67 research outputs found

    Boosted features for face authentication

    Get PDF
    Boosted features developed using face signatures in combination with Gentle Adaboost algorithm offer alternative features for face authentication and face recognition. Face signatures are face representations extracted from Trace transform and Gentle Adaboost is used to enhance the performance of the features extracted from the face signatures. In this paper, we demonstrate the usefulness of the constructed features with experiments on BANCA database

    Nose tip region detection in 3D facial model across large pose variation and facial expression

    Get PDF
    Detecting nose tip location has become an important task in face analysis. However, for a 3D face model with presence of large rotation variation, detecting nose tip location is certainly a challenging task. In this paper, we propose a method to detect nose tip region in large rotation variation based on the geometrical shape of a nose. Nose region has always been considered as the most protuberant part of a face. Based on convex points of face surface, we use morphological approach to obtain nose tip region candidates consist of highest point density. For each point of each region candidate, a signature is generated and evaluated with trained nose tip tolerance band for matching purpose. The region that contains the point which scores the most is chosen as the final nose tip region. This method can handle large rotation variation, facial expression, combination of all rotations (yaw, pitch and roll) and large non-facial outliers. Combination of two databases has been used; UPMFace and GavabDB as training data set and test data set. The experimental results show that 95.19% nose tip region over 1300 3D face models were correctly detected

    RFID-enabled web-based interface for a chemical storage management system

    Get PDF
    The management of a chemical inventory is necessary for safety purposes as well as for fulfilling regulatory compliance. In most academic laboratories, the management of chemicals is still being done manually, which is time-consuming. As a result, data are not updated and expired chemicals are unintentionally used. This research proposes that UHF Class 1 Gen 2 Radio Frequency Identification (RFID) technology be used in the development of a chemical inventory information system to ease chemical tracking as well as to shorten the inventory process time. An information system integrating RFID data and a web-based rule identification interface was developed. WAMP 2.2.17, PHP 5.3.5 and MySQL 5.5.8 were downloaded and a programming language was written to check the expiration date of the chemicals as well as to produce alert notification status. Wireless technology through GSM modem helped in producing alert messages using the Short Message System (SMS) of the nearly expired chemicals to the handphone of the person in charge in real time

    BER improvement for multi-gigabits-per-second free space optical communications by stabilizing the decision threshold level

    Get PDF
    A new transmission and detection technique namely Double Carrier Modulation/Differential Detection (DCM/Diff.D) for free space optical (FSO) is proposed. The technique employs two beams, one modulated with the data, the other with the inverted version of the same data. A differential detection technique is used at the receiver whereby the inverted data are used as the reference to perform the decision making, as opposed to the fixed threshold used in conventional technique. The probability of error under threshold instability in DCM/Diff.D technique and Intensity Modulation/Direct Detection (IM/DD) technique, is compared. A simulation under heavy rainfall condition of 8.33x10-4 cm/sec at bit rate of 2.5 Gbps with 0 dBm of optical transmitter power shows that this technique achieves an improvement of more then twice of distance of the conventional IM/DD

    On the robustness of measurement of reliability stopping criterion in turbo iterative decoding

    Get PDF
    Measurement of reliability (MOR) stopping criterion is able to terminate early in the low and high signal-to-noise ratio (SNR) while maintaining the bit error rate (BER) performance. However, the performance of MOR is only based on one code structure and hence, the robustness of MOR is still unknown in turbo iterative decoding. Thus, this paper will test the robustness of MOR based on the following parameters: frame size, code structure, channel reliability and code rate. Then, we analyse and compare the average iteration number (AIN) and the BER performance of MOR with the benchmark stopping criterion known as Genie to determine the robustness of MOR. From the analysis, MOR has a BER degradation for low code rate. MOR also fails to perform well if the corret channel reliability is not available at the receiver and this results a large degradation in BER performance. However, MOR has close performance to Genie in terms of BER for various frame sizes, code structures and high code rate with the assistance of correct channel reliability. MOR is also able to save AIN at low SNR as compared to Genie and this can reduce delay and complexity of turbo codes

    RFID-enabled web-based interface for chemical storage management system

    Get PDF
    The management of a chemical inventory is necessary for safety purposes as well as for fulfilling regulatory compliance. In most academic laboratories, the management of chemicals is still being done manually, which is time-consuming. As a result, data are not updated and expired chemicals are unintentionally used. This research proposes that UHF Class 1 Gen 2 Radio Frequency Identification (RFID) technology be used in the development of a chemical inventory information system to ease chemical tracking as well as to shorten the inventory process time. An information system integrating RFID data and a web-based rule identification interface was developed. WAMP 2.2.17, PHP 5.3.5 and MySQL 5.5.8 were downloaded and a programming language was written to check the expiration date of the chemicals as well as to produce alert notification status. Wireless technology through GSM modem helped in producing alert messages using the Short Message System (SMS) of the nearly expired chemicals to the handphone of the person in charge in real time

    Performance of Ultra High Frequency Gen2 Passive Tags Radio Frequency Identification in chemical laboratory environment

    Get PDF
    This research analyzes the performance of Ultra High Frequency (UHF) Gen2 Passive Tags Radio Frequency Identification (RFID) technology as sensing device in chemical laboratory environment. The purpose of this paper is to verify the effectiveness of using RFID for tracking chemical bottles during inventory process in a laboratory. In most laboratories, the chemical tracking process is still being done manually which is very time consuming. The advantages of RFID operaton will help to enhance the effectiveness of chemical inventory management and reduce the process time. An experiment in a laboratory was done to verify the performance of detection rate according to the specifications stated in the manual data sheet. Pre-programmed RFID passive tags were affixed onto chemical bottles and then scanned using RFID reader to detect all output data in a controlled environment. The result showed that certain conditions such as material of the container, tag-reader orientation and the size of chemical bottles play important role to get detected for this type of RFID. From the result, the paper suggested some guidelines to be taken care of during scanning process to get higher percentage of reading rates

    Stabilization of decision threshold for BER improvement using double carrier modulation/differential detection for outdoor optical wireless communications

    Get PDF
    A new transmission and detection technique namely Double Carrier Modulation/Differential Detection (DCM/Diff.D) for outdoor optical wireless (OW) is proposed. The technique employs two beams, one modulated with the data, the other with the inverted version of the same data. A differential detection technique is used at the receiver whereby the inverted data are used as the reference to perform the decision making, as opposed to the fixed threshold used in conventional technique. The probability of error under threshold instability in DCM/Diff.D technique and Intensity Modulation/Direct Detection (IM/DD) technique, is compared. A simulation under heavy rainfall condition of 8.33x10-4 cm/sec at bit rate of 2.5 Gbps with 0 dBm of optical transmitter power shows that this technique achieves an improvement of more then twice of distance of the conventional IM/DD

    Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal

    Get PDF
    Cardiovascular disease (CVD), especially coronary artery disease (CAD) is a leading cause of human morbidity and mortality. CVD involves blockage in the heart or blood vessels (arteries, capillaries and veins). Different techniques are used to check the condition and blockage in the heart. Electrocardiogram (ECG) is one of the medical techniques employed to monitor heart performance and used for the detection of different arrhythmias. Secured transmission of ECG system has transpired as a prospective solution to help the medical practitioner to check the patient's heart condition; either the heart is working normally or has some abnormalities like tachycardia or bradycardia. This study aims to design and develop security enhanced ECG system for secure and privacy-preserving, ECG diagnosing and ECG visualization. The QRS complex method will be used in this work to diagnose the acquired ECG signal. The result obtained from QRS complex method is used to display a healthy or unhealthy patient's condition. The system will alert for further diagnosis if the condition is critical, so it will help medical practitioner for further detection of arrhythmias and medical researcher for further studies. The security and privacy features of the system protect the authenticity and confidentiality of the patient's medical data and are implemented using security enhancing techniques. This problem will be solved by encrypting the signals, using the proposed fully homomorphic encryption (FHE) technique. This study demonstrates contributions by applying these ideas to two classical problems on the natural algorithm calculation and signal processing

    Laser phase noise effect and reduction in self- homodyne optical OFDM transmission system

    Get PDF
    We present a laser phase noise (PN) induced effect of a phase-modulation-to-intensity-modulation conversion noise and noise pedestals underneath each of the orthogonal frequency division multiplexing (OFDM) subcarriers in a selfcoherent optical OFDM transmission using a self-homodyne technique. We provide a statistical analysis on the received symbols using a histogram to demonstrate the effect of a phase rotation term and inter-subcarrier interference individually and collectively. The PN is then compensated using a simple time delay to realign the phase walk-off of the subcarriers relative to the carrier. Significant quadrature improvements of 6.82 dB using 5 MHz laser linewidth over a 720 km transmission length and 5.38 dB using 20 MHz over 240 km have been obtained with 16 quadrature amplitude modulation (QAM) over 15 GHz OFDM signal bandwidth. The technique also significantly reduced an optical-signal-to-noise ratio requirement at the bit error rate of 1 × 10−3 by 16.15 dB for 64-QAM over 160 km. With the delay, the system can tolerate three times the chromatic dispersion-length product
    corecore