Advanced search
Showing result 1 - 5 of 68 essays matching the above criteria.
-
1. Force Type ID, a Two-Factor-Authentication based on force sensitive keys and password
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : The conventional computer keyboard keys work as binary switch systems and have stayed the same since the invention of typewriters. With the accelerated progress in forcesensing technology, force-sensitive keyboards have become viable consumer products due to advancements in manufacturing. READ MORE
-
2. Comparative Analysis of Machine Learning Algorithms for Biometric Iris Recognition Systems
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: Biometric identification plays a crucial role in various industries such as retail, and banking. Among the different biometric traits, iris patterns have become a reliable means of identification due to their unique features. In our thesis, we focus on evaluating and comparing different machine learning algorithms for irisrecognition. READ MORE
-
3. Human Digital Shadow : A Conceptual Model for Quantifying Wheel Loader Operator’s Behaviors
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Digital Twin has been a trendy topic for half a century in the engineering field but has recently been criticized for its potential infeasibility. To approach the physical-virtual dual-connection goal, Digital Shadow has been prompted to organize the data into a virtual version for driving insights and supporting decision-making. READ MORE
-
4. Concerns of Power and Policy in the Use of Biometrics by UNHCR
University essay from Uppsala universitet/Teologiska institutionenAbstract : This paper investigates the growing concerns surrounding the utilisation of biometric technology within humanitarian organisations, with a specific focus on the Biometric Information Management System (BIMS) operated by UNHCR. The study is based on a literature review in which themes of concern are first identified in theoretical literature followed by an examination of empirical literature (here termed ‘refugee-including literature’) to see if the concerns are shared. READ MORE
-
5. Detecting Images Outside Training Distribution for Fingerprint Spoof Detection
University essay from Lunds universitet/Matematik LTHAbstract : Artificial neural networks are known to run into issues when given samples that deviate from the training distribution, where the network may confidently provide an incorrect answer. Out-of-distribution detection methods aims to provide a solution to this issue, by detecting data that deviates from the distribution used to train the model. READ MORE