Search results for "biometric"

showing 10 items of 87 documents

Optimized Parallel Implementation of Face Detection based on GPU component

2015

Display Omitted An algorithm for face detection has been implemented on CPU.An acceleration of this algorithm on GPU migration.Performance of GPU implementation shows the effectiveness of this implementation.Another optimization method on GPU are operated. Face detection is an important aspect for various domains such as: biometrics, video surveillance and human computer interaction. Generally a generic face processing system includes a face detection, or recognition step, as well as tracking and rendering phase. In this paper, we develop a real-time and robust face detection implementation based on GPU component. Face detection is performed by adapting the Viola and Jones algorithm. We hav…

Parallel computingBiometricsComputer Networks and CommunicationsComputer science02 engineering and technologyParallel computing[ SPI.SIGNAL ] Engineering Sciences [physics]/Signal and Image processingFace detectionRendering (computer graphics)CUDACUDA optimizationArtificial Intelligence0202 electrical engineering electronic engineering information engineeringGraphics processorsAdaBoost[ INFO.INFO-ES ] Computer Science [cs]/Embedded SystemsGraphicsWaldBoostFace detectionComputingMilieux_MISCELLANEOUS[SPI.SIGNAL] Engineering Sciences [physics]/Signal and Image processingViola and Jones algorithmAdaBoostGrid020202 computer hardware & architectureShared memoryHardware and Architecture020201 artificial intelligence & image processing[INFO.INFO-ES]Computer Science [cs]/Embedded Systems[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processingSoftware
researchProduct

CORMORANT

2019

People own and carry an increasing number of ubiquitous mobile devices, such as smartphones, tablets, and notebooks. Being small and mobile, those devices have a high propensity to become lost or stolen. Since mobile devices provide access to their owners' digital lives, strong authentication is vital to protect sensitive information and services against unauthorized access. However, at least one in three devices is unprotected, with inconvenience of traditional authentication being the paramount reason. We present the concept of CORMORANT, an approach to significantly reduce the manual burden of mobile user verification through risk-aware, multi-modal biometric, cross-device authentication…

PasswordAuthenticationBiometricsComputer Networks and CommunicationsEvent (computing)Computer science020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreHuman-Computer InteractionInformation sensitivityKeystroke dynamicsHardware and Architecture0202 electrical engineering electronic engineering information engineeringStrong authentication020201 artificial intelligence & image processingcomputerMobile deviceProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
researchProduct

Embedded access points for trusted data and resources access in HPC systems

2010

Biometric authentication systems represent a valid alternative to the conventional username-password based approach for user authentication. However, authentication systems composed of a biometric reader, a smartcard reader, and a networked workstation which perform user authentication via software algorithms have been found to be vulnerable in two areas: firstly in their communication channels between readers and workstation (communication attacks) and secondly through their processing algorithms and/or matching results overriding (replay attacks, confidentiality and integrity threats related to the stored information of the networked workstation). In this paper, a full hardware access poi…

PasswordAuthenticationBiometricsbusiness.industryComputer scienceAccess controlInformation SystemFingerprint recognitionTrusted authenticationTheoretical Computer ScienceSoftwareHardware and ArchitectureEmbedded systemEmbedded biometric authentication systemSmart cardSecurity solutions for user authenticationbusinessReplay attackSoftwareInformation SystemsThe Journal of Supercomputing
researchProduct

An Embedded Biometric Sensor for Ubiquitous Authentication

2013

Communication networks and distributed technologies move people towards the era of ubiquitous computing. An ubiquitous environment needs many authentication sensors for users recognition, in order to provide a secure infrastructure for both user access to resources and services and information management. Today the security requirements must ensure secure and trusted user information to protect sensitive data resource access and they could be used for user traceability inside the platform. Conventional authentication systems, based on username and password, are in crisis since they are not able to guarantee a suitable security level for several applications. Biometric authentication systems…

PasswordInformation managementUser informationSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAuthenticationEngineeringUbiquitous computingBiometricsTraceabilitybusiness.industry FPGA rapid prototypingBiometric identity managementFingerprintSelf-contained sensorUbiquitous authenticationIdentity managementEmbedded systembusinessEmbedded system
researchProduct

Bio-agronomic behaviour and an initial study of the energy properties of Carthamus tinctorius L. and Brassica carinata A. Braun crop residues

2009

In recent years, the agro-energy sector has become of considerable importance, both as a vehicle towards realising the objectives established by the Kyoto protocol and as a means of meeting the ever increasing demand for energy. Biofuels represent one of the most promising forms of renewable energy due to their wide range of applications, although limited by the fact that they do not compete on a cost level with fossil fuels. This study takes a look at the bio-agronomic response and the physical and energetic properties of crop residues of a selection of Carthamus tinctorius L. and Brassica carinata A. Braun accessions in order to evaluate integrating oilseed production with lignocellulosic…

Phenological stages moisture content calorific value biometric and yield dataSettore AGR/02 - Agronomia E Coltivazioni Erbacee
researchProduct

Fingerprint classification based on deep learning approaches: Experimental findings and comparisons

2021

Biometric classification plays a key role in fingerprint characterization, especially in the identification process. In fact, reducing the number of comparisons in biometric recognition systems is essential when dealing with large-scale databases. The classification of fingerprints aims to achieve this target by splitting fingerprints into different categories. The general approach of fingerprint classification requires pre-processing techniques that are usually computationally expensive. Deep Learning is emerging as the leading field that has been successfully applied to many areas, such as image processing. This work shows the performance of pre-trained Convolutional Neural Networks (CNNs…

Physics and Astronomy (miscellaneous)BiometricsComputer scienceGeneral Mathematicsfingerprint featuresfingerprint classification; deep learning; convolutional neural networks; fingerprint featuresConvolutional neural networks Deep learning Fingerprint classification Fingerprint featuresImage processing02 engineering and technologyConvolutional neural networkField (computer science)fingerprint classification020204 information systemsconvolutional neural networksQA1-9390202 electrical engineering electronic engineering information engineeringComputer Science (miscellaneous)Reliability (statistics)business.industryDeep learningFingerprint (computing)deep learningPattern recognitionIdentification (information)Chemistry (miscellaneous)Convolutional neural networks; Deep learning; Fingerprint classification; Fingerprint features020201 artificial intelligence & image processingArtificial intelligencebusinessMathematics
researchProduct

Obesity under full fresh fruit and vegetable access conditions

2021

There is no agreement regarding the role of fresh fruit and vegetables’ affordability, accessibility and availability, or access in general, on obesity rates. In this article we investigated whether access to fresh fruit and vegetables is related to better biometric indicators such as weight and body mass index. Using mediation and matching methods and assuming that farmers and traditional market sellers have easy access to fruit and vegetables, we found that having better access is not associated to a reduction in weight or body mass index. Potential explanations for this result are that better access was not associated with fresh fruit and vegetables’ consumption and fruit and vegetables’…

Physiology030309 nutrition & dieteticsSciencePopulationSocial SciencesBiologyResearch and Analysis MethodsHuman GeographyFood SupplyEducationBody Mass IndexUrban GeographyToxicology03 medical and health sciences0302 clinical medicineSociologyVegetablesComputational TechniquesMedicine and Health SciencesmedicineHumansObesity030212 general & internal medicineeducationEducational AttainmentNutritionMatching methodsConsumption (economics)0303 health scienceseducation.field_of_studyFarmersMultidisciplinaryGeographyBody WeightQRBiology and Life Sciencesfood and beveragesmedicine.diseaseObesityDietPhysiological ParametersBiometricsFoodFruitEarth SciencesMedicineBody mass indexResearch ArticlePLOS ONE
researchProduct

ANALISI BIOMETRICA DI VARIETA’ DI MORUS ALBA AI FINI DELLA IDENTIFICAZIONE E CLASSI- FICAZIONE

2014

Per gli storici c’è ancora una polemica circa l’origine ed il tempo della prima introduzione del gelso in Italia. Molti sono d’accordo che le due principali specie di gelso (Morus alba e M. nigra) provengono dall’Asia, la prima dalla Persia e la seconda dal lontano est. Sembra, comunque, che sia stato il gelso nero (Morus nigra) il primo ad essere adattato e coltivato per i suoi frutti, non solo a fini alimentari ma anche per scopi medicinali dai Greci e dai Romani (Bertelli Bargamaschi, 1994). Il gelso bianco, originario della Cina, è stato introdotto in occidente assieme al baco da seta nel XII secolo. La grande importanza del gelso bianco derivava infatti dal fatto che questo era un alim…

Settore AGR/03 - Arboricoltura Generale E Coltivazioni ArboreeANALISI BIOMETRICA
researchProduct

Hatching Success of Caretta caretta on a Mediterranean Volcanic Beach: Impacts from Environmental Parameters and Substrate Composition

2022

New data on the potential impact of environmental parameters and the mineralogical nature of the substrate on the hatching success of the loggerhead sea turtle Caretta caretta on a volcanic beach on Linosa Island in the central Mediterranean Sea are reported. During 2 years of investigation (2018-19), five nests were observed. The temperature and moisture of the nests were determined along with the grain size and mineralogical nature of the substrate. The temperature values of the nests recorded at depths of 5 and 35 cm showed an average temperature incubation of 32.2°C ± 1.4°C and 32.8°C ± 1.6°C, respectively, with peaks close to 37°C. The sedimentological analysis carried out on two cores…

Settore BIO/07 - EcologiaSettore GEO/02 - Geologia Stratigrafica E SedimentologicaEcologyLoggerhead sea turtle volcanic island Mediterranean Sea sedimentological features moisture temperature biometric parameters malformations.Settore BIO/05 - ZoologiaSettore GEO/07 - Petrologia E PetrografiaEarth-Surface ProcessesWater Science and TechnologyJournal of Coastal Research
researchProduct

Fingerprint Traits and RSA Algorithm Fusion Technique

2012

The present work deals with modern computing systems security issues, focusing on biometric based asymmetric keys generation process. Conventional PKI systems are based on private/public keys generated through RSA or similar algorithms. The present solution embeds biometric information on the private/public keys generation process. In addition the corresponding private key depends on physical or behavioural biometric features and it can be generated when it is needed. Starting from fingerprint acquisition, the biometric identifier is extracted, cyphered, and stored in tamper-resistant smart card to overcome the security problems of centralized databases. Biometric information is then used f…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAuthenticationBiometricsbusiness.industryComputer scienceData_MISCELLANEOUSPublic key infrastructureFingerprint recognitionComputer securitycomputer.software_genreEncryptionPublic-key cryptographyIdentifierFingerprint biometric and encryption algorithm fusion asymetric encryption tecniqueSmart cardbusinessAlgorithmcomputer
researchProduct