44,048 research outputs found

    A Study on the Hand-Geometry's Feature Extraction Algorithm

    Get PDF
    Biometrics is getting more and more attention in recent years for security and other purpose. So far, only fingerprint has seen limited success for on-line security check, since other biometrics verification and identification systems require more complicated and expensive acquisition interfaces and recognition processes. Hand-Geometry has been used for biometric verification and identification because of its acquisition convenience and good verification and identification performance. Therefore, this paper propose Hand-Geometry recognition system based on geometrical of hand. From anatomical point of view, human hand can be characterized by its length, width, thickness, geometrical composition, shapes of the palm, and shape and geometry of the fingers. Unlike palmprint verification Hand-Geometry does not involve extraction of detailed features of the hand(for example, wrinkles on the skin). Whole system is consisted of image acquisition part, processing part, actuator part. Image acquisition part is consisted of image capture board and CCD camera that is image acquisition system. Processing part extracts feature points in hand image that inputted from CCD camera using GAs that imitates nature evolution and has excellent performance in search algorithm. And after extract feature points, image of inputted color scale changes to gray scale, and extracts characteristic data. Finally, feature data that is gotten from processing part is transmitted by printer port and confirmed result of Hand-Geometry recognition through actuator part. This paper proposes Hand-Geometry recognition system having with function such as upside. This system presents verification results based on hand measurements of 100 data about 20 individuals captured over real time. The recognition process has been tested on a size of 320 × 240 image, and result of the recognition process have hit rate of 94% and FAR of 0.021.Abstract 제 1 장 서 론 1 제 2 장 Hand-Geometry 3 제 3 장 영상 획득 시스템 6 3.1 영상 획득 시스템의 구성 6 3.2 이미지 캡쳐 보드 7 3.3 Hand-Geometry의 영상 획득 9 3.4 Hand-Geometry인식의 전반적인 처리 과정 10 제 4 장 GAs를 이용한 특징 데이터 추출 12 4.1 Hand-Geometry의 특징 데이터 13 4.2 GAs를 이용한 특징점 추출 19 제 5 장 Hand-Geometry 특징 데이터 인식 알고리즘 32 5.1 Hand-Geometry의 특징 데이터 인식 32 5.2 Hand-Geometry의 특징 데이터의 인식 실험 35 제 6 장 PC 기반 Hand-Geometry인식 시스템 구현 및 실험 36 6.1 Hand-Geometry인식 시스템 36 6.2 Hand-Geometry인식 시스템의 실험 및 결과 40 제 7 장 결 론 46 참 고 문 헌 47 부 록 4

    Machine Learning and Location Verification in Vehicular Networks

    Full text link
    Location information will play a very important role in emerging wireless networks such as Intelligent Transportation Systems, 5G, and the Internet of Things. However, wrong location information can result in poor network outcomes. It is therefore critical to verify all location information before further utilization in any network operation. In recent years, a number of information-theoretic Location Verification Systems (LVSs) have been formulated in attempts to optimally verify the location information supplied by network users. Such LVSs, however, are somewhat limited since they rely on knowledge of a number of channel parameters for their operation. To overcome such limitations, in this work we introduce a Machine Learning based LVS (ML-LVS). This new form of LVS can adapt itself to changing environments without knowing the channel parameters. Here, for the first time, we use real-world data to show how our ML-LVS can outperform information-theoretic LVSs. We demonstrate this improved performance within the context of vehicular networks using Received Signal Strength (RSS) measurements at multiple verifying base stations. We also demonstrate the validity of the ML-LVS even in scenarios where a sophisticated adversary optimizes her attack location.Comment: 5 pages, 3 figure

    Computational Fluid Dynamic Studies of Vortex Amplifier Design for the Nuclear Industry—I. Steady-State Conditions

    Get PDF
    In this study the effects of changes to the geometry of a vortex amplifier are investigated using computational fluid dynamics (CFD) techniques, in the context of glovebox operations for the nuclear industry. These investigations were required because of anomalous behavior identified when, for operational reasons, a long-established vortex amplifier design was reduced in scale. The aims were (i) to simulate both the anomalous back-flow into the glovebox through the vortex amplifier supply ports, and the precessing vortex core in the amplifier outlet, then (ii) to determine which of the various simulated geometries would best alleviate the supply port back-flow anomaly. Various changes to the geometry of the vortex amplifier were proposed; smoke and air tests were then used to identify a subset of these geometries for subsequent simulation using CFD techniques. Having verified the mesh resolution was sufficient to reproduce the required effects, the code was then validated by comparing the results of the steady-state simulations with the experimental data. The problem is challenging in terms of the range of geometrical and dynamic scales encountered, with consequent impact on mesh quality and turbulence modeling. The anomalous nonaxisymmetric reverse flow in the supply ports of the vortex amplifier has been captured and the mixing in both the chamber and the precessing vortex core has also been successfully reproduced. Finally, by simulating changes to the supply ports that could not be reproduced experimentally at an equivalent cost, the geometry most likely to alleviate the back-flow anomaly has been identified

    Grip-Pattern Recognition for Smart Guns

    Get PDF
    This paper describes the design, implementation and evaluation of a user-verification system for a smart gun, which is based on grip-pattern recognition. An existing pressure sensor consisting of an array of 44 x 44 piezoresistive elements has been used. An interface has been developed to acquire pressure images from the sensor. The values of the pixels in the pressure-pattern images are used as inputs for a verification algorithm, which is currently implemented in software on a computer. The verification algorithm is based on a likelihood-ratio classifier for Gaussian probability densities. First results indicate that it is possible to use grip-pattern recognition for biometric verification, when allowing a certain false-rejection and false-acceptance rate. However, more measurements are needed to give a more reliable indication of the systems performance

    Biometric Authentication System on Mobile Personal Devices

    Get PDF
    We propose a secure, robust, and low-cost biometric authentication system on the mobile personal device for the personal network. The system consists of the following five key modules: 1) face detection; 2) face registration; 3) illumination normalization; 4) face verification; and 5) information fusion. For the complicated face authentication task on the devices with limited resources, the emphasis is largely on the reliability and applicability of the system. Both theoretical and practical considerations are taken. The final system is able to achieve an equal error rate of 2% under challenging testing protocols. The low hardware and software cost makes the system well adaptable to a large range of security applications

    What is the method in applying formal methods to PLC applications?

    Get PDF
    The question we investigate is how to obtain PLC applications with confidence in their proper functioning. Especially, we are interested in the contribution that formal methods can provide for their development. Our maxim is that the place of a particular formal method in the total picture of system development should be made very clear. Developers and customers ought to understand very well what they can rely on or not, and we see our task in trying to make this explicit. Therefore, for us the answer to the question above leads to the following questions: Which parts of the system can be treated formally? What formal methods and tools can be applied? What does their successful application tell (or does not) about the proper functioning of the whole system

    Visual identification by signature tracking

    Get PDF
    We propose a new camera-based biometric: visual signature identification. We discuss the importance of the parameterization of the signatures in order to achieve good classification results, independently of variations in the position of the camera with respect to the writing surface. We show that affine arc-length parameterization performs better than conventional time and Euclidean arc-length ones. We find that the system verification performance is better than 4 percent error on skilled forgeries and 1 percent error on random forgeries, and that its recognition performance is better than 1 percent error rate, comparable to the best camera-based biometrics

    Body language, security and e-commerce

    Get PDF
    Security is becoming an increasingly more important concern both at the desktop level and at the network level. This article discusses several approaches to authenticating individuals through the use of biometric devices. While libraries might not implement such devices, they may appear in the near future of desktop computing, particularly for access to institutional computers or for access to sensitive information. Other approaches to computer security focus on protecting the contents of electronic transmissions and verification of individual users. After a brief overview of encryption technologies, the article examines public-key cryptography which is getting a lot of attention in the business world in what is called public key infrastructure. It also examines other efforts, such as IBM’s Cryptolope, the Secure Sockets Layer of Web browsers, and Digital Certificates and Signatures. Secure electronic transmissions are an important condition for conducting business on the Net. These business transactions are not limited to purchase orders, invoices, and contracts. This could become an important tool for information vendors and publishers to control access to the electronic resources they license. As license negotiators and contract administrators, librarians need to be aware of what is happening in these new technologies and the impact that will have on their operations
    corecore