The document presents a highly secured palm print authentication system using undecimated bi-orthogonal wavelet (UDBW) transform. The proposed system has three main modules: registration, testing, and palm matching. In the registration module, morphological operations and region of interest extraction are used to preprocess palm images. Distance transform and 3-level UDBW transform are then used to extract low-level features and create feature vectors for registered palm prints. In testing, low-level features are extracted from input palm prints using the same approach. Palm matching involves comparing feature vectors of registered and input palm prints to identify matches. Simulation results show the system provides accurate recognition rates for palm print authentication.
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...IJTET Journal
Abstract— In the field of biometric modality fingerprint is considered to be one of the most widely used method for individual identity. The fingerprint authentication is used in most application for security purpose. In the biometric systems, the input images are binarized and feature is extraction. The Minutiae matching in fingerprint identification is done by identifying the minutiae point of interest and their relationship. The validation testing in the proposed system using the method of K- fold cross validation by using two , a training set and test set of images to find the appropriate image that matches the input image ,increase the accuracy of recognition by reducing the false acceptance rate of the system.
Authentication of a person is the major concern in this era for security purposes. In biometric systems Signature is one of the behavioural features used for the authentication purpose. In this paper we work on the offline signature collected through different persons. Morphological operations are applied on these signature images with Hough transform to determine regular shape which assists in authentication process. The values extracted from this Hough space is used in the feed forward neural network which is trained using back-propagation algorithm. After the different training stages efficiency found above more than 95%. Application of this system will be in the security concerned fields, in the defence security, biometric authentication, as biometric computer protection or as method of the analysis of person’s behaviour changes.
An offline signature recognition and verification system based on neural networkeSAT Journals
Abstract Various techniques are already introduced for personal identification and verification based on different types of biometrics which can be physiological or behavioral. Signatures lies in the category of behavioral biometric which can distort or changed with course of time. Signatures are considered to be most promising authentication method in all legal and financial documents. It is necessary to verify signers and their respective signatures. This paper presents an Offline Signature recognition and verification system(SRVS). In this system signature database of signature images is created, followed by image preprocessing, feature extraction, neural network design and training, and classification of signature as genuine or counterfeit. Keywords: biometrics, neural network design, feature extraction, classification etc.
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm IJECEIAES
The uniqueness, firmness, public recognition, and its minimum risk of intrusion made fingerprint is an expansively used personal authentication metrics. Fingerprint technology is a biometric technique used to distinguish persons based on their physical traits. Fingerprint based authentication schemes are becoming increasingly common and usage of these in fingerprint security schemes, made an objective to the attackers. The repute of the fingerprint image controls the sturdiness of a fingerprint authentication system. We intend for an effective method for fingerprint classification with the help of soft computing methods. The proposed classification scheme is classified into three phases. The first phase is preprocessing in which the fingerprint images are enhanced by employing median filters. After noise removal histogram equalization is achieved for augmenting the images. The second stage is the feature Extraction phase in which numerous image features such as Area, SURF, holo entropy, and SIFT features are extracted. The final phase is classification using hybrid Neural for classification of fingerprint as fake or original. The neural network is unified with BAT algorithm for optimizing the weight factor.
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...IJTET Journal
Abstract— In the field of biometric modality fingerprint is considered to be one of the most widely used method for individual identity. The fingerprint authentication is used in most application for security purpose. In the biometric systems, the input images are binarized and feature is extraction. The Minutiae matching in fingerprint identification is done by identifying the minutiae point of interest and their relationship. The validation testing in the proposed system using the method of K- fold cross validation by using two , a training set and test set of images to find the appropriate image that matches the input image ,increase the accuracy of recognition by reducing the false acceptance rate of the system.
Authentication of a person is the major concern in this era for security purposes. In biometric systems Signature is one of the behavioural features used for the authentication purpose. In this paper we work on the offline signature collected through different persons. Morphological operations are applied on these signature images with Hough transform to determine regular shape which assists in authentication process. The values extracted from this Hough space is used in the feed forward neural network which is trained using back-propagation algorithm. After the different training stages efficiency found above more than 95%. Application of this system will be in the security concerned fields, in the defence security, biometric authentication, as biometric computer protection or as method of the analysis of person’s behaviour changes.
An offline signature recognition and verification system based on neural networkeSAT Journals
Abstract Various techniques are already introduced for personal identification and verification based on different types of biometrics which can be physiological or behavioral. Signatures lies in the category of behavioral biometric which can distort or changed with course of time. Signatures are considered to be most promising authentication method in all legal and financial documents. It is necessary to verify signers and their respective signatures. This paper presents an Offline Signature recognition and verification system(SRVS). In this system signature database of signature images is created, followed by image preprocessing, feature extraction, neural network design and training, and classification of signature as genuine or counterfeit. Keywords: biometrics, neural network design, feature extraction, classification etc.
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm IJECEIAES
The uniqueness, firmness, public recognition, and its minimum risk of intrusion made fingerprint is an expansively used personal authentication metrics. Fingerprint technology is a biometric technique used to distinguish persons based on their physical traits. Fingerprint based authentication schemes are becoming increasingly common and usage of these in fingerprint security schemes, made an objective to the attackers. The repute of the fingerprint image controls the sturdiness of a fingerprint authentication system. We intend for an effective method for fingerprint classification with the help of soft computing methods. The proposed classification scheme is classified into three phases. The first phase is preprocessing in which the fingerprint images are enhanced by employing median filters. After noise removal histogram equalization is achieved for augmenting the images. The second stage is the feature Extraction phase in which numerous image features such as Area, SURF, holo entropy, and SIFT features are extracted. The final phase is classification using hybrid Neural for classification of fingerprint as fake or original. The neural network is unified with BAT algorithm for optimizing the weight factor.
IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of mechanical and civil engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in mechanical and civil engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This slide proposed a method to authenticate a signature in off-line. Our proposed method uses "Harris Corner Detector", "Orientation Assignment" , "KNN Classifier", "Hungarian Algorithm".
A Hybrid Approach to Face Detection And Feature Extractioniosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
An offline signature verification using pixels intensity levelsSalam Shah
Offline signature recognition has great importance in our day to day activities. Researchers are trying to use them as biometric identification in various areas like banks, security systems and for other identification purposes. Fingerprints, iris, thumb impression and face detection based biometrics are successfully used for identification of individuals because of their static nature. However, people’s signatures show variability that makes it difficult to recognize the original signatures correctly and to use them as biometrics. The handwritten signatures have importance in banks for cheque, credit card processing, legal and financial transactions, and the signatures are the main target of fraudulence. To deal with complex signatures, there should be a robust signature verification method in places such as banks that can correctly classify the signatures into genuine or forgery to avoid financial frauds. This paper, presents a pixels intensity level based offline signature verification model for the correct classification of signatures. To achieve the target, three statistical classifiers; Decision Tree (J48), probability based Naïve Bayes (NB tree) and Euclidean distance based k-Nearest Neighbor (IBk), are used.
For comparison of the accuracy rates of offline signatures with online signatures, three classifiers were applied on online signature database and achieved a 99.90% accuracy rate with decision tree (J48), 99.82% with Naïve Bayes Tree and 98.11% with K-Nearest Neighbor (with 10 fold cross validation). The results of offline signatures were 64.97% accuracy rate with decision tree (J48), 76.16% with Naïve Bayes Tree and 91.91% with k-Nearest Neighbor (IBk) (without forgeries). The accuracy rate dropped with the inclusion of forgery signatures as, 55.63% accuracy rate with decision tree (J48), 67.02% with Naïve Bayes Tree and 88.12% (with forgeries).
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...IJNSA Journal
One of the most important processes used by companies to safeguard the security of information and prevent it from unauthorized access or penetration is the signature process. As businesses and individuals move into the digital age, a computerized system that can discern between genuine and faked signatures is crucial for protecting people's authorization and determining what permissions they have. In this paper, we used Pre-Trained CNN for extracts features from genuine and forged signatures, and three widely used classification algorithms, SVM (Support Vector Machine), NB (Naive Bayes) and KNN (k-nearest neighbors), these algorithms are compared to calculate the run time, classification error, classification loss, and accuracy for test-set consist of signature images (genuine and forgery). Three classifiers have been applied using (UTSig) dataset; where run time, classification error, classification loss and accuracy were calculated for each classifier in the verification phase, the results showed that the SVM and KNN got the best accuracy (76.21), while the SVM got the best run time (0.13) result among other classifiers, therefore the SVM classifier got the best result among the other classifiers in terms of our measures.
Iris recognition is a method of biometric identification.
Biometric identification provides automatic recognition of an
individual based on the unique feature of physiological
characteristics or behavioral characteristic. Iris recognition is a
method of recognizing a person by analyzing the iris pattern.
This survey paper covers the different iris recognition techniques
and methods.
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Handwritten Signature Verification using Artificial Neural NetworkEditor IJMTER
This paper reviews various Signature Verification approaches; various feature sets,
various online databases and types of features. Processing on an online database, post extracting a
combination of global and local features onto a signature as an image, using MultiLayer Perceptron Feed
Forward Network alongwith Back Propogation Algorithm for training is proposed to classify a genuine
and forged (random, simple and skilled) offline signatures.
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYijcsit
Protection has become one of the biggest fields of study for several years, however the demand for this is growing exponentially mostly with rise in sensitive data. The quality of the research can differ slightly from any workstation to cloud, and though protection must be incredibly important all over. Throughout the past two decades, sufficient focus has been given to substantiation along with validation in the technology model. Identifying a legal person is increasingly become the difficult activity with the progression of time. Some attempts are introduced in that same respect, in particular by utilizing human movements such as fingerprints, facial recognition, palm scanning, retinal identification, DNA checking, breathing, speech checker, and so on. A number of methods for effective iris detection have indeed been suggested and researched. A general overview of current and state-of-the-art approaches to iris recognition is presented in this paper. In addition, significant advances in techniques, algorithms, qualified classifiers, datasets and methodologies for the extraction of features are also discussed.
Graphically Selecting Optical Material for Color Correction and Passive Ather...IJERA Editor
This paper presents pair optical glass by using a graphical method for selecting achromatize and athermalize an
imaging lens. An athermal glass map that plots thermal glass constant versus inverse Abbe number is derived
through analysis of optical glasses in visible light. By introducing the equivalent Abbe number and equivalent
thermal glass constant, although it is a multi-lens system, we have a simple way to visually identify possible
optical materials. ZEMAX will be used to determine the change in focus through the expected temperature
changes in Earth orbit. The thermal defocuses over -20°C to +60°C are reduced to be much less than the depth of
focus of the system.
Seismic Analysis of Reinforced Concrete Shaft Support Water Storage TankIJERA Editor
This paper compares the results of Seismic Analysis of Reinforced Concrete Shaft Support Water Storage Tank
carried out in accordance with IS: 1893- 1984 and IS: 1893-2002 (Part-2) draft code. The analysis is carried out
for shaft supported water tank of 500,750 and 1000 Cu.m capacity, located in four seismic zones (Zone-II, Zone
-III, Zone-IV, Zone-V) and on three different soil types (Hard rock, Medium soil, Soft soil). Further, 1000 kl
tank for conditions - tank full, tank empty are also considered in this study. The analysis was performed using
MAT LAB. The parameters of comparison include base shears, base moments and time history analysis. The
above models are analyzed for different time history data such as El Centro, Kobe, Ji-Ji, Erzincan. The
comparison is made between the structural responses of one mass and two mass models of above capacity.
IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of mechanical and civil engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in mechanical and civil engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This slide proposed a method to authenticate a signature in off-line. Our proposed method uses "Harris Corner Detector", "Orientation Assignment" , "KNN Classifier", "Hungarian Algorithm".
A Hybrid Approach to Face Detection And Feature Extractioniosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
An offline signature verification using pixels intensity levelsSalam Shah
Offline signature recognition has great importance in our day to day activities. Researchers are trying to use them as biometric identification in various areas like banks, security systems and for other identification purposes. Fingerprints, iris, thumb impression and face detection based biometrics are successfully used for identification of individuals because of their static nature. However, people’s signatures show variability that makes it difficult to recognize the original signatures correctly and to use them as biometrics. The handwritten signatures have importance in banks for cheque, credit card processing, legal and financial transactions, and the signatures are the main target of fraudulence. To deal with complex signatures, there should be a robust signature verification method in places such as banks that can correctly classify the signatures into genuine or forgery to avoid financial frauds. This paper, presents a pixels intensity level based offline signature verification model for the correct classification of signatures. To achieve the target, three statistical classifiers; Decision Tree (J48), probability based Naïve Bayes (NB tree) and Euclidean distance based k-Nearest Neighbor (IBk), are used.
For comparison of the accuracy rates of offline signatures with online signatures, three classifiers were applied on online signature database and achieved a 99.90% accuracy rate with decision tree (J48), 99.82% with Naïve Bayes Tree and 98.11% with K-Nearest Neighbor (with 10 fold cross validation). The results of offline signatures were 64.97% accuracy rate with decision tree (J48), 76.16% with Naïve Bayes Tree and 91.91% with k-Nearest Neighbor (IBk) (without forgeries). The accuracy rate dropped with the inclusion of forgery signatures as, 55.63% accuracy rate with decision tree (J48), 67.02% with Naïve Bayes Tree and 88.12% (with forgeries).
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...IJNSA Journal
One of the most important processes used by companies to safeguard the security of information and prevent it from unauthorized access or penetration is the signature process. As businesses and individuals move into the digital age, a computerized system that can discern between genuine and faked signatures is crucial for protecting people's authorization and determining what permissions they have. In this paper, we used Pre-Trained CNN for extracts features from genuine and forged signatures, and three widely used classification algorithms, SVM (Support Vector Machine), NB (Naive Bayes) and KNN (k-nearest neighbors), these algorithms are compared to calculate the run time, classification error, classification loss, and accuracy for test-set consist of signature images (genuine and forgery). Three classifiers have been applied using (UTSig) dataset; where run time, classification error, classification loss and accuracy were calculated for each classifier in the verification phase, the results showed that the SVM and KNN got the best accuracy (76.21), while the SVM got the best run time (0.13) result among other classifiers, therefore the SVM classifier got the best result among the other classifiers in terms of our measures.
Iris recognition is a method of biometric identification.
Biometric identification provides automatic recognition of an
individual based on the unique feature of physiological
characteristics or behavioral characteristic. Iris recognition is a
method of recognizing a person by analyzing the iris pattern.
This survey paper covers the different iris recognition techniques
and methods.
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Handwritten Signature Verification using Artificial Neural NetworkEditor IJMTER
This paper reviews various Signature Verification approaches; various feature sets,
various online databases and types of features. Processing on an online database, post extracting a
combination of global and local features onto a signature as an image, using MultiLayer Perceptron Feed
Forward Network alongwith Back Propogation Algorithm for training is proposed to classify a genuine
and forged (random, simple and skilled) offline signatures.
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYijcsit
Protection has become one of the biggest fields of study for several years, however the demand for this is growing exponentially mostly with rise in sensitive data. The quality of the research can differ slightly from any workstation to cloud, and though protection must be incredibly important all over. Throughout the past two decades, sufficient focus has been given to substantiation along with validation in the technology model. Identifying a legal person is increasingly become the difficult activity with the progression of time. Some attempts are introduced in that same respect, in particular by utilizing human movements such as fingerprints, facial recognition, palm scanning, retinal identification, DNA checking, breathing, speech checker, and so on. A number of methods for effective iris detection have indeed been suggested and researched. A general overview of current and state-of-the-art approaches to iris recognition is presented in this paper. In addition, significant advances in techniques, algorithms, qualified classifiers, datasets and methodologies for the extraction of features are also discussed.
Graphically Selecting Optical Material for Color Correction and Passive Ather...IJERA Editor
This paper presents pair optical glass by using a graphical method for selecting achromatize and athermalize an
imaging lens. An athermal glass map that plots thermal glass constant versus inverse Abbe number is derived
through analysis of optical glasses in visible light. By introducing the equivalent Abbe number and equivalent
thermal glass constant, although it is a multi-lens system, we have a simple way to visually identify possible
optical materials. ZEMAX will be used to determine the change in focus through the expected temperature
changes in Earth orbit. The thermal defocuses over -20°C to +60°C are reduced to be much less than the depth of
focus of the system.
Seismic Analysis of Reinforced Concrete Shaft Support Water Storage TankIJERA Editor
This paper compares the results of Seismic Analysis of Reinforced Concrete Shaft Support Water Storage Tank
carried out in accordance with IS: 1893- 1984 and IS: 1893-2002 (Part-2) draft code. The analysis is carried out
for shaft supported water tank of 500,750 and 1000 Cu.m capacity, located in four seismic zones (Zone-II, Zone
-III, Zone-IV, Zone-V) and on three different soil types (Hard rock, Medium soil, Soft soil). Further, 1000 kl
tank for conditions - tank full, tank empty are also considered in this study. The analysis was performed using
MAT LAB. The parameters of comparison include base shears, base moments and time history analysis. The
above models are analyzed for different time history data such as El Centro, Kobe, Ji-Ji, Erzincan. The
comparison is made between the structural responses of one mass and two mass models of above capacity.
Augmentation of Real & Reactive Power in Grid by Unified Power Flow ControllerIJERA Editor
In this paper, a Power Flow Control in transmission line with respect to voltage condition (L-G, L-L-G, L-L)
over come by using unified power flow controller. The existing system employs UPFC with transformer less
connection with both series and shunt converter. This converter have been cascaded with multilevel inverters
which is more complicated to enhance the performance of UPFC.A proposed system consist of three terminal
transformer for shunt converter and six terminal transformer for series converter. Shunt converter & series
converter is coupled with common DC capacitor. DC link capacitor voltage is maintained using PID controller
and synchronous reference frame theory (SRF) is used to generate reference voltage & current signal.
Simulation studies are carried out for (L-G, L-L-G, L-L real & reactive power compensation results will be
shown in this paper)
FEA based Dissipation Energy and Temperature Distribution of Rubber BushingIJERA Editor
Rubber bushings used in the vehicle or aerospace can reduce the noise and vibration and absorb the shocks. The
heat accumulation in the rubber components is attributed to the nonlinear mechanical behavior of rubber and
leads to degeneration of mechanical properties. The viscoelastic damping is treated as the major mechanism of
dissipation energy, which is heat source of temperature rising in bushing. A finite element method is expanded
from elastic structure to viscoelastic structure and computes the dissipation energy distribution in the rubber
core. Based on that heat source, the temperature distribution of rubber bushing under radial harmonic excitation
has been calculated using finite volume method. The frequency and amplitude effect on dissipation energy and
temperature distribution are described. The radial dynamic testing is carried out and the temperature is recorded
using thermal imager to evaluate the simulation. As complement, the dynamic torsional testing is also carried
out explore the possible failure zone of rubber bushing under different types of loading.
Seismic Response of Non-Structural Element Placed on Single Story Two-Way Asy...IJERA Editor
The seismic response of non-structural element placed on single-storey, two-way asymmetric building under
bi-directional excitations is investigated. The response is obtained by numerically solving the governing
equations of motion. The seismic response of the system and non-structural element is obtained by numerically
solving the equations of motion using state-space method under different system parameters. The comparative
performance is investigated of non-structural element placed at different places on single story asymmetric
building and finding a best place for survival during earthquake. It is found that non-structural element at
flexible edge along Y- direction gives less response of displacement and acceleration. So, non-structural
element placed at flexible edge along Y- direction on asymmetric SDOF system performs better in earthquake
than at other places.
A Study of Anodic Voltage Drop in Aluminum Reduction Cell by Finite Element A...IJERA Editor
Aluminum extraction has a very high energy consumption process, so reducing energy consumption is one of
the most important roles in aluminum reduction cell design. The good path to achieve this goal can be made by
voltage savings at the anode assembly.
The aim of this work is todevelop3D thermo-electrical finite element model and validate based on actual
temperature measurements and electrical calculations for the anode assembly. The model is used to estimate the
temperature distribution and the anodic voltage drop over the anode assembly and to suggest alternative design
modifications to reduce the anodic voltage drop.
The effect of changing in stub diameter and chemical composition of cast iron on anodic voltage drop were
studied. The findings indicated that the effect of stub diameter is more effective as compare with the changing in
cast iron composition.
Comparative Study of Response of Structures Subjected To Blast and Earthquake...IJERA Editor
The increase in the number of terrorist attacks especially in the last few years has shown that the effect of blast
load on building is a serious challenge that should be taken in to consideration for designing of structures. This
type of loading damages the structures, externally as well as internally. Hence the blast load should be
considered with same importance as earthquake load. The present study includes the comparative performance
of G+3 storey building subjected to blast and earthquake loading using ETABS. For four storey building using
different input parameters like charge explosive, stand-off distance and layout of building the blast pressure are
conducted and linear time history analysis is carried out. Comparative study for blast and earthquake loading is
carried out for different parameters like maximum storey displacement, storey drift and quantity of materials.
Safe charge explosive and safe stand-off distance are obtained for the RCC structure with the sections of
structural elements same as per the requirement for earthquake resistance. Displacement is higher for the blast
loading as compared to earthquake loading and very high for the storey at which blast load is applied. Quantity
of concrete is 40 percentages higher for blast resistant building than the earthquake resistant building.
The focus of this Paper is the actual implementation of Network Router and verifies the functionality of the
three port router for network on chip using the latest verification methodologies, Hardware Verification
Languages and EDA tools and qualify the IP for Synthesis an implementation. This Router design contains three
output ports and three input ports, it is packet based Protocol. This Design consists Registers and FIFO. For
larger networks, where a direct-mapped approach is not feasible due to FPGA resource limitations, a virtualized
time-multiplexed approach was used. Compared to the provided software reference implementation, our directmapped
approach achieves three orders of magnitude speedup, while our virtualized time multiplexed approach
achieves one to two orders of magnitude speedup, depending on the network and router configuration.
Validation of Polarization angles Based Resonance Modes IJERA Editor
The symmetry, tilt and elongation degrees are figures of merit which can be used to describe the radar target
shape once incorporated with the target resonance modes. Through optimization of the second moments of the
quadrature-polarized residues matrix, the angles are determined by the optimum co-null polarization states. The
approach is tested and validated against low signal-to-noise ratio and also the late-time onset selection when
extracting the mode set. A wire plane model is used and the results show that with ensemble averaging it
possible to have robust polarization angle set, even with small number of sample set
Analysis of Permanent Magnets Bearings in Flywheel Rotor DesignsIJERA Editor
This paper discusses analysis of permanent magnet bearing in flywheel rotor designs. This work focuses on
the advantages of using permanent magnets in flywheel rotor design as compared to that of the
convectional mode of levitating the rotor position. The use of permanent magnet in magnetic bearing
design to generate the steady state position of the magnetic field results in less variation of the force
exerted on the rotor when it deviates from the nominal position than when an electrical coil is used for the
same purpose. Theresults of the analysis shows that the magnetic bearing dynamics as well as its load
carryingcapacity improves when the rotor is offset from its central position. The use of permanent magnet
compared to current-carrying coils results in smaller overall size of magnetic bearing leading to a more
compact system design resulting in improved rotordynamic performance.
Experimentation and Optimization of Surface Roughness in WEDM Process using F...IJERA Editor
Application of WEDM is growing rapidly since the last three decades due its several advantages and
applicability of the process to produce complicated intrinsic, extrinsic shapes of miniaturized size, so there is a
need to analyze and optimize the process. In this research work the experiments were conducted using the
general full factorial design methodology with 48 experimental runs. The values response parameters Ra, Rq and
Rz were measured and the effect of process parameters wire type, wire tension, power, pulse on time and
discharge current on these responses were studied qualitatively and quantitatively using main effect plots,
interaction plots and ANOVA. Finally the optimal process parameter setting for responses were found by using
full factorial design integrated PCA Approach.
The Return on Investment (ROI) calculation, through the application of Occupa...IJERA Editor
The project aims to disseminate the quantitative results obtained with the implementation of the Occupational
Repetitive Actions method (OCRA) in a job of a graphic industry sector. It also aims to spread this work and
stress the importance of ergonomics and ergonomic analysis tools when applied to jobs, especially in the case of
Physical Ergonomics and improvements in work production chain. The tool in question assesses aspects of
Physical Ergonomics in productive seasons analyzing tasks that require use of the upper body members and with
the results of this review can be implemented significant changes to improve the performance of work,
preserving workers' health
Study of Steel Moment Resisting Frame with Reduced Beam SectionIJERA Editor
A research became necessary after the collapse of steel structure during the 1994 Northridge and 1995 Kobe
earthquakes. Reduced beam section emerged as one of the best solution. Guidelines about the cut, that is to be
introduced in the flange of the beam section, are obtained from FEMA 350. Here, a G+15 storey steel building is
modeled using RBS as a component in one building and regular beam section as a component of the other in
STAAD PRO V8i. Time history analysis is carried out in this paper. Displacement, storey drift, time period and
base shear of both the buildings are compared as the result. Base shear shows no change but considerable change
in displacement and storey drift is observed
Determination of Optimal Product Mix for Profit Maximization using Linear Pro...IJERA Editor
This paper demonstrates the use of liner programming methods in order to determine the optimal product mix for
profit maximization. There had been several papers written to demonstrate the use of linear programming in
finding the optimal product mix in various organization. This paper is aimed to show the generic approach to be
taken to find the optimal product mix.
In many activities concerned with the use of soil, the physical properties like Stiffness, Compressibility and
Strength are some of the few important parameters to be considered. Of the many methods involved in
improvement of soil properties, soil reinforcement is method concerned with increase of strength properties of
soil. In soil reinforcement, the reinforcements or resisting element are of different materials and of various
forms depending upon the intended use. The reinforcement can be provided permanently or temporarily to
increase strength of adjacent structures. The present topic of discussion involves different materials, forms and
applications of soil reinforcement
Heat Transfer & Periodic Flow Analysis of Heat Exchanger by CFD with Nano FluidsIJERA Editor
Many heat transfer applications such as steam generators in a boiler or air cooling coil of an air conditioner, can
be modelled in a bank of tubes containing a fluid flowing at one temperature that is immersed in a second fluid
in a cross flow at different temperature. CFD simulations are a useful tool for understanding flow and heat
transfer principles as well as for modelling these types of geometries. Both the fluids considered in the present
study are CUO Nano fluids, and flow is classified as laminar and steady with Reynolds number between 100-
600.The mass flow rate of the cross flow and diameter has been varied (such as 0.05, 0.1, 0.15, 0.20, 0.25, 0.30
kg/sec and 0.8, 1.0.1.2 &1.4cm) and the models are used to predict the flow and temperature fields that result
from convective heat transfer. Due to symmetry of the tube bank and the periodicity of the flow inherent in the
tube bank geometry, only a portion of the geometry will be modelled and with symmetry applied to the outer
boundaries. The inflow boundary will be redefined as a periodic zone and the outflow boundary is defined as the
shadow. The various static pressures, velocities, and temperatures obtained are reported.
In this present project tubes of different diameters and different mass flow rates are considered to examine the
optimal flow distribution. Further the problem has been subjected to effect of materials used for tubes
manufacturing on heat transfer rate. Materials considered are copper and Nickle Chromium alloys. Results
emphasize the utilization of alloys in place of copper as tube material serves better heat transfer with most
economical way
Mapping between Discrete Cosine Transform of Type-VI/VII and Discrete Fourier...IJERA Editor
In this paper, the mapping between discrete cosine transform of types VI and VII (DCT-VI/VII) of even length
N and (2N – 1)-point one dimensional discrete Fourier transform (1D-DFT) is presented. The technique used in
this paper is the mapping between the real-valued data sequence to an intermediate sequence used as an input to
DFT
Bending moment of galvanized iron glass fiber sandwich panelIJERA Editor
The main objective of this project is to prepare a laminated with Galvanized iron thickness fractions, fiber
volume fractions and orientation in the layers of GF were fabricated by hand lay-up method and evaluated for
their bending moment properties of the sandwich panel using universal testing machine. This paper theoretically
calculates the bending behavior of sandwich panel. The recent need to develop a new range of materials has
resulted in the development of high performance lightweight composites with excellent properties. Metal–
composite systems consist of alternating layers of metal and fiber-reinforced polymer composites which are
bonded by an adhesive. Sandwich beams were tested under Air Bending. Stress-strain and stress-displacement
were recorded by using AIMIL UTM. The beam face sheets exhibited a softening non-linearity on the bending
side. Experimental results were in good agreement with predictions from simple models. On an overall basis, the
sandwich panel exhibited better bending moment performance than the monolithic galvanized iron.
Palmprint Identification Based on Principle Line Using Machine Learning Tech...IJMER
In this paper, we propose principle line based Palmprint Identification method. In this method
to detect principle lines of palm print is with consecutive filtering operations. Smoothing operation is used
to remove image noise. Edge detector operation and closing operation are merged to extract the principle
lines. Binarization yields the binary principle line. The lines detected with the developed scheme are used
to extract textural information using Gray Level Co-occurrence Matrix and Statistical Property Features.
Euclidean distance is used for matching to identify the genuine person and the powerful supervised
classification techniques namely Support Vector classification Machine and Extreme Learning Machine
with kernels like linear, radial basis function is applied to classification. The experimental results on the
PolyU palmprint database demonstrate the feasibility and effectiveness of the higher accuracy and
reduced execution speed shows that our proposed approach.
Advanced Authentication Scheme using Multimodal Biometric SchemeEditor IJCATR
Fingerprint recognition has attracted various researchers and achieved great success. But, fingerprint alone may not be able to meet the increasing demand of high accuracy in today‟s biometric system. The purpose of our paper is to inspect whether the integration of palmprint and fingerprint biometric can achieve performance that may not be possible using a single biometric technology. Pre-processing is done for fingerprint and palmprint images separately in order to remove any noise. The next step is feature extraction. Minutiae algorithm is used for fingerprint feature extraction and Local Binary pattern for palmprint. Wavelet fusion is applied in order to fuse the extracted features and Support Vector Machine is used for matching. The main highlight of the project is multimodal biometrics which will give a better security and accuracy comparing to unimodel system.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
As we know the fingerprint is unique of every living objects. It is quite difficult to find out the prints.
Usually the Forensics use Fine powder and duct tapes to identify the prints of living object. As powder is
exceptionally muddled, so such molecule can cause loss of information after that examination the information is
coordinated with the system. The proposed system consists of an embedded device in which it consists of ultra
light to glow the fingerprints details. After that we can detect the fingerprint, analysis and it will checks on the
database, and it will return the output after matching. For matching and analysis of the Fingerprint, we will be
using the Algorithm for matching.
Biometric identification with improved efficiency using sift algorithmIJARIIT
Osseo-integrated dental implants have been widely used for the rehabilitation of tooth loss. Although dental implants
are considered an available treatment in the paradigm shift from traditional dental therapies, such as fixed dental bridges and
removable dentures, the fundamental problems must be overcome prior to their clinical use in young patients who are still
undergoing jawbone growth. A bio-engineered functional bio-hybrid implant that is combined with adult-derived periodontal
tissue and attached with bone tissue can act as a substitute for cementum. This bio-hybrid implant was successfully engrafted
and it restored physiological function, including bone remodelling, regeneration and appropriate responsiveness to noxious
stimuli. Thus, this article reviews the functional bio-hybrid implant’s potential for clinical use as a next-generation dental
implant using adult-derived tissues.
novel method of identifying fingerprint using minutiae matching in biometric ...INFOGAIN PUBLICATION
Fingerprint is one of the best apparatus to identify human because of its uniqueness, details information, hard to change and long-term indicators of human identity where there are several biometric feature that can be recycled to endorse the individuality. Identification of fingerprint is very important in forensic science, trace any part of human, collection of crime part and proof from a crime. This paper presents a new method of identifying fingerprint in biometrics security system. Fingerprint is one of the best example in biometric security because it can identify personal information and it is much secure than any other biometric identification system. The experimental result exhibits the performance of the proposed method.
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...ijcsa
This paper proposes a Bio metric identification system for person identification using two bio metric traits
hand geometry and palm print. The hand image captured from digital camera is preprocessed to identify
key points on palm region of hand. Identified key points are used to find hand geometry feature and palm
print Region of interest (ROI). The discriminative palm print features are extracted by applying local
binary descriptor on palm print ROI. In a bio metric identification system the identity corresponding to the
input image (probe) is determined by comparing probe template with the templates of all identities enrolled
in biometric system (gallery). Response time to establish the identity of an individual increases in proportion to the number of enrollees. One way to reduce the response time is to retrieve a smaller set of candidate identity templates from the database for explicit comparison. In this paper we propose a coarseto-fine hierarchical approach to retrieve a smaller set of candidate identities called as candidate set to reduce the response time. The proposed approach is tested on the database collected at our institute.Proposed approach is of significance since hand geometry and palm print features can be extracted from the palm region of the hand. Also performance of identification system is enhanced by reducing the response time without compromising the identification accuracy.
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSijcsit
Biometric matching involves finding similarity between fingerprint images.The accuracy and speed of the
matching algorithmdetermines its effectives. This researchaims at comparing two types of matching
algorithms namely(a) matching using global orientation features and (b) matching using minutia triangulation.The comparison is done using accuracy, time and number of similar features. The experiment is conducted on a datasets of 100 candidates using four (4) fingerprints from each candidate. The data is sampled from a mass registration conducted by a reputable organization in Kenya.Theresearch reveals that fingerprint matching based on algorithm (b) performs better in speed with an average of 38.32 milliseconds
as compared to matching based on algorithm (a) with an average of 563.76 milliseconds. On accuracy,algorithm(a) performs better with an average accuracy of 0.142433 as compared to algorithm (b) with an average accuracy score of 0.004202.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
1. Dr. Raja Murali Prasad. Int. Journal of Engineering Research and Application www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 7) April 2016, pp.19-24
www.ijera.com 19|P a g e
Highly Secured Bio-Metric Authentication Model with Palm Print
Identification
Dr. Raja Murali Prasad
Professor, Vardhaman College of Engineering, Hyderabad, Telangana, India
ABSTRACT
For securing personal identifications and highly secure identification problems, biometric technologies will
provide higher security with improved accuracy. This has become an emerging technology in recent years due to
the transaction frauds, security breaches and personal identification etc. The beauty of biometric technology is it
provides a unique code for each person and it can’t be copied or forged by others. To overcome the draw backs
of finger print identification systems, here in this paper we proposed a palm print based personal identification
system, which is a most promising and emerging research area in biometric identification systems due to its
uniqueness, scalability, faster execution speed and large area for extracting the features. It provides higher
security over finger print biometric systems with its rich features like wrinkles, continuous ridges, principal
lines, minutiae points, and singular points. The main aim of proposed palm print identification system is to
implement a system with higher accuracy and increased speed in identifying the palm prints of several users.
Here, in this we presented a highly secured palm print identification system with extraction of region of interest
(ROI) with morphological operation there by applying un-decimated bi-orthogonal wavelet (UDBW) transform
to extract the low level features of registered palm prints to calculate its feature vectors (FV) then after the
comparison is done by measuring the distance between registered palm feature vector and testing palm print
feature vector. Simulation results show that the proposed biometric identification system provides more
accuracy and reliable recognition rate.
Index terms: personal identification, finger print recognition, face recognition, IRIS recognition, ROI, Hybrid
wavelet and recognition rate
I. INTRODUCTION
Identifying our selves is omnipresent in
daily lives at many places such as accessing bank
accounts, cash draw from ATM, computer logging,
entering into a protecting sites and so on. Formally,
one can access their self by physically carrying the
passports, remembering pass words, access cards,
keys; personal identification numbers (PINs) and
secret codes. Regrettably, all the mentioned
identifications can be lost, copied, forgotten or
even stolen. Such loopholes or deficiencies cause
many serious issues to all concerned people. For
example, all over world the hackers often interrupt
computer networks; credit card fraud is
approximated at billion dollars per annum.
Forgotten passwords cost will be very high,
Therefore, we need a solution for all the above
deficiencies in conventional personal identification
techniques which is more reliable, robust and
foolproof personal identification solution that could
verify that physically he/she claims to be. A
biometric is a method that recognizes the identity
of a person or human being automatically by doing
the statistical analysis of biological characteristics.
The measurable characteristics can be physical,
such as finger, eye, face or palm. Common
modalities being used as biometric personal
identification systems are face recognition and
finger print identification. But authentication with
face is still a problem due to its illumination
invariance, occlusion effects and pose variations
where as finger print does not have a good
psychological effect on the user because of it wide
use in investigations of crime. Hence, in future if
any biometric system that should get succeeds have
the attributes like accuracy, easy acquisition,
richness, uniqueness, reliability and all above user
acceptance. Palm print identification system is a
new modality of biometric system which will
overcome all the deficiencies occur with
conventional personal identification systems such
as finger print, face recognition and iris
recognition. It not only has the unique information
but also has far more amount of details such as
principal lines, creases and wrinkles. Moreover, it
has rich features to analyze more effectively and to
improve the security. It has entered into a biometric
family and become most promising personal
identification system with higher security and
improved accuracy due to its easy acquisition,
reliability and high user acceptance. There are
many researchers in the literature, who have
developed palm print based personal identification
systems using edge detection, region of interest
RESEARCH ARTICLE OPEN ACCESS
2. Dr. Raja Murali Prasad. Int. Journal of Engineering Research and Application www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 7) April 2016, pp.19-24
www.ijera.com 20|P a g e
(ROI), discrete cosine transform (DCT), short time
fourier transform (STFT), principle component
analysis (PCA) and independent component
analysis (ICA). All the above algorithms have
suffered from lack of features extraction and time
complexity. Here, in this we presented a highly
secured palm print identification system with
extraction of region of interest there by applying
hybrid wavelet to extract the low level features of
registered palm prints to calculate its feature
vectors then after the comparison is done by
measuring the distance between registered palm
feature vector and testing palm print feature vector.
II. EXISTING METHODS
In the literature, there are many
researchers who have developed biometric
authentication modules based on various spatial
and transformation domain techniques. D. Huang,
W. Jia, and D. Zhang[1] proposed a novel
algorithm for the automatic classification of low-
resolution palmprints. First the principal lines of
the palm are defined using their position and
thickness. Principal lines are defined and
characterized by their position and thickness. A set
of directional line detectors is devised for principal
line extraction. By using these detectors, the
potential line initials of the principal lines are
extracted and then, based on the extracted potential
line initials, the principal lines are extracted in their
entirety using a recursive process. The local
information about the extracted part of the principal
line is used to decide a ROI and then a suitable line
detector is chosen to extract the next part of the
principal line in this ROI. After extracting the
principal lines, some rules are presented for
palmprint classification. A. Kong and D. Zhang [2]
have presented a novel feature extraction method,
the Competitive Coding Scheme for palmprint
identification. This scheme extracts the orientation
information from the palm lines and stores it in the
Competitive Code. An angular match with an
effective implementation is developed for
comparing Competitive Codes. Total execution
time for verification is about 1s, which is fast
enough for real-time applications. The proposed
coding scheme has been evaluated using a database
with 7,752 palmprint images from 386 different
palms. For verification, the proposed method can
operate at a high genuine acceptance rate of 98.4%
and a low false acceptance rate of 3*10-6. Dai and
Zhou [3] introduces high resolution approach for
palmprint recognition with multiple features
extraction. Features like minutiae, density,
orientation, and principal lines are taken for feature
extraction. For orientation estimation the DFT and
Radon-Transform-Based Orientation Estimation
are used. For minutiae extraction Gabor filter is
used for ridges enhancement according to the local
ridge direction and density. Density map is
calculated by using the composite algorithm, Gabor
filter, Hough transform. And to extract the
principal line features Hough transform is applied.
SVM is used as the fusion method for the
verification system and the proposed heuristic rule
for the identification system. Jiaa, Huanga and
Zhang [4] and [5] have proposed palmprint
verification based on robust line orientation code.
Modified finite Radon transform has been used for
feature extraction, which extracts orientation
feature. For matching of test image with a training
image the line matching technique has been used
which is based on pixel-to-area algorithm. Zhang,
Kong, You and Wong [6] have proposed Online
Palmprint Identification. The proposed system
takes online palmprints, and uses low resolution
images. Low pass filter and boundary tracking
algorithm is used in preprocessing phase. Circular
Gabor filter used for feature extraction and 2-D
Gabor phase coding is used for feature
representation. A normalized hamming distance is
applied for matching. J. You, W. Kong, D. Zhang,
and K. Cheung[7] proposed a dynamic selection
scheme by introducing global texture feature
measurement and the detection of local interesting
points. Our comparative study of palmprint feature
extraction shows that palmprint patterns can be
well described by textures, and the texture energy
measurement possesses a large variance between
different classes while retaining high compactness
within the class. The coarse-level classification by
global texture features is effective and essential to
reduce the number of samples for further
processing at fine level. The guided searching for
the best matching based on interesting points
improves the system efficiency further. W. Li, J.
You, and D. Zhang[8], have proposed an effective
indexing and searching scheme for an image
database to facilitate fast retrieval when the size of
a palmprint database is large. There are three key
issues to be considered: feature extraction,
indexing, and matching. In general, in an image
database, the extracted features are often associated
to the original images as indices. A search for the
best matching is conducted in a layered fashion,
where one feature is first selected to lead the search
by reducing the set of candidates. Then other
features are used to reduce the candidate set
further. Such a process will be repeated until the
final output is determined based on the given
matching criteria. The selection of features plays an
important role for efficient search. An effective
feature selection scheme should exclude the most
impossible candidates, compare easily, require
small size of space for storage. Prasad, Govindan
and Sathidevi[9], have proposed Palmprint
3. Dr. Raja Murali Prasad. Int. Journal of Engineering Research and Application www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 7) April 2016, pp.19-24
www.ijera.com 21|P a g e
Authentication Using Fusion of Wavelet Based
Representations. Features extracted are Texture
feature and line features. In proposed system pre-
processing includes low pass filtering,
segmentation, location of invariant points, and
alignment and extraction of ROI. OWE used for
feature extraction. The match scores are generated
for texture and line features individually and in
combined modes. Weighted sum rule and product
rule is used for score level matching. Cappelli,
Ferrara, and Maio[9] proposed high resolution
palmprint recognition system which is based on
minutiae extraction. Pre-processing is formed by
segmentation of an image from its background. To
enhance the quality of image, local frequencies and
local orientations are estimated. Local orientation is
estimated using fingerprint orientation extraction
approach and local frequencies are estimated by
counting the number of pixels between two
consecutive peaks of gray level along the direction
normal to local ridge orientation. Minutiae feature
is extracted in feature extraction phase. To extract
the minutiae features contextual filtering with
Gabor filters approach is applied. Minutiae cylinder
code has been used for matching the minutiae
features.A. Gyaourova and A. Ross[10] have
proposed an indexing technique that can either
employ the biometric matcher that is already
present in the biometric system or use another
independent matcher. Index codes are generated for
each modality using the corresponding matcher.
During retrieval, the index code of the probe is
compared against those in the gallery using a
similarity measure to retrieve a list of candidate
identities for biometric matching. The proposed
indexing technique on a chimeric multimodal
database resulted in a reduction of the search space
by an average of 84% at a 100% hit rate. The main
factor for the amount of speedup during
identification was the penetration rate of the
indexing.
To overcome all the drawbacks of above
works developed by many authors, here we
supposed to introduce a highly secured biometric
authentication system with palm print using
UDBW transform and Morphological ROI
extraction.
III. PROPOSED METHOD
Here in this section, we described the
proposed palm print authentication model using
hybrid process and UDBWtransform. Fig shows
that the proposed model for palm print
authentication, in which we had three modules:
a. Registration process
b. Testing and
c. Palm matching
3.1. Registration
In this module input palm image will be
registered by applying region of interest with
morphological operation there by calculate the
distance transform and then extracting the low level
features using 3-level UDBW transform. After
getting the UDBW coefficients, statistical
computation will be done by taking the mean and
variance of the decomposed coefficients. Then all
the statistics will be stored in a vector to make a
train feature vector.
3.1.1. Morphological Operation
Binary images may contain numerous
imperfections. In particular, the binary regions
produced by simple thresholding are distorted by
noise and texture. Morphological image processing
pursues the goals of removing these imperfections
by accounting for the form and structure of the
image.
Fig1. Flow chart of proposed palm print
authentication system
3.1.2. ROI extraction
Region of interest is a selected samples
subset within a dataset distinguished for a
particular purpose.This can be used in many
applications such as medical imaging, the tumor
boundaries may be defined on an MR or CT image
for measuring of its size. The endocardial border
may be defined on an image, perhaps during
different phases of the cardiac cycle, for example
end-systole and end-diastole, for the purpose of
assessing cardiac function. In geographical
information systems (GIS), a ROI can be taken
literally as a polygonal selection from a 2D map.
In computer vision and optical character
recognition, the ROI defines the borders of an
object under consideration.
4. Dr. Raja Murali Prasad. Int. Journal of Engineering Research and Application www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 7) April 2016, pp.19-24
www.ijera.com 22|P a g e
3.1.3. Distance Transform
The distance transform is an operator
which can only be applied to binary images. It
results in a gray level image which looks like same
as input image, except that the gray level intensities
of points inside foreground regions are changed to
show the distance to the closest boundary from
each point.
Fig2. Example of distance transform with
chessboard metric
3.1.4. UDBW Transform
Un-decimated biorthogonal transform is
well used for multi resolution analysis due to its
multi scaling functionality i.e., two scaling
functions to generate wavelet filter banks for
decomposition and reconstruction separately. It
will give more effective decomposition coefficients
due to its multi scaling property.
In the case of orthogonal, we have one
hierarchy of approximation spaces 𝑉𝑗−1 ⊂ 𝑉𝑗 ⊂
𝑉𝑗+1 and an orthogonal decomposition
𝑉𝑗+1 = 𝑉𝑗 ⊕ 𝑊𝑗 (1)
which leads us to use two filter sequences
𝑛 and 𝑔 𝑛 for decomposition and reconstruction.
Hence, we need to construct two different wavelet
functions and two different scaling functions.
Let𝑓𝑘,𝑔 𝑘 ∈ 𝐻.𝑖𝑓 𝑓𝑗 , 𝑔 𝑘 = 𝛿𝑗𝑘 Then we will say that
the two sequences are biorthogonal.
Now, our aim is to build two sets of wavelets
𝜓𝑗 ,𝑘 = 2
𝑗
2 𝜓 2𝑗
𝑥 − 𝑘 (2)
𝜓𝑗,𝑘 = 2
𝑗
2 𝜓2𝑗
𝑥 − 𝑘 (3)
To do so, we need four filters𝑔, , 𝑔, i.e.,
two sequences to be act as decomposition
sequences and two sequences as reconstruction
sequences. For example, if 𝑐 𝑛
1
is a data set, it will be
decomposed as follows:
𝑐 𝑛
0
= 2𝑛−𝑘 𝑐 𝑘
1
𝑘 (4)
𝑑 𝑛
0
= 𝑔2𝑛−𝑘 𝑐 𝑘
1
𝑘 (5)
And the reconstruction is given by
𝑐𝑙
1
= 2𝑛−𝑙 𝑐 𝑛
0
+ 𝑔2𝑛−𝑙 𝑑 𝑛
0
𝑛 (6)
We can achieve perfect reconstruction by following
some conditions given below:
𝑔 𝑛 = −1 𝑛+1
−𝑛 ,𝑔 𝑛 = −1 𝑛+1
𝑛
𝑚 𝑛+2𝑘 = 𝛿 𝑘0
𝑛
Now consider that 𝜙 𝑥 and 𝜙 𝑥 are two
scaling function with their own hierarchy of
approximation spaces, then we will generate
function of wavelet in a method of analogous to the
orthogonal case. We now define the scaling
function as follows:
𝜙 𝑥 = 2 𝑛 𝜙 2𝑥 − 𝑛𝑛𝑛 (7)
𝜙 𝑥 = 2 𝑛 𝜙 2𝑥 − 𝑛𝑛 (8)
So, finally the bi-orthogonal wavelet functions can
be defined as follows:
𝜓 𝑥 = 2 𝑔 𝑛 𝜙 2𝑥 − 𝑛𝑛 (9)
𝜓 𝑥 = 2 𝑔 𝑛+1 𝜙 2𝑥 − 𝑛𝑛 (10)
3.2. Testing
The second module in the proposed
system is testing process which includes that the
database palm image will be selected for testing
with the registered palm image by applying
morphological processing; ROI extraction, distance
transform and UDBW transform there by
calculating the statistics to get the test feature
vector.
3.3. Matching Process
In this step, Euclidean distance will be
calculated between both the feature vectors i.e.,
train and test to obtain the most matched image that
is stored in database to found that whether
authorized person’s identification is available or
not. If the distance is zero then the person will be
identified otherwise it displays that the match not
found.
IV. SIMULATION RESULTS
Experimental results have been done in
MATLAB 2014a version with various palm images
by using proposed palm print identification model
with high security. We achieved 100% accuracy
and more efficiency with the proposed model. Fig1
shows that the original palm image for registration
process described in section 3.1, 3 (a) shows the
original palm image, 3(b) shows it’s binary image
with morphing, 3(c) shows that the distance
transformed image of a binary image and finally 3
(d) is a registered palm print for authenticating a
person for authorization into a particular task.
(a) (b)
5. Dr. Raja Murali Prasad. Int. Journal of Engineering Research and Application www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 7) April 2016, pp.19-24
www.ijera.com 23|P a g e
(c) (d)
Fig3. (a) original palm image for
registration (b) morphed image (c) distance
transformed image and (d) registered palm image
Fig4. Message box for saving the registered palm
filename with mahe7
Fig5. distance transform of a test image
Fig6. Registered palm print of a test image
Fig7. Message box displayed after completion of
test and matching process
(a) (b)
(c) (d)
Fig.8un saved file from data base (a)
binary image (b) distance transform (c) registered
palm print and (d) message box after testing with
data base files
(a)
(b)
Fig.9 screen shots of test image 4.jpg which has
been saved with a specific file name in database
6. Dr. Raja Murali Prasad. Int. Journal of Engineering Research and Application www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 7) April 2016, pp.19-24
www.ijera.com 24|P a g e
Fig.10 screen shots of test image 2.jpg which has
not saved with a specific file name
V. CONCLUSIONS
Here, we introduced a novel and highly
secured biometric authentication model with palm
print identification system using morphological
ROI extraction with distance transform and un-
decimated biorthogonal wavelet transform. Due to
its multi scaling functionality, two different
wavelet filter banks will be used to extract the
features of distance transformed image to obtain
the most effective feature factor for comparing with
a test feature vector. The proposed model has
proven that it has achieved 100% accuracy with
several test images from the database.
REFERENCES
[1] D. Zhang, W. K. Kong, J. You, M. Wong,
“Online Palmprint Identification,” IEEE
Transaction on Pattern Analysis and
Machine Intelligence, Vol.25, No. 9, pp.
0162-8828, Sept 2003.
[2] G. Lu, D. Zhang, K. Wang, Palm print
recognition using eigenpalms features,
Pattern Recognition Letters 24 (9) (2003)
1463–1467.
[3] J. Dai, J. Feng, J. Zhou, “Robust and
Efficient Ridge-Based Palmprint
Matching,” IEEE Transaction on Pattern
Analysis and Machine Intelligence,
Vol.34, No. 8, pp. 0162-8828, August
2012
Kong and D. Zhang, “Competitive coding
scheme for palmprint verification,” in
Proc ICPR, 2011,pp. 520–523.
[4] Huang,W. Jia, D. Zhang, “Palmprint
verification based on robust line
orientation code,” Pattern Recognition,
Science Direct, pp. 1504 – 1513, 2008.
[5] Huang,W. Jia, D. Zhang, “Palmprint
verification based on principal lines,”
Pattern Recognition, Science Direct,
pp.1316 – 1328, 2008.
[6] J. You, W. Kong, D. Zhang, and K.
Cheung, “On hierarchical palmprint
coding with multiple features for personal
identification in large databases,” IEEE
Trans. Circuits Syst. Video Technol., vol.
14, no. 2,pp. 234–243, Feb. 2009.
[7] W. Li, J. You, and D. Zhang, “Texture-
based palmprint retrieval using a layered
search scheme for personal identification,”
IEEE Trans. Multimedia, vol. 7, no. 5, pp.
891–898, Oct. 2009.
[8] S. M. Prasad, V. K. Govindan , P. S.
Sathidevi, “Palmprint Authentication
Using Fusion of Wavelet Based
Representations,” IEEE, pp. 978-1-4244-
5612-3, 2009.
[9] R. Cappelli, M. Ferrara, and D. Maio, “A
Fast and Accurate Palmprint Recognition
System Based on Minutiae,” IEEE
Transaction on System, Man and
Cybernetics- Part B: Cybernetics, Vol. 42,
No. 3, pp. 1083-4419, June 2012.
[10] Gyaourova and A. Ross, “Index codes for
multibiometric pattern retrieval,” IEEE
Trans. Inf. Forensics Security, vol. 7, no.
2, pp. 518–529, Apr. 2012.
Raja Murali Prasad received
his bachelor’s degree from
the Institution of Engineers
in 1989 and M. Tech in
ECE from Pondicherry
Engineering College in
1993. He worked in various
engineering colleges as
faculty member. Presently,
he is working as faculty member in the
Department of Electronics and Communication
Engineering, Vardhaman College of
Engineering, Hyderabad. He completed PhD at
JNT University Anantapur. His research
interests include digital communications,
control systems and wireless communications.