This document discusses a biometrics authentication system using fingerprint recognition on a Raspberry Pi. It uses a fingerprint reader module connected to a Raspberry Pi. Fingerprint images are captured using a GUI application and converted to binary templates. The templates are stored in a PostgreSQL database. A Python script is used to match fingerprints by comparing templates and identifying matching ridge patterns between fingerprints. The system was able to accurately match fingerprints from the same finger and distinguish fingerprints from different fingers based on the ridge patterns. Future work involves improving the matching accuracy and developing the system for real-time high-end applications.
IoT project: best 30 ideas with cloud, raspberry pi, and arduinoMarkMojumdar
When you plan to implement your academic knowledge with a real-life scenario, you need an IoT Project Idea. IoT is the automation and digitization of home appliances, industrial machinery, and everything through the internet and cloud computing. One IoT idea can change your future life. We are here to help you try the 30 best internets of things project new ideas with cloud computing, raspberry pi 3, and Arduino.
Source: www.fossguru.com
Bridge Rectifier Circuit with Working Operation and Their Typeselprocus
A bridge rectifier is an arrangement of four or more diodes in a bridge circuit configuration which provides the same output polarity for either input polarity. It is used for converting an alternating current (AC) input into a direct current (DC) output.
IoT project: best 30 ideas with cloud, raspberry pi, and arduinoMarkMojumdar
When you plan to implement your academic knowledge with a real-life scenario, you need an IoT Project Idea. IoT is the automation and digitization of home appliances, industrial machinery, and everything through the internet and cloud computing. One IoT idea can change your future life. We are here to help you try the 30 best internets of things project new ideas with cloud computing, raspberry pi 3, and Arduino.
Source: www.fossguru.com
Bridge Rectifier Circuit with Working Operation and Their Typeselprocus
A bridge rectifier is an arrangement of four or more diodes in a bridge circuit configuration which provides the same output polarity for either input polarity. It is used for converting an alternating current (AC) input into a direct current (DC) output.
This project explains a simple wireless battery charger circuit that charges your mobile when placed near the transmitter.
This circuit may be used as wireless power transfer circuit, wireless mobile charger circuit, wireless battery charger circuit, etc.
Android based crime managements syetem final year pdfBeresa Abebe
Android based Crime Management System final project using android,php and mysql interconnections. This project is done by final year computer science students . Its source code the documentation are here. Any one who is interested can take it for free and use it. This system is majorly the documentation. WEe planned to complete the system using androdid, php, mysql. Pleaese don't hesiate to contact me on the projects documents ppt/.After allowing the system it can be accessible through mobile and through web sites
In today’s society technology is growing at an
exponential rate, and elevator is very common example of
technology for consuming time of human being Elevator began
as hoists. An elevator is platform that can move up and down in
vertical direction by a mechanical means .In the past elevator
drive mechanism were powered by stream and water hydraulic
piston. In today’s world, there are intricate governors and
switching schemes to carefully control cab needs in any situation,
buttons have been giving way to keypads.
In our project, the atmega8 microcontroller based lift system is
constructed to simulate as an actual lift in the human life. The
elevator control system is one of the important aspects in
electronics control module in automotive application. Here
elevator control system is designed with different levels. First the
elevator control system is implemented for multi-storage
buildings. [1]
The aim of our project is to minimize this manual intervention by the farmer. Automated Irrigation system will serve the following purposes: 1) As there is no un-planned usage of water, a lot of water is saved from being wasted. 2) The irrigation is the only when there is not enough moisture in the soil and the sensors decides when should the pump be turned on/off, saves a lot time for the farmers. This also gives much needed rest to the farmers, as they don’t have to go and turn the pump on/off manually.
Class materials for teaching the use of the HC-SR04 ultrasonic sensor with an Arduino Uno. These materials were originally used in Startathon 2016.
The code is available here. https://github.com/SustainableLivingLab/ultrasonic-hc-sr04-usage
Mini Projects for Electronics and Communication Engineering.pdfjagan477830
these mini projects are meant to enhance your practical skills, apply theoretical knowledge, and gain hands-on experience in the field of ECE. Feel free to choose a project that aligns with your interests and level of expertise.
YouTube Link: https://youtu.be/tSjR7bk1Y9U
** Python Certification Training: https://www.edureka.co/python **
This Edureka PPT on 'How To Make A Chatbot In Python' will help you understand how you can use Chatterbot library in python to make a chatbot from scratch. Following are the topics discussed:
What Is A Chatbot?
ChatterBot In Python
Trainer For The Chatbot
Use Case - Flask Chatbot
Python Tutorial Playlist: https://goo.gl/WsBpKe
Blog Series: http://bit.ly/2sqmP4s
Biometric authentication is one of the most popular and accurate technology. Now a days, it is used in many real time applications. However, recognizing finger prints in Linux based embedded computers (raspberry pi) is still a very complex problem. This entire work is done on the Linux based embedded computer called raspberry pi, in which database creation, fingerprint reader access, authentication and recognition using python were entirely done on raspberry pi This paper discusses on the standardized authentication model which is capable of extracting the finger prints of individual and store that in database . Then the use of final finger print to match with others in finger prints present in the database to show the capability of this model and also updating the database obtained to the organisation by creating an application through cloud. Pradeep Kumar M S | Dr. K. Suresh | Indumati T | Kishor kumar R"Smart Attendance System using Raspberry Pi" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-5 , August 2017, URL: http://www.ijtsrd.com/papers/ijtsrd2306.pdf http://www.ijtsrd.com/computer-science/bioinformatics/2306/smart-attendance-system-using-raspberry-pi/pradeep-kumar-m-s
This project explains a simple wireless battery charger circuit that charges your mobile when placed near the transmitter.
This circuit may be used as wireless power transfer circuit, wireless mobile charger circuit, wireless battery charger circuit, etc.
Android based crime managements syetem final year pdfBeresa Abebe
Android based Crime Management System final project using android,php and mysql interconnections. This project is done by final year computer science students . Its source code the documentation are here. Any one who is interested can take it for free and use it. This system is majorly the documentation. WEe planned to complete the system using androdid, php, mysql. Pleaese don't hesiate to contact me on the projects documents ppt/.After allowing the system it can be accessible through mobile and through web sites
In today’s society technology is growing at an
exponential rate, and elevator is very common example of
technology for consuming time of human being Elevator began
as hoists. An elevator is platform that can move up and down in
vertical direction by a mechanical means .In the past elevator
drive mechanism were powered by stream and water hydraulic
piston. In today’s world, there are intricate governors and
switching schemes to carefully control cab needs in any situation,
buttons have been giving way to keypads.
In our project, the atmega8 microcontroller based lift system is
constructed to simulate as an actual lift in the human life. The
elevator control system is one of the important aspects in
electronics control module in automotive application. Here
elevator control system is designed with different levels. First the
elevator control system is implemented for multi-storage
buildings. [1]
The aim of our project is to minimize this manual intervention by the farmer. Automated Irrigation system will serve the following purposes: 1) As there is no un-planned usage of water, a lot of water is saved from being wasted. 2) The irrigation is the only when there is not enough moisture in the soil and the sensors decides when should the pump be turned on/off, saves a lot time for the farmers. This also gives much needed rest to the farmers, as they don’t have to go and turn the pump on/off manually.
Class materials for teaching the use of the HC-SR04 ultrasonic sensor with an Arduino Uno. These materials were originally used in Startathon 2016.
The code is available here. https://github.com/SustainableLivingLab/ultrasonic-hc-sr04-usage
Mini Projects for Electronics and Communication Engineering.pdfjagan477830
these mini projects are meant to enhance your practical skills, apply theoretical knowledge, and gain hands-on experience in the field of ECE. Feel free to choose a project that aligns with your interests and level of expertise.
YouTube Link: https://youtu.be/tSjR7bk1Y9U
** Python Certification Training: https://www.edureka.co/python **
This Edureka PPT on 'How To Make A Chatbot In Python' will help you understand how you can use Chatterbot library in python to make a chatbot from scratch. Following are the topics discussed:
What Is A Chatbot?
ChatterBot In Python
Trainer For The Chatbot
Use Case - Flask Chatbot
Python Tutorial Playlist: https://goo.gl/WsBpKe
Blog Series: http://bit.ly/2sqmP4s
Biometric authentication is one of the most popular and accurate technology. Now a days, it is used in many real time applications. However, recognizing finger prints in Linux based embedded computers (raspberry pi) is still a very complex problem. This entire work is done on the Linux based embedded computer called raspberry pi, in which database creation, fingerprint reader access, authentication and recognition using python were entirely done on raspberry pi This paper discusses on the standardized authentication model which is capable of extracting the finger prints of individual and store that in database . Then the use of final finger print to match with others in finger prints present in the database to show the capability of this model and also updating the database obtained to the organisation by creating an application through cloud. Pradeep Kumar M S | Dr. K. Suresh | Indumati T | Kishor kumar R"Smart Attendance System using Raspberry Pi" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-5 , August 2017, URL: http://www.ijtsrd.com/papers/ijtsrd2306.pdf http://www.ijtsrd.com/computer-science/bioinformatics/2306/smart-attendance-system-using-raspberry-pi/pradeep-kumar-m-s
the project is aimed to develop a crime file for maintain a computerized record of all the F.I.R against
crime .The system is desktop application that can be access throughout the police department. This system can be used
as an application for the crime file of the police department to manage the records of different activity of related to
first information report .In such desktop Crime file system we will manage all such activities (like registration of the
complaint updating information, search of particular viewing of the respective reports of crimes) that will save time,
manpower. This software is for police station which provides facility for reporting crimes, complaints, FIR, charge
sheet, prisoner records, and show most wanted criminal’s details.
This system will provide better prospective for the enhancement of organization regarding to quality and transparency
In Today life The Security is the most common challenging issue in the world and with such advancements happening, the security of most is the home security. Many of technology come in market For Security. In the Modern world advances in electronics and communications technologies have led to the miniaturization and improvement of the performance of computers and networking. These changes have given rise to the development of several home automation technologies and system. Surveillance can be defined as monitoring of the behaviour, other changing information,activities,observing or analysing particular area for the purpose of directing, influencing,managing or protecting. A home security system should provide safety and security features for a home by alarming the residents from natural,accidental and/or human dangers such as:flooding,fire,theft,animals invading etc. To design a software application for intrusion detection system to identify malicious activities using cloud technology.
Top 5 Machine Learning Tools for Software Development in 2024.pdfPolyxer Systems
Machine learning has been widely used by various industries in 2023. The software development industry can take great advantage of machine learning in 2024 as well.
It has great potential to revolutionize various aspects of software development including task automation, boosting user experience, and easy software development and deployment.
When developer's api simplify user mode rootkits developing.Yury Chemerkin
This is a series of articles about shell extensions that enhance high-level features of any operation system. However, such possibilities not only enrich platform but simplify developing trojans, exploits that leads to the new security holes. Mostly this kind of extensions are known as usermode rootkits.
http://hakin9.org/theultimat/
Beaglebone Black Webcam Server For SecurityIJTET Journal
Web server security using BeagleBone Black is based on ARM Cortex-A8 processor and Linux operating system
is designed and implemented. In this project the server side consists of BeagleBone Black with angstrom OS and interfaced
with webcam. The client can access the web server by proper authentication. The web server displays the web page forms
like home, video, upload, settings and about. The home web page describes the functions of Web Pages. The video Web page
displays the saved videos in the server and client can view or download the videos. The upload web page is used by the client
to upload the files to server. The settings web page is used to change the username, password and date if needed. The about web page provides the description of the project
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksIJTET Journal
Number of techniques has been planned supported packet secret writing to safeguard the
communication in MANETs. STARS functioning supported stastical characteristics of captured raw traffic.
STARS discover the relationships of offer to destination communication. To forestall STAR attack associate
offer hidding technique is introduced.The pattern aims to derive the source/destination probability distribution.
that's the probability for each node to entire traffic captured with link details message source/destination and
conjointly the end-to-end link probability distribution that's the probability for each strive of nodes to be
associate end-to-end communication strive. thence construct point-to-point traffic originate and then derive the
end-to-end traffic with a set of traffic filtering rules; thus actual traffic protected against revelation attack.
Through this protective mechanism efficiency of traffic enlarged by ninety fifth from attacked traffic. For a lot of
sweetening to avoid overall attacks second shortest path is chosen.
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...IJTET Journal
The most necessary issue that has to be solved in coming up with an information transmission rule for
wireless unplanned networks is a way to save unplanned node energy whereas meeting the wants of applications
users because the unplanned nodes are battery restricted. Whereas satisfying the energy saving demand, it’s
conjointly necessary to realize the standard of service. Just in case of emergency work, it's necessary to deliver the
information on time. Achieving quality of service in is additionally necessary. So as to realize this demand, Power -
efficient Energy-Aware routing protocol for wireless unplanned networks is planned that saves the energy by
expeditiously choosing the energy economical path within the routing method. When supply finds route to
destination, it calculates α for every route. The worth α is predicated on largest minimum residual energy of the trail
and hop count of the trail. If a route has higher α, then that path is chosen for routing the information. The worth of α
are higher, if the most important of minimum residual energy of the trail is higher and also the range of hop count is
lower. Once the trail is chosen, knowledge is transferred on the trail. So as to extend the energy potency any
transmission power of the nodes is additionally adjusted supported the situation of their neighbour. If the neighbours
of a node are closely placed thereto node, then transmission vary of the node is diminished. Thus it's enough for the
node to own the transmission power to achieve the neighbour at intervals that vary. As a result transmission power
of the node is cut back that later on reduces the energy consumption of the node. Our planned work is simulated
through Network machine (NS-2). Existing AODV and Man-Min energy routing protocol conjointly simulated
through NS-2 for performance comparison. Packet Delivery quantitative relation, Energy Consumption and end-toend
delay.
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodIJTET Journal
In Manet the first demand is co-operative communication among nodes. The malicious nodes might cause security issues like grey hole and cooperative attacks. To resolve these attack issue planning Dynamic supply routing mechanism, that is referred as cooperative bait detection theme (CBDS) that integrate the advantage of each proactive and reactive defence design is used. In region attacks, a node transmits a malicious broadcast informing that it's the shortest path to the destination, with the goal of intercepting messages. During this case, a malicious node (so-called region node) will attract all packets by victimisation solid Route Reply (RREP) packet to incorrectly claim that “fake” shortest route to the destination then discard these packets while not forwarding them to the destination. In grey hole attacks, the malicious node isn't abs initio recognized in and of itself since it turns malicious solely at a later time, preventing a trust-based security resolution from detective work its presence within the network. It then by selection discards/forwards the info packets once packets undergo it. During this we have a tendency to focus is on detective work grey hole/collaborative region attacks employing a dynamic supply routing (DSR)-based routing technique.
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksIJTET Journal
Wireless detector nodes are a promising technology to play three-dimensional applications. Even it
will sight correct lead to could on top of ground and underground. In solid underground watching system makes
some challenges are there to propagating the signals. The detector node is moving entire the underground
pipeline and sending information to relay node that's placed within the on top of ground. If any relay node is
unsuccessful during this condition suggests that it'll not sending the info. In this watching system can specially
designed as a heterogeneous networks. Every high power relay nodes most covers minimum 2 low power relay
node. If any relay node is unsuccessful within the network, the constellation can modification mechanically
supported the heterogeneous network. The high power relay node is change the unsuccessful node and sending
the condition of pipeline. The benefits are thought-about to be extremely distributed, improved packet delivery
Raspberry Pi Based Client-Server Synchronization Using GPRSIJTET Journal
A low cost Internet-based attendance record embedded system for students which uses wireless technology to
transfer data between the client and server is designed. The proposed system consist of a Raspberry Pi which acts as a
client which stores the details of the students in the database by using user login system using web. When the user logs
into the database the data is sent through GPRS to the server machine which maintains the records of the employees and
the attendance is updated in the server database. The GPRS module provides a bidirectional real-time data transfer
between the client and server. This system can be implemented to any real time application so as to retrieve information
from a data source of the client system and send a file to the remote server through GPRS. The main aim is to avoid the
limitations in Ethernet connection and design a low cost and efficient attendance record system where the data is
transferred in a secure way from the client database and updated in the server database using GPRS technology
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...IJTET Journal
Data hiding can hide sensitive information into signals for covert communication. Most data hiding
techniques will distort the signal in order to insert additional messages. The distortion is often small; the irreversibility is
not admissible to some sensitive techniques. Most of the applications, lossless data hiding is desired to extract the
embedded data and the original host signal. The project proposes the enhancement of protection system for secret data
communication through encrypted data concealment in ECG signals of the patient. The proposed encryption technique
used to encrypt the confidential data into unreadable form and not only enhances the safety of secret carrier information by
making the information inaccessible to any intruder having a random method. For that we use twelve square ciphering
techniques. The technique is used make the communication between the sender and the receiver to be authenticated is hash
function. To evaluate the effectiveness of ECG wave at the proposed technique, distortion measurement techniques of two
are used, the percentage residue difference (PWD) and wavelets weighted PRD. Proposed technique provides high security protection for patient data with low distortion is proven in this proposed system.
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesIJTET Journal
In this paper, a hybrid turbo decoding algorithm is used, in which the outer code, Cyclic Redundancy Check code is
not used for detection of errors as usual but for error correction and improvement. This algorithm effectively combines the iterative
decoding algorithm with Rate-Compatible Insertion Convolution Turbo Decoding, where the CRC code and the turbo code are
regarded as an integrated whole in the Decoding process. Altogether we propose an effective error detecting method based on
normalized Euclidean distance to compensate for the loss of error detection capability which should have been provided by CRC
code. Simulation results show that with the proposed approach, 0.5-2dB performance gain can be achieved for the code blocks
with short information length
Improved Trans-Z-source Inverter for Automobile ApplicationIJTET Journal
In this paper a new technology is proposed with a replacement of conventional voltage source/current
source inverter with Improved Trans-Z-source inverter in automobile applications. The improved Trans-Z-source
inverter has a high boost inversion capability and continues input current. Also this new inverter can suppress the
resonant current at the startup; this resonant current in the startup may lead the device to permanent damage. In
improved Trans-Z-source inverter a couple inductor is needed, instead of this coupled inductor a transformer is used.
By using a transformer with sufficient turns ratio the size can be reduced. The turn’s ratio of the transformer decides
the input voltage of the inverter. In this paper operating principle, comparison with conventional inverters, working
with automobiles simulation results, THD analysis, Hardware implementation using ATMEGA 328 P are included.
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...IJTET Journal
This paper presents an analysis of a PMSG wind power system using T-Sourcethree phase matrix converter. PMSG using T-Source three phase matrix converterhas advantages that it can provide any desired AC output voltage regardless of DC input with regulation in shoot-through time. In this control system T-Source capacitor voltage can be kept stable with variations in the shoot-through time, maximum power from the wind turbine to be delivered. Inaddition, of a new future, the converter employs a safe-commutation strategy toconduct along a continuous current flow, which results in theelimination of voltage spikes on switches without the need for a snubber circuit. With the use of matrix converter the surely need forrectifier circuit and passive components to store energy arereduced. The MATLAB/Simulinkmodel of the overall system is carried out and theoretical wind energy conversion output load voltage calculations are madeand feasibility of the new topology has been verified and that theconverter can produce an output voltage and output current. This proposed method has greater efficiency and lower cost.
Comprehensive Path Quality Measurement in Wireless Sensor NetworksIJTET Journal
A wireless sensor network mostly relies on multi-hop transmissions to deliver a data packet. It is of essential importance to measure the quality of multi-hop paths and such information shall be utilized in designing efficient routing strategies. Existing metrics like ETF, ETX mainly focus on quantifying the link performance in between the nodes while overlooking the forwarding capabilities inside the sensor nodes. By combining the QoF measurements within a node and over a link, we are able to comprehensively measure the intact path quality in designing efficient multihop routing protocols. We propose QoF, Quality of Forwarding, a new metric which explores the performance in the gray zone inside a node left unattended in previous studies. We implement QoF and build a modified Collection Tree Protocol.
Optimizing Data Confidentiality using Integrated Multi Query ServicesIJTET Journal
Query services have experienced terribly massive growth within past few years for that reason large usage of services need to balance outsourcing data management to Cloud service providers that provide query services to the client for data owners, therefore data owner needs data confidentiality as well as query privacy to be guaranteed attributable to disloyal behavior of cloud service provider consequently enhancing data confidentiality must not be compromise the query processed performance. It is not significant to provide slow query services as the result of security along with privacy assurance. We propose the random space perturbation data perturbation method to provide secure with kNN(k-nearest-neighbor) range query services for protecting data in the cloud and Frequency Structured R-Tree (FSR-Tree) efficient range query. Our schemes enhance data confidentiality without compromising the FSR-TREE query processing performance that also increases the user experience.
Foliage Measurement Using Image Processing TechniquesIJTET Journal
Automatic detection of fruit and leaf diseases is essential to automatically detect the symptoms of diseases as early as they appear on the growing stage. This system helps to detect the diseases on fruit during farming , right from plan and easily monitoring the diseases of grapes leaf and apple fruit. By using this system we can avoid the economical loss due to various diseases in agriculture production. K-means clustering technique is used for segmentation. The features are extracted from the segmented image and artificial neural network is used for training the image database and classified their performance to the respective disease categories. The experimental results express that what type of disease can be affected in the fruit and leaf .
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemIJTET Journal
This project suggest a sine-wave modulation technique is to achieve a low total harmonic distortion of Buck-Boost converter connected to a changing polarity inverter in a system. The suggested technique improves the harmonic content of the output. In addition, a proportional-resonant Integral controller is used along with harmonic compensation techniques for eliminating the DC component in the system. Also, the performance of the Proposed controller is analyzed when it connecting to the converter. The design of Buck-Boost converter is fed by modulated sine wave Pulse width modulation technique are proposed to mitigate the low order harmonics and to control the output current. So, that the output complies within the standard limit without use of low pass filter.
Comparative Study on NDCT with Different Shell Supporting StructuresIJTET Journal
Natural draft cooling towers are very essential in modern days in thermal and nuclear power stations. These are the hyperbolic shells of revolution in form and are supported on inclined columns. Several types of shell supporting structures such as A,V,X,Y are being used for construction of NDCT’s. Wind loading on NDCT governs critical cases and requires attention. In this paper a comparative study on reinforcement details has been done on NDCT’s with X and Y shell supporting structures. For this purpose 166m cooling tower with X and Y supporting structures being analyzed and design for wind (BS & IS code methods), seismic loads using SAP2000.
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...IJTET Journal
The modeling of pressure distribution of fresh concrete poured in vertical formwork are rather dynamic than complex. Many researchers had worked on the pressure distribution modeling of concrete and formulated empirical relationship factors like formwork height, rate of pour, consistency classes of concrete. However, in the current scenario, most of high rise construction uses self compacting concrete(SCC) which is a special concrete which utilizes not only mineral and chemical admixtures but also varied aggregate proportions and hence modeling pressure distribution of SCC over other concrete in vertical formwork systems is necessitated. This research seeks to bridge the gap between the theoretical formulation of pressure distribution with the actual modeled (scaled) vertical formwork systems. The pressure distribution of SCC in the laboratory will be determined using pressure sensors, modeled and analyzed.
A Five – Level Integrated AC – DC ConverterIJTET Journal
This paper presents the implementation of a new five – level integrated AC – DC converter with high input power factor and reduced input current harmonics complied with IEC1000-3-2 harmonic standards for electrical equipments. The proposed topology is a combination of boost input power factor pre – regulator and five – level DC – DC converter. The single – stage PFC (SSPFC) approach used in this topology is an alternative solution to low – power and cost – effective applications.
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...IJTET Journal
Sclera and finger print vein fusion is a new biometric approach for uniquely identifying humans. First, Sclera vein is identified and refined using image enhancement techniques. Then Y shape feature extraction algorithm is used to obtain Y shape pattern which are then fused with finger vein pattern. Second, Finger vein pattern is obtained using CCD camera by passing infrared light through the finger. The obtained image is then enhanced. A line shape feature extraction algorithm is used to get line patterns from enhanced finger vein image. Finally Sclera vein image pattern and Finger vein image pattern were combined to get the final fused image. The image thus obtained can be used to uniquely identify a person. The proposed multimodal system will produce accurate results as it combines two main traits of an individual. Therefore, it can be used in human identification and authentication systems.
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationIJTET Journal
Outrigger braced structures has efficient structural form consist of a central core, comprising braced frames with
horizontal cantilever ”outrigger” trusses or girders connecting the core to the outer column. When the structure is loaded
horizontally, vertical plane rotation of the core is restrained by the outriggers through tension in windward column and
compression in leeward column. The effective structural depth of the building is greatly increased, thus augmenting the lateral
stiffness of the building and reducing the lateral deflections and moments in core. In effect, the outriggers join the columns to the
core to make the structure behave as a partly composite cantilever. By providing eccentrically braced system in outrigger frame by
varying the size of links and analyzing it. Push over analysis is carried out by varying the link size using computer programs, Sap
2007 to understand their seismic performance. The ductile behavior of eccentrically braced frame is highly desirable for structures
subjected to strong ground motion. Maximum stiffness, strength, ductility and energy dissipation capacity are provided by
eccentrically braced frame. Studies were conducted on the use of outrigger frame for the high steel building subjected to
earthquake load. Braces are designed not to buckle, regardless of the severity of lateral loading on the frame. Thus eccentrically
braced frame ensures safety against collapse.
Enhanced Hashing Approach For Image Forgery Detection With Feature Level FusionIJTET Journal
Image forgery detection and its accuracy are addressed in the proposed work. The image authentication process aims at finding the originality of an image. Due to the advent of many image editing software image tampering has become common. The Enhanced hashing approach is suggested for image authentication. The concept of Hashing has been used for searching images from large databases. It can also be applied to image authentication as it produces different results with respect to the change in image. But the hashing methods used for similarity searches cannot be used for image authentication since they are no sensitive for small changes. Moreover, we need a system that detects only perceptual changes. A new hashing method, namely, enhanced robust hashing is proposed for image authentication, which uses global and local properties of an image. This method is developed for detecting image forgery, including removal, insertion, and replacement of objects, and abnormal color modification, and for locating the forged area. The local models include position and texture information of object regions in the image. The hash mechanism uses secret keys for encryption and decryption. IP tracing is done to track the suspicious nodes.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
1. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
212
Biometrics Authentication Using Raspberry Pi
L.ARUNKUMAR
PG student
M.E-Embedded System Technologies
Sri Ramakrishna Engineering College
Coimbatore-22
larunkumareee@gmail.com
A.ARUN RAJA
Assistant professor
M.E-Embedded System Technologies
Sri Ramakrishna Engineering College
Coimbatore-22
arunraja21@gmail.com
Abstract— Biometric authentication is one of the most popular and accurate technology. Nowadays, it is used in many real time
applications. However, recognizing fingerprints in Linux based embedded computers (raspberry pi) is still a very complex problem.
This entire work is done on the Linux based embedded computer called raspberry pi , in which database creation and management
using postgresql, web page creation using PHP language, fingerprint reader access, authentication and recognition using python were
entirely done on raspberry pi This paper discusses on the standardized authentication model which is capable of extracting the
fingerprints of individual and store that in database . Then I use the final fingerprint to match with others in fingerprints present in the
database (postgresql) to show the capability of this model.
Index Terms— fingerprint authentication, PHP, postgresql, python, raspberry pi.
1 INTRODUCTION
The human body has the privilege of having features
that are unique and exclusive to each individual. This exclusivity
and unique characteristic has led to the field of biometrics and its
application in ensuring security in various fields with various
embedded controllers and embedded computers. Biometrics have
gained popularity and has proved itself to be a reliable mode of
ensuring privacy, maintaining security and identifying
individuals. It has wide acceptance throughout the globe and now
is being used at places like airports, hospitals, schools, colleges,
corporate offices etc.
Biometrics is the study of identifying a person by their
physical traits that are inherent and unique to only the person
concerned. Biometric identification include fingerprint
verification, palm geometry, face recognition, iris recognition,
etc. The above mentioned techniques work with different levels
of functionality and accuracy.
Accuracy and reliability are the two most important
parameters when it comes to biometric applications and that too
with advanced embedded computers. Fingerprint verification is
one of the oldest known biometric techniques known but still is
the most widely used because of its simplicity and good levels of
accuracy. It’s a well known fact that every human being is born
with a different pattern on the fingers and this feature is exploited
to identify and differentiate between two different persons that is
what the factor which helped to initiate the model .
2 RELATED WORKS
2.1 DEVICE SUPPORT
Through prior involvement with fingerprint scanning
efforts on Linux, I tested different devices to support with
raspberry pi. I identified the key characteristics of each device
and checked for the compatibility of each device. Finally
concluded with U.are.U 4500 Module which suits the application
I tried for chapter 3 covers the technical information’s of the
fingerprint device used in this proposed design.
2.2 LITERATURE SURVEY
Sonam Shukla, Pradeep Mishra suggested increasing
the Accuracy of an Existing Fingerprint Recognition System
Using Adaptive Technique, in this approach developer mainely
focusing onIntegrated Automated Fingerprint Identification
Service (IAFIS) of the most famous police agencies.[1] They
extracted fingerprint pattern is characterized by a set of
ridgelines that often flow in parallel, but intersect and terminate
at some points. The uniqueness of a fingerprint is determined by
the local ridge characteristics and their relationships. Main
drawback of this model is this approach is not so apt for real time
applications but the accuracy of system is highly adaptable. Most
automatic systems for fingerprint comparison are based on
minutiae matching.
Le Hoang Thai and Ha Nhat Tam in 2010 suggested
Fingerprint recognition using standardized fingerprint model,
now a days, fingerprint recognition is one of the most Important
biometric technologies based on fingerprint distinctiveness,[2] in
this approach they focused on improving the quality of
fingerprint images. In fingerprint recognition process, the
important step which affects on system accuracy is matching
between template and query fingerprint. Many solutions are
designed to increase this step’s accuracy these matching
algorithms may be classified into three types: minutiae-based
approach, correlation-based approach and feature-based
approach. However, as analyzed, the score of these algorithms is
not high (especially in case fingerprints are of the same finger
but they are rotated or the intersection is too small). So, it’s
Necessary to design a model to standardized fingerprint template
in order to improve matching score.
Mukesh Kumar Thakur, Ravi Shankar Kumar, Mohit
Kumar, Raju Kumar suggested Wireless Fingerprint Based
2. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
213
Security System Using Zigbee Technology [3]. This approach
functions based on the uniqueness of each person and it
integrating the biometric device along with zigbee to transmit the
information obtained in this approach they are using fingerprint
extraction and matching algorithm and they maintaining the
database to authenticate the person who approaching for the
access through the online web page created in the local server.
3 SYSTEM OUTLINE
3.1 HARDWARE ARCHITECTURE
This proposed system consists of raspberry pi and
fingerprint module. This system provides the features of real time
authentication facilities
Fig 1: proposed system Block diagram
3.1.1 RASPBERRY PI
Hardware is a physical device that can be touched or held,
like a hard drive or a mobile phone. Software can be thought of
as a program or a collection of programs that instruct a computer
on what to do and how to do it. Below is an image of the
Raspberry Pi which describes some of the components that make
up the hardware.
Fig.2. Hardware Components of Raspberry Pi
Fig.2 shows the hardware description of raspberry pi.
The real time vehicle tracking system uses the GPIO pin, Micro
SD slot, USB port and Micro USB connector. The GPIO pins are
used for serial communication for interfacing GSM and GPS. It
uses 8GB SD for installing the Raspbian OS and for storage. The
USB port is used for connecting keyboard, mouse, dongle and
pen drive. The power supply is given through USB connector.
3.1.2 U.are.U 4500 USB FINGERPRINT READER
The U.are.U 4500 is the module which I used in this
project where this Module is a miniature USB fingerprint reader
designed for integration in to OEM equipment where fingerprint
verification or identification is needed. This module supports
both windows and Linux based operating system. This self-
contained module optically scans the fingerprint when the user
touches the glowing window.
Fig 3: fingerprint module
Optical technology gives the highest quality fingerprint
templates and reliability along with the raspberry pi embedded
computer. The U.are.U 4500 Module is designed to simplify
OEM integration. The module is sealed from dust and includes
convenient mounting features.
The device can automatically control calibration,
encryption, and data transfer through the USB interface. A
―Heavy Duty‖ version of the module is available for unattended
public installations and other high-use applications. While
checking the compatibility of this module I have found this
module to be more reliable for all kind of OS, even its easy to
interface with raspberry pi (debian os) .The U.are.U 4500
Module and digital Persona Fingerprint Recognition Engine have
an unmatched ability to authenticate even the most difficult
fingerprints accurately and rapidly.
3.2 SOFTWARE ARCHITECTURE
For this project I have used softwares like PHP,
postgresql, opencv (python script). The configuring procedures,
saving and retrieval of fingerprint templates procedures are
mentioned in the upcoming chapters.
3.2.1 PHP
PHP is a server-side scripting language designed
for web development but also used as a general-purpose
programming language which is been used in the project. As of
January 2013, PHP was installed on more than 240
million websites (39% of those sampled) and 2.1 million web
servers. Originally created by Rasmus Lerdorf in
1994, the reference implementation of PHP (powered by
3. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
214
the Zend Engine) is now produced by The PHP Group.[6]
While
PHP originally stood for Personal Home Page, it now stands
for PHP: Hypertext Preprocessor. This is been used to display the
information’s of workers in the monitor.
3.2.2 POSTGRESQL
PostgreSQL, often simply "Postgres", is a object-
relational database management system which is used along
with an emphasis on extensibility and standards-compliance. As
a database server, its primary function is to store data securely in
the raspberry pi, supporting best practices, and to allow for
retrieval at the request of other software applications like PHP. It
can handle workloads ranging from small machine applications
to large Internet facing applications with many concurrent users
even through the terminal in the raspberry pi server. Recent
versions also provide replication of the database itself for
availability and scalability in both windows and linux.
3.2.3 SOFTWARE- ALGORITHM
The software algorithm of authentication system is
described here, the IP address in putty is initialized.
Tightvncserver is used for viewing raspberry pi.
Step 1 : Initialize IP address in PuTTY.
Step 2 : Run the tightvncserver.
Step 3 : Connect the fingerprint module.
Step 4 : open the fprint_demo gui
Step 5 : read and save the image template
Step 6 : covert the image template in to binary template
Step 7 : save the obtained template in the postgresql
database
Step 8 : now comparison between various templates can
be carried out using the python script
Step 9 : The accurate matching points will obtain
between the images
3.3 IMPLEMENTATION PROCEDURE
3.3.1 FPRINT DEMO: GRAPHICAL
DEMONSTRATION APPLICATION
This proposed system is implemented in a Linux based
GUI application, fprint demo and fingerprint model, with the
intention of using this to demonstrate the functionality of the
finger print device along with raspberry pi embedded computer.
fprint demo offers an interface for enrolling fingers and deleting
enrollment data for previously enrolled fingers with the help of
fprint GUI, an interface for verifying a specific finger and an
Interface for identifying a finger from a selection of previously
enrolled fingerprint data. For imaging devices, it shows the
scanned fingerprints on-screen and allows you to view the
binarized version with minutiae plotted in the GUI.
Fig 4:capturing of fingerprint template
3.3.2 CONVERTING THE TEMPLATE IN TO
BINARAIZED TEMPLATE
This GUI is capable of converting the fingerprint
template in to binary template. The imaging performance of this
device is excellent. The returned images are large and finds a
large number of minutiae, leading to suitably distinct scores for
matching/non-matching fingers. Fig 5 shows an image returned
by this driver and its binarized form with minutiae plotted with
the help of raspberry pi embedded computer.
Fig 5: normal and binarized template
4 EXPREIMENTAL RESULTS
After extracting the fingerprint template using fprint
demo GUI, I was able to store the binarized image in the data
base using the PHP script
Then comparison has been carried out with the help of
open cv programming tool with python script
The below figure shows the image of mismatched
fingers, which is identified by the python script which uses the
special image processing algorithm called
FLANN_INDEX_KDTREE with cv2.FlannBasedMatcher
Fig 6 given below shows mismatched fingerprints of
different persons the python program is running as the
background process
4. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
215
Fig 6: mismatched finger ridges in template
Thus the above figure shows the mismatched
characteristics of two different fingers, while comparing the
same fingers I got the matching points almost every where in
finger templates
Fig 8 given below shows exactly matched fingerprints
of a person the python program is running as the background
process
The green coloured lines connecting two templates
showing the number of matching points in the templates
Fig 7: matched finger ridges in template
The above experimental results clearly states the ability
of the proposed design to distinguish the matched and
mismatched fingers.
5 CONCLUSIONS AND FUTURE WORK
Fingerprint recognition is one of the most popular and
accurate Biometric technologies. Nowadays, it is used in many
real time applications. However, recognizing fingerprints in
Linux based embedded computers (raspberry pi) are still a very
complex problem. This entire work is done on the Linux based
embedded computer called raspberry pi , in which database
creation and management using postgresql, web page creation
using PHP language, fingerprint reader access, authentication
and recognition using python were entirely done on raspberry pi
This paper discusses on the standardized fingerprint model which
is used to synthesize the template of fingerprints. In this model,
after pre-processing step, find the transformation between
templates, adjust parameters and synthesize fingerprint. Then i
use the final fingerprint to match with others in fingerprints
present in the database (postgresql) to show the capability of this
model.
Fine tuning has to be done to improve the accuracy of
the system and developing the system for real time higher end
application are need to be done as the future work for this design.
REFERENCES
[1] Sonam Shukla, Pradeep Mishra [2012],
"Increasing The Accuracy Of An Existing
Recognition System Using Adaptive
Technique" International Journal of Advanced
Research in Computer Science and Software
Engineering, Volume 2, Issue 6, PP 52-57.
[2] Le Hoang Thai and Ha Nhat Tam [2010],"
Fingerprint recognition using
Standardized fingerprint model" IJCSI
International Journal of Computer Science
Issues, Vol. 7, Issue 3, PP 11-16.
[3] Mukesh Kumar Thakur, Ravi Shankar
Kumar, Mohit Kumar, Raju Kumar
[2013],"Wireless Fingerprint Based Security
System Using Zigbee Technology"
International Journal of Inventive
5. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
216
Engineering and Sciences (IJIES),ISSN:
2319–9598, Volume-1, Issue-5, PP 14-17.
[4] Arun, Emmanuel., Diwakar& Rajeswari
―Automated attendance system using
biometrics with Embedded web server‖
Graduate Research in Engineering and
Technology (GRET): An International
Journal, page No-(54 to 57)
[5] Karthik Vignesh E, Shanmuganathan S,
A.Sumithra S.Kishore and P. Karthikeyan ―A
Foolproof Biometric Attendance Management
System‖ International Journal of Information and
Computation Technology. ISSN 0974-2239
Volume 3, Number 5 (2013), pp. 433-438
[6] www.postgresql.org
[7] www.tutorialspoint.com
[8] www.raspberry pi.org