This document provides a review of different methods for palmprint recognition. It begins with an introduction to palmprint recognition and the general architecture of a palmprint recognition system, which includes image acquisition, preprocessing, feature extraction, and matching. The document then reviews several related works on palmprint recognition methods. These methods extract different features from palmprint images such as principal lines, minutiae, orientation, and texture. Feature extraction is followed by matching, where templates are compared to determine similarity. The document analyzes and compares the different palmprint recognition approaches.
A Spectral Domain Dominant Feature Extraction Algorithm for Palm-print Recogn...CSCJournals
In this paper, a spectral feature extraction algorithm is proposed for palm-print recognition, which can efficiently capture the detail spatial variations in a palm-print image. The entire image is segmented into several spatial modules and the task of feature extraction is carried out using two dimensional Fourier transform within those spatial modules. A dominant spectral feature selection algorithm is proposed, which offers an advantage of very low feature dimension and results in a very high within-class compactness and between-class separability of the extracted features. A principal component analysis is performed to further reduce the feature dimension. From our extensive experimentations on different palm-print databases, it is found that the performance of the proposed method in terms of recognition accuracy and computational complexity is superior to that of some of the recent methods.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Number Plate Recognition of Still Images in Vehicular Parking SystemIRJET Journal
This document discusses a proposed method for number plate recognition in vehicle parking systems using image processing techniques. It begins with an abstract that outlines the increasing need for automated vehicle management systems due to rising vehicle and traffic volumes. It then provides an overview of the key steps in number plate recognition systems - plate detection, character segmentation, and character recognition. The proposed method uses profile projection for segmentation and neural networks for recognition. The document reviews several existing plate detection methods and their limitations. It proposes a new method that uses edge detection and morphological operations to isolate the license plate from an image while removing noise. Finally, it discusses factors to consider for license plate detection and different image segmentation techniques used in existing automatic number plate recognition systems.
The document discusses a proposed approach for personal identification using palmprint biometrics based on principal line extraction. It begins with an abstract summarizing preprocessing using Gaussian filtering and ROI extraction to smooth images and isolate the palm region. Canny edge detection is then used to extract principal lines by analyzing edge direction and gradient strength. The lines are traced and non-maximum edges suppressed to extract key lines. Templates are generated by dividing images into blocks and identifying those containing lines. Identification is performed by comparing templates to stored ones using distance matching. The document then provides context on palmprint identification and prior approaches before detailing the proposed Canny edge detection based method.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
This document discusses palmprint recognition for biometric identification. It begins with an introduction to biometrics and how palmprint recognition works. Palmprint recognition extracts features like wrinkles and principal lines from palm images. The document then summarizes two research papers on palmprint recognition techniques. One technique enhances palm vein pattern recognition by maintaining orientations and region-based matching. The other extracts line features from palmprint images using complex Gabor wavelets for fast authentication.
A Spectral Domain Dominant Feature Extraction Algorithm for Palm-print Recogn...CSCJournals
In this paper, a spectral feature extraction algorithm is proposed for palm-print recognition, which can efficiently capture the detail spatial variations in a palm-print image. The entire image is segmented into several spatial modules and the task of feature extraction is carried out using two dimensional Fourier transform within those spatial modules. A dominant spectral feature selection algorithm is proposed, which offers an advantage of very low feature dimension and results in a very high within-class compactness and between-class separability of the extracted features. A principal component analysis is performed to further reduce the feature dimension. From our extensive experimentations on different palm-print databases, it is found that the performance of the proposed method in terms of recognition accuracy and computational complexity is superior to that of some of the recent methods.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Number Plate Recognition of Still Images in Vehicular Parking SystemIRJET Journal
This document discusses a proposed method for number plate recognition in vehicle parking systems using image processing techniques. It begins with an abstract that outlines the increasing need for automated vehicle management systems due to rising vehicle and traffic volumes. It then provides an overview of the key steps in number plate recognition systems - plate detection, character segmentation, and character recognition. The proposed method uses profile projection for segmentation and neural networks for recognition. The document reviews several existing plate detection methods and their limitations. It proposes a new method that uses edge detection and morphological operations to isolate the license plate from an image while removing noise. Finally, it discusses factors to consider for license plate detection and different image segmentation techniques used in existing automatic number plate recognition systems.
The document discusses a proposed approach for personal identification using palmprint biometrics based on principal line extraction. It begins with an abstract summarizing preprocessing using Gaussian filtering and ROI extraction to smooth images and isolate the palm region. Canny edge detection is then used to extract principal lines by analyzing edge direction and gradient strength. The lines are traced and non-maximum edges suppressed to extract key lines. Templates are generated by dividing images into blocks and identifying those containing lines. Identification is performed by comparing templates to stored ones using distance matching. The document then provides context on palmprint identification and prior approaches before detailing the proposed Canny edge detection based method.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
This document discusses palmprint recognition for biometric identification. It begins with an introduction to biometrics and how palmprint recognition works. Palmprint recognition extracts features like wrinkles and principal lines from palm images. The document then summarizes two research papers on palmprint recognition techniques. One technique enhances palm vein pattern recognition by maintaining orientations and region-based matching. The other extracts line features from palmprint images using complex Gabor wavelets for fast authentication.
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...IJERA Editor
The multimodal Biometric System using multiple sources of information has been widely recognized. However computational models for multimodal biometrics recognition have only recently received attention. In this paper the fingerprint and palmprint images are chosen and fused together using image fusion methods. The biometric features are subjected to modality extraction. Different fusion methods like average fusion, minimum fusion, maximum fusion, discrete wavelet transform fusion and stationary wavelet transformfusion are implemented for the fusion of extracting modalities. The best fused template is analyzed by applying various fusion metrics. Here the DWT fused image provided better results.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IRJET- Optical Character Recognition using Neural Networks by Classification ...IRJET Journal
This document proposes a method for optical character recognition (OCR) using neural networks and character classification based on symmetry. It involves three main phases: 1) A classification phase that categorizes training characters by their symmetry properties (vertical, horizontal, total, none), 2) A training phase that trains separate neural networks on each classified group, and 3) A recognition phase that preprocesses documents, extracts lines and characters, and recognizes characters using the trained neural networks. Experimental results show the method achieves up to 99.2% accuracy on Arial font without punctuation, outperforming traditional OCR methods. However, it requires 14.01 seconds for full network training.
IRJET - Human Eye Pupil Detection Technique using Center of Gravity MethodIRJET Journal
This document presents a pupil detection technique using the center of gravity method. It first applies Gaussian filtering, double thresholding, and morphological closing to an eye image to isolate the pupil region. It then uses the center of gravity method to calculate the x and y coordinates of the pupil center by dividing the total pixel values in each dimension by the total number of black pixels. Experimental results on the CASIA iris database demonstrate the accuracy of the proposed computationally efficient pupil detection method. A hardware implementation of the technique is also presented, which could be used for real-time iris localization in biometric recognition applications.
IRJET-Analysis of Face Recognition System for Different ClassifierIRJET Journal
M.Manimozhi, A. John Dhanaseely "Analysis of Face Recognition System for Different Classifier ", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net .published by Fast Track Publications
Abstract
Face recognition plays vital role for authenticating system. Human Face recognition is a challenging task in computer vision and pattern recognition. Face recognition has attracted much attention due to its potential value in security and law enforcement applications and its theoretical challenges. Different methods are used for feature extraction and classification. Kernel fisher analysis is used for feature extraction. The performance analysis for Euclidean, support vector machine is evaluated. The whole process is done using MATLAB software. A set of 10 person real time images is taken for our work. The classifier recognizes the similar posture as an output.
IRJET-Comparison of SIFT & SURF Corner Detector as Features and other Machine...IRJET Journal
This document compares the SIFT and SURF corner detection algorithms for extracting features from leaf images that can then be used in machine learning techniques for leaf identification. It proposes using SIFT or SURF to extract features from leaf training images, clustering the features using the CURE algorithm into k clusters, and building a decision tree for each cluster using C4.5 or CART classification. The same process would be applied to unknown leaf images to extract features, match them to the closest cluster, and traverse the corresponding decision tree to identify the leaf.
Recognition of basic kannada characters in scene images using euclidean disIAEME Publication
The document describes a proposed methodology for recognizing basic Kannada characters in scene images using zone-wise horizontal and vertical profile-based features and an Euclidean distance classifier. The methodology involves preprocessing images, extracting 30 features from 15 horizontal and vertical zones, constructing a knowledge base from training images, and recognizing characters in test images by calculating distances between their features and the knowledge base. The method was evaluated on 460 Kannada character images with variations, achieving an average recognition accuracy of 91%.
Enhanced Thinning Based Finger Print RecognitionIJCI JOURNAL
This paper is the implementation of fingerprint recognition system in which the matching is done using the
Minutiae points. The methodology is the extracting & applying matching procedure on the Minutiae points
between the sample fingerprint & fingerprint under question. The main functional blocks of this system
follows steps of Image Thinning, Image Segmentation, Minutiae (feature) point Extraction, & Minutiae
point Matching. The procedure of Enhanced Thinning included for the purpose of decreasing the size of the
memory space used by the fingerprint image database.
IRJET- Prediction of Traffic Signs for Automated Vehicles using Convolutional...IRJET Journal
This document describes a system for using convolutional neural networks to recognize traffic signs for automated vehicles. It begins with background on the problem of traffic accidents and how image recognition technology could help. The proposed system uses pre-processing like frame normalization and edge detection, followed by a convolutional neural network to match signs to a dataset. Fuzzy classification is then applied to improve accuracy. Challenges like processing time and accuracy are addressed by using more accurate filters and TensorFlow algorithms.
This document describes an emotion recognition system that analyzes crowd behavior using machine learning and image processing techniques. The system works in three stages: 1) face detection using Haar cascade algorithms, 2) feature extraction and emotion recognition by converting images to grayscale and using CNN models, and 3) sending alerts based on recognized emotions like anger. The system was able to accurately detect faces and recognize emotions like happy, sad, anger, etc. It sent alerts via Twilio if high levels of anger were detected, allowing for analysis of crowd behavior and monitoring of public safety.
Appearance based static hand gesture alphabet recognitionIAEME Publication
This document describes a system for recognizing static hand gestures in American Sign Language (ASL). It discusses:
1) Using image processing techniques like segmentation, morphological filtering, and contour tracing to extract features from images of hand gestures. Features include centroid, shape, and number of fingers.
2) A classification approach using rule-based recognition based on the extracted features to identify the gesture as a particular letter in the ASL alphabet.
3) The implementation of the system in MATLAB, including steps for image capture, preprocessing, feature extraction, and classification. Experimental results demonstrating recognition of the letter "A" are shown.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...IJTET Journal
Sclera and finger print vein fusion is a new biometric approach for uniquely identifying humans. First, Sclera vein is identified and refined using image enhancement techniques. Then Y shape feature extraction algorithm is used to obtain Y shape pattern which are then fused with finger vein pattern. Second, Finger vein pattern is obtained using CCD camera by passing infrared light through the finger. The obtained image is then enhanced. A line shape feature extraction algorithm is used to get line patterns from enhanced finger vein image. Finally Sclera vein image pattern and Finger vein image pattern were combined to get the final fused image. The image thus obtained can be used to uniquely identify a person. The proposed multimodal system will produce accurate results as it combines two main traits of an individual. Therefore, it can be used in human identification and authentication systems.
A Review on Geometrical Analysis in Character Recognitioniosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
An Assimilated Face Recognition System with effective Gender Recognition RateIRJET Journal
This document summarizes an assimilated face recognition system that can also perform gender recognition. The system conducts experiments using databases like GENDER-FERET and Cambridge AT&T. For face recognition, it uses the Eigenfaces algorithm to extract features and classify faces. For gender recognition, it uses a trainable COSFIRE filter with Gabor filters to obtain face descriptors, which are classified using an SVM classifier. The experiments achieve a gender recognition rate of over 90%. The paper shows that the gender recognition approach outperforms other methods using handcrafted features and raw pixels.
This document summarizes a research paper that proposes a feature level fusion based bimodal biometric authentication system using fingerprint and face recognition with transformation domain techniques. The system extracts fingerprint features using Dual Tree Complex Wavelet Transforms and extracts face features using Discrete Wavelet Transforms. It then concatenates the fingerprint and face features into a single feature vector. Euclidean distance is used to match test biometrics to those stored in a database. The proposed algorithm is shown to achieve better equal error rates and true positive identification rates compared to individual transformation domain techniques.
Classification and Detection of Vehicles using Deep Learningijtsrd
The vehicle classification and detecting its license plate are important tasks in intelligent security and transportation systems. The traditional methods of vehicle classification and detection are highly complex which provides coarse grained results due to suffering from limited viewpoints. Because of the latest achievements of Deep Learning, it was successfully applied to image classification and detection of objects. This paper presents a method based on a convolutional neural network, which consists of two steps vehicle classification and vehicle license plate recognition. Several typical neural network modules have been applied in training and testing the vehicle Classification and detection of license plate model, such as CNN convolutional neural networks , TensorFlow, Tesseract OCR. The proposed method can identify the vehicle type, number plate and other information accurately. This model provides security and log details regarding vehicles by using AI Surveillance. It guides the surveillance operators and assists human resources. With the help of the original training dataset and enriched testing dataset, the algorithm can obtain results with an average accuracy of about 97.32 in the classification and detection of vehicles. By increasing the amount of the data, the mean error and misclassification rate gradually decreases. So, this algorithm which is based on Deep Learning has good superiority and adaptability. When compared to the leading methods in the challenging Image datasets, our deep learning approach obtains highly competitive results. Finally, this paper proposes modern methods for the improvement of the algorithm and prospects the development direction of deep learning in the field of machine learning and artificial intelligence. Madde Pavan Kumar | Dr. K. Manivel | N. Jayanthi "Classification & Detection of Vehicles using Deep Learning" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30353.pdf Paper Url :https://www.ijtsrd.com/engineering/software-engineering/30353/classification-and-detection-of-vehicles-using-deep-learning/madde-pavan-kumar
This document summarizes a research paper on fingerprint identification using wavelet-based feature extraction. The paper proposes a Wavelet-Bands Selection Features (WBSF) method to enhance fingerprint recognition rates. Fingerprint images from 49 individuals were collected and preprocessed before feature extraction. In closed-set tests, recognition rates were initially below 90% but increased to 100% with the WBSF method. The WBSF descriptors provided efficient representation for fingerprint variability. Open-set verification tests on 290 trials from 29 individuals achieved verification rates over 97% using two distance measures. The proposed method effectively extracts wavelet features for fingerprint recognition and verification.
Palmprint Identification Based on Principle Line Using Machine Learning Tech...IJMER
In this paper, we propose principle line based Palmprint Identification method. In this method
to detect principle lines of palm print is with consecutive filtering operations. Smoothing operation is used
to remove image noise. Edge detector operation and closing operation are merged to extract the principle
lines. Binarization yields the binary principle line. The lines detected with the developed scheme are used
to extract textural information using Gray Level Co-occurrence Matrix and Statistical Property Features.
Euclidean distance is used for matching to identify the genuine person and the powerful supervised
classification techniques namely Support Vector classification Machine and Extreme Learning Machine
with kernels like linear, radial basis function is applied to classification. The experimental results on the
PolyU palmprint database demonstrate the feasibility and effectiveness of the higher accuracy and
reduced execution speed shows that our proposed approach.
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationIJERA Editor
The document presents a highly secured palm print authentication system using undecimated bi-orthogonal wavelet (UDBW) transform. The proposed system has three main modules: registration, testing, and palm matching. In the registration module, morphological operations and region of interest extraction are used to preprocess palm images. Distance transform and 3-level UDBW transform are then used to extract low-level features and create feature vectors for registered palm prints. In testing, low-level features are extracted from input palm prints using the same approach. Palm matching involves comparing feature vectors of registered and input palm prints to identify matches. Simulation results show the system provides accurate recognition rates for palm print authentication.
Review of three categories of fingerprint recognition 2prjpublications
This document reviews three categories of fingerprint recognition techniques: correlation-based, minutiae-based, and pattern-based. Minutiae-based matching is the most popular as minutiae points require less storage than images but it is more time-consuming than other methods. The correlation-based method matches entire fingerprint images and handles poor quality prints better but is computationally expensive. Pattern-based matching compares fingerprint swirl/loop patterns but requires consistent image alignment. Challenges include enhancing low-quality images and improving feature extraction, matching, and alignment algorithms.
Review of three categories of fingerprint recognitionprjpublications
This document reviews three categories of fingerprint recognition techniques: correlation-based, minutiae-based, and pattern-based. Minutiae-based matching is the most popular as it uses ridge endings and bifurcations, but it is time-consuming. Pattern-based matching uses a virtual core point and pattern points for alignment. Correlation-based matching superimposes images and computes pixel correlations but is computationally expensive. Challenges include handling low quality images and improving feature extraction and matching accuracy and speed.
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...IJERA Editor
The multimodal Biometric System using multiple sources of information has been widely recognized. However computational models for multimodal biometrics recognition have only recently received attention. In this paper the fingerprint and palmprint images are chosen and fused together using image fusion methods. The biometric features are subjected to modality extraction. Different fusion methods like average fusion, minimum fusion, maximum fusion, discrete wavelet transform fusion and stationary wavelet transformfusion are implemented for the fusion of extracting modalities. The best fused template is analyzed by applying various fusion metrics. Here the DWT fused image provided better results.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IRJET- Optical Character Recognition using Neural Networks by Classification ...IRJET Journal
This document proposes a method for optical character recognition (OCR) using neural networks and character classification based on symmetry. It involves three main phases: 1) A classification phase that categorizes training characters by their symmetry properties (vertical, horizontal, total, none), 2) A training phase that trains separate neural networks on each classified group, and 3) A recognition phase that preprocesses documents, extracts lines and characters, and recognizes characters using the trained neural networks. Experimental results show the method achieves up to 99.2% accuracy on Arial font without punctuation, outperforming traditional OCR methods. However, it requires 14.01 seconds for full network training.
IRJET - Human Eye Pupil Detection Technique using Center of Gravity MethodIRJET Journal
This document presents a pupil detection technique using the center of gravity method. It first applies Gaussian filtering, double thresholding, and morphological closing to an eye image to isolate the pupil region. It then uses the center of gravity method to calculate the x and y coordinates of the pupil center by dividing the total pixel values in each dimension by the total number of black pixels. Experimental results on the CASIA iris database demonstrate the accuracy of the proposed computationally efficient pupil detection method. A hardware implementation of the technique is also presented, which could be used for real-time iris localization in biometric recognition applications.
IRJET-Analysis of Face Recognition System for Different ClassifierIRJET Journal
M.Manimozhi, A. John Dhanaseely "Analysis of Face Recognition System for Different Classifier ", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net .published by Fast Track Publications
Abstract
Face recognition plays vital role for authenticating system. Human Face recognition is a challenging task in computer vision and pattern recognition. Face recognition has attracted much attention due to its potential value in security and law enforcement applications and its theoretical challenges. Different methods are used for feature extraction and classification. Kernel fisher analysis is used for feature extraction. The performance analysis for Euclidean, support vector machine is evaluated. The whole process is done using MATLAB software. A set of 10 person real time images is taken for our work. The classifier recognizes the similar posture as an output.
IRJET-Comparison of SIFT & SURF Corner Detector as Features and other Machine...IRJET Journal
This document compares the SIFT and SURF corner detection algorithms for extracting features from leaf images that can then be used in machine learning techniques for leaf identification. It proposes using SIFT or SURF to extract features from leaf training images, clustering the features using the CURE algorithm into k clusters, and building a decision tree for each cluster using C4.5 or CART classification. The same process would be applied to unknown leaf images to extract features, match them to the closest cluster, and traverse the corresponding decision tree to identify the leaf.
Recognition of basic kannada characters in scene images using euclidean disIAEME Publication
The document describes a proposed methodology for recognizing basic Kannada characters in scene images using zone-wise horizontal and vertical profile-based features and an Euclidean distance classifier. The methodology involves preprocessing images, extracting 30 features from 15 horizontal and vertical zones, constructing a knowledge base from training images, and recognizing characters in test images by calculating distances between their features and the knowledge base. The method was evaluated on 460 Kannada character images with variations, achieving an average recognition accuracy of 91%.
Enhanced Thinning Based Finger Print RecognitionIJCI JOURNAL
This paper is the implementation of fingerprint recognition system in which the matching is done using the
Minutiae points. The methodology is the extracting & applying matching procedure on the Minutiae points
between the sample fingerprint & fingerprint under question. The main functional blocks of this system
follows steps of Image Thinning, Image Segmentation, Minutiae (feature) point Extraction, & Minutiae
point Matching. The procedure of Enhanced Thinning included for the purpose of decreasing the size of the
memory space used by the fingerprint image database.
IRJET- Prediction of Traffic Signs for Automated Vehicles using Convolutional...IRJET Journal
This document describes a system for using convolutional neural networks to recognize traffic signs for automated vehicles. It begins with background on the problem of traffic accidents and how image recognition technology could help. The proposed system uses pre-processing like frame normalization and edge detection, followed by a convolutional neural network to match signs to a dataset. Fuzzy classification is then applied to improve accuracy. Challenges like processing time and accuracy are addressed by using more accurate filters and TensorFlow algorithms.
This document describes an emotion recognition system that analyzes crowd behavior using machine learning and image processing techniques. The system works in three stages: 1) face detection using Haar cascade algorithms, 2) feature extraction and emotion recognition by converting images to grayscale and using CNN models, and 3) sending alerts based on recognized emotions like anger. The system was able to accurately detect faces and recognize emotions like happy, sad, anger, etc. It sent alerts via Twilio if high levels of anger were detected, allowing for analysis of crowd behavior and monitoring of public safety.
Appearance based static hand gesture alphabet recognitionIAEME Publication
This document describes a system for recognizing static hand gestures in American Sign Language (ASL). It discusses:
1) Using image processing techniques like segmentation, morphological filtering, and contour tracing to extract features from images of hand gestures. Features include centroid, shape, and number of fingers.
2) A classification approach using rule-based recognition based on the extracted features to identify the gesture as a particular letter in the ASL alphabet.
3) The implementation of the system in MATLAB, including steps for image capture, preprocessing, feature extraction, and classification. Experimental results demonstrating recognition of the letter "A" are shown.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...IJTET Journal
Sclera and finger print vein fusion is a new biometric approach for uniquely identifying humans. First, Sclera vein is identified and refined using image enhancement techniques. Then Y shape feature extraction algorithm is used to obtain Y shape pattern which are then fused with finger vein pattern. Second, Finger vein pattern is obtained using CCD camera by passing infrared light through the finger. The obtained image is then enhanced. A line shape feature extraction algorithm is used to get line patterns from enhanced finger vein image. Finally Sclera vein image pattern and Finger vein image pattern were combined to get the final fused image. The image thus obtained can be used to uniquely identify a person. The proposed multimodal system will produce accurate results as it combines two main traits of an individual. Therefore, it can be used in human identification and authentication systems.
A Review on Geometrical Analysis in Character Recognitioniosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
An Assimilated Face Recognition System with effective Gender Recognition RateIRJET Journal
This document summarizes an assimilated face recognition system that can also perform gender recognition. The system conducts experiments using databases like GENDER-FERET and Cambridge AT&T. For face recognition, it uses the Eigenfaces algorithm to extract features and classify faces. For gender recognition, it uses a trainable COSFIRE filter with Gabor filters to obtain face descriptors, which are classified using an SVM classifier. The experiments achieve a gender recognition rate of over 90%. The paper shows that the gender recognition approach outperforms other methods using handcrafted features and raw pixels.
This document summarizes a research paper that proposes a feature level fusion based bimodal biometric authentication system using fingerprint and face recognition with transformation domain techniques. The system extracts fingerprint features using Dual Tree Complex Wavelet Transforms and extracts face features using Discrete Wavelet Transforms. It then concatenates the fingerprint and face features into a single feature vector. Euclidean distance is used to match test biometrics to those stored in a database. The proposed algorithm is shown to achieve better equal error rates and true positive identification rates compared to individual transformation domain techniques.
Classification and Detection of Vehicles using Deep Learningijtsrd
The vehicle classification and detecting its license plate are important tasks in intelligent security and transportation systems. The traditional methods of vehicle classification and detection are highly complex which provides coarse grained results due to suffering from limited viewpoints. Because of the latest achievements of Deep Learning, it was successfully applied to image classification and detection of objects. This paper presents a method based on a convolutional neural network, which consists of two steps vehicle classification and vehicle license plate recognition. Several typical neural network modules have been applied in training and testing the vehicle Classification and detection of license plate model, such as CNN convolutional neural networks , TensorFlow, Tesseract OCR. The proposed method can identify the vehicle type, number plate and other information accurately. This model provides security and log details regarding vehicles by using AI Surveillance. It guides the surveillance operators and assists human resources. With the help of the original training dataset and enriched testing dataset, the algorithm can obtain results with an average accuracy of about 97.32 in the classification and detection of vehicles. By increasing the amount of the data, the mean error and misclassification rate gradually decreases. So, this algorithm which is based on Deep Learning has good superiority and adaptability. When compared to the leading methods in the challenging Image datasets, our deep learning approach obtains highly competitive results. Finally, this paper proposes modern methods for the improvement of the algorithm and prospects the development direction of deep learning in the field of machine learning and artificial intelligence. Madde Pavan Kumar | Dr. K. Manivel | N. Jayanthi "Classification & Detection of Vehicles using Deep Learning" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30353.pdf Paper Url :https://www.ijtsrd.com/engineering/software-engineering/30353/classification-and-detection-of-vehicles-using-deep-learning/madde-pavan-kumar
This document summarizes a research paper on fingerprint identification using wavelet-based feature extraction. The paper proposes a Wavelet-Bands Selection Features (WBSF) method to enhance fingerprint recognition rates. Fingerprint images from 49 individuals were collected and preprocessed before feature extraction. In closed-set tests, recognition rates were initially below 90% but increased to 100% with the WBSF method. The WBSF descriptors provided efficient representation for fingerprint variability. Open-set verification tests on 290 trials from 29 individuals achieved verification rates over 97% using two distance measures. The proposed method effectively extracts wavelet features for fingerprint recognition and verification.
Palmprint Identification Based on Principle Line Using Machine Learning Tech...IJMER
In this paper, we propose principle line based Palmprint Identification method. In this method
to detect principle lines of palm print is with consecutive filtering operations. Smoothing operation is used
to remove image noise. Edge detector operation and closing operation are merged to extract the principle
lines. Binarization yields the binary principle line. The lines detected with the developed scheme are used
to extract textural information using Gray Level Co-occurrence Matrix and Statistical Property Features.
Euclidean distance is used for matching to identify the genuine person and the powerful supervised
classification techniques namely Support Vector classification Machine and Extreme Learning Machine
with kernels like linear, radial basis function is applied to classification. The experimental results on the
PolyU palmprint database demonstrate the feasibility and effectiveness of the higher accuracy and
reduced execution speed shows that our proposed approach.
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationIJERA Editor
The document presents a highly secured palm print authentication system using undecimated bi-orthogonal wavelet (UDBW) transform. The proposed system has three main modules: registration, testing, and palm matching. In the registration module, morphological operations and region of interest extraction are used to preprocess palm images. Distance transform and 3-level UDBW transform are then used to extract low-level features and create feature vectors for registered palm prints. In testing, low-level features are extracted from input palm prints using the same approach. Palm matching involves comparing feature vectors of registered and input palm prints to identify matches. Simulation results show the system provides accurate recognition rates for palm print authentication.
Review of three categories of fingerprint recognition 2prjpublications
This document reviews three categories of fingerprint recognition techniques: correlation-based, minutiae-based, and pattern-based. Minutiae-based matching is the most popular as minutiae points require less storage than images but it is more time-consuming than other methods. The correlation-based method matches entire fingerprint images and handles poor quality prints better but is computationally expensive. Pattern-based matching compares fingerprint swirl/loop patterns but requires consistent image alignment. Challenges include enhancing low-quality images and improving feature extraction, matching, and alignment algorithms.
Review of three categories of fingerprint recognitionprjpublications
This document reviews three categories of fingerprint recognition techniques: correlation-based, minutiae-based, and pattern-based. Minutiae-based matching is the most popular as it uses ridge endings and bifurcations, but it is time-consuming. Pattern-based matching uses a virtual core point and pattern points for alignment. Correlation-based matching superimposes images and computes pixel correlations but is computationally expensive. Challenges include handling low quality images and improving feature extraction and matching accuracy and speed.
Review of three categories of fingerprint recognition 2prj_publication
This document reviews three categories of fingerprint recognition techniques: minutiae-based matching, pattern based matching, and correlation-based matching. Minutiae-based matching is the most popular and analyzes ridge endings and bifurcations. Pattern based matching uses fingerprint patterns like loops and whorls. Correlation-based matching overlays images and computes pixel correlations. The document also discusses challenges with fingerprint identification like low quality images and evaluates different enhancement and feature extraction methods.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSijcsit
Biometric matching involves finding similarity between fingerprint images.The accuracy and speed of the
matching algorithmdetermines its effectives. This researchaims at comparing two types of matching
algorithms namely(a) matching using global orientation features and (b) matching using minutia triangulation.The comparison is done using accuracy, time and number of similar features. The experiment is conducted on a datasets of 100 candidates using four (4) fingerprints from each candidate. The data is sampled from a mass registration conducted by a reputable organization in Kenya.Theresearch reveals that fingerprint matching based on algorithm (b) performs better in speed with an average of 38.32 milliseconds
as compared to matching based on algorithm (a) with an average of 563.76 milliseconds. On accuracy,algorithm(a) performs better with an average accuracy of 0.142433 as compared to algorithm (b) with an average accuracy score of 0.004202.
This document presents a simple signature recognition system that uses invariant central moment and modified Zernike moment for feature extraction. The system is divided into preprocessing, feature extraction, and recognition/verification stages. In preprocessing, the input signature image is converted to grayscale and binary, and the region of interest is extracted. Feature extraction uses invariant central moments and Zernike moments to extract shape features. Recognition and verification is performed using a backpropagation neural network for its high accuracy and low computational complexity. The system was tested on a database of 500 signatures from 50 individuals and achieved suitable performance for signature verification.
This document summarizes a research paper about a simple signature recognition system designed using MATLAB. The system extracts features from signatures using invariant central moment and modified Zernike moment for invariant feature extraction. It is divided into preprocessing, feature extraction, and recognition/verification. Preprocessing prepares the signature image for processing. Feature extraction uses invariant central moments and Zernike moments. Recognition uses a backpropagation neural network for classification. The system was tested on a database of 500 signatures from 50 individuals, achieving high accuracy and low computational complexity.
IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of mechanical and civil engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in mechanical and civil engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Cursive Handwriting Recognition System using Feature Extraction and Artif...IRJET Journal
The document describes a system for recognizing cursive handwriting using feature extraction and an artificial neural network. It involves preprocessing scanned images, segmenting them into individual characters, extracting features from the characters using a diagonal scanning method, and classifying the characters using a neural network. This approach provides higher recognition accuracy compared to conventional methods. The key steps are preprocessing images, segmenting into characters, extracting 54 features from each character by moving along diagonals in a grid, and training a neural network classifier on the extracted features.
A Real Time Advance Automated Attendance System using Face-Net AlgorithmIRJET Journal
This document presents a real-time advanced automated attendance system using the Face-Net algorithm. The system uses facial recognition technology to automate the attendance tracking process. It involves developing facial detection and recognition algorithms, a database to store student information, and interfaces for educators. The system captures images of students' faces and matches them to stored data to record attendance in real-time while maintaining privacy. Testing showed the system could accurately detect and recognize faces in classroom settings. The authors aim to contribute to digitizing education administration and allowing educators to focus on teaching.
This document summarizes research on palmprint identification. It begins by introducing palmprint biometrics and principal line features. It then summarizes several existing approaches that extract principal lines using techniques like finite radon transform, gradient images, and morphological operators. The proposed approach is described which uses Canny edge detection to extract principal lines based on edge direction. It preprocesses images, applies Canny edge detection, divides the output into blocks to generate templates, and performs matching. Experimental results on a public database achieve an accuracy of 86% for personal identification.
This document presents a human identification system using gait recognition. The system first detects moving subjects in video sequences and extracts silhouettes using background subtraction. It then calculates motion parameters like joint angles and gait velocity from the silhouettes using Speeded Up Robust Features (SURF) descriptors. These motion parameters are classified using a Meta-sample based sparse representation method, achieving an overall classification rate of 94.6782% on a test dataset. The system provides view-invariant human identification through gait analysis.
This document presents a human identification system using gait biometrics. The system first detects moving subjects in video sequences and extracts silhouettes using background subtraction. It then uses Speeded Up Robust Features (SURF) to detect keypoints and extract descriptors, which are used to calculate gait features like joint angles and velocities. These gait features are classified using Meta-sample based Sparse Representation Classification (MSRC) which achieves an overall classification rate of 94.6782% on a self-collected dataset.
A Review Paper on Personal Identification with An Efficient Method Of Combina...IRJET Journal
This document summarizes a review paper on personal identification using an efficient method to combine left and right palmprint images. It discusses combining left and right palmprint images at the matching score level by obtaining three matching scores - from left palmprint matching, right palmprint matching, and a crossing match between the left query and right training images. Multibiometric techniques like this can improve accuracy over single biometrics. The paper also reviews various palmprint identification methods including line-based, coding-based, representation-based, and SIFT-based approaches.
An Enhanced Authentication System Using Face and Fingerprint Technologiesiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document describes an enhanced authentication system that uses both face recognition and fingerprint verification technologies. It begins with an overview of the general architecture, which divides the system into fingerprint recognition and face recognition parts. It then provides details on the fingerprint enrollment and verification processes, including image enhancement, minutiae extraction, and template matching. Next, it covers the face detection, preprocessing, feature extraction, training, and recognition steps. The system was implemented using VB.NET and a neural network approach. It was tested using various faces and fingerprints, with one template selected per person and remaining images used for training and testing. The results demonstrated the system's ability to perform multi-biometric identification.
IRJET- Survey Paper on Vision based Hand Gesture RecognitionIRJET Journal
This document presents a survey of previous research on vision-based hand gesture recognition. It discusses various methods that have been used, including discrete wavelet transforms, skin color segmentation, orientation histograms, and neural networks. The document proposes a new methodology using webcam image capture, static and dynamic gesture definition, image processing techniques like localization, enhancement, segmentation, and morphological filtering, and a convolutional neural network for classification. The goal is to develop a more efficient and accurate system for hand gesture recognition and human-computer interaction.
Applications of Pattern Recognition Algorithms in Agriculture: A ReviewEswar Publications
Pattern recognition has its roots in artificial intelligence and is a branch of machine learning that focuses on the recognition of patterns and regularities in data. Data can be in the form of image, text, video or any other format. Under normal scenario, pattern recognition is implemented by first formalizing a problem, explain and at last visualize the pattern. In contrast to pattern matching, pattern recognition algorithms generally provide a fair result for all possible inputs by considering statistical variations. Probabilistic classifiers have supported
Agricultural statistical inference for decades. Potential applications of this technique in agriculture are numerous
like pattern recognition from satellite imagery, identifying the type of disease from leaf image, weed detection etc.
This paper explores employment of pattern recognition in an agricultural domain.
Submission Deadline: 30th September 2022
Acceptance Notification: Within Three Days’ time period
Online Publication: Within 24 Hrs. time Period
Expected Date of Dispatch of Printed Journal: 5th October 2022
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
White layer thickness (WLT) formed and surface roughness in wire electric discharge turning (WEDT) of tungsten carbide composite has been made to model through response surface methodology (RSM). A Taguchi’s standard Design of experiments involving five input variables with three levels has been employed to establish a mathematical model between input parameters and responses. Percentage of cobalt content, spindle speed, Pulse on-time, wire feed and pulse off-time were changed during the experimental tests based on the Taguchi’s orthogonal array L27 (3^13). Analysis of variance (ANOVA) revealed that the mathematical models obtained can adequately describe performance within the parameters of the factors considered. There was a good agreement between the experimental and predicted values in this study.
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
The study explores the reasons for a transgender to become entrepreneurs. In this study transgender entrepreneur was taken as independent variable and reasons to become as dependent variable. Data were collected through a structured questionnaire containing a five point Likert Scale. The study examined the data of 30 transgender entrepreneurs in Salem Municipal Corporation of Tamil Nadu State, India. Simple Random sampling technique was used. Garrett Ranking Technique (Percentile Position, Mean Scores) was used as the analysis for the present study to identify the top 13 stimulus factors for establishment of trans entrepreneurial venture. Economic advancement of a nation is governed upon the upshot of a resolute entrepreneurial doings. The conception of entrepreneurship has stretched and materialized to the socially deflated uncharted sections of transgender community. Presently transgenders have smashed their stereotypes and are making recent headlines of achievements in various fields of our Indian society. The trans-community is gradually being observed in a new light and has been trying to achieve prospective growth in entrepreneurship. The findings of the research revealed that the optimistic changes are taking place to change affirmative societal outlook of the transgender for entrepreneurial ventureship. It also laid emphasis on other transgenders to renovate their traditional living. The paper also highlights that legislators, supervisory body should endorse an impartial canons and reforms in Tamil Nadu Transgender Welfare Board Association.
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
Since ages gender difference is always a debatable theme whether caused by nature, evolution or environment. The birth of a transgender is dreadful not only for the child but also for their parents. The pain of living in the wrong physique and treated as second class victimized citizen is outrageous and fully harboured with vicious baseless negative scruples. For so long, social exclusion had perpetuated inequality and deprivation experiencing ingrained malign stigma and besieged victims of crime or violence across their life spans. They are pushed into the murky way of life with a source of eternal disgust, bereft sexual potency and perennial fear. Although they are highly visible but very little is known about them. The common public needs to comprehend the ravaged arrogance on these insensitive souls and assist in integrating them into the mainstream by offering equal opportunity, treat with humanity and respect their dignity. Entrepreneurship in the current age is endorsing the gender fairness movement. Unstable careers and economic inadequacy had inclined one of the gender variant people called Transgender to become entrepreneurs. These tiny budding entrepreneurs resulted in economic transition by means of employment, free from the clutches of stereotype jobs, raised standard of living and handful of financial empowerment. Besides all these inhibitions, they were able to witness a platform for skill set development that ignited them to enter into entrepreneurial domain. This paper epitomizes skill sets involved in trans-entrepreneurs of Thoothukudi Municipal Corporation of Tamil Nadu State and is a groundbreaking determination to sightsee various skills incorporated and the impact on entrepreneurship.
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
The banking and financial services industries are experiencing increased technology penetration. Among them, the banking industry has made technological advancements to better serve the general populace. The economy focused on transforming the banking sector's system into a cashless, paperless, and faceless one. The researcher wants to evaluate the user's intention for utilising a mobile banking application. The study also examines the variables affecting the user's behaviour intention when selecting specific applications for financial transactions. The researcher employed a well-structured questionnaire and a descriptive study methodology to gather the respondents' primary data utilising the snowball sampling technique. The study includes variables like performance expectations, effort expectations, social impact, enabling circumstances, and perceived risk. Each of the aforementioned variables has a major impact on how users utilise mobile banking applications. The outcome will assist the service provider in comprehending the user's history with mobile banking applications.
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
Technology upgradation in banking sector took the economy to view that payment mode towards online transactions using mobile applications. This system enabled connectivity between banks, Merchant and user in a convenient mode. there are various applications used for online transactions such as Google pay, Paytm, freecharge, mobikiwi, oxygen, phonepe and so on and it also includes mobile banking applications. The study aimed at evaluating the predilection of the user in adopting digital transaction. The study is descriptive in nature. The researcher used random sample techniques to collect the data. The findings reveal that mobile applications differ with the quality of service rendered by Gpay and Phonepe. The researcher suggest the Phonepe application should focus on implementing the application should be user friendly interface and Gpay on motivating the users to feel the importance of request for money and modes of payments in the application.
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
The prototype of a voice-based ATM for visually impaired using Arduino is to help people who are blind. This uses RFID cards which contain users fingerprint encrypted on it and interacts with the users through voice commands. ATM operates when sensor detects the presence of one person in the cabin. After scanning the RFID card, it will ask to select the mode like –normal or blind. User can select the respective mode through voice input, if blind mode is selected the balance check or cash withdraw can be done through voice input. Normal mode procedure is same as the existing ATM.
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
There is increasing acceptability of emotional intelligence as a major factor in personality assessment and effective human resource management. Emotional intelligence as the ability to build capacity, empathize, co-operate, motivate and develop others cannot be divorced from both effective performance and human resource management systems. The human person is crucial in defining organizational leadership and fortunes in terms of challenges and opportunities and walking across both multinational and bilateral relationships. The growing complexity of the business world requires a great deal of self-confidence, integrity, communication, conflict and diversity management to keep the global enterprise within the paths of productivity and sustainability. Using the exploratory research design and 255 participants the result of this original study indicates strong positive correlation between emotional intelligence and effective human resource management. The paper offers suggestions on further studies between emotional intelligence and human capital development and recommends for conflict management as an integral part of effective human resource management.
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
Our life journey, in general, is closely defined by the way we understand the meaning of why we coexist and deal with its challenges. As we develop the "inspiration economy", we could say that nearly all of the challenges we have faced are opportunities that help us to discover the rest of our journey. In this note paper, we explore how being faced with the opportunity of being a close carer for an aging parent with dementia brought intangible discoveries that changed our insight of the meaning of the rest of our life journey.
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
The main objective of this study is to analyze the impact of aspects of Organizational Culture on the Effectiveness of the Performance Management System (PMS) in the Health Care Organization at Thanjavur. Organizational Culture and PMS play a crucial role in present-day organizations in achieving their objectives. PMS needs employees’ cooperation to achieve its intended objectives. Employees' cooperation depends upon the organization’s culture. The present study uses exploratory research to examine the relationship between the Organization's culture and the Effectiveness of the Performance Management System. The study uses a Structured Questionnaire to collect the primary data. For this study, Thirty-six non-clinical employees were selected from twelve randomly selected Health Care organizations at Thanjavur. Thirty-two fully completed questionnaires were received.
Living in 21st century in itself reminds all of us the necessity of police and its administration. As more and more we are entering into the modern society and culture, the more we require the services of the so called ‘Khaki Worthy’ men i.e., the police personnel. Whether we talk of Indian police or the other nation’s police, they all have the same recognition as they have in India. But as already mentioned, their services and requirements are different after the like 26th November, 2008 incidents, where they without saving their own lives has sacrificed themselves without any hitch and without caring about their respective family members and wards. In other words, they are like our heroes and mentors who can guide us from the darkness of fear, militancy, corruption and other dark sides of life and so on. Now the question arises, if Gandhi would have been alive today, what would have been his reaction/opinion to the police and its functioning? Would he have some thing different in his mind now what he had been in his mind before the partition or would he be going to start some Satyagraha in the form of some improvement in the functioning of the police administration? Really these questions or rather night mares can come to any one’s mind, when there is too much confusion is prevailing in our minds, when there is too much corruption in the society and when the polices working is also in the questioning because of one or the other case throughout the India. It is matter of great concern that we have to thing over our administration and our practical approach because the police personals are also like us, they are part and parcel of our society and among one of us, so why we all are pin pointing towards them.
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
The goal of this study was to see how talent management affected employee retention in the selected IT organizations in Chennai. The fundamental issue was the difficulty to attract, hire, and retain talented personnel who perform well and the gap between supply and demand of talent acquisition and retaining them within the firms. The study's main goals were to determine the impact of talent management on employee retention in IT companies in Chennai, investigate talent management strategies that IT companies could use to improve talent acquisition, performance management, career planning and formulate retention strategies that the IT firms could use. The respondents were given a structured close-ended questionnaire with the 5 Point Likert Scale as part of the study's quantitative research design. The target population consisted of 289 IT professionals. The questionnaires were distributed and collected by the researcher directly. The Statistical Package for Social Sciences (SPSS) was used to collect and analyse the questionnaire responses. Hypotheses that were formulated for the various areas of the study were tested using a variety of statistical tests. The key findings of the study suggested that talent management had an impact on employee retention. The studies also found that there is a clear link between the implementation of talent management and retention measures. Management should provide enough training and development for employees, clarify job responsibilities, provide adequate remuneration packages, and recognise employees for exceptional performance.
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
Globally, Millions of dollars were spent by the organizations for employing skilled Information Technology (IT) professionals. It is costly to replace unskilled employees with IT professionals possessing technical skills and competencies that aid in interconnecting the business processes. The organization’s employment tactics were forced to alter by globalization along with technological innovations as they consistently diminish to remain lean, outsource to concentrate on core competencies along with restructuring/reallocate personnel to gather efficiency. As other jobs, organizations or professions have become reasonably more appropriate in a shifting employment landscape, the above alterations trigger both involuntary as well as voluntary turnover. The employee view on jobs is also afflicted by the COVID-19 pandemic along with the employee-driven labour market. So, having effective strategies is necessary to tackle the withdrawal rate of employees. By associating Emotional Intelligence (EI) along with Talent Management (TM) in the IT industry, the rise in attrition rate was analyzed in this study. Only 303 respondents were collected out of 350 participants to whom questionnaires were distributed. From the employees of IT organizations located in Bangalore (India), the data were congregated. A simple random sampling methodology was employed to congregate data as of the respondents. Generating the hypothesis along with testing is eventuated. The effect of EI and TM along with regression analysis between TM and EI was analyzed. The outcomes indicated that employee and Organizational Performance (OP) were elevated by effective EI along with TM.
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
By implementing talent management strategy, organizations would have the option to retain their skilled professionals while additionally working on their overall performance. It is the course of appropriately utilizing the ideal individuals, setting them up for future top positions, exploring and dealing with their performance, and holding them back from leaving the organization. It is employee performance that determines the success of every organization. The firm quickly obtains an upper hand over its rivals in the event that its employees having particular skills that cannot be duplicated by the competitors. Thus, firms are centred on creating successful talent management practices and processes to deal with the unique human resources. Firms are additionally endeavouring to keep their top/key staff since on the off chance that they leave; the whole store of information leaves the firm's hands. The study's objective was to determine the impact of talent management on organizational performance among the selected IT organizations in Chennai. The study recommends that talent management limitedly affects performance. On the off chance that this talent is appropriately management and implemented properly, organizations might benefit as much as possible from their maintained assets to support development and productivity, both monetarily and non-monetarily.
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
Banking regulations act of India, 1949 defines banking as “acceptance of deposits for the purpose of lending or investment from the public, repayment on demand or otherwise and withdrawable through cheques, drafts order or otherwise”, the major participants of the Indian financial system are commercial banks, the financial institution encompassing term lending institutions. Investments institutions, specialized financial institution and the state level development banks, non banking financial companies (NBFC) and other market intermediaries such has the stock brokers and money lenders are among the oldest of the certain variants of NBFC and the oldest market participants. The asset quality of banks is one of the most important indicators of their financial health. The Indian banking sector has been facing severe problems of increasing Non- Performing Assets (NPAs). The NPAs growth directly and indirectly affects the quality of assets and profitability of banks. It also shows the efficiency of banks credit risk management and the recovery effectiveness. NPA do not generate any income, whereas, the bank is required to make provisions for such as assets that why is a double edge weapon. This paper outlines the concept of quality of bank loans of different types like Housing, Agriculture and MSME loans in state Haryana of selected public and private sector banks. This study is highlighting problems associated with the role of commercial bank in financing Small and Medium Scale Enterprises (SME). The overall objective of the research was to assess the effect of the financing provisions existing for the setting up and operations of MSMEs in the country and to generate recommendations for more robust financing mechanisms for successful operation of the MSMEs, in turn understanding the impact of MSME loans on financial institutions due to NPA. There are many research conducted on the topic of Non- Performing Assets (NPA) Management, concerning particular bank, comparative study of public and private banks etc. In this paper the researcher is considering the aggregate data of selected public sector and private sector banks and attempts to compare the NPA of Housing, Agriculture and MSME loans in state Haryana of public and private sector banks. The tools used in the study are average and Anova test and variance. The findings reveal that NPA is common problem for both public and private sector banks and is associated with all types of loans either that is housing loans, agriculture loans and loans to SMES. NPAs of both public and private sector banks show the increasing trend. In 2010-11 GNPA of public and private sector were at same level it was 2% but after 2010-11 it increased in many fold and at present there is GNPA in some more than 15%. It shows the dark area of Indian banking sector.
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
An experiment conducted in this study found that BaSO4 changed Nylon 6's mechanical properties. By changing the weight ratios, BaSO4 was used to make Nylon 6. This Researcher looked into how hard Nylon-6/BaSO4 composites are and how well they wear. Experiments were done based on Taguchi design L9. Nylon-6/BaSO4 composites can be tested for their hardness number using a Rockwell hardness testing apparatus. On Nylon/BaSO4, the wear behavior was measured by a wear monitor, pinon-disc friction by varying reinforcement, sliding speed, and sliding distance, and the microstructure of the crack surfaces was observed by SEM. This study provides significant contributions to ultimate strength by increasing BaSO4 content up to 16% in the composites, and sliding speed contributes 72.45% to the wear rate
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
The majority of the population in India lives in villages. The village is the back bone of the country. Village or rural industries play an important role in the national economy, particularly in the rural development. Developing the rural economy is one of the key indicators towards a country’s success. Whether it be the need to look after the welfare of the farmers or invest in rural infrastructure, Governments have to ensure that rural development isn’t compromised. The economic development of our country largely depends on the progress of rural areas and the standard of living of rural masses. Village or rural industries play an important role in the national economy, particularly in the rural development. Rural entrepreneurship is based on stimulating local entrepreneurial talent and the subsequent growth of indigenous enterprises. It recognizes opportunity in the rural areas and accelerates a unique blend of resources either inside or outside of agriculture. Rural entrepreneurship brings an economic value to the rural sector by creating new methods of production, new markets, new products and generate employment opportunities thereby ensuring continuous rural development. Social Entrepreneurship has the direct and primary objective of serving the society along with the earning profits. So, social entrepreneurship is different from the economic entrepreneurship as its basic objective is not to earn profits but for providing innovative solutions to meet the society needs which are not taken care by majority of the entrepreneurs as they are in the business for profit making as a sole objective. So, the Social Entrepreneurs have the huge growth potential particularly in the developing countries like India where we have huge societal disparities in terms of the financial positions of the population. Still 22 percent of the Indian population is below the poverty line and also there is disparity among the rural & urban population in terms of families living under BPL. 25.7 percent of the rural population & 13.7 percent of the urban population is under BPL which clearly shows the disparity of the poor people in the rural and urban areas. The need to develop social entrepreneurship in agriculture is dictated by a large number of social problems. Such problems include low living standards, unemployment, and social tension. The reasons that led to the emergence of the practice of social entrepreneurship are the above factors. The research problem lays upon disclosing the importance of role of social entrepreneurship in rural development of India. The paper the tendencies of social entrepreneurship in India, to present successful examples of such business for providing recommendations how to improve situation in rural areas in terms of social entrepreneurship development. Indian government has made some steps towards development of social enterprises, social entrepreneurship, and social in- novation, but a lot remains to be improved.
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
Distribution system is a critical link between the electric power distributor and the consumers. Most of the distribution networks commonly used by the electric utility is the radial distribution network. However in this type of network, it has technical issues such as enormous power losses which affect the quality of the supply. Nowadays, the introduction of Distributed Generation (DG) units in the system help improve and support the voltage profile of the network as well as the performance of the system components through power loss mitigation. In this study network reconfiguration was done using two meta-heuristic algorithms Particle Swarm Optimization and Gravitational Search Algorithm (PSO-GSA) to enhance power quality and voltage profile in the system when simultaneously applied with the DG units. Backward/Forward Sweep Method was used in the load flow analysis and simulated using the MATLAB program. Five cases were considered in the Reconfiguration based on the contribution of DG units. The proposed method was tested using IEEE 33 bus system. Based on the results, there was a voltage profile improvement in the system from 0.9038 p.u. to 0.9594 p.u.. The integration of DG in the network also reduced power losses from 210.98 kW to 69.3963 kW. Simulated results are drawn to show the performance of each case.
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
Manufacturing industries have witnessed an outburst in productivity. For productivity improvement manufacturing industries are taking various initiatives by using lean tools and techniques. However, in different manufacturing industries, frugal approach is applied in product design and services as a tool for improvement. Frugal approach contributed to prove less is more and seems indirectly contributing to improve productivity. Hence, there is need to understand status of frugal approach application in manufacturing industries. All manufacturing industries are trying hard and putting continuous efforts for competitive existence. For productivity improvements, manufacturing industries are coming up with different effective and efficient solutions in manufacturing processes and operations. To overcome current challenges, manufacturing industries have started using frugal approach in product design and services. For this study, methodology adopted with both primary and secondary sources of data. For primary source interview and observation technique is used and for secondary source review has done based on available literatures in website, printed magazines, manual etc. An attempt has made for understanding application of frugal approach with the study of manufacturing industry project. Manufacturing industry selected for this project study is Mahindra and Mahindra Ltd. This paper will help researcher to find the connections between the two concepts productivity improvement and frugal approach. This paper will help to understand significance of frugal approach for productivity improvement in manufacturing industry. This will also help to understand current scenario of frugal approach in manufacturing industry. In manufacturing industries various process are involved to deliver the final product. In the process of converting input in to output through manufacturing process productivity plays very critical role. Hence this study will help to evolve status of frugal approach in productivity improvement programme. The notion of frugal can be viewed as an approach towards productivity improvement in manufacturing industries.
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
In this paper, we investigated a queuing model of fuzzy environment-based a multiple channel queuing model (M/M/C) ( /FCFS) and study its performance under realistic conditions. It applies a nonagonal fuzzy number to analyse the relevant performance of a multiple channel queuing model (M/M/C) ( /FCFS). Based on the sub interval average ranking method for nonagonal fuzzy number, we convert fuzzy number to crisp one. Numerical results reveal that the efficiency of this method. Intuitively, the fuzzy environment adapts well to a multiple channel queuing models (M/M/C) ( /FCFS) are very well.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .