National Repository of Grey Literature 198 records found  beginprevious194 - 198  jump to record: Search took 0.01 seconds. 
Description and comparison of biometric methods in IT
Müller, Pavel ; Balada, Jakub (advisor) ; Buchalcevová, Alena (referee)
The main objectives of this work are the elaboration of the basic facts and principles of the field of biometric identification as a basis for further introduction of five selected biometric techniques (fingerprints, hand geometry, face, voice and eye iris) and consequently also their evaluation and selection of the most promising methods based on four selected summary of the evaluation criteria (cost, reliability, security level and other criteria). Which itself will be done on the basis of facts presented throughout the work and will be designed in such a way that it can be used even in case of choosing of biometric identification method for specific use in practice.
Biometrics Software Testing
Pravlovský, Petr ; Borovcová, Anna (advisor) ; Buchalcevová, Alena (referee)
The thesis introduces fields of biometrics and software testing. The main objective is to introduce the use of biometrics and biometric devices in practice of these days to readers, and also introduce the field of software testing with a more detailed look at testing the biometric devices. Based on the found specifics of testing biometric devices, the author tries to propose improvements to the process of testing these devices.
The use of biometrics in IT
Bílý, Petr ; Balada, Jakub (advisor) ; Šedivá, Zuzana (referee)
Biometrics is increasingly applied in IT (biometric methods today generally use computer technology), mostly used to authenticate users. The aim of this thesis is to describe and compare two selected biometric methods. These methods are fingerprints and scanning of human face. The contribution of this work is to provide information on biometric identification methods, their advantages and disadvantages, and deployment options. If an organization decides to strengthen their security systems with introduction of biometric identification / verification systems, they can find information about these systems, types of sensing devices and their advantages and disadvantages. This work will provide an answer WHY introdukce and use these systems to persons who are responsible for the security policy. The first part after the introduction contains basic concepts in the field of biometric identification, followed by a general overview of the stages of biometric processing (from data collection to their storage), the main areas of use of biometric identification (corporate sphere, security of persons and property, law enforcement agencies and the courts, banking and e-commerce, travel and tourism, and telecommunications), measuring performance in biometrics. Then follow the main chapters of work consisting of two chosen methods of biometric identification (fingerprints and face) and their summaries in the form of mapping advantages and disadvantages.
Applications of the fingerprint sensing in IT
Rakár, Peter ; Balada, Jakub (advisor) ; Kulovaný, Martin (referee)
The biometrics is a branch with long history. With the arrival of information technologies biometrics also penetrates onto the field of the computer science. Even if there have been specialists concerned with application of biometrics in informatics for decades, state of the biometric technologies does not provide hundred percent reliability. Biometrics in IT is still evolving and with improving technologies from other spheres of the human activity new challenges also arise in biometrics. Biometry of fingerprint is the most common and the most used biometry in practice. The aim of this work is to bring the problem of fingerprints sensing and recognition closer to the reader. Work describes individual characteristics of fingerprints as well as common aspects of all other biometrics. Next concern of the work is the application of fingerprints biometry in practice. It is closer concerned with the most common methods and approaches which are used in implementation of fingerprints sensing, analyzes, recognition and classification in biometric system. The goal of the work is not to create an exact guideline for fingerprints implementation but to make the reader acquainted with possibilities, advantages and weakness of the biometry of fingerprints in context of IT.
Comparsion of classic and modern authentication methods
Koudela, Radek ; Doucek, Petr (advisor) ; Cidlina, Jaroslav (referee)
Owing to the growing significance of data protection and informatics in general, the importance of information system security counts among the most actual topics at this time. The main goal of this work is to give a comprehensive overview of the issue of users' authentication, including current trends on this field. There are also described the principles and working methods of classic and modern authentication methods, and listed their pros and cons. The main benefit lies in the comparison of these methods as well as in the evaluation of their deployment. As a result of this are suggestions, which can managers take into account when deciding about the method of authentication, and a description of weak points that need an attention. One part of this work also includes a reliability and performance test of modern biometric device.

National Repository of Grey Literature : 198 records found   beginprevious194 - 198  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.