884 resultados para Biometric authentication


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Individual Video Training iVT and Annotating Academic Videos AAV: two complementing technologies 1. Recording communication skills training sessions and reviewing them by oneself, with peers, and with tutors has become standard in medical education. Increasing numbers of students paired with restrictions of financial and human resources create a big obstacle to this important teaching method. 2. Everybody who wants to increase efficiency and effectiveness of communication training can get new ideas from our technical solution. 3. Our goal was to increase the effectiveness of communication skills training by supporting self, peer and tutor assessment over the Internet. Two technologies of SWITCH, the national foundation to support IT solutions for Swiss universities, came handy for our project. The first is the authentication and authorization infrastructure providing all Swiss students with a nationwide single login. The second is SWITCHcast which allows automated recording, upload and publication of videos in the Internet. Students start the recording system by entering their single login. This automatically links the video with their password. Within a few hours, they find their video password protected on the Internet. They now can give access to peers and tutors. Additionally, an annotation interface was developed. This software has free text as well as checklist annotations capabilities. Tutors as well as students can create checklists. Tutor’s checklists are not editable by students. Annotations are linked to tracks. Tracks can be private or public. Public means visible to all who have access to the video. Annotation data can be exported for statistical evaluation. 4. The system was well received by students and tutors. Big numbers of videos were processed simultaneously without any problems. 5. iVT http://www.switch.ch/aaa/projects/detail/UNIBE.7 AAV http://www.switch.ch/aaa/projects/detail/ETHZ.9

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Vector control is the mainstay of malaria control programmes. Successful vector control profoundly relies on accurate information on the target mosquito populations in order to choose the most appropriate intervention for a given mosquito species and to monitor its impact. An impediment to identify mosquito species is the existence of morphologically identical sibling species that play different roles in the transmission of pathogens and parasites. Currently PCR diagnostics are used to distinguish between sibling species. PCR based methods are, however, expensive, time-consuming and their development requires a priori DNA sequence information. Here, we evaluated an inexpensive molecular proteomics approach for Anopheles species: matrix assisted laser desorption/ionization time-of-flight mass spectrometry (MALDI-TOF MS). MALDI-TOF MS is a well developed protein profiling tool for the identification of microorganisms but so far has received little attention as a diagnostic tool in entomology. We measured MS spectra from specimens of 32 laboratory colonies and 2 field populations representing 12 Anopheles species including the A. gambiae species complex. An important step in the study was the advancement and implementation of a bioinformatics approach improving the resolution over previously applied cluster analysis. Borrowing tools for linear discriminant analysis from genomics, MALDI-TOF MS accurately identified taxonomically closely related mosquito species, including the separation between the M and S molecular forms of A. gambiae sensu stricto. The approach also classifies specimens from different laboratory colonies; hence proving also very promising for its use in colony authentication as part of quality assurance in laboratory studies. While being exceptionally accurate and robust, MALDI-TOF MS has several advantages over other typing methods, including simple sample preparation and short processing time. As the method does not require DNA sequence information, data can also be reviewed at any later stage for diagnostic or functional patterns without the need for re-designing and re-processing biological material.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Historical information is always relevant for clinical trial design. Additionally, if incorporated in the analysis of a new trial, historical data allow to reduce the number of subjects. This decreases costs and trial duration, facilitates recruitment, and may be more ethical. Yet, under prior-data conflict, a too optimistic use of historical data may be inappropriate. We address this challenge by deriving a Bayesian meta-analytic-predictive prior from historical data, which is then combined with the new data. This prospective approach is equivalent to a meta-analytic-combined analysis of historical and new data if parameters are exchangeable across trials. The prospective Bayesian version requires a good approximation of the meta-analytic-predictive prior, which is not available analytically. We propose two- or three-component mixtures of standard priors, which allow for good approximations and, for the one-parameter exponential family, straightforward posterior calculations. Moreover, since one of the mixture components is usually vague, mixture priors will often be heavy-tailed and therefore robust. Further robustness and a more rapid reaction to prior-data conflicts can be achieved by adding an extra weakly-informative mixture component. Use of historical prior information is particularly attractive for adaptive trials, as the randomization ratio can then be changed in case of prior-data conflict. Both frequentist operating characteristics and posterior summaries for various data scenarios show that these designs have desirable properties. We illustrate the methodology for a phase II proof-of-concept trial with historical controls from four studies. Robust meta-analytic-predictive priors alleviate prior-data conflicts ' they should encourage better and more frequent use of historical data in clinical trials.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the introduction to this special issue on Sociolinguistics and Tourism, we focus on language in tourism as an important window into contemporary forms of economic, political, and social change. Our aim is twofold: (1) to establish and extend ‘sociolinguistics and tourism’ as another social and applied domain of sociolinguistic research; and (2) to use tourism as a lens for a broader discussion of the sociolinguistics of late modernity. To this end, we outline the contours of language and tourism research to date; we consider the (re)conceptualization of key thematics or notions in sociolinguistic research – such as ‘community’, ‘identity’, and ‘language’ itself – as particularly germane to the study of tourism's fleeting encounters; we examine the inevitable tensions between commodification and authenticity; and we explore the links between performances of ‘self’ and ‘other’, and the contestation of different identity positions with regard to social actors’ multilingual repertoires. We illustrate these issues with data examples from several tourist sites, where multilingual resources are deployed for identification, authentication and commodification. Finally, we briefly introduce the papers in this special issue and conclude by commenting on some sociolinguistic consequences of the study of language/s in tourism.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The study purpose was to analyze the effects Integrated Health Solutions (IHS), an employee wellness program that has been implemented for one year on the corporate campus of a major private sector petrochemical company in Houston, TX, has on employee health. ^ Chronic diseases are the leading causes of morbidity and mortality in the United States and are the most preventable of all health problems. The costs of chronic diseases in the working-age adult population include not only health problems and a decrease in quality of life, but also an increase the cost of health care and costs to businesses and employers, both directly and indirectly. These emerging costs to employers as well as the fact that adults now spend the majority of waking hours at the office have increased the interest in worksite health promotion programs that address many of the behavioral factors that lead to chronic conditions. Therefore, implementing and evaluating programs that are aimed at promoting health and decreasing the prevalence of chronic diseases at worksites is very important. ^ Data came from existing data that were collected by IHS staff during employee biometric screenings at the company in 2010 and 2011. Data from employees who participated in screenings in both 2010 and 2011 were grouped into a cohort by IHS staff. ^ One-tailed t-tests were conducted to determine if there were significant improvements in the biometric measures of body fat percentage, BMI, waist circumference, systolic and diastolic blood pressures, total, HDL, and LDL cholesterol levels, triglycerides, blood glucose levels, and cardiac risk ratios. Sensitivity analysis was conducted to determine if there were differences in program outcomes when stratified by age, gender, job type, and time between screenings. ^ Mean differences for the variables from 2010 to 2011 were small and not always in the desired direction for health improvement indicators. Through conducting t-tests, it was found that there were significant improvements in HDL, cardiac risk ratio, and glucose levels. There were significant increases in cholesterol, LDL, and diastolic blood pressures. For the IHS program, it appears that gender, job type, and time between screenings were possible modifiers of program effectiveness. When program outcome measures were stratified by these factors, results suggest that corporate employees had better outcomes than field employees, males had better outcomes overall than females, and more positive program effects were seen for employees with less time between their two screenings. ^ Recommendations for the program based on the results include ensuring validity of instruments and initial and periodic training of measurement procedures and equipment handling, using normative data or benchmarks to decrease chances for biased estimates of program effectiveness, measuring behaviors as well as biometric and physiologic statuses and changes, and collecting level of engagement data.^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this preliminary biometric study of the calcareous nannofossil species Chiasmolithus expansus, Chiasmolithus oamaruensis, and Chiasmolithus altus from the upper middle Eocene to lower Oligocene of Sites 647 and 748, we document a complete gradation of forms among all three species. Chiasmolithus oamaruensis has significantly higher morphologic variance than the other species. The Chiasmolithus population at each site changes from C. expansus to C. oamaruensis and then to C. altus. This may not reflect a true evolutionary sequence because a major reversal in shape change of the central cross-bar structure accompanies this sequence, and because C. altus is morphologically closer to C. expansus than it is to C. oamaruensis. The change in the width of the cross-bar structure is primarily a result of changes in the alignment of the central connecting bar, rather than of changes in the cross-bar angle. At Site 748, two fluctuations in morphology produce sample populations intermediate between all three species. In addition, reported stratigraphic and paleogeographic occurrences of C. oamaruensis and C. altus show different latitudinal distributions. These morphological and distributional patterns may be explained by a continuous morphologic gradient between C. oamaruensis and C. altus, with C. oamaruensis occurring more commonly in cool-water paleoenvironments, and C. altus occurring more commonly in cold-water paleoenvironments. Thus, paleoenvironmental fluctuations at Site 748 may be the cause of the morphologic fluctuations in Chiasmolithus. This hypothesis can be tested against previously proposed evolutionary models by more detailed sampling of sections along a latitudinal transect.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Unattended Wireless Sensor Networks (UWSNs) operate in autonomous or disconnected mode: sensed data is collected periodically by an itinerant sink. Between successive sink visits, sensor-collected data is subject to some unique vulnerabilities. In particular, while the network is unattended, a mobile adversary (capable of subverting up to a fraction of sensors at a time) can migrate between compromised sets of sensors and inject fraudulent data. In this paper, we provide two collaborative authentication techniques that allow an UWSN to maintain integrity and authenticity of sensor data-in the presence of a mobile adversary-until the next sink visit. Proposed schemes use simple, standard, and inexpensive symmetric cryptographic primitives, coupled with key evolution and few message exchanges. We study their security and effectiveness, both analytically and via simulations. We also assess their robustness and show how to achieve the desired trade-off between performance and security.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Liquid crystal properties make them useful for the development of security devices in applications of authentication and detection of fakes. Induced orientation of liquid crystal molecules and birefringence are the two main properties used in security devices. Employing liquid crystal and dichroic colorants, we have developed devices that show, with the aid of a polarizer, multiple images on each side of the device. Rubbed polyimide is used as alignment layer on each substrate of the LC cell. By rubbing the polyimide in different directions in each substrate it is possible to create any kind of symbols, drawings or motifs with a greyscale; the more complex the created device is, the more difficult is to fake it. To identify the motifs it is necessary to use polarized light. Depending on whether the polarizer is located in front of the LC cell or behind it, different motifs from one or the other substrate are shown. The effect arises from the dopant colour dye added to the liquid crystal, the induced orientation and the twist structure. In practice, a grazing reflection on a dielectric surface is polarized enough to see the effect. Any LC flat panel display can obviously be used as backlight as well.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper a layered architecture to spot and characterize vowel segments in running speech is presented. The detection process is based on neuromorphic principles, as is the use of Hebbian units in layers to implement lateral inhibition, band probability estimation and mutual exclusion. Results are presented showing how the association between the acoustic set of patterns and the phonologic set of symbols may be created. Possible applications of this methodology are to be found in speech event spotting, in the study of pathological voice and in speaker biometric characterization, among others.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Establishing trust while preserving privacy is a challenging research problem. In this paper we introduce lambda -congenial secret groups which allow users to recognize trusted partners based on common attributes while preserving their anonymity and privacy. Such protocols are different from authentication protocols, since the latter are based on identities, while the former are based on attributes. Introducing attributes in trust establishment allows a greater flexibility but also brings up several issues. In this paper, we investigate the problem of building trust with attributes by presenting motivating examples, analyzing the security requirements and giving an informal definition. We also survey one of the most related techniques, namely private matching, and finally present solutions based on it.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a study on the effect of blurred images in hand biometrics. Blurred images simulates out-of-focus effects in hand image acquisition, a common consequence of unconstrained, contact-less and platform-free hand biometrics in mobile devices. The proposed biometric system presents a hand image segmentation based on multiscale aggregation, a segmentation method invariant to different changes like noise or blurriness, together with an innovative feature extraction and a template creation, oriented to obtain an invariant performance against blurring effects. The results highlight that the proposed system is invariant to some low degrees of blurriness, requiring an image quality control to detect and correct those images with a high degree of blurriness. The evaluation has considered a synthetic database created based on a publicly available database with 120 individuals. In addition, several biometric techniques could benefit from the approach proposed in this paper, since blurriness is a very common effect in biometric techniques involving image acquisition.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The increasing demand of security oriented to mobile applications has raised the attention to biometrics, as a proper and suitable solution for providing secure environment to mobile devices. With this aim, this document presents a biometric system based on hand geometry oriented to mobile devices, involving a high degree of freedom in terms of illumination, hand rotation and distance to camera. The user takes a picture of their own hand in the free space, without requiring any flat surface to locate the hand, and without removals of rings, bracelets or watches. The proposed biometric system relies on an accurate segmentation procedure, able to isolate hands from any background; a feature extraction, invariant to orientation, illumination, distance to camera and background; and a user classification, based on k-Nearest Neighbor approach, able to provide an accurate results on individual identification. The proposed method has been evaluated with two own databases collected with a HTC mobile. First database contains 120 individuals, with 20 acquisitions of both hands. Second database is a synthetic database, containing 408000 images of hand samples in different backgrounds: tiles, grass, water, sand, soil and the like. The system is able to identify individuals properly with False Reject Rate of 5.78% and False Acceptance Rate of 0.089%, using 60 features (15 features per finger)

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Improving the security of mobile phones is one of the crucial points required to assure the personal information and the operations that can be performed from them. This article presents an authentication procedure consisting of verifying the identity of people by making a signature in the air while holding the mobile phone. Different temporal distance algorithms have been proposed and evaluated through a database of 50 people making their signatures in the air and 6 people trying to forge each of them by studying their records. Approaches based on DTW have obtained better EER results than those based on LCS (2.80% against 3.34%). Besides, different signal normalization methods have been evaluated not finding any with better EER results that when no normalization has carried out.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Biometrics applied to mobile devices are of great interest for security applications. Daily scenarios can benefit of a combination of both the most secure systems and most simple and extended devices. This document presents a hand biometric system oriented to mobile devices, proposing a non-intrusive, contact-less acquisition process where final users should take a picture of their hand in free-space with a mobile device without removals of rings, bracelets or watches. The main contribution of this paper is threefold: firstly, a feature extraction method is proposed, providing invariant hand measurements to previous changes; second contribution consists of providing a template creation based on hand geometric distances, requiring information from only one individual, without considering data from the rest of individuals within the database; finally, a proposal for template matching is proposed, minimizing the intra-class similarity and maximizing the inter-class likeliness. The proposed method is evaluated using three publicly available contact-less, platform-free databases. In addition, the results obtained with these databases will be compared to the results provided by two competitive pattern recognition techniques, namely Support Vector Machines (SVM) and k-Nearest Neighbour, often employed within the literature. Therefore, this approach provides an appropriate solution to adapt hand biometrics to mobile devices, with an accurate results and a non-intrusive acquisition procedure which increases the overall acceptance from the final user.