This document summarizes a research paper on hand vein authentication systems. It discusses how hand vein patterns are unique biometric identifiers that can be used for authentication. The system works by capturing an image of the veins in the back of the hand, extracting the vein pattern features, and matching the features to authenticate a user. Key advantages of this approach are that vein patterns are difficult to replicate, located inside the hand, and stable over time. The document provides details on the image processing and authentication methodology.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Paper helps to learner to know about various bio metrics and comparison between them. this paper provide researchers a brief information so that they can choose their research area in biometric based on the comparison
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Paper helps to learner to know about various bio metrics and comparison between them. this paper provide researchers a brief information so that they can choose their research area in biometric based on the comparison
This is a Fingerprint based class attendance system in higher institutions, The implementation take attendance of student in a class and give output of student eligibility status at the end of the semester or term
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEJournal For Research
This paper presents an optimized palm vein authentication algorithm which will match the similar type of vascular pattern from the database given i.e. CASIA-Palmprint V1 dataset. . The palm vein authentication technology offers a high level of accuracy. Palm vein authentication uses the vascular patterns of an individual’s palm as personal identification data. If we compare with a finger or the back of a hand, a palm has a broader and more complicated vascular pattern and thus contains a wealth of differentiating features for personal identification. The importance of biometrics in the current field of Security has been depicted in this work. Also, we have also outlined opinions about the utility of Biometric authentication systems. We have processed the raw image from the dataset before implementing authentication algorithm. After getting the suitable image after pre- processing, we have used local binary pattern (LBP) for feature extraction purpose & then using a machine learning algorithm, with support vector machine (SVM), we tried to match the vascular vein pattern for authentication. Result of the matching algorithm is not only optimized as per the proposed approach but also quite efficient.
Introduction
The term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to measure). Automated biometric systems have only become available over the last few decades, due to significant advances in the field of computer processing. Many of these new automated techniques, however, are based on ideas that were originally conceived hundreds, even thousands of years ago.
One of the oldest and most basic examples of a characteristic that is used for recognition by humans is the face. Since the beginning of civilization, humans have used faces to identify known (familiar) and unknown (unfamiliar) individuals. This simple task became increasingly more challenging as populations increased and as more convenient methods of travel introduced many new individuals into- once small communities. The concept of human-to-human recognition is also seen in behavioral-predominant biometrics such as speaker and gait recognition. Individuals use these characteristics, somewhat unconsciously, to recognize known individuals on a day-to-day basis.
This paper describes and implements an authentication resolutionmistreatmentstatistics, digital certificates and sensible cards to unravelthe protectiondownsidewithin the authentication method. The primaryhalfmay be a general introduction to the subject; the second may be atemporarysummaryregardingmistreatmentstatistics, a lot ofprecisely hand vein pattern. The third half presents a way of extracting the pattern vein of the rear of the hand additionallya way to match 2 templates. The fourth presents the 2 necessary phases in any authentication system: the enrolment and therefore the authentication. A projected authentication protocol is delineated too. The twenty percent generalize the attainable attacks and vulnerabilities during abiometric identification system and it additionally shows however our system is ready to avoid them .The sixth half talks regarding the implementation of the applying. Finally, within the conclusion, we tend to tried to summarize our work and prove the advantages of mistreatmentthis technique.
This is a Fingerprint based class attendance system in higher institutions, The implementation take attendance of student in a class and give output of student eligibility status at the end of the semester or term
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEJournal For Research
This paper presents an optimized palm vein authentication algorithm which will match the similar type of vascular pattern from the database given i.e. CASIA-Palmprint V1 dataset. . The palm vein authentication technology offers a high level of accuracy. Palm vein authentication uses the vascular patterns of an individual’s palm as personal identification data. If we compare with a finger or the back of a hand, a palm has a broader and more complicated vascular pattern and thus contains a wealth of differentiating features for personal identification. The importance of biometrics in the current field of Security has been depicted in this work. Also, we have also outlined opinions about the utility of Biometric authentication systems. We have processed the raw image from the dataset before implementing authentication algorithm. After getting the suitable image after pre- processing, we have used local binary pattern (LBP) for feature extraction purpose & then using a machine learning algorithm, with support vector machine (SVM), we tried to match the vascular vein pattern for authentication. Result of the matching algorithm is not only optimized as per the proposed approach but also quite efficient.
Introduction
The term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to measure). Automated biometric systems have only become available over the last few decades, due to significant advances in the field of computer processing. Many of these new automated techniques, however, are based on ideas that were originally conceived hundreds, even thousands of years ago.
One of the oldest and most basic examples of a characteristic that is used for recognition by humans is the face. Since the beginning of civilization, humans have used faces to identify known (familiar) and unknown (unfamiliar) individuals. This simple task became increasingly more challenging as populations increased and as more convenient methods of travel introduced many new individuals into- once small communities. The concept of human-to-human recognition is also seen in behavioral-predominant biometrics such as speaker and gait recognition. Individuals use these characteristics, somewhat unconsciously, to recognize known individuals on a day-to-day basis.
This paper describes and implements an authentication resolutionmistreatmentstatistics, digital certificates and sensible cards to unravelthe protectiondownsidewithin the authentication method. The primaryhalfmay be a general introduction to the subject; the second may be atemporarysummaryregardingmistreatmentstatistics, a lot ofprecisely hand vein pattern. The third half presents a way of extracting the pattern vein of the rear of the hand additionallya way to match 2 templates. The fourth presents the 2 necessary phases in any authentication system: the enrolment and therefore the authentication. A projected authentication protocol is delineated too. The twenty percent generalize the attainable attacks and vulnerabilities during abiometric identification system and it additionally shows however our system is ready to avoid them .The sixth half talks regarding the implementation of the applying. Finally, within the conclusion, we tend to tried to summarize our work and prove the advantages of mistreatmentthis technique.
Here i discuss 3 algorithm about String matching.
Those algorithm are:
1. The naive algorithm.
2. The Rabin-Krap algorithm.
3. The Knuth-Morris-Pratt algorithm.
i hope,by readinng this slide, it is easy to undarstand those algorithm.
Finger vein based biometric security systemeSAT Journals
Abstract Finger vein recognition is a kind of biometric authentication system. This is one among many forms of biometrics used to recognize the individuals and to verify their identity. This paper presents a finger vein authentication system using template matching. Implementation using Matlab shows that the finger vein authentication system performs well for user identification. Keywords – biometric, feature extraction, figure vein, security system
Finger Vein Detection using Gabor Filter, Segmentation and Matched FilterEditor IJCATR
This paper propose a method of personal identification based on finger-vein patterns. An image of a finger captured by the web camera under the IR light transmission contains not only the vein pattern itself; but also shade produced by various thickness of the finger muscles; bones; and tissue networks surrounding the vein. In this paper; we intro-duce preliminary process to enhance the image quality worsened by light effect and noise produced by the web camera; then segment the vein pattern by using adaptive threshold method and matched them using improved template matching. The main purposes of this paper are to investigate finger-vein technology; the applicable fields and whether finger-vein detection can solve the problems fingerprint detection imposes in certain industries
Finger vein identification system
You can also check it in Sales Sharing Site "www.lunchntouch.com"
If you want a brochure in your language,
send E-mail below E-mail address unquestioningly!
(English, Chinese, Japanese, french, Portuguese, Spanish, etc)
Import & Export discussion Welcome, too!
Thank you for your touch!
E-mail address : yun@lunchntouch.com
"We can Make happy place for small business! Let's do it!!"
= Lunch N Touch =
Biometric ATM are used for wide range of applications like for Banking, Coupons & Self service ATM. Biometrics ATM offer ATM type interface along with at-least one Biometrics capture device like Fingerprint Scanner, Iris camera, Palm/Finger Vein scanner , Face recognition camera. They are often called Multi-Biometrics ATM, Wall mount Biometrics ATM, Biometrics Devices / Machine.
Most of the ATM in the past have been using ID cards to identify users but with the wide acceptance of Biometrics , a new generation of Biometrics ATM are being deployed for wide range of applications worldwide.
Technology that identifies you based on your physical or behavioral traits- for added security to confirm that you are who you claim to be.(this ppt is very dear to me as i have given a talk on this topic twice. this also fetched me and migmar first prize at deen dayal upadhyay college- converging vectors - an inter college presentation competition organized by arya bhata science forum)
A Simple Presentation about Finger vein Authentication System.It Details about Finger vein authentication system with easy words & pictures.It is an effective ppt prepared with essential informations about finger vein authentication system.It should be useful for students as well as programmers.
Biometrics technology is rapidly progressing and offers attractive opportunities. In recent years, biometric authentication has grown in popularity as a means of personal identification in ATM authentication systems. The prominent biometric methods that may be used for authentication include fingerprint, palmprint, handprint, face recognition, speech recognition, dental and eye biometrics. In this paper, a microcontroller based prototype of ATM cashbox access system using fingerprint sensor module is implemented. An 8-bit PIC16F877A microcontroller developed by Microchip Technology is used in the system. The necessary software is written in Embedded 'C' and the system is tested.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This technology provides 100% security to the individual's personal data as it is based on detecting the veins pattern present on the hand of an individual.
An Investigation towards Effectiveness of Present State of Biometric-Based Au...RSIS International
The adoption of biometric-based authentication mechanism has been already initiated a decade back but still in real-life we get to see usage of only unimodal biometrics. Out of all the different forms of biometrics, we see usage of fingerprint as the dominant attribute in contrast to different other attributes e.g. teeth image, palm, facial geometry, retina network, iris, etc. Multimodal biometrics is believed to offered better security compared to unimodal. Although, there are some of the technical advancement in evolving up with new multimodal methodologies, but still commercial usage of such is yet to be seen. Therefore, this manuscripts aims to explore the level of effectiveness in existing approaches of biometric-based authentication system in order to further investigate the unaddressed solution towards this problem. This paper reviews the approaches used for addressing different problems associated with biometrics and discusses about their technical methodologies as well as their limitations.
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...TELKOMNIKA JOURNAL
The idea of security is as old as humanity itself. Between oldest methods of security were
included simple mechanical locks whose authentication element was the key. At first, a universal–simple
type, later unique for each lock. A long time had mechanical locks been the sole option for protection
against unauthorized access. The boom of biometrics has come in the 20th century, and especially in
recent years, biometrics is much expanded in the various areas of our life. Opposite of traditional security
methods such as passwords, access cards, and hardware keys, it offers many benefits. The main benefits
are the uniqueness and the impossibility of their loss. The main benefits are the uniqueness and the
impossibility of their loss. Therefore we focussed in this paper on the the design of low cost biometric
fingerprint system and subsequent implementation of this system in praxtise. Our main goal was to create
a system that is capable of recognizing fingerprints from a user and then processing them. The main part
of this system is the microcontroller Arduino Yun with an external interface to the scan of the fingerprint
with a name Adafruit R305 (special reader). This microcontroller communicates with the external database,
which ensures the exchange of data between Arduino Yun and user application. This application was
created for (currently) most widespread mobile operating system-Android.
Protection of Patient Identity and Privacy Using Vascular BiometricsCSCJournals
Biometric systems are being used in hospitals to streamline patient registration and identification, as an effective measure to protect patient privacy and prevent identity theft. Many Hospitals and Healthcare institutions are turning towards Vascular Biometrics which complement the biometric recognition with hygiene and improved accuracy. In this paper, a multimodal hand vein system and a multibiometric fingerprint-hand vein biometric system are proposed. The multimodal hand vein system is a non-invasive, contactless and fast system, which uses two different feature sets extracted from each hand vein image. The multibiometric system captures both the fingerprint as well as the hand vein of the patient and hence offers even more improved performance though the speed and the cost of the system as well as the hygiene are reduced. We have used the Euclidean classifier to calculate the performance rates namely the False Rejection Rate (FRR) and False Acceptance Rate (FAR) of the Vein System and the Fingerprint-Vein System. We have performed this analysis using a volunteer crew of 74 persons. The FRR and FAR were 0.46% and 0.7% in the former case and 0% and 0.01% in the latter case respectively. The multimodal or the multibiometric system could be used based of the Hospital‘s requirements.
Similar to hand vein structure authentication (20)
Ijeee 33-36-surveillance system for coal mines based on wireless sensor networkKumar Goud
Abstract: The foremost critical task for coal mine is of keeping track of miners spread out across a large mining areas .It becomes even difficult when mine tunnels collapse. Many mines use a radio system to track miners, but when a collapse occurs, the base stations connected by a thin wire often are rendered useless. In this project to overcome the demerits of radio system we used wireless technology for tracking the miners. For this purpose a small RF transmitter module is equipped to each person entering a mine. Each transceiver placed in the mine look after the location of miners. The transceivers communicate with base stations through Zigbee module. In addition of tracking the location of miners we also include sensors such as temperature & humidity to intimate the base station & miners when some atmosphere changes occur. Mine operators are now able to monitor the real-time locations of each miner to better pinpoint their locations in the event of an emergency. Even after a full-day of use, mine operators can locate an individual miner within ten feet.
Key Words: Wireless sensor networks (WSN), ZIGBEE, and LPC2148.
Ijeee 28-32-accurate fault location estimation in transmission linesKumar Goud
Accurate Fault Location Estimation in Transmission Lines
B. Narsimha Reddy Dr. P. Chandra Sekar
Sr. Assistant Professor, Dept. of EEE Associate Professor, Dept. of EEE
Mahatma Gandhi Institute of Technology Mahatma Gandhi Institute of Technology
Hyderabad, TS, India Hyderabad, TS, India
babubnr@gmail.com Pcs_76@rediffmail.com
Abstract: In trendy power transmission systems, the double-circuit line structure is increasingly adopted. However, owing to the mutual coupling between the parallel lines it is quite difficult to style correct fault location algorithms. Moreover, the widely used series compensator and its protecting device introduce harmonics and non-linearity’s to the transmission lines, that create fault location a lot of difficult. To tackle these issues, this thesis is committed to developing advanced fault location strategies for double-circuit and series-compensated transmission lines. Algorithms utilizing thin measurements for pinpointing the situation of short-circuit faults on double-circuit lines square measure planned. By moldering the initial net-work into 3 sequence networks, the bus ohmic resistance matrix for every network with the addition of the citations fault bus may be developed. It’s a perform of the unknown fault location. With the increased bus ohmic resistance matrices the sequence voltage amendment throughout the fault at any bus may be expressed in terms of the corresponding sequence fault current and also the transfer ohmic resistance between the fault bus and the measured bus. Resorting to tape machine the superimposed sequence current at any branch may be expressed with relevancy the pertaining sequence fault current and transfer ohmic resistance terms. Obeying boundary conditions of different fault sorts, four different categories of fault location algorithms utilizing either voltage phasors, or phase voltage magnitudes, or current phasors or section current magnitudes square measure derived. The distinguishing characteristic of the planned methodology is that the information measurements need not stem from the faulted section itself. Quite satisfactory results are obtained victimisation EMTP simulation studies. A fault location rule for series-compensated transmission lines that employs two-terminal asynchronous voltage and current measurements has been implemented. For the distinct cases that the fault happens either on the left or on the right aspect of the series compensator, 2 subroutines square measure developed. In addition, the procedure to spot the proper fault location estimate is represented during this work. Simulation studies disbursed with Matlab Sim Power Systems show that the fault location results square measure terribly correct.
Keywords: Ohmic Resistance, Transmission Lines, PMU, DFR, VCR, EMTP, MOV.
Ijeee 24-27-energy efficient communication for adhoc networksKumar Goud
Energy Efficient Communication for Adhoc Networks
1SK.Nagula Meera 2Dr. D.Srinivasa Kumar 3Dr. D.Srinivasa Rao
Research Scholar Professor & Principal Professor, ECE department
ECE department, JNTU Hyderabad Hosur Institute of Technology and Science
Errandapalli Village, Beerpalli PO JNTU College of Engineering Hyderabad(Autonomous)
Ramapuram (via), Krishnagri Dt., Tamilnadu
Abstract: A mobile accidental network (MANET) may be an assortment of nodes equipped with wireless communications and a networking capability while not central network management. The method of wireless networks within the applications like transferring video files is subjected to twin constraints. Each step-down of power and different QOS needs like delay, throughputs square measure need to be bewaring properly. Mobile accidental Networks square measure a lot of perceptive to those problems wherever every mobile device is active sort of a router and consequently, routing delay adds significantly to overall end-to-end delay. This paper presents a survey on power economical routing protocols for Mobile Ad-Hoc Networks. This survey focused on recent progress on power saving algorithms. Additionally we recommend one power aware technique which can cut back power consumption yet as increase the lifespan of node and network.
Keywords: Mobile, Ad-Hoc networks, QOS, MANET, IBSS, ATIM, DPSM.
Ijeee 20-23-target parameter estimation for pulsed doppler radar applicationsKumar Goud
Target Parameter Estimation for Pulsed Doppler Radar Applications
Pratibha Jha1 S.Swetha2 D.Kavitha3
M.Tech Scholar (ECE), Dept of ECE Senior Assistant Professor & Associate Professor, Dept of ECE
Aurora’s Scientific Technological &
Research Academy Aurora’s Scientific Technological &
Research Academy, JNTUH Aurora’s Scientific Technological &
Research Academy, JNTUH
Bandlaguda, Hyderabad, TS, India Bandlaguda, Hyderabad, TS, India Bandlaguda, Hyderabad, TS, India
pratibhajha1001@yahoo.co.in swetha.sirisin@gmail.com kavitadevireddy@gmail.com
Abstract- Conventional monostatic single-input single-output (SISO) radar transmits an electro-magnetic (EM) wave from the transmitter. The properties of this wave are altered while reflecting from the surfaces of the targets towards the receiver. The altered properties of the wave enable estimation of unknown target parameters like range, Doppler, and attenuation. However, such systems offer limited degrees of freedom. Multiple-input and multiple-output (MIMO) radar systems use arrays of transmitting and receiving antennas like phased array radars but while a phased array transmits highly correlated signals which form a beam, MIMO antennas transmit signals from a diverse set and independence between the signals is exploited
Keywords: radar, OTA, MIMO, FHSS, DSSS, MISO
Ijeee 16-19-digital media hidden data extractingKumar Goud
Abstract— Magnetic Resonance Imaging (MRI) brain tumor image classification is a difficult task due to the variance and complexity of tumors. This paper presents an efficient techniques for the classification of the magnetic resonance brain images. In this work we are taking MR images as input; MRI which is directed into internal cavity of brain and gives the complete image of the brain. The proposed technique consists of two stages.In the first stage, discrete wavelet transform is used for dimensionality reduction and feature extraction.In the second stage, classification is performed using the probabilistic neural network. The classifier have been used to classify real MR images as benign (non-cancerous) and Malignant (cancerous). Probabilistic neural network (PNN) with image and data processing technique is employed to implement an automated brain tumor classification. The use of artificial intelligent technique has shown great potential in this field.
Index Terms— Brain tumors, Feature extraction,Classification, MRI, Probabilistic neural network, Dimensionality reduction, Discrete wavelet transform.
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...Kumar Goud
Privacy Preserving Distributed Data Mining with Anonymous ID Assignment
Chikkudu Chandrakanth Bheemari Santhoshkumar Tejavath Charan Singh
M.Tech Scholar(CSE) M.Tech Scholar(CSE) Assistant Professor, Dept of CSE
Sri Indu College of Engg and Tech Sri Indu College of Engg and Tech Sri Indu College of Engg and Tech
Ibrahimpatan, Hyderabad, TS, India Ibrahimpatan, Hyderabad, TS, India Ibrahimpatan, Hyderabad, TS, India
Abstract: This paper builds an algorithm for sharing simple integer data on top of secure sum data mining operation using Newton’s identities and Sturm’s theorem. Algorithm for anonymous sharing of private data among parties is developed. This assignment is anonymous in that the identities received are unknown to the other members of the group. Resistance to collusion among other members is verified in an information theoretic sense when private communication channels are used. This assignment of serial numbers allows more complex data to be shared and has applications to other problems in privacy preserving data mining, collision avoidance in communications and distributed database access. The new algorithms are built on top of a secure sum data mining operation using Newton’s identities and Sturm’s theorem. An algorithm for distributed solution of certain polynomials over finite fields enhances the scalability of the algorithms.
Key words: Cloud, Website, information sharing, DBMS, ID, ODBC, ASP.NET
.
Ijeee 3-6-implementation of environment monitoring system using arm microcont...Kumar Goud
Implementation of Environment Monitoring System using ARM Microcontroller Communication
SABEEH AFAQ ISMAEL 1 Dr.CHANDRASEKHAR REDDY 2
M.Tech Embedded Systems, Dept of ECE Professor
JNTUH Collage of Engineering JNTUH College of Engineering
Iraqi Ministry of Communications drpcsreeddy@gmail.com
Afaq_s2002@yahoo.com
Abstract: In present scenario, there is no mechanism to find where irrigation is needed. In this Project, we made wireless sensor network for monitoring the crop field area by Deploying water sensors in the land to detect the places where the water level is low. From Those results we irrigate to that particular place only. From the above methodology we Can conserve water and minimize the problem of water logging in the land. We used humidity Sensor to sense the weather. By this the farmer can get idea about the climate. If There is any chance for rainfall; the farmer need not irrigate the crop field. Due to this we can Conserve water and also power since we didn’t turn on motors. Nowadays in the crops the Fertilizer level is increasing, which affects people. By using pH sensors we get the Information about the soil and analyze the acid level of the soil. By which we can apply fertilizer To the place where it needs, also we can avoid over fertilization of the crops. Temperature is a Randomly varying quantity in the environment of paddy field. Temperature reading gives Information to the farmer. By using temperature sensors we can detect the temperature, and Irrigate the water to the crop.
Keywords: WSN, GSM, PDA, Zigbee
Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...Kumar Goud
A Tracking System using Location Prediction and Dynamic Threshold for Minimising Message Delivery
Ettaboina Sharanya DR.M.Nagaratna (Ph.D)
M.Tech (Information Technology) Assistant professor, Dept of CSE
JNTUCEH, Hyderabad. JNTUCEH, Hyderabad
Abstract: Cellular text electronic messaging services area unit progressively being relied upon to broadcast crucial data throughout emergencies. Accordingly, a good vary of organizations together with faculties and universities currently partner with third-party suppliers that promise to improve physical security by apace delivering such messages. Sadly, these products don't work as publicised because of limitations of cellular infrastructure and thus give a false sense of security to their users. During this paper, we have a tendency to perform the primary extensive investigation associate degreed characterization of the restrictions of an Emergency Alert System (EAS) mistreatment text messages as a security incident response mechanism. we have a tendency to show emergency alert systems designed on text electronic messaging not solely will meet the ten minute delivery requirement mandated by the WARN Act, however conjointly doubtless cause different voice and SMS traffic to be blocked at rates upward of 80 percent. We have a tendency to then show that our results area unit representative of reality by scrutiny them to variety of documented however not previously understood failures. Finally, we have a tendency to analyze a targeted electronic messaging mechanism as a way of with efficiency mistreatment presently deployed infrastructure and third-party EAS. In thus doing, we have a tendency to demonstrate that this progressively deployed security infrastructure will not deliver the goods its expressed needs for giant populations.
Keywords: emergency alert system, sms, EAS
layout impact of resolution enhancement in design for manufacturing dfm- in ...Kumar Goud
Abstract: As VLSI technology scales to 65nm and below, ancient communication between style and producing becomes a lot of and lighter. Gone square measure the times once designers merely pass the look GDSII file to the mill and expect excellent manufacturing and constant quantity yield. this is often for the most part thanks to the big challenges within the producing stage because the feature size continues to shrink. Thus, the concept of DFM (Design for Manufacturing) is obtaining highly regarded. even if there's no universally accepted definition of DFM, in my opinion, one in every of} the main elements of DFM is to bring producing info into the look stage in a means that's understood by designers. Consequently, designers will act on the knowledge to boost each producing and constant quantity yield. During this treatise, I’ll gift many makes an attempt to cut back the gap between style and producing communities: Alt-PSM aware galvanic cell styles, printability improvement for careful routing and therefore the ASIC style flow with litho aware static temporal arrangement analysis. Experiment results show that greatly improve the manufacturability of the styles and that we can cut back style pessimism considerably for easier style closure.
Keywords: Layout, Cell, PSM, OAI, RSM, RET, SRAF, Optimization
a new power gating technique for mitigation of standby leakage power using vt...Kumar Goud
Abstract—A power-gating scheme was presented to support multiple power-off modes and reduce the leakage power during short periods of inactivity. However, this scheme can suffer from high sensitivity to process variations, which impedes manufacturability. Recently, a new power-gating technique that is tolerant to process variations and scalable to more than two intermediate power-off modes. However this scheme can suffer from Increase in the lower threshold voltage, devices leads increased sub threshold leakage and hence more standby power consumption. We propose boy biasing technique used to reduce the power. The proposed design requires less design effort and offers greater power reduction and smaller area cost than the previous method. In addition, it can be combined with existing techniques to offer further static power reduction benefits. Analysis and extensive simulation results demonstrate the effectiveness of the proposed design.
Index Terms—Leakage power, Multi-mode VTcmos switches, Power Consumption reduction, process variation, Reconfigurable power-gating structure.
hardware implementation of aes encryption and decryption for low area & low p...Kumar Goud
Abstract-An AES algorithm is implemented on FPGA platform to improve the safety of data in transmission. AES algorithms can be implemented on FPGA in order to speed data processing and reduce time for key generating. We achieve higher performance by maintaining standard speed and reliability with low area and power. The 128 bit AES algorithm is implements on a FPGA using VHDL language with help of Xilinx tool.
dynamic resource allocation using virtual machines for cloud computing enviro...Kumar Goud
Abstract—Cloud computing allows business customers to scale up and down their resource usage based on needs., we present a system that uses virtualization technology to allocate data center resources dynamically based on application demands and support green computing by optimizing the number of servers in use. We introduce the concept of “skewness” to measure the unevenness in the multidimensional resource utilization of a server. By minimizing imbalance, we will mix completely different of workloads nicely and improve the overall utilization of server resources. We develop a set of heuristics that prevent overload in the system effectively while saving energy used. Many of the touted gains in the cloud model come from resource multiplexing through virtualization technology. In this paper Trace driven simulation and experiment results demonstrate that our algorithm achieves good performance.
Index Terms—Cloud computing, resource management, virtualization, green computing.
transient stability improvement in power system in multi machine system with ...Kumar Goud
Abstract— This paper is highlighting review of improvement the transient stability of the power system with the utilization of robust Distributed Static Series Compensator (DSSC) in transmission line power flow control. DSSC has operated similarly as a Static Synchronous Series Compensator (SSSC) but is in smaller in size and lesser cost along with various other factors. Simulation results support the DSSC capability for improving transient stability boundary of the power system.
The theory of DSSC is on the support of using a small power single-phase inverter, which connected to the transmission conductor and vigorously controls the consequent transfer impedance. Through this, the dynamic control of power flow in the line is attained. Therefore, the lowest degree of available and describe technical projects for DSSC conform further more studies on the other factors of this apparatus. This study serves a research where 1400 DSSCs are incorporate in a two-area, two-machine system in order to study the transient stability of the system. By the intend of improving the transient stability, a complementary controller have been considered and properly shared to the main control loop of DSSCs. Simulation results demonstrate the resourceful influence of DSSCs in the transient stability expansion.
Index Terms— Distributed Flexible AC Transmission System (D-FACTS), Voltage Source Inverters (VSI), Pulse Width Modulation (PWM), Distributed Static Series Compensator (DSSC), Transient Stability Enhancement.
go green - green marketing its rise for an eco friendly processes in indiaKumar Goud
Abstract: Green marketing is a phenomenon which has developed particular important in the contemporary market. This concept has enabled for the re-marketing and packaging of accessible products which already adhere to such guidelines. Moreover, the development of green marketing has opened the door of opportunity for companies to co-brand their products into separate line, lauding the green-friendliness of some while ignoring that of others. Such marketing techniques will be explained as a direct result of movement in the minds of the consumer market. As a result of this businesses have increased their rate of targeting consumers who are concerned about the environment. These same consumers through their concern are interested in integrating environmental issues into their purchasing decisions through their incorporation into the process and content of the marketing strategy for whatever product may be required. This paper discusses how businesses have increased their rate of targeting green consumers, those who are concerned about the environment and allow it to affect their purchasing decisions. The paper identifies the three particular segments of green consumers and explores the challenges and opportunities businesses have with green marketing. The paper also examines the present trends of green marketing in India and describes the reason why companies are adopting it and future of green marketing and concludes that green marketing is something that will continuously grow in both practice and demand.
Keywords - Green Marketing, Green Product, Recyclable, Environmentally safe, Eco Friendly.
enhancement of low power pulse triggered flip-flop design based on signal fee...Kumar Goud
Abstract: Low Power research major concern in today’s VLSI word. Practically, clocking system like flip-flop (FF) consumes large portion of total chip power. So in this paper we discuss about the design of the clock system using novel Flip-Flop design. In this paper, a novel low-power pulse-triggered flip-flop (FF) design is presented. Pulse- triggered FF (P-FF) has been considered as a popular alternative to the conventional master –slave based F. a low-power flip-flop (FF) design featuring an explicit type pulse-triggered structure and a modified true single phase clock latch based on a signal feed-through scheme is presented. The proposed design successfully solves the long discharging path problem in conventional explicit type pulse-triggered FF (P-FF) designs and achieves better speed and power performance in the applications of high speed. These circuits are simulated using Tanner Tools with TSMC018 technology.
Keywords: pulse-triggered flip-flop (FF), true single phase clock latch, clocking system
implementation of area efficient high speed eddr architectureKumar Goud
Abstract-This project presents an EDDR design, based on the residue-and-quotient (RQ) code, to embed into motion estimation (ME) for video coding testing applications. An error in processing elements (PEs), i.e. key components of a ME, can be detected and recovered effectively by using the EDDR design. The proposed EDDR design for ME testing can detect errors and recover data with an acceptable area overhead and timing penalty. The functional verification and synthesis can be done by Xilinx ISE. That is when compare to the existing design the implemented design area and timing will be reduced.
Index Terms—Area overhead, data recovery, error detection, reliability, residue-and-quotient (RQ) code, Xilinx ISE
professional fuzzy type-ahead rummage around in xml type-ahead search techni...Kumar Goud
Abstract – It is a research venture on the new information-access standard called type-ahead search, in which systems discover responds to a keyword query on-the-fly as users type in the uncertainty. In this paper we learn how to support fuzzy type-ahead search in XML. Underneath fuzzy search is important when users have limited knowledge about the exact representation of the entities they are looking for, such as people records in an online directory. We have developed and deployed several such systems, some of which have been used by many people on a daily basis. The systems received overwhelmingly positive feedbacks from users due to their friendly interfaces with the fuzzy-search feature. We describe the design and implementation of the systems, and demonstrate several such systems. We show that our efficient techniques can indeed allow this search paradigm to scale on large amounts of data.
Index Terms - type-ahead, large data set, server side, online directory, search technique.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
1. International Journal of Ethics in Engineering & Management Education
Website: www.ijeee.in (ISSN: 2348-4748, Volume 1, Issue 12, December 2014)
10
Hand Vein Structure Authentication
Based System
Pavitra R Deepti Natawat
Digital Communication and networking HOD, Asst. Prof. CSE Dept.
Pacific Institute of Technology Pacific Institute of Technology
Udaipur, India Udaipur, India
Abstract— A biometric feature provides a high security access
system. Traditional method uses PIN number, password, key,
and etc to identify a person is unreliable and provide a low level
security. It provides more reliable feature than the password
based authentication system as biometric characteristic cannot be
lost or forgotten, biometric feature are difficult to replicate, and
require the person to be present for the authentication process.
Many biometric such as face , finger print, iris and voice have
been developed. But here verification using vein pattern is less
developed. Biometric authentication is perform in insecure
because of information leakage issue, so overcome this the
implementation of biometric hand vein authentication Hand vein
patterns are the vast network of blood vessels underneath a
person’s skin.
Index Terms— Biometric, Hand vein structure, Authentication
I. INTRODUCTION
A biometric is a physiological or behavioral characteristic
of a human being that can distinguish one person from another
and that theoretically can be used for identification or
verification of identity. For a biometric to be practically
useful, ideally it should be unique, universal, permanent,
recordable, and acceptable—more on these properties of
practical biometrics later.
Biometrics involves using the different parts of the body,
such as the fingerprint or the eye, as a password or form of
identification. Currently, Federal Bureau of Investigation use
the fingerprints from a crime scene to find a criminal.
However, biometrics is becoming more public. Iris scans are
used in United Kingdom at ATM's instead of the normal
codes.
In our Project we are presenting authentication based on
hand vein recognition .The vein patterns are unique individual
and are stable over a long period of time It is invisible to
human eye that way its avoid the external distortion and it is
not easy to replicate the vein patterns as compared to other
biometric traits.
Due to the uniqueness, stability, and high resistance
to criminal tampering, vein pattern offers a more secure and
reliable traits for biometric authentication system. This paper
investigates a method of personal authentication.
The recognition system of back hand vein is composed of
four stages:
1. Obtaining the image of back of hand vein
2. Extracting the vein pattern from the vein images of back
of hand
3. Getting the features from the vein pattern
4. The matching schemes
Some of the advantages that vein pattern recognition
provides are:
1) The vein patterns are unique to each individual. Apart
from size, the pattern does not change over time. This feature
makes it suitable for one-to-many matching, for which hand
geometry and face recognition may not be suitable. Vein
recognition technology has a False Rejection Rate (FRR) of
0.01% and a False Acceptance Rate (FAR) of 0.0001%, hence
making it suitable for high-security applications.
2) Veins are located underneath the skin surface and are
not prone to external distortion the way fingerprints are. This
reduces the high failure to enroll (FTE) rate caused by bad
samples. Vein patterns are difficult to replicate because they
lie under the skin surface. Fingerprints can be duplicated using
gummy fingers. Additionally, some vein recognition models
come with ‘liveness’ detection that senses flow of blood in
veins.
3) User friendliness: This technology overcomes
aversion to fingerprinting and related privacy concerns since
its traditional association to criminal activity is non-existent.
In countries such as Japan, where there is strong opposition to
fingerprinting, vein recognition has become the biometric
technology of choice. It is relatively quick as it takes less than
2 seconds to authenticate. Some noncontact models are more
hygienic than fingerprint readers.
4) Potential fusion with other biometric technologies:
With the popularity of multimodal biometrics, vein
recognition technology could be used in conjunction with
hand or fingerprint biometrics. Vein recognition can provide
one-to-many matching, and hand geometry can be used for
one-to-one matching, thereby enhancing security
5) The vein image acquisition is non-contact and the
problem public hygiene is alleviated.
6) No obstructions are involved and thus the quality of
vein patterns is acceptable to be further processed.
7) Vein recognition belongs to the kind of live body
identification, while fingerprint or hand shape recognition may
be not .
8) Vein pattern is an internal feature and difficult to
forge.
2. International Journal of Ethics in Engineering & Management Education
Website: www.ijeee.in (ISSN: 2348-4748, Volume 1, Issue 12, December 2014)
11
Because of this and the live body identification, high
security of vein recognition is preserved.
Fingerprint Recognition
Introduction Fingerprint identification is one of the most
well-known and publicized biometrics. Because of their
uniqueness and consistency over time, fingerprints have been
used for identification for over a century, more recently
becoming automated (i.e. a biometric) due to advancements in
computing capabilities. Fingerprint identification is popular
because of the inherent ease in acquisition, the numerous
sources (ten fingers) available for collection, and their
established use and collections by law enforcement and
immigration.
A fingerprint usually appears as a series of dark lines that
represent the high, peaking portion of the friction ridge skin,
while the valleys between these ridges appears as white space
and are the low, shallow portion of the friction ridge skin.
Fingerprint identification is base d primarily on the minutiae,
or the location and direction of the ridge endings and
bifurcations (splits) along a ridge path.
A fingerprint recognition [1] system based on Minutiae
based matching quite frequently used in various fingerprint
algorithms and techniques. The approach mainly involves
extraction of minutiae points from the sample fingerprint
images and then performing fingerprint matching based on the
number of minutiae pairings among two fingerprints in
question.
But it has relatively low percentage of verification rate as
compared to other forms of biometrics. Also a major challenge
in Fingerprint recognition lies in the pre processing of the bad
quality of fingerprint images which also add to the low
verification rate[1].
Password Based Authentication
The use of passwords [2] is a major point of vulnerability in
computer security, as passwords are often easy to guess by
automated programs running dictionary attacks. Passwords
remain the most widely used authentication method despite
their well-known security weaknesses. User authentication is
clearly a practical problem. From the perspective of a service
provider this problem needs to be solved within real-world
constraints such as the available hardware and software
infrastructures. From a user’s perspective user-friendliness is a
key requirement.
A novel authentication scheme that preserves the
advantages of conventional password authentication, while
simultaneously raising the costs of online dictionary attacks by
orders of magnitude was proposed[2] which was easy to
implement and overcomes some of the difficulties of previous
methods of improving the security of user authentication
schemes[2].
However passwords are difficult to remember and can lead
to information leakage.
Automatic Speech Recognition
Automatic speech recognition [3] is being used in a variety
of assistive contexts, including home computer systems,
mobile telephones, and various public and private telephony
services.
Despite their growing presence, commercial speech
recognition technologies are still not easily employed by
individuals who have speech or communication disorders.
While speech disorders in older adults are common, there has
been relatively little research on automatic speech recognition
performance with older adults. However, research findings
suggest that the speech characteristics of the older adult may, in
some ways, be similar to dysarthric speech. Dysarthria, A
common neuro-motor speech disorder, is particularly useful for
exploring automatic speech recognition performance
limitations because of its wide range of speech expression
IRIS Recognition
The randomness of iris pattern makes it one of the most
reliable biometric traits[4]. On the other hand, the complex iris
image structure and the various sources of intra-class variations
result in the difficulty of iris representation. A novel efficient
multiscale approach for human iris recognition was
introduced[4] based on combined feature extraction methods
by considering both the textural and topological features of an
iris image which is invariant to translation, scale and rotation.
The disadvantages of iris recognition is that a person who
has a color blindness or who are blind cannot pass through this
iris recognition test.
The drawbacks of iris scanning include greater initial cost
and the fact that it's still a relatively untried technology (some
trials, for example, have found a much greater rate of false
matches than originally claimed). Civil liberties campaigners
have also voiced privacy concerns—that future iris-scanning
technology could be developed that will allow people to be
tracked covertly (at a distance of some meters) without either
their knowledge or cooperation.
Face Recognition
Two types of face recognition tasks were proposed: one
from still images and the other from video [5].The still image
problem has several inherent advantages and disadvantages.
For applications such as drivers’ licenses, due to the controlled
nature of the image acquisition process, the segmentation
problem is rather easy. However, if only a static picture of an
airport scene is available, automatic location and segmentation
of a face could pose serious challenges to any segmentation
algorithm. On the other hand, if a video sequence is available,
segmentation of a moving person can be more easily
accomplished using motion as a cue. But the small size and low
image quality of faces captured from video can significantly
increase the difficulty in recognition.
3. International Journal of Ethics in Engineering & Management Education
Website: www.ijeee.in (ISSN: 2348-4748, Volume 1, Issue 12, December 2014)
12
II. SYSTEM REQUIREMENT SPECIFICATION
The first step in developing anything is to state the
requirements. This applies just as much to leading edge
research as to simple programs and to personal programs, as
well as to large team efforts. Being vague about your objective
only postpones decisions to a later stage where changes are
much more costly.
The problem statement should state what is to be done and
not how it is to be done. It should be a statement of needs, not a
proposal for a solution. A user manual for the desired system is
a good problem statement. The requestor should indicate which
features are mandatory and which are optional, to avoid overly
constraining design decisions. The requestor should avoid
describing system internals, as this restricts implementation
flexibility. Performance specifications and protocols for
interaction with external systems are legitimate requirements.
Software engineering standards, such as modular construction,
design for testability, and provision for future extensions, are
also proper.
The analyst must separate the true requirements from
design and implementation decisions disguised as
requirements. The analyst should challenge such pseudo
requirements, as they restrict flexibility. There may be politics
or organizational reasons for the pseudo requirements, but at
least the analyst should recognize that these externally imposed
design decisions are not essential features of the problem
domain.
Functional requirement specification:
Functional requirements precisely states the functions of
the system what it should do and what it should not do.
Functions are provided to the users in a GUI. All the
functionalities are provided in the main interface.
Non-functional requirement specification:
The non-functional requirements arise through user needs,
because of budget constraints, because of organizational
politics, with other software or hardware systems. The non-
functional requirements may come from required
characteristics of the software (product
requirements),theorganization developing the
software(organizational requirements) or from external
sources. The following are the types of functional
requirements.
• Product requirements:
• Usability requirements:
The usability requirements are which the application
interfaces are designed to interact with the system and external
devices.
• Efficiency requirements:
The efficiency requirements include the processing time,
responsive time and memory utilization. The memory
utilization is more because of the more images to store for
further processing’s.
• Reliability requirements:
• Hardware reliability
• Software reliability
• Operator reliability
• Portability requirements:
since we have developed through the java swings which is
light weight component to support for the portability.
• Organizational requirements:
• Delivery requirements:
this can be done through the appropriate planning and the
man power .
• Implementation requirements:
• we are using the iterative process model through this we
feel more flexible because of if any changes needed can
be done easily .
• External requirements:
• Legislative requirements:
• Safety requirements:
This will not give any damage to society by using of this
software because it is not a critical system.
Domain Requirements:
A domain requirement basically means the workspace or
the range or the environment in which the product will work
properly. Basically the domain requirement includes both the
things i.e. functional and the non-functional requirement So,
for the proper working of the project it is required that the
product should meet the functional and the non-functional
requirements. It includes the things like the full modules and
there working and the technology used .The product should be
fully functional without any kind of errors and without any
kind of difficulties .This may also cover the hardware
requirements as the product will also needs the good and
efficient hardware for the working of the software product.
If the product doesn’t work properly then it means that it
the analyst has not gathered the proper information i.e for the
proper working of the product. So tit is really a big and difficult
task for the system analyst to find the full domain requirement
so that the software product will be fully functional and should
work in most efficient manner so that it should produce good
results with less time consumption. The analyst should also see
at the security, robustness and the efficiency. All type of testing
should be done so that when the product is live it should not
produce any kind of error or problem, as it will produce a bad
impression on the image of the company.
Customer Requirement Specification:
The customer requirement specifications are the needs
of the client for a particular project. The customer has different
thoughts regarding of the project, before he is going to give the
software requirements he has to think about the following
constraints. The following constraints are the questions as soon
as he thinks to develop a project.
• The client as soon as think about the project he has to
think first whether the application software is really
necessary to our environment.
• The next is the duration of the project i.e. how long it
takes, to came to existence in our environment.
4. International Journal of Ethics in Engineering & Management Education
Website: www.ijeee.in (ISSN: 2348-4748, Volume 1, Issue 12, December 2014)
13
• Another one is regarding of the cost, it meets with our
budget proposed for that project.
• The client thinks about that we require any training for
their existing staff to use that particular project.
• The client has gone through with the above constraints
well and he thinks that he had meet all the constraints, he
will going to think about the requirements that are needed
for his application software. The software requirements of
the clients are in the fairly abstract.
• The client requires that they were already using any other
technology, so he needs to develop another biometric
technology to do his work in more secure way.
• The client needs that he requires the more user friendly
system and also it should not be more complex to use.
The remaining requirements will decide when the
client and the software engineering people meet together for
compromising the needs that are required by the client as well
as it can be possible to do by developers.
Hardware Requirement:
Processor - Dual Core
RAM - 1GB RAM
Hard disk - 80 GB
CD drive - 40 x Samsung
Monitor - 15’ Samtron color
Keyboard - 108 mercury keyboard
Mouse - Logitech mouse
External Hardware - IR-Webcam
Software Requirement:
• Operating System - Win XP/SP2
• Technology - JAVA
• Development IDE - Eclipse 3.x
• Database - Mysql
III. IMPLEMENTATION
Image processing
The image is converted from jpeg to BMP. Then its
contrast is enhanced using Histogram Equalization technique
Algorithm for Histogram equalization
Step 1: Start
Step 2: Input Image
Step 3: Create a histogram of the image for each pixel
Step 4: Calculate the scale factor for each pixel with the
histogram of the image
Step 5: The value of scale factor are inserted into a histogram
look up table
Step 6: using the value of scale factor modify the histogram
of the image
Step 7: Output the modified image
Step 8: stops
The image is then converted into grey scale from using grey
scale technique
Algorithm for Grey scale:
Step 1: Start
Step 2: Input image
Step 3: Get the R, G, B values of a pixel
Step 4: Compute the value 0.299*R + 0.587*G + 0.114*B
Step 5: After computing the weighted average, create a new
pixel with this average as its component value.
Step 6: Repeat the procedure from 3 to 5 for all the pixels in
the image.
Step 7: Output the converted grayscale image.
Step 9: Stop
The edges of hand veins are detected using Canny Edge
detection algorithm
Algorithm for Canny Edge detection:
Step1: start
Step 2: Input image
Upper threshold =7.5
Lower threshold =2.5
Step 3: Noise of the image is filtered using Gaussian filter
Step 4: Apply sobelmass Sx and Sy to the 3*3 pixel
neighborhood of current pixel in both X and Y directions
Step 5: The sum of each masks value times the corresponding
pixel is computed as Gx and Gy.
Step 6: The square of Gx2
plus Gy2
is computed which gives
the edge strength
Step 7: Compute the inverse langent of Gx/Gy which gives the
direction
Step 8: Trace along the pixels
Step 9: If current pixel has a gradient strength greater than the
defined lower threshold the edge direction of the current pixel
is determined
Step 10: The row and the column of the next possible pixel in
the direction is determined.
Step 11: Its edge direction and gradient strength are
determined by repeating the steps from 4 to 7
Step 12: Compare the gradient strength .if it is greater than the
lower threshold the pixel is set to white
Step 13: The next pixels along that edge is tested by repeating
the steps from 3 to 11
Step 14: Output the image with edges
Step 15: Stop
The features of the image are detected using Hough Line
Transform algorithm.
Algorithm For Hough line Transform:
Step 1: Start
Step 2: Input grey scale edge detected image.
An accumulator array initialized to zero.
Step 3: Identify an image points which is in the image.
Step 4: Draw all possible lines passing through each of these
points.
Step 5: For each line passing through a point, the
corresponding cells are incremented by one.
5. International Journal of Ethics in Engineering & Management Education
Website: www.ijeee.in (ISSN: 2348-4748, Volume 1, Issue 12, December 2014)
14
Step 5: For each of these lines determine r and theta by
drawing perpendicular lines from those lines to the origin.
Step 6: These are repeated for each the points.
Step 7: A graph, known as a Hough space graph, is then
created for each of r and theta.
Step 8: The point where the curves intersect gives a distance
and angle. This distance and angle indicate the line which
intersects the points being tested
Step 9: Cells are incremented in the accumulator array when
the line pass through multiple points
Step 10: The cell that has the highest value represents the line
that passes through the most number of points in the source
image array.
Step 11: Stop
Then the authentication is done using Hamming distance
algorithm and image matching algorithm
Algorithm for Hamming Distance:
Step 1: Start
Step 2: Input two sets of numbers
Counter = 0
Min Distance = Integer.Max – Value
Step 3: Compare two numbers .if they are not equal increment
counter else counter equal to 0
Step 4: If counter equal to zero return counter
Step 5: else if Counter is not equal to zero compare it with min
Distance .whichever is smaller is returned
Step 6: Stop
Algorithm for image matching
Step1: Start
Step 2: Take the image features that are created during login
Step 3: Check if the corresponding user-id exits in the
database and get the image features of the corresponding
image
Step 4: Both the image features are subtracted and the
corresponding value is divided is divided by the feature values
in the database
Step 5: If the resulting value is less than 0.08 then the person
is allowed to log in else not
Step 6: Stop
IV. PERFORMANCE EVOLUTION
In our project, we have reduced cost of system considerably
to make device “cheap”. So, we have used webcam for this
purpose by making the webcam sensitive to IR region and
then is used to obtain vein images.
V. CONCLUSION
The Hand vein structure authentication is a biometric
system that recognizes the shapes of the vein pattern in the
back of the human hands captured using a infrared camera,
performs image processing, extracts some features and
compares these features with already present image’s features
in order to authenticate a person. As the usage of biometric
technologies expands, the need for different modalities for
different applications becomes imperative. Vein recognition
has great potential as a convenient, easy-to-use biometric
technology with high security and accuracy levels. The
technology is gaining momentum, but whether it can displace
fingerprint biometrics and become successful with high-
profile government deployment remains to be seen.
It should be developed further completely with automation
feature rather than manual process involvement. The time
taken for processing the image could be reduced.
REFERENCES
[1] Sangram Bana1 and Dr. Davinder Kaur2,Fingerprint Recognition using
Image Segmentation in (Ijaest) in International Journal Of Advanced
Engineering Sciences And Technologies,2011
[2] Benny Pinkasy Tomas Sanderz,Securing Passwords Against Dictionary
Attacks
[3] Victoria Young,MHSc, and Alex Mihailidis, Difficulties In Automatic
Speech Recognition
[4] MakramNabti, LahouariGhouti and Ahmed Bouridane,An effective and
fast iris recognition system based on a combined multiscale feature
extraction technique,2007
[5] W. Zhao,R. Chellappa,P. J. Phillips and ,A.
Rosenfeld,Facerecognition:An emerging biometric,2003
[6] Xi Li, XiangbinLiu ,Zhicheng Liu “A Dorsal Hand Vein Patter
Recognition Algorithm”2010 3rd International Congress on Image and
Signal Processing (C,ISP2010).
[7] Wang Lingyu and Graham Leedham,“Near- and far- infrared imaging for
vein pattern biometrics,” Proc. of the IEEE International Conference on
Video and Signal Based Surveillance (AVSS 06), IEEE Press, Nov 2006.
[8] M Heenaye-Mamode Khan, R.K.Subramanian, and N. A.
MamodeKhan,“Low dimensional representation of dorsal hand vein
features using principle component analysis (pca),” World Academyof
Science, Engineeringand Technology, vol. 49, pp. 1001–1007,2009.
[9] M. Badawi, “Hand vein biometric verification prototype: A testing
performance and
[10] Patterns similarity,” in IPCV, 2006, pp. 3–9.N. A. Mamode Khan and
MaleikaHeenaye-Mamode Khan, “An efficient dimension
[11] Reduction algorithm to extract dorsal hand vein pattern on generalized
method of moments and moore-penrose generalized inverse procedure,”
IJCSNS International Journal of Compute.
About the Authors
Pavitra R, Completed Masters in Computer
Science and engineering at Pacific Institute Of
Technology Udaipur, India. Completed
bachelor of engineering in Information Science
and engineering at CMRIT, Bangalore, India.
Her area of interest is Computer Science and
digital Image Processing related to medical
electronics.