Essays about: "biometrics"
Showing result 1 - 5 of 61 essays containing the word biometrics.
-
1. Polar Codes for Biometric Identification Systems
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Biometrics are widely used in identification systems, such as face, fingerprint, iris, etc. Polar code is the only code that can be strictly proved to achieve channel capacity, and it has been proved to be optimal for channel and source coding. READ MORE
-
2. Web-Application for Tracking Exercise and Dietary Habits and Their Effect on Biometrics, with Integrated Coaching
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : The use of mobile or web-applications in combination with different wearable devices to track biometric data such as heart rate and glucose levels has become increasingly common. However, using such applications with the aim of better understanding your health and understanding how biometric data is correlated to your health can be quite challenging. READ MORE
-
3. Predicting Bipolar Mood Disorder using LongShort-Term Memory Neural Networks
University essay from Högskolan Dalarna/Institutionen för information och teknikAbstract : Bipolar mood disorder is a severe mental condition that has multiple episodesof either of two types: manic or depressive. These phases can lead patients tobecome hyperactive, hyper-sexual, lethargic, or even commit suicide — all ofwhich seriously impair the quality of life for patients. READ MORE
-
4. Voice Biometrics Exploring The Boundaries Of Speaker Verification
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Recent advancements in computational power, datasets and models have resulted in significant performanceincreases across various speech and speaker recognition models. This work investigates the capabilities ofusing voice as a biometric tool, namely what is referred to as speaker verification. READ MORE
-
5. Evasion Attacks Against Behavioral Biometric Continuous Authentication Using a Generative Adversarial Network
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The aim of the project was to examine the feasibilityof evading continuous authentication systems with a generativeadversarial network. To this end, a group of supervised andunsupervised state-of-the-art classifiers were trained on a publiclyavailable dataset of stroke patterns on mobile devices. READ MORE
