avec la quantité d'informations que les systèmes E-learning peuvent accumuler sur les apprenants, et l'impact que cela peut avoir sur leur vie privée, des préoccupations sont soulevées afin de protéger la vie privée des apprenants. Au meilleur de nos connaissances, il n'existe pas de solutions existantes qui prennent en charge les différents problèmes soulevés par ces changements. Dans ce travail, nous abordons ces questions en présentant Cadmus, SHAREK, et le E-learning préservant la vie privée. Plus précisément, Cadmus est une plateforme web, conforme au standard IMS QTI, offrant un cadre et des outils adéquats pour permettre à des tuteurs de créer et partager des questions de tests et des examens. Plus précisément, Cadmus fournit des modules telles que EQRS (Exam Question Recommender System) pour aider les tuteurs à localiser des questions appropriées pour leur examens, ICE (Identification of Conflits in Exams) pour aider à résoudre les conflits entre les questions contenu dans un même examen, et le Topic Tree, conçu pour aider les tuteurs à mieux organiser leurs questions d'examen et à assurer facilement la couverture des différent sujets contenus dans les examens. D'autre part, SHAREK (Sharing REsources and Knowledge) fournit un cadre pour pouvoir profiter du meilleur des deux mondes : la solidité des systèmes E-learning et la flexibilité de PLE (Personal Learning Environment) tout en permettant aux apprenants d'enrichir le contenu d'apprentissage, et les aider à localiser nouvelles ressources d'apprentissage. Plus précisément, SHAREK combine un système recommandation multicritères, ainsi que des techniques et des technologies Web2.0, tels que le RSS et le web social, pour promouvoir de nouvelles ressources d'apprentissage et aider les apprenants à localiser du contenu adapté. Finalement, afin de répondre aux divers besoins de la vie privée dans le E-learning, nous proposons un cadre avec quatre niveaux de vie privée, ainsi que quatre niveaux de traçabilité. De plus, nous présentons ACES (Anonymous Credentials for E-learning Systems), un ensemble de protocoles, basés sur des techniques cryptographiques bien établies, afin d'aider les apprenants à atteindre leur niveau de vie privée désiré.
Resumo:
Introduction: Avec l’abondance d’information gratuite disponible en ligne, la tâche de trouver, de trier et d’acheminer de l’information pertinente à l’auditoire approprié peut s’avérer laborieuse. En décembre 2010, la Bibliothèque virtuelle canadienne de santé / Canadian Virtual Health Library (BVCS) a formé un comité d’experts afin d’identifier, d’évaluer, de sélectionner et d’organiser des ressources d’intérêt pour les professionnels de la santé. Méthodes: Cette affiche identifiera les décisions techniques du comité d’experts, incluant le système de gestion de contenus retenu, l’utilisation des éléments Dublin Core et des descripteurs Medical Subject Headings pour la description des ressources, et le développement et l’adaptation de taxonomies à partir de la classification MeSH. La traduction française des descripteurs MeSH à l’aide du portail CISMeF sera également abordée. Résultats: Au mois de mai 2011, le comité a lancé la base de données BVCS de ressources en ligne gratuites sur la santé, regroupant plus de 1600 sites web et ressources. Une variété de types de contenus sont représentés, incluant des articles et rapports, des bases de données interactives et des outils de pratique clinique. Discussion: Les bénéfices et défis d’une collaboration pancanadienne virtuelle seront présentés, ainsi que l’inclusion cruciale d’un membre francophone pour composer avec la nature bilingue de la base de données. En lien avec cet aspect du projet, l’affiche sera présentée en français et en anglais. Introduction: With the abundance of freely available online information, the task of finding, filtering and fitting relevant information to the appropriate audience, is daunting. In December 2010 the Canadian Virtual Health Library / Bibliothèque virtuelle canadienne de santé (CVHL) formed an expert committee to identify, evaluate, select and organize resources relevant to health professionals. Methods: This poster will identify the key technical decisions of the expert committee including the content management system used to manage the data, the use of Dublin Core elements and Medical Subject Headings to describe the resources, and the development and adaptation of taxonomies from MeSH classification to catalog resources. The translation of MeSH terms to French using the CiSMeF portal will also be discussed. Results: In May 2010, the committee launched the CVHL database of free web-based health resources. Content ranged from online articles and reports to videos, interactive databases and clinical practice tools, and included more than 1,600 websites and resources. Discussion: The benefits and challenges of a virtual, pan-Canadian collaboration, and the critical inclusion of a Francophone member to address the bilingual nature of the database, will be presented. In keeping with the nature of the project, the poster will be presented in French and English.
Resumo:
Thesis written in co-mentorship with Robert Michaud.
Resumo:
The aim of this study was to investigate service utilization by students and staff in the 18 months following the September 13, 2006, shooting at Dawson College, Montreal, as well as the determinants of this utilization within the context of Canada’s publicly managed healthcare system. Methods A sample of 948 from among the college’s 10,091 students and staff agreed to complete an adapted computer or web-based standardized questionnaire drawn from the Statistics Canada 2002 Canadian Community Health Survey cycle 1.2 on mental health and well-being. Results In the 18 months following the shooting, there was a greater incidence and prevalence not only of PTSD, but also of other anxiety disorders, depression, and substance abuse. Staff and students were as likely to consult a health professional when presenting a mental or substance use disorder, with females more likely to do so than males. Results also indicated that there was relatively high internet use for mental health reasons by students and staff (14% overall). Conclusions Following a major crisis event causing potential mass trauma, even in a society characterized by easy access to public, school and health services and when the population involved is generally well educated, the acceptability of consulting health professionals for mental health or substance use problems represents a barrier. However, safe internet access is one way male and female students and staff can access information and support and it may be useful to further exploit the possibilities afforded by web-based interviews in anonymous environments.
Resumo:
The present study focuses on the stability of the coast, exploitation of the coastal resources, human activities within the study are that extends from Fort Cochin at north to Thottappally at south, central Kerala State and hinterlands, socio-economic problems of the coastal community and the environmental issues arising in the recent past due to human activities. The objective of the study is critically analyse the coastal zone region and prevailing situation and to propose a comprehensive management plan for the sustainable development of the region under study. The thesis covers varied aspects of coastal uses like fisheries, tourism, land use, water resources etc. To critically examine the above scenarios, the ILWIS (Integrated Land and Water Information Systems) – GIS software has been used. A satellite image of the area has been used for the coastline change detection and land use patterns. The outcome of the present study will be beneficial to the various stakeholders within the coastal region and its hinterlands. To further add, this study should find better applications to similar or near-similar situations of Southeast Asia where identical scenarios are noticeable.
Resumo:
Modern computer systems are plagued with stability and security problems: applications lose data, web servers are hacked, and systems crash under heavy load. Many of these problems or anomalies arise from rare program behavior caused by attacks or errors. A substantial percentage of the web-based attacks are due to buffer overflows. Many methods have been devised to detect and prevent anomalous situations that arise from buffer overflows. The current state-of-art of anomaly detection systems is relatively primitive and mainly depend on static code checking to take care of buffer overflow attacks. For protection, Stack Guards and I-leap Guards are also used in wide varieties.This dissertation proposes an anomaly detection system, based on frequencies of system calls in the system call trace. System call traces represented as frequency sequences are profiled using sequence sets. A sequence set is identified by the starting sequence and frequencies of specific system calls. The deviations of the current input sequence from the corresponding normal profile in the frequency pattern of system calls is computed and expressed as an anomaly score. A simple Bayesian model is used for an accurate detection.Experimental results are reported which show that frequency of system calls represented using sequence sets, captures the normal behavior of programs under normal conditions of usage. This captured behavior allows the system to detect anomalies with a low rate of false positives. Data are presented which show that Bayesian Network on frequency variations responds effectively to induced buffer overflows. It can also help administrators to detect deviations in program flow introduced due to errors.
Resumo:
Biometrics deals with the physiological and behavioral characteristics of an individual to establish identity. Fingerprint based authentication is the most advanced biometric authentication technology. The minutiae based fingerprint identification method offer reasonable identification rate. The feature minutiae map consists of about 70-100 minutia points and matching accuracy is dropping down while the size of database is growing up. Hence it is inevitable to make the size of the fingerprint feature code to be as smaller as possible so that identification may be much easier. In this research, a novel global singularity based fingerprint representation is proposed. Fingerprint baseline, which is the line between distal and intermediate phalangeal joint line in the fingerprint, is taken as the reference line. A polygon is formed with the singularities and the fingerprint baseline. The feature vectors are the polygonal angle, sides, area, type and the ridge counts in between the singularities. 100% recognition rate is achieved in this method. The method is compared with the conventional minutiae based recognition method in terms of computation time, receiver operator characteristics (ROC) and the feature vector length. Speech is a behavioural biometric modality and can be used for identification of a speaker. In this work, MFCC of text dependant speeches are computed and clustered using k-means algorithm. A backpropagation based Artificial Neural Network is trained to identify the clustered speech code. The performance of the neural network classifier is compared with the VQ based Euclidean minimum classifier. Biometric systems that use a single modality are usually affected by problems like noisy sensor data, non-universality and/or lack of distinctiveness of the biometric trait, unacceptable error rates, and spoof attacks. Multifinger feature level fusion based fingerprint recognition is developed and the performances are measured in terms of the ROC curve. Score level fusion of fingerprint and speech based recognition system is done and 100% accuracy is achieved for a considerable range of matching threshold
Resumo:
Conceptual Information Systems are based on a formalization of the concept of "concept" as it is discussed in traditional philosophical logic. This formalization supports a human-centered approach to the development of Information Systems. We discuss this approach by means of an implemented Conceptual Information System for supporting IT security management in companies and organizations.