3,448 research outputs found

    A highly-verified biometric recognition system using an ultra-speed specifically-developed finger vein sensor

    Get PDF
    Currently, Biometrics has been utilized the top five modality of face, voice, IRIs, fingerprint, and palm to identify individuals. Comparatively, these Biometrics systems need complex computation to be slow and an easy target to hack. Alternatively, this work proposes a novel biometrics system of highly secured recognition with low computation time using specifically designed biometrics sensor. Consequently, finger vein recognition has been developed. Although, this recognition requires high point of safety measures comes with its individual experiments. The most prominent one being the vein pattern is very difficult to extract because finger vein images are constantly low in quality, seriously hampering the feature extraction and classification stages. Sophisticated algorithms need to be designed with the conventional hardware for capturing finger-vein images is modified by using red Surface Mounted Diode (SMD) leds. For capturing images, Canon 750D camera is used with micro lens. The integrated micro lens gives better quality images, and with some adjustments it can also capture finger print. Results have been comparatively improvement for SDUMLA-HMT database and extensively evaluated with k-nearest neighbors (KNN) algorithm. The (KNN) algorithm is a simple, easy-to-implement supervised machine learning algorithm that can be used to solve both classification and regression problems. KNN calculations are highly accurate in test data. Using stratified 6- fold analysis on all fingers of all hands in collected database, a maximum accuracy of 100% was achieved with an EER of 0% when select right hand and middle finger, based on the analysis of the 106 persons present in the data set. Many approaches have been used to optimize vein image quality. The proposed system has optimum results as compared to existing related works. The work novelty is due to the hardware design of the sensor within the finger-vein recognition system to obtain, simultaneously, finger vein and finger print at low cost, unlimited users for one device and open source

    Finger vein recognition using two parallel enhancement ppproachs based fuzzy histogram equalization

    Get PDF
    This paper evaluates a set of enhancement stages for finger vein enhancement that not only has low computational complexity but also high distinguishing power. This proposed set of enhancement stages is centered around fuzzy histogram equalization. Two sets of evaluation are carried out: one with the proposed approach and one with another unique approach that was formulated by rearranging and cropping down the preprocessing steps of the original proposed approach. To extract features, a combination of Hierarchical Centroid and Histogram of Gradients was used. Both enhancement stages were evaluated with K Nearest Neighbor and Deep Neural Networks using 6 fold stratified cross validation. Results showed improvement as compared to three latest benchmarks in this field that used 6-fold validation

    Segmental Oriented Liver Surgery

    Get PDF

    Handbook of Vascular Biometrics

    Get PDF

    Biometric Systems

    Get PDF
    Because of the accelerating progress in biometrics research and the latest nation-state threats to security, this book's publication is not only timely but also much needed. This volume contains seventeen peer-reviewed chapters reporting the state of the art in biometrics research: security issues, signature verification, fingerprint identification, wrist vascular biometrics, ear detection, face detection and identification (including a new survey of face recognition), person re-identification, electrocardiogram (ECT) recognition, and several multi-modal systems. This book will be a valuable resource for graduate students, engineers, and researchers interested in understanding and investigating this important field of study

    Handbook of Vascular Biometrics

    Get PDF
    This open access handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric recognition, i.e. vascular biometrics, including finger vein recognition, hand/palm vein recognition, retina recognition, and sclera recognition. After an introductory chapter summarizing the state of the art in and availability of commercial systems and open datasets/open source software, individual chapters focus on specific aspects of one of the biometric modalities, including questions of usability, security, and privacy. The book features contributions from both academia and major industrial manufacturers

    Assessment of surgical performance

    Get PDF
    Surgical patient outcomes are related to technical and non-technical skills of the surgeon. Trauma patient operative and management experience has declined since trainee duty-hour restrictions were mandated in 2003 resulting in less experience in technical surgical skills. The Advanced Surgical Skills for Exposure in Trauma (ASSET) cadaver-based course, teaching vascular exposure and haemorrhage control, was developed to fill this training gap. The aim of this Thesis is to develop surgeon performance metrics and to test surgeons before and after taking the ASSET course to determine whether such training improves performance of peripheral vascular control. The importance of training in surgical vascular control in both civilian and military practice, and a description of current surgical training for trauma are described in Chapter 1. Reviews of existing trauma training courses and surgical performance metrics are provided in Chapters 2 and 3, and show limited testing of training courses and lack of trauma surgical performance metrics. Data collection methods, evaluator training and analysis are described in Chapter 4. Chapter 5 evaluates self-confidence of surgeons performing the vascular control procedures in cadavers compared to the performance evaluated by trained evaluators. Preliminary validation of vascular-control performance metrics and testing of a standardized script with item analysis and inter-rater reliability are discussed in Chapter 6. Testing 40 surgeons performing 3 extremity vascular control procedures before and after training is reported in Chapter 7. ASSET training improves performance, but large performance variability, repeated errors and no improvements were found in some surgeons. Chapter 8 reports how blind video analysis checklist, global rating metrics, error occurrence and recovery show convergent validity with co-located evaluators. Chapter 9 identifies the key findings and implications, innovation of the work described in the Thesis and concludes with the potential impact on military readiness and my personal reflection on what I learnt.  Open Acces

    Pelvitomy through the pubic bone by Gigli's method as an operation in obstetrics

    Get PDF
    The subject will be considered under the following divisions:-PART I.I. History of the operation; II. Technique of the operation; III. Cases reported; IV. Opinions expressed on the operation by those; who have performed it;PART II.I. The anatomy of the field of operation; II. Structures involved in the incision and bone section; III. Complications arising during the operation; IV. Comparison with symphysiotomy as to:- 1. Lesions of soft parts. 2. Future condition of the Pelvis. (a) Trouble at the point where the pelvis was opened; (b) Prolapse; (c) Urinary trouble; (d) Difficulties presented in repeating the operation; 3. Movements of the Pelvic Bones. V. The Indications for the operation; VI. Suggestions as to the side on which to open the pelvis;. VII. Bibliography

    Biometrics

    Get PDF
    Biometrics uses methods for unique recognition of humans based upon one or more intrinsic physical or behavioral traits. In computer science, particularly, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. The book consists of 13 chapters, each focusing on a certain aspect of the problem. The book chapters are divided into three sections: physical biometrics, behavioral biometrics and medical biometrics. The key objective of the book is to provide comprehensive reference and text on human authentication and people identity verification from both physiological, behavioural and other points of view. It aims to publish new insights into current innovations in computer systems and technology for biometrics development and its applications. The book was reviewed by the editor Dr. Jucheng Yang, and many of the guest editors, such as Dr. Girija Chetty, Dr. Norman Poh, Dr. Loris Nanni, Dr. Jianjiang Feng, Dr. Dongsun Park, Dr. Sook Yoon and so on, who also made a significant contribution to the book

    Mastering Endo-Laparoscopic and Thoracoscopic Surgery

    Get PDF
    This is an open access book. The book focuses mainly on the surgical technique, OR setup, equipments and devices necessary in minimally invasive surgery (MIS). It serves as a compendium of endolaparoscopic surgical procedures. It is an official publication of the Endoscopic and Laparoscopic Surgeons of Asia (ELSA). The book includes various sections covering basic skills set, devices, equipments, OR setup, procedures by area. Each chapter cover introduction, indications and contraindications, pre-operative patient’s assessment and preparation, OT setup (instrumentation required, patient’s position, etc.), step by step description of surgical procedures, management of complications, post-operative care. It includes original illustrations for better understanding and visualization of specific procedures. The book serves as a practical guide for surgical residents, surgical trainees, surgical fellows, junior surgeons, surgical consultants and anyone interested in MIS. It covers most of the basic and advanced laparoscopic and thoracoscopic surgery procedures meeting the curriculum and examination requirements of the residents
    • …
    corecore