National Repository of Grey Literature 210 records found  beginprevious198 - 207next  jump to record: Search took 0.01 seconds. 
Biometric data security in medicine
Horňáková, Anna ; Šárek, Milan
The paper analyzes the current status of the use of biometrics in computer security. It offers an overview of the most commonly used anatomical, physiological and behavioral biometric identification methods. The result of the work should be a new complex of methods that will allow reliable identification of the user in the most comfortable way. The resulting application of new security principles will be used to increase the protection of specialized medical record. Furthermore, there is generally conceived to extend the concept of the EHR MUDR other application areas.
Comparative analysis of the quality of biometric methods
Filipčík, Jan ; Šedivá, Zuzana (advisor) ; Basl, Josef (referee)
The main objective is to describe and analyze the types of biometric identification and selected biometric methods and identify their strengths and weaknesses compared to the current document type of identification and verification of persons and compared to other biometric methods and then focus on the relationships and support of biometric methods in terms of IS / ICT services. The work will consist of 5 types of biometric methods namely dactyloscopy, hand geometry scanning, facial scanning, iris scanning and retinal scanning, these methods will be described in their essentials parts, the process of capturing and using the method in practice. A dual rating will be made based on these facts; first will include the sum of the absolute order of biometric methods and then a comparative analysis of pairs of multi-criteria quality biometric methods will be carried out. The evaluation will be determined by ten different criteria with different weights of importance. The aim will be to evaluate the most comprehensive and best method to determine the selection of various other alternative biometric methods.
Biometric systems in businesses and homes
Jarolín, Michael ; Doucek, Petr (advisor) ; Veber, Jaromír (referee)
In my bachelor thesis I focused on biometrics and biometric systems, which are suitable for use in businesses and homes. The main aims of this thesis are to show what choices enterprises have in various sectors and to verify whether deployment of biometric systems in a particular company will increase productivity and profits. The thesis is divided into two parts. The first part is theoretical and deals with biometrics and biometric systems. It mentions the history of biometrics, opportunities offered by the today's market with the systems to the companies in various sectors and factors that influence the implementation of the device. The second part of the thesis deals with particular implementation of biometric attendance system in particular company. The basic hypothesis of the second part is to verify whether the deployment of biometric attendance system will be profitable or not.
Description and comparison of biometric methods in IT
Müller, Pavel ; Balada, Jakub (advisor) ; Buchalcevová, Alena (referee)
The main objectives of this work are the elaboration of the basic facts and principles of the field of biometric identification as a basis for further introduction of five selected biometric techniques (fingerprints, hand geometry, face, voice and eye iris) and consequently also their evaluation and selection of the most promising methods based on four selected summary of the evaluation criteria (cost, reliability, security level and other criteria). Which itself will be done on the basis of facts presented throughout the work and will be designed in such a way that it can be used even in case of choosing of biometric identification method for specific use in practice.
Biometrics Software Testing
Pravlovský, Petr ; Borovcová, Anna (advisor) ; Buchalcevová, Alena (referee)
The thesis introduces fields of biometrics and software testing. The main objective is to introduce the use of biometrics and biometric devices in practice of these days to readers, and also introduce the field of software testing with a more detailed look at testing the biometric devices. Based on the found specifics of testing biometric devices, the author tries to propose improvements to the process of testing these devices.
The use of biometrics in IT
Bílý, Petr ; Balada, Jakub (advisor) ; Šedivá, Zuzana (referee)
Biometrics is increasingly applied in IT (biometric methods today generally use computer technology), mostly used to authenticate users. The aim of this thesis is to describe and compare two selected biometric methods. These methods are fingerprints and scanning of human face. The contribution of this work is to provide information on biometric identification methods, their advantages and disadvantages, and deployment options. If an organization decides to strengthen their security systems with introduction of biometric identification / verification systems, they can find information about these systems, types of sensing devices and their advantages and disadvantages. This work will provide an answer WHY introdukce and use these systems to persons who are responsible for the security policy. The first part after the introduction contains basic concepts in the field of biometric identification, followed by a general overview of the stages of biometric processing (from data collection to their storage), the main areas of use of biometric identification (corporate sphere, security of persons and property, law enforcement agencies and the courts, banking and e-commerce, travel and tourism, and telecommunications), measuring performance in biometrics. Then follow the main chapters of work consisting of two chosen methods of biometric identification (fingerprints and face) and their summaries in the form of mapping advantages and disadvantages.
Evaluation of biometric data and theire usage in authentication system
Peroutka, Tomáš ; Doucek, Petr (advisor) ; Veber, Jaromír (referee)
The goal of this thesis is to introduce the main aspects of biometry, explain particular methods of biometric analysis and determine suitable methods for using in particular authentication system by multicriterial analysis. Our criteria for method analysis are: uniqueness, universality, public acceptability and policy consideration, resistence of fraud, accuracy, speed of comparison, template storage requirements, constancy of human biometric characters. The thesis deals with the effective using of biometric characters in particular authentication system appropriate to requirements for these systems.
Applications of the fingerprint sensing in IT
Rakár, Peter ; Balada, Jakub (advisor) ; Kulovaný, Martin (referee)
The biometrics is a branch with long history. With the arrival of information technologies biometrics also penetrates onto the field of the computer science. Even if there have been specialists concerned with application of biometrics in informatics for decades, state of the biometric technologies does not provide hundred percent reliability. Biometrics in IT is still evolving and with improving technologies from other spheres of the human activity new challenges also arise in biometrics. Biometry of fingerprint is the most common and the most used biometry in practice. The aim of this work is to bring the problem of fingerprints sensing and recognition closer to the reader. Work describes individual characteristics of fingerprints as well as common aspects of all other biometrics. Next concern of the work is the application of fingerprints biometry in practice. It is closer concerned with the most common methods and approaches which are used in implementation of fingerprints sensing, analyzes, recognition and classification in biometric system. The goal of the work is not to create an exact guideline for fingerprints implementation but to make the reader acquainted with possibilities, advantages and weakness of the biometry of fingerprints in context of IT.
Comparsion of classic and modern authentication methods
Koudela, Radek ; Doucek, Petr (advisor) ; Cidlina, Jaroslav (referee)
Owing to the growing significance of data protection and informatics in general, the importance of information system security counts among the most actual topics at this time. The main goal of this work is to give a comprehensive overview of the issue of users' authentication, including current trends on this field. There are also described the principles and working methods of classic and modern authentication methods, and listed their pros and cons. The main benefit lies in the comparison of these methods as well as in the evaluation of their deployment. As a result of this are suggestions, which can managers take into account when deciding about the method of authentication, and a description of weak points that need an attention. One part of this work also includes a reliability and performance test of modern biometric device.

National Repository of Grey Literature : 210 records found   beginprevious198 - 207next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.