Advanced search
Showing result 6 - 10 of 109 essays matching the above criteria.
-
6. Sensory : Designing an Ai-Powered Interactive Artefact for Managing Sensory Overload Experiences
University essay from Malmö universitet/Institutionen för konst, kultur och kommunikation (K3)Abstract : This project aims to explore how interactive technological artefacts can support young adults with sensory overload in their experiences. It intends to investigate the potential of carefully designing technologies tailored to the user's sensory needs of managing and reflecting on the sensory experience, and understanding their patterns. READ MORE
-
7. How do voiceprints age?
University essay from Uppsala universitet/Institutionen för lingvistik och filologiAbstract : Voiceprints, like fingerprints, are a biometric. Where fingerprints record a person's unique pattern on their finger, voiceprints record what a person's voice "sounds like", abstracting away from what the person said. They have been used in speaker recognition, including verification and identification. READ MORE
-
8. Comparative Analysis of Machine Learning Algorithms for Biometric Iris Recognition Systems
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: Biometric identification plays a crucial role in various industries such as retail, and banking. Among the different biometric traits, iris patterns have become a reliable means of identification due to their unique features. In our thesis, we focus on evaluating and comparing different machine learning algorithms for irisrecognition. READ MORE
-
9. Concerns of Power and Policy in the Use of Biometrics by UNHCR
University essay from Uppsala universitet/Teologiska institutionenAbstract : This paper investigates the growing concerns surrounding the utilisation of biometric technology within humanitarian organisations, with a specific focus on the Biometric Information Management System (BIMS) operated by UNHCR. The study is based on a literature review in which themes of concern are first identified in theoretical literature followed by an examination of empirical literature (here termed ‘refugee-including literature’) to see if the concerns are shared. READ MORE
-
10. Privacy Preserving Biometric Multi-factor Authentication
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : This thesis investigates the viability of using Fully Homomorphic Encryption and Machine Learning to construct a privacy-preserving biometric multi-factor authentication system. The system is based on the architecture described as ”Model K - Store distributed, compare distributed” in ISO/IEC 24745:2022 and uses the Torus Fully Homomorphic Encryption scheme proposed by Chillotti et al. READ MORE