5,680 research outputs found
Insightful classification of crystal structures using deep learning
Computational methods that automatically extract knowledge from data are
critical for enabling data-driven materials science. A reliable identification
of lattice symmetry is a crucial first step for materials characterization and
analytics. Current methods require a user-specified threshold, and are unable
to detect average symmetries for defective structures. Here, we propose a
machine-learning-based approach to automatically classify structures by crystal
symmetry. First, we represent crystals by calculating a diffraction image, then
construct a deep-learning neural-network model for classification. Our approach
is able to correctly classify a dataset comprising more than 100 000 simulated
crystal structures, including heavily defective ones. The internal operations
of the neural network are unraveled through attentive response maps,
demonstrating that it uses the same landmarks a materials scientist would use,
although never explicitly instructed to do so. Our study paves the way for
crystal-structure recognition of - possibly noisy and incomplete -
three-dimensional structural data in big-data materials science.Comment: Nature Communications, in press (2018
A Review of Audio Features and Statistical Models Exploited for Voice Pattern Design
Audio fingerprinting, also named as audio hashing, has been well-known as a
powerful technique to perform audio identification and synchronization. It
basically involves two major steps: fingerprint (voice pattern) design and
matching search. While the first step concerns the derivation of a robust and
compact audio signature, the second step usually requires knowledge about
database and quick-search algorithms. Though this technique offers a wide range
of real-world applications, to the best of the authors' knowledge, a
comprehensive survey of existing algorithms appeared more than eight years ago.
Thus, in this paper, we present a more up-to-date review and, for emphasizing
on the audio signal processing aspect, we focus our state-of-the-art survey on
the fingerprint design step for which various audio features and their
tractable statistical models are discussed.Comment: http://www.iaria.org/conferences2015/PATTERNS15.html ; Seventh
International Conferences on Pervasive Patterns and Applications (PATTERNS
2015), Mar 2015, Nice, Franc
DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent Variable Evolution
Recent research has demonstrated the vulnerability of fingerprint recognition
systems to dictionary attacks based on MasterPrints. MasterPrints are real or
synthetic fingerprints that can fortuitously match with a large number of
fingerprints thereby undermining the security afforded by fingerprint systems.
Previous work by Roy et al. generated synthetic MasterPrints at the
feature-level. In this work we generate complete image-level MasterPrints known
as DeepMasterPrints, whose attack accuracy is found to be much superior than
that of previous methods. The proposed method, referred to as Latent Variable
Evolution, is based on training a Generative Adversarial Network on a set of
real fingerprint images. Stochastic search in the form of the Covariance Matrix
Adaptation Evolution Strategy is then used to search for latent input variables
to the generator network that can maximize the number of impostor matches as
assessed by a fingerprint recognizer. Experiments convey the efficacy of the
proposed method in generating DeepMasterPrints. The underlying method is likely
to have broad applications in fingerprint security as well as fingerprint
synthesis.Comment: 8 pages; added new verification systems and diagrams. Accepted to
conference Biometrics: Theory, Applications, and Systems 201
Fingerprinting Smart Devices Through Embedded Acoustic Components
The widespread use of smart devices gives rise to both security and privacy
concerns. Fingerprinting smart devices can assist in authenticating physical
devices, but it can also jeopardize privacy by allowing remote identification
without user awareness. We propose a novel fingerprinting approach that uses
the microphones and speakers of smart phones to uniquely identify an individual
device. During fabrication, subtle imperfections arise in device microphones
and speakers which induce anomalies in produced and received sounds. We exploit
this observation to fingerprint smart devices through playback and recording of
audio samples. We use audio-metric tools to analyze and explore different
acoustic features and analyze their ability to successfully fingerprint smart
devices. Our experiments show that it is even possible to fingerprint devices
that have the same vendor and model; we were able to accurately distinguish
over 93% of all recorded audio clips from 15 different units of the same model.
Our study identifies the prominent acoustic features capable of fingerprinting
devices with high success rate and examines the effect of background noise and
other variables on fingerprinting accuracy
ATTENDANCE MANAGEMENT SYSTEM USING BIOMETRIC FINGERPRINT AUTHENTICATION TECHNOLOGY (FAT)
This Final Year Project Part II final report concerns with the approach to an
online system called Attendance Management System using Biometric Fingerprint
Authentication Technology (FAT) proposed for Universiti Teknologi PETRONAS. In
current system, students' attendance is tracked manually using attendance sheet. The
paper will be passed around and students are required to sign on it. Later, lecturer will
check the paper and mark onthe empty column. Basically, the system is proposed so that
it can capture student's daily attendance accurately because it will use fingerprint as the
main input to access the system. It can help to enable the lecturer to reduce the buddy
signed on and unauthorized attendance. This system will involve some hardware devices
such as fingerprint reader and also some software to support this system. It is developed
mainly using PHP and MySQL. The system can be seen as reliable andconvenient since
fingerprint authentication is oneof the most reliable authentication methods. This system
is built so that it can solve the problem occurred with the current system and provide
more accuratestudent daily attendance details for future used
- …