Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
A new design for a compact portable lab-on-a-chip instrument based on MCE and dual capacitively coupled contactless conductivity detection (dC4D) is described. The instrument is battery powered with total dimension of 14 x 25 x 8 cm3 (w x l x h), and weigh ...
Spoofing attacks are one of the security traits that biometric recognition systems are proven to be vulnerable to. When spoofed, a biometric recognition system is bypassed by presenting a copy of the biometric evidence of a valid user. Among all biometric ...
One of the major problems concerning latent fingerprint matching in forensic applications is the poor quality of fingerprint data. Therefore, local quality assessment of fingerprint images is necessary to ensure high biometric performance in this applicati ...
Many online transactions require the sharing of identity information, even though this sharing poses substantial trust challenges, both for the sender and the receiver. For this reason, Internet must provide channels to ensure a secure, reliable, private, ...
The 40 thieves realize that the fortune in their cave is vanishing. A rumor says that Ali Baba has been granted access (in the form of a certificate) to the cave but they need evidence to get justice from the Caliph. On the other hand, Ali Baba wants to be ...
Multiple techniques are presented to implement an ultra-low-power remotely powered implantable system. The temperature is monitored locally by a thermistor-type sensor. The resistive response of the sensor is amplified and resolved in the time-domain. The ...
Vulnerability to spoofing attacks is a serious drawback for many biometric systems. Among all biometric traits, face is the one that is exposed to the most serious threat, since it is exceptionally easy to access. The limited work on fraud detection capabi ...
This work discusses the remote powering link of a passive UHF RFID tag for sensor applications. The design, implementation, and measurements of the base-station antenna, tag antenna, and the rectifier are presented. The base-station antenna is a 50 Ω recta ...
Besides the recognition task, today's biometric systems need to cope with additional problem: spoofing attacks. Up to date, academic research considers spoofing as a binary classification problem: systems are trained to discriminate between real accesses a ...
Besides the recognition task, today's biometric systems need to cope with additional problem: spoofing attacks. Up to date, academic research considers spoofing as a binary classification problem: systems are trained to discriminate between real accesses a ...