108 research outputs found

    Cognitive Checkpoint: Emerging Technologies for Biometric-Enabled Watchlist Screening

    Get PDF
    This paper revisits the problem of individual risk assessment in the layered security model. It contributes to the concept of balancing security and privacy via cognitive-centric machine called an ’e-interviewer’. Cognitive checkpoint is a cyber-physical security frontier in mass-transit hubs that provides an automated screening using all types of identity (attributed, biometric, and biographical) from both physical and virtual worlds. We investigate how the development of the next generation of watchlist for rapid screening impacts a sensitive balancing mechanism between security and privacy. We identify directions of such an impact, trends in watchlist technologies, and propose ways to mitigate the potential risks

    Unimodal and multimodal biometric sensing systems : a review

    Get PDF
    Biometric systems are used for the verification and identification of individuals using their physiological or behavioral features. These features can be categorized into unimodal and multimodal systems, in which the former have several deficiencies that reduce the accuracy of the system, such as noisy data, inter-class similarity, intra-class variation, spoofing, and non-universality. However, multimodal biometric sensing and processing systems, which make use of the detection and processing of two or more behavioral or physiological traits, have proved to improve the success rate of identification and verification significantly. This paper provides a detailed survey of the various unimodal and multimodal biometric sensing types providing their strengths and weaknesses. It discusses the stages involved in the biometric system recognition process and further discusses multimodal systems in terms of their architecture, mode of operation, and algorithms used to develop the systems. It also touches on levels and methods of fusion involved in biometric systems and gives researchers in this area a better understanding of multimodal biometric sensing and processing systems and research trends in this area. It furthermore gives room for research on how to find solutions to issues on various unimodal biometric systems.http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6287639am2017Electrical, Electronic and Computer Engineerin

    Decision fusion in healthcare and medicine : a narrative review

    Get PDF
    Objective: To provide an overview of the decision fusion (DF) technique and describe the applications of the technique in healthcare and medicine at prevention, diagnosis, treatment and administrative levels. Background: The rapid development of technology over the past 20 years has led to an explosion in data growth in various industries, like healthcare. Big data analysis within the healthcare systems is essential for arriving to a value-based decision over a period of time. Diversity and uncertainty in big data analytics have made it impossible to analyze data by using conventional data mining techniques and thus alternative solutions are required. DF is a form of data fusion techniques that could increase the accuracy of diagnosis and facilitate interpretation, summarization and sharing of information. Methods: We conducted a review of articles published between January 1980 and December 2020 from various databases such as Google Scholar, IEEE, PubMed, Science Direct, Scopus and web of science using the keywords decision fusion (DF), information fusion, healthcare, medicine and big data. A total of 141 articles were included in this narrative review. Conclusions: Given the importance of big data analysis in reducing costs and improving the quality of healthcare; along with the potential role of DF in big data analysis, it is recommended to know the full potential of this technique including the advantages, challenges and applications of the technique before its use. Future studies should focus on describing the methodology and types of data used for its applications within the healthcare sector

    Multimedia Decision Fusion

    Get PDF
    Ph.DDOCTOR OF PHILOSOPH

    3D Palmprint Recognition Using Dempster-Shafer Fusion Theory

    Get PDF
    This paper proposed a novel 3D palmprint recognition algorithm by combining 3D palmprint features using D-S fusion theory. Firstly, the structured light imaging is used to acquire the 3D palmprint data. Secondly, two types of unique features, including mean curvature feature and Gaussian curvature feature, are extracted. Thirdly, the belief function of the mean curvature recognition and the Gaussian curvature recognition was assigned, respectively. Fourthly, the fusion belief function from the proposed method was determined by the Dempster-shafer (D-S) fusion theory. Finally, palmprint recognition was accomplished according to the classification criteria. A 3D palmprint database with 1000 range images from 100 individuals was established, on which extensive experiments were performed. The results show that the proposed method 3D palmprint recognition is much more robust to illumination variations and condition changes of palmprint than MCR and GCR. Meanwhile, by fusing mean curvature and Gaussian curvature feature, the experimental results are promising (the average equal error rate of 0.404%). In the future, imaging technique needs further improvement for a better recognition performance

    Distributed Detection and Fusion in Parallel Sensor Architectures

    Get PDF
    Parallel distributed detection system consists of several separate sensor-detector nodes (separated spatially or by their principles of operation), each with some processing capabilities. These local sensor-detectors send some information on an observed phenomenon to a centrally located Data Fusion Center for aggregation and decision making. Often, the local sensors use electro-mechanical, optical or RF modalities and are known as ``hard'' sensors. For such data sources, the sensor observations have structure and often some tractable statistical distributions which help in weighing their contribution to an integrated global decision. In a distributed detection environment, we often also have ``humans in the loop.''. Humans provide their subjective opinions on these phenomena. These opinions are labeled ``soft'' data. It is of interest to integrate "soft'' decisions, mostly assessments provided by humans, with data from the "hard" sensors, in order to improve global decision reliability. Several techniques were developed to combine data from traditional hard sensors, and a body of work was also created about integration of "soft'' data. However relatively little work was done on combining hard and soft data and decisions in an integrated environment. Our work investigates both "hard'' and "hard/soft'' fusion schemes, and proposes data integration architectures to facilitate heterogeneous sensor data fusion. In the context of "hard'' fusion, one of the contributions of this thesis is an algorithm that provides a globally optimum solution for local detector (hard sensor) design that satisfies a Neyman-Pearson criterion (maximal probability of detection under a fixed upper bound on the global false alarm rate) at the fusion center. Furthermore, the thesis also delves into application of distributed detection techniques in both parallel and sequential frameworks. Specifically, we apply parallel detection and fusion schemes to the problem of real time computer user authentication and sequential Kalman filtering for real time hypoxia detection. In the context of "hard/soft'' fusion, we propose a new Dempster-Shafer evidence theory based approach to facilitate heterogeneous sensor data fusion. Application of the framework to a number of simulated example scenarios showcases the wide range of applicability of the developed approach. We also propose and develop a hierarchical evidence tree based architecture for representing nested human opinions. The proposed framework is versatile enough to deal with both hard and soft source data using the evidence theory framework, it can handle uncertainty as well as data aggregation.Ph.D., Electrical Engineering -- Drexel University, 201

    Advances and Applications of Dezert-Smarandache Theory (DSmT) for Information Fusion (Collected Works), Vol. 4

    Get PDF
    The fourth volume on Advances and Applications of Dezert-Smarandache Theory (DSmT) for information fusion collects theoretical and applied contributions of researchers working in different fields of applications and in mathematics. The contributions (see List of Articles published in this book, at the end of the volume) have been published or presented after disseminating the third volume (2009, http://fs.unm.edu/DSmT-book3.pdf) in international conferences, seminars, workshops and journals. First Part of this book presents the theoretical advancement of DSmT, dealing with Belief functions, conditioning and deconditioning, Analytic Hierarchy Process, Decision Making, Multi-Criteria, evidence theory, combination rule, evidence distance, conflicting belief, sources of evidences with different importance and reliabilities, importance of sources, pignistic probability transformation, Qualitative reasoning under uncertainty, Imprecise belief structures, 2-Tuple linguistic label, Electre Tri Method, hierarchical proportional redistribution, basic belief assignment, subjective probability measure, Smarandache codification, neutrosophic logic, Evidence theory, outranking methods, Dempster-Shafer Theory, Bayes fusion rule, frequentist probability, mean square error, controlling factor, optimal assignment solution, data association, Transferable Belief Model, and others. More applications of DSmT have emerged in the past years since the apparition of the third book of DSmT 2009. Subsequently, the second part of this volume is about applications of DSmT in correlation with Electronic Support Measures, belief function, sensor networks, Ground Moving Target and Multiple target tracking, Vehicle-Born Improvised Explosive Device, Belief Interacting Multiple Model filter, seismic and acoustic sensor, Support Vector Machines, Alarm classification, ability of human visual system, Uncertainty Representation and Reasoning Evaluation Framework, Threat Assessment, Handwritten Signature Verification, Automatic Aircraft Recognition, Dynamic Data-Driven Application System, adjustment of secure communication trust analysis, and so on. Finally, the third part presents a List of References related with DSmT published or presented along the years since its inception in 2004, chronologically ordered
    corecore