135 research outputs found

    An enhanced iris recognition and authentication system using energy measure

    Get PDF
    In order to fight identity fraud, the use of a reliable personal identifier has become a necessity. Using Personal Identification Number (PIN) or a password is no longer secure enough to identify an individual. Iris recognition is considered to be one of the best and accurate form of biometric measurements compared to others, it has become an interesting research area. Iris recognition and authentication has a major issue in its code generation and verification accuracy, in order to enhance the authentication process, a binary bit sequence of iris is generated, which contain several vital information that is used to calculate the Mean Energy and Maximum Energy that goes into the eye with an adopted Threshold Value. The information generated can further be used to find out different eye ailments. An iris is obtained using a predefined iris image which is scanned through eight (8) different stages and wavelet packet decomposition is used to generate 64 wavelet packages bit iris code so as to match the iris codes with Hamming distance criteria and evaluate different energy values. The system showed 98% True Acceptance Rate and 1% False Rejection Rate and this is because some of the irises weren’t properly captured during iris acquisition phase. The system is implemented using UBIRIS v.1 Database.Keywords: Local Image Properties, Authentication Enhancement, Iris Authentication, Local Image, Iris Recognition, Binary Bit Sequenc

    A Review of Voice-Base Person Identification: State-of-the-Art

    Get PDF
    Automated person identification and authentication systems are useful for national security, integrity of electoral processes, prevention of cybercrimes and many access control applications. This is a critical component of information and communication technology which is central to national development. The use of biometrics systems in identification is fast replacing traditional methods such as use of names, personal identification numbers codes, password, etc., since nature bestow individuals with distinct personal imprints and signatures. Different measures have been put in place for person identification, ranging from face, to fingerprint and so on. This paper highlights the key approaches and schemes developed in the last five decades for voice-based person identification systems. Voice-base recognition system has gained interest due to its non-intrusive technique of data acquisition and its increasing method of continually studying and adapting to the person’s changes. Information on the benefits and challenges of various biometric systems are also presented in this paper. The present and prominent voice-based recognition methods are discussed. It was observed that these systems application areas have covered intelligent monitoring, surveillance, population management, election forensics, immigration and border control

    An experimental study on the deformation behaviour and fracture mode of recycled aluminium alloy AA6061-reinforced alumina oxide undergoing high-velocity impact

    Get PDF
    The anisotropic behaviour and the damage evolution of recycled aluminium alloy-reinforced alumina oxide are investigated in this paper using Taylor impact test. The test is performed at various impact velocity ranging from 190 to 360 m/s by firing a cylindrical projectile towards anvil target. The deformation behaviour and the fracture modes are analysed using the digitized footprint of the deformed specimens. The damage initiation and the progression are observed around the impact surface and the surface 0.5 cm from the impact area using the scanning electron microscope. The deformed specimens showed several ductile fracture modes of mushrooming, tensile splitting and petalling. The critical impact velocity is defined below 280 m/s. The specimens showed a strong strain-rate dependency due to the damage evolution that is driven by severe localized plastic-strain deformation. The scanning electron microscope analysis showed the damage mechanism progress via voids initiation, growth and coalescence in the material. The micrograph within the footprint surface shows the presence of alumina oxide particles within the specimen. The microstructure analysis shows a significant refinement of the specimen particle at the surface located 0.5 cm above the impact area. ImageJ software is adopted in this work to measure the average size of voids within this surface. Non-symmetrical (ellipse-shaped) footprint around the footprints showed plastic anisotropic behaviour. The results in this paper provide a better understanding of the deformation behaviour of recycled materials subjected to dynamic loading. This information on mechanical response is crucial before any potential application can be established to substitute the primary sources

    Feedback Based Architecture for Reading Check Courtesy Amounts

    Get PDF
    In recent years, a number of large-scale applications continue to rely heavily on the use of paper as the dominant medium, either on intra-organization basis or on inter-organization basis, including paper intensive applications in the check processing application. In many countries, the value of each check is read by human eyes before the check is physically transported, in stages, from the point it was presented to the location of the branch of the bank which issued the blank check to the concerned account holder. Such process of manual reading of each check involves significant time and cost. In this research, a new approach is introduced to read the numerical amount field on the check; also known as the courtesy amount field. In the case of check processing, the segmentation of unconstrained strings into individual digits is a challenging task because one needs to accommodate special cases involving: connected or overlapping digits, broken digits, and digits physically connected to a piece of stroke that belongs to a neighboring digit. The system described in this paper involves three stages: segmentation, normalization, and the recognition of each character using a neural network classifier, with results better than many other methods in the literaratu

    Handwritten Bank Check Recognition of Courtesy Amounts

    Get PDF
    In spite of rapid evolution of electronic techniques, a number of large-scale applications continue to rely on the use of paper as the dominant medium. This is especially true for processing of bank checks. This paper examines the issue of reading the numerical amount field. In the case of checks, the segmentation of unconstrained strings into individual digits is a challenging task because of connected and overlapping digits, broken digits, and digits that are physically connected to pieces of strokes from neighboring digits. The proposed architecture involves four stages: segmentation of the string into individual digits, normalization, recognition of each character using a neural network classifier, and syntactic verification. Overall, this paper highlights the importance of employing a hybrid architecture that incorporates multiple approaches to provide high recognition rates

    A computational framework for complex disease stratification from multiple large-scale datasets.

    Get PDF
    BACKGROUND: Multilevel data integration is becoming a major area of research in systems biology. Within this area, multi-'omics datasets on complex diseases are becoming more readily available and there is a need to set standards and good practices for integrated analysis of biological, clinical and environmental data. We present a framework to plan and generate single and multi-'omics signatures of disease states. METHODS: The framework is divided into four major steps: dataset subsetting, feature filtering, 'omics-based clustering and biomarker identification. RESULTS: We illustrate the usefulness of this framework by identifying potential patient clusters based on integrated multi-'omics signatures in a publicly available ovarian cystadenocarcinoma dataset. The analysis generated a higher number of stable and clinically relevant clusters than previously reported, and enabled the generation of predictive models of patient outcomes. CONCLUSIONS: This framework will help health researchers plan and perform multi-'omics big data analyses to generate hypotheses and make sense of their rich, diverse and ever growing datasets, to enable implementation of translational P4 medicine
    • …
    corecore