Nowadays, the fingerprint identification system is the most exploited sector of biometric. Fingerprint image segmentation is considered one of its first processing stage. Thus, this stage affects typically the feature extraction and matching process which leads to fingerprint recognition system with high accuracy. In this paper, three major steps are proposed. First, Soble and TopHat filtering method have been used to improve the quality of the fingerprint images. Then, for each local block in fingerprint image, an accurate separation of the foreground and background region is obtained by K-means clustering for combining 5-dimensional characteristics vector (variance, difference of mean, gradient coherence, ridge direction and energy spectrum). Additionally, in our approach, the local variance thresholding is used to reduce computing time for segmentation. Finally, we are combined to our system DBSCAN clustering which has been performed in order to overcome the drawbacks of K-means classification in fingerprint images segmentation. The proposed algorithm is tested on four different databases. Experimental results demonstrate that our approach is significantly efficacy against some recently published techniques in terms of separation between the ridge and non-ridge region.
SELF-LEARNING AI FRAMEWORK FOR SKIN LESION IMAGE SEGMENTATION AND CLASSIFICATIONijcsit
Image segmentation and classification are the two main fundamental steps in pattern recognition. To perform medical image segmentation or classification with deep learning models, it requires training on large image dataset with annotation. The dermoscopy images (ISIC archive) considered for this work does not have ground truth information for lesion segmentation. Performing manual labelling on this dataset is time-consuming. To overcome this issue, self-learning annotation scheme was proposed in the two-stage deep learning algorithm. The two-stage deep learning algorithm consists of U-Net segmentation model with the annotation scheme and CNN classifier model. The annotation scheme uses a K-means clustering algorithm along with merging conditions to achieve initial labelling information for training the U-Net model. The classifier models namely ResNet-50 and LeNet-5 were trained and tested on the image dataset without segmentation for comparison and with the U-Net segmentation for implementing the proposed self-learning Artificial Intelligence (AI) framework. The classification results of the proposed AI framework achieved training accuracy of 93.8% and testing accuracy of 82.42% when compared with the two classifier models directly trained on the input images.
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...CSCJournals
In this work, we deal with contactless fingerprint biometrics. More specifically, we are interested in solving the problem of registration by taking into consideration some constraints such as finger rotation and translation. In the proposed method, the registration requires: (1) a segmentation technique to extract streaks, (2) a skeletonization technique to extract the center line streaks and (3) and landmarks extraction technique. The correspondence between the sets of control points, is obtained by calculating the descriptor vector of Zernike moments on a window of size RxR centered at each point. Comparison of correlation coefficients between the descriptor vectors of Zernike moments helps define the corresponding points. The estimation of parameters of the existing deformation between images is performed using RANSAC algorithm (Random SAmple Consensus) that suppresses wrong matches. Finally, performance evaluation is achieved on a set of fingerprint images where promising results are reported.
A novel medical image segmentation and classification using combined feature ...eSAT Journals
Abstract Diagnosis is the first step before giving a medicine to the patient. In the recent past such diagnosis is performed using medical images where segmentation is the prime part in the medical image retrieval which improves the feature set that is collected from the segmented image. In this paper, it is proposed to segment the medical image a semi decision algorithm that can segment only the tumor part from the CT image. Further texture based techniques are used to extract the feature vector from the segmented region of interest. Medical images under test are classified using decision tree classifier. Results show better performance in terms of accuracy when compared to the conventional methods. Key Words: Medical Images, Decision Tree Classifier, Segmentation, Semi-decision algorithm
Optimization of deep learning features for age-invariant face recognition IJECEIAES
This paper presents a methodology for Age-Invariant Face Recognition (AIFR), based on the optimization of deep learning features. The proposed method extracts deep learning features using transfer deep learning, extracted from the unprocessed face images. To optimize the extracted features, a Genetic Algorithm (GA) procedure is designed in order to select the most relevant features to the problem of identifying a person based on his/her facial images over different ages. For classification, K-Nearest Neighbor (KNN) classifiers with different distance metrics are investigated, i.e., Correlation, Euclidian, Cosine, and Manhattan distance metrics. Experimental results using a Manhattan distance KNN classifier achieve the best Rank-1 recognition rates of 86.2% and 96% on the standard FGNET and MORPH datasets, respectively. Compared to the state-of-the-art methods, our proposed method needs no preprocessing stages. In addition, the experiments show its privilege over other related methods.
Deep hypersphere embedding for real-time face recognitionTELKOMNIKA JOURNAL
With the advancement of human-computer interaction capabilities of robots, computer vision surveillance systems involving security yields a large impact in the research industry by helping in digitalization of certain security processes. Recognizing a face in the computer vision involves identification and classification of which faces belongs to the same person by means of comparing face embedding vectors. In an organization that has a large and diverse labelled dataset on a large number of epoch, oftentimes, creates a training difficulties involving incompatibility in different versions of face embedding that leads to poor face recognition accuracy. In this paper, we will design and implement robotic vision security surveillance system incorporating hybrid combination of MTCNN for face detection, and FaceNet as the unified embedding for face recognition and clustering.
SELF-LEARNING AI FRAMEWORK FOR SKIN LESION IMAGE SEGMENTATION AND CLASSIFICATIONijcsit
Image segmentation and classification are the two main fundamental steps in pattern recognition. To perform medical image segmentation or classification with deep learning models, it requires training on large image dataset with annotation. The dermoscopy images (ISIC archive) considered for this work does not have ground truth information for lesion segmentation. Performing manual labelling on this dataset is time-consuming. To overcome this issue, self-learning annotation scheme was proposed in the two-stage deep learning algorithm. The two-stage deep learning algorithm consists of U-Net segmentation model with the annotation scheme and CNN classifier model. The annotation scheme uses a K-means clustering algorithm along with merging conditions to achieve initial labelling information for training the U-Net model. The classifier models namely ResNet-50 and LeNet-5 were trained and tested on the image dataset without segmentation for comparison and with the U-Net segmentation for implementing the proposed self-learning Artificial Intelligence (AI) framework. The classification results of the proposed AI framework achieved training accuracy of 93.8% and testing accuracy of 82.42% when compared with the two classifier models directly trained on the input images.
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...CSCJournals
In this work, we deal with contactless fingerprint biometrics. More specifically, we are interested in solving the problem of registration by taking into consideration some constraints such as finger rotation and translation. In the proposed method, the registration requires: (1) a segmentation technique to extract streaks, (2) a skeletonization technique to extract the center line streaks and (3) and landmarks extraction technique. The correspondence between the sets of control points, is obtained by calculating the descriptor vector of Zernike moments on a window of size RxR centered at each point. Comparison of correlation coefficients between the descriptor vectors of Zernike moments helps define the corresponding points. The estimation of parameters of the existing deformation between images is performed using RANSAC algorithm (Random SAmple Consensus) that suppresses wrong matches. Finally, performance evaluation is achieved on a set of fingerprint images where promising results are reported.
A novel medical image segmentation and classification using combined feature ...eSAT Journals
Abstract Diagnosis is the first step before giving a medicine to the patient. In the recent past such diagnosis is performed using medical images where segmentation is the prime part in the medical image retrieval which improves the feature set that is collected from the segmented image. In this paper, it is proposed to segment the medical image a semi decision algorithm that can segment only the tumor part from the CT image. Further texture based techniques are used to extract the feature vector from the segmented region of interest. Medical images under test are classified using decision tree classifier. Results show better performance in terms of accuracy when compared to the conventional methods. Key Words: Medical Images, Decision Tree Classifier, Segmentation, Semi-decision algorithm
Optimization of deep learning features for age-invariant face recognition IJECEIAES
This paper presents a methodology for Age-Invariant Face Recognition (AIFR), based on the optimization of deep learning features. The proposed method extracts deep learning features using transfer deep learning, extracted from the unprocessed face images. To optimize the extracted features, a Genetic Algorithm (GA) procedure is designed in order to select the most relevant features to the problem of identifying a person based on his/her facial images over different ages. For classification, K-Nearest Neighbor (KNN) classifiers with different distance metrics are investigated, i.e., Correlation, Euclidian, Cosine, and Manhattan distance metrics. Experimental results using a Manhattan distance KNN classifier achieve the best Rank-1 recognition rates of 86.2% and 96% on the standard FGNET and MORPH datasets, respectively. Compared to the state-of-the-art methods, our proposed method needs no preprocessing stages. In addition, the experiments show its privilege over other related methods.
Deep hypersphere embedding for real-time face recognitionTELKOMNIKA JOURNAL
With the advancement of human-computer interaction capabilities of robots, computer vision surveillance systems involving security yields a large impact in the research industry by helping in digitalization of certain security processes. Recognizing a face in the computer vision involves identification and classification of which faces belongs to the same person by means of comparing face embedding vectors. In an organization that has a large and diverse labelled dataset on a large number of epoch, oftentimes, creates a training difficulties involving incompatibility in different versions of face embedding that leads to poor face recognition accuracy. In this paper, we will design and implement robotic vision security surveillance system incorporating hybrid combination of MTCNN for face detection, and FaceNet as the unified embedding for face recognition and clustering.
Automatic Isolated word sign language recognitionSana Fakhfakh
This paper suggests a new system to help the
deaf and the hearing-impaired community improve their
connection with the hearing world and communicate
freely. The most important thing in this system is
how to help the users be free and finally have a more
natural way of communication. For this reason, we
present a new process based on two levels: a static-level
aiming to extract the most head/hands key points and
a dynamic-level with the objective of accumulating the
key-point trajectory matrix. Also our proposed approach
takes into account the signer-independence constraint.
A SIGNUM database is applied in the classification
stage and our system performances have improved with
a 94.3% recognition rate. Furthermore, a reduction
in time processing is obtained when the removing of
redundant frame step is applied. The obtained results
prove the superiority of our system compared to the
state-of- the-art methods in terms of recognition rate and
execution time.
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...ijtsrd
Sign Language SL is a medium of communication for physically disabled people. It is a gesture based language for communication of dumb and deaf people. These people communicate by using different actions of hands, where each different action means something. Sign language is the only way of conversation for deaf and dumb people. It is very difficult to understand this language for the common people. Hence sign language recognition has become an important task. There is a necessity for a translator to communicate with the world. Real time translator for sign language provides a medium to communicate with others. Previous methods employs sensor gloves, hat mounted cameras, armband etc. which has wearing difficulties and have noisy behaviour. To alleviate this problem, a real time gesture recognition system using Deep Learning DL is proposed. It enables to achieve improvements on the gesture recognition performance. Jeni Moni | Anju J Prakash ""A Deep Neural Framework for Continuous Sign Language Recognition by Iterative Training: Survey"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd30032.pdf
Paper Url : https://www.ijtsrd.com/engineering/computer-engineering/30032/a-deep-neural-framework-for-continuous-sign-language-recognition-by-iterative-training-survey/jeni-moni
Hand and wrist localization approach: sign language recognition Sana Fakhfakh
This paper proposes a new hand detection and wrist localization method which presents an important step in the hand gesture recognizing process. The wrist localization step has not been given much attention and the existing works are limited and include many conditions. Our proposed approach was evaluated on a public dataset whose obtained results underscore its performance. We highlight through a comparative study with existing work, the superiority of our approach and the importance of the wrist localization step. We also propose to benefit from our proposed method which can be applied in the sign language recognition domain, and more precisely in the Arabic digit sign language recognition.
Microarray spot partitioning by autonomously organising maps through contour ...IJECEIAES
In cDNA microarray image analysis, classification of pixels as forefront area and the area covered by background is very challenging. In microarray experimentation, identifying forefront area of desired spots is nothing but computation of forefront pixels concentration, area covered by spot and shape of the spots. In this piece of writing, an innovative way for spot partitioning of microarray images using autonomously organizing maps (AOM) method through C-V model has been proposed. Concept of neural networks has been incorpated to train and to test microarray spots.In a trained AOM the comprehensive information arising from the prototypes of created neurons are clearly integrated to decide whether to get smaller or get bigger of contour. During the process of optimization, this is done in an iterative manner. Next using C-V model, inside curve area of trained spot is compared with test spot finally curve fitting is done.The presented model can handle spots with variations in terms of shape and quality of the spots and meanwhile it is robust to the noise. From the review of experimental work, presented approach is accurate over the approaches like C-means by fuzzy, Morphology sectionalization.
Medical Image Fusion Using Discrete Wavelet TransformIJERA Editor
Medical image fusion is the process of registering and combining multiple images from single or multiple imaging modalities to improve the imaging quality and reduce randomness and redundancy in order to increase the clinical applicability of medical images for diagnosis and assessment of medical problems. Multimodal medical image fusion algorithms and devices have shown notable achievements in improving clinical accuracy of decisions based on medical images. The domain where image fusion is readily used nowadays is in medical diagnostics to fuse medical images such as CT (Computed Tomography), MRI (Magnetic Resonance Imaging) and MRA. This paper aims to present a new algorithm to improve the quality of multimodality medical image fusion using Discrete Wavelet Transform (DWT) approach. Discrete Wavelet transform has been implemented using different fusion techniques including pixel averaging, maximum minimum and minimum maximum methods for medical image fusion. Performance of fusion is calculated on the basis of PSNR, MSE and the total processing time and the results demonstrate the effectiveness of fusion scheme based on wavelet transform.
Real Time Object Identification for Intelligent Video Surveillance ApplicationsEditor IJCATR
Intelligent video surveillance system has emerged as a very important research topic in the computer vision field in the
recent years. It is well suited for a broad range of applications such as to monitor activities at traffic intersections for detecting
congestions and predict the traffic flow. Object classification in the field of video surveillance is a key component of smart
surveillance software. Two robust methodology and algorithms adopted for people and object classification for automated surveillance
systems is proposed in this paper. First method uses background subtraction model for detecting the object motion. The background
subtraction and image segmentation based on morphological transformation for tracking and object classification on highways is
proposed. This algorithm uses erosion followed by dilation on various frames. Proposed algorithm in first method, segments the image
by preserving important edges which improves the adaptive background mixture model and makes the system learn faster and more
accurately. The system used in second method adopts the object detection method without background subtraction because of the static
object detection. Segmentation is done by the bounding box registration technique. Then the classification is done with the multiclass
SVM using the edge histogram as features. The edge histograms are calculated for various bin values in different environment. The
result obtained demonstrates the effectiveness of the proposed approach.
ieee projects download, base paper for ieee projects, ieee projects list, ieee projects titles, ieee projects for cse, ieee projects on networking,ieee projects 2012, ieee projects 2013, final year project, computer science final year projects, final year projects for information technology, ieee final year projects, final year students projects, students projects in java, students projects download, students projects in java with source code, students projects architecture, free ieee papers
A Hybrid Filtering Technique for Random Valued Impulse Noise Elimination on D...IDES Editor
A novel adaptive network fuzzy inference system
(ANFIS) based filter is presented for the enhancement of
images corrupted by random valued impulse noise (RVIN).
This technique is performed in two steps. In the first step,
impulse noise using an Asymmetric Trimmed Median Filter
(ATMF). In the second step, image restoration is obtained by
an appropriately combining ATMF with ANFIS at the removal
of higher level of RVIN on the digital images. Three well
known images are selected for training and the internal
parameters of the neuro-fuzzy network are adaptively
optimized by training. This technique offers excellent line,
edge, and fine detail preservation performance while, at the
same time, effectively enhancing digital images. Extensive
simulation results were realized for ANFIS network and
different filters are compared. Results show that the proposed
filter is superior performance in terms of image denoising
and edges and fine details preservation properties.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Face Detection in Digital Image: A Technical ReviewIJERA Editor
Face detection is the method of focusing faces in input image is an important part of any face processing system. In Face detection, segmentation plays the major role to detect the face. There are many contests for effective and efficient face detection. The aim of this paper is to present a review on several algorithms and methods used for face detection. We read the various surveys and related various techniques according to how they extract features and what learning algorithms are adopted for. Face detection system has two major phases, first to segment skin region from an image and second to decide these regions cover human face or not. There are number of algorithms used in face detection namely Genetic, Hausdorff Distance etc.
Scene Text Detection of Curved Text Using Gradiant Vector Flow MethodIJTET Journal
Abstract--Text detection and recognition is a hot topic for researchers in the field of image processing and multimedia. Content based Image Retrieval (CBIR) community fills the semantic gap between low-level and high-level features. For text detection and extraction that achieve reasonable accuracy for multi-oriented text and natural scene text (camera images), several methods have been developed. In general most of the methods use classifier and large number of training samples to improve the accuracy in text detection. In general, connected components are used to tackle the multi-orientation problem. The connected component analysis based features with classifier training, work well for achieving better accuracy when the images are highly contrast. However, when the same methods used directly for text detection in video it results in disconnections, loss of shapes etc, because of low contrast and complex background. For such cases, deciding geometrical features of the components and classifier is not that easy. To overcome from this problem the proposed research uses Gradiant Vector Flow and Grouping based Method for Arbitrarily Oriented Scene text Detection method. The GVF of edge pixels in the Sobel edge map of the input frame is explored to identify the dominant edge pixels which represent text components. The method extracts dominant pixel’s edge components corresponding to the Sobel edge map, which is called Text Candidates (TC) of the text lines. Experimental results on different datasets including text data that is oriented arbitrary, non-horizontal text data also horizontal text data, Hua’s data and ICDAR-03 data (Camera images) show that the proposed method outperforms existing methods.
International Refereed Journal of Engineering and Science (IRJES) is a peer reviewed online journal for professionals and researchers in the field of computer science. The main aim is to resolve emerging and outstanding problems revealed by recent social and technological change. IJRES provides the platform for the researchers to present and evaluate their work from both theoretical and technical aspects and to share their views.
FINGERPRINT CLASSIFICATION MODEL BASED ON NEW COMBINATION OF PARTICLE SWARM O...IAEME Publication
Fingerprint is one of the broadly utilized biometric distinguishing proof to
recognize the persons due steady and worthiness. The classification of fingerprints
gives indexing to the dataset to decrease the seeking and matching manner. There
researches have been developed numerous approaches for fingerprint classification
model, for example, the Neural Network (NN) methods and support vector machine.
Nevertheless, there are a lot of developments to develop the classification procedure.
In this paper, a new classification model based on PSO-SVM technique is used to
achieve fingerprint classification process. The proposed methodology comprises three
phases: preprocessing phases, feature extraction phase and classification phase using
the proposed PSO-SVM model. The CASIA V5 fingerprint dataset and a property
dataset are adopted in this study to test the proposed model. The experimental results
showed that the proposed PSO-SVM classification model was better than the standard
SVM in terms of accuracy, sensitivity and specificity for both datasets.
Automatic Isolated word sign language recognitionSana Fakhfakh
This paper suggests a new system to help the
deaf and the hearing-impaired community improve their
connection with the hearing world and communicate
freely. The most important thing in this system is
how to help the users be free and finally have a more
natural way of communication. For this reason, we
present a new process based on two levels: a static-level
aiming to extract the most head/hands key points and
a dynamic-level with the objective of accumulating the
key-point trajectory matrix. Also our proposed approach
takes into account the signer-independence constraint.
A SIGNUM database is applied in the classification
stage and our system performances have improved with
a 94.3% recognition rate. Furthermore, a reduction
in time processing is obtained when the removing of
redundant frame step is applied. The obtained results
prove the superiority of our system compared to the
state-of- the-art methods in terms of recognition rate and
execution time.
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...ijtsrd
Sign Language SL is a medium of communication for physically disabled people. It is a gesture based language for communication of dumb and deaf people. These people communicate by using different actions of hands, where each different action means something. Sign language is the only way of conversation for deaf and dumb people. It is very difficult to understand this language for the common people. Hence sign language recognition has become an important task. There is a necessity for a translator to communicate with the world. Real time translator for sign language provides a medium to communicate with others. Previous methods employs sensor gloves, hat mounted cameras, armband etc. which has wearing difficulties and have noisy behaviour. To alleviate this problem, a real time gesture recognition system using Deep Learning DL is proposed. It enables to achieve improvements on the gesture recognition performance. Jeni Moni | Anju J Prakash ""A Deep Neural Framework for Continuous Sign Language Recognition by Iterative Training: Survey"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd30032.pdf
Paper Url : https://www.ijtsrd.com/engineering/computer-engineering/30032/a-deep-neural-framework-for-continuous-sign-language-recognition-by-iterative-training-survey/jeni-moni
Hand and wrist localization approach: sign language recognition Sana Fakhfakh
This paper proposes a new hand detection and wrist localization method which presents an important step in the hand gesture recognizing process. The wrist localization step has not been given much attention and the existing works are limited and include many conditions. Our proposed approach was evaluated on a public dataset whose obtained results underscore its performance. We highlight through a comparative study with existing work, the superiority of our approach and the importance of the wrist localization step. We also propose to benefit from our proposed method which can be applied in the sign language recognition domain, and more precisely in the Arabic digit sign language recognition.
Microarray spot partitioning by autonomously organising maps through contour ...IJECEIAES
In cDNA microarray image analysis, classification of pixels as forefront area and the area covered by background is very challenging. In microarray experimentation, identifying forefront area of desired spots is nothing but computation of forefront pixels concentration, area covered by spot and shape of the spots. In this piece of writing, an innovative way for spot partitioning of microarray images using autonomously organizing maps (AOM) method through C-V model has been proposed. Concept of neural networks has been incorpated to train and to test microarray spots.In a trained AOM the comprehensive information arising from the prototypes of created neurons are clearly integrated to decide whether to get smaller or get bigger of contour. During the process of optimization, this is done in an iterative manner. Next using C-V model, inside curve area of trained spot is compared with test spot finally curve fitting is done.The presented model can handle spots with variations in terms of shape and quality of the spots and meanwhile it is robust to the noise. From the review of experimental work, presented approach is accurate over the approaches like C-means by fuzzy, Morphology sectionalization.
Medical Image Fusion Using Discrete Wavelet TransformIJERA Editor
Medical image fusion is the process of registering and combining multiple images from single or multiple imaging modalities to improve the imaging quality and reduce randomness and redundancy in order to increase the clinical applicability of medical images for diagnosis and assessment of medical problems. Multimodal medical image fusion algorithms and devices have shown notable achievements in improving clinical accuracy of decisions based on medical images. The domain where image fusion is readily used nowadays is in medical diagnostics to fuse medical images such as CT (Computed Tomography), MRI (Magnetic Resonance Imaging) and MRA. This paper aims to present a new algorithm to improve the quality of multimodality medical image fusion using Discrete Wavelet Transform (DWT) approach. Discrete Wavelet transform has been implemented using different fusion techniques including pixel averaging, maximum minimum and minimum maximum methods for medical image fusion. Performance of fusion is calculated on the basis of PSNR, MSE and the total processing time and the results demonstrate the effectiveness of fusion scheme based on wavelet transform.
Real Time Object Identification for Intelligent Video Surveillance ApplicationsEditor IJCATR
Intelligent video surveillance system has emerged as a very important research topic in the computer vision field in the
recent years. It is well suited for a broad range of applications such as to monitor activities at traffic intersections for detecting
congestions and predict the traffic flow. Object classification in the field of video surveillance is a key component of smart
surveillance software. Two robust methodology and algorithms adopted for people and object classification for automated surveillance
systems is proposed in this paper. First method uses background subtraction model for detecting the object motion. The background
subtraction and image segmentation based on morphological transformation for tracking and object classification on highways is
proposed. This algorithm uses erosion followed by dilation on various frames. Proposed algorithm in first method, segments the image
by preserving important edges which improves the adaptive background mixture model and makes the system learn faster and more
accurately. The system used in second method adopts the object detection method without background subtraction because of the static
object detection. Segmentation is done by the bounding box registration technique. Then the classification is done with the multiclass
SVM using the edge histogram as features. The edge histograms are calculated for various bin values in different environment. The
result obtained demonstrates the effectiveness of the proposed approach.
ieee projects download, base paper for ieee projects, ieee projects list, ieee projects titles, ieee projects for cse, ieee projects on networking,ieee projects 2012, ieee projects 2013, final year project, computer science final year projects, final year projects for information technology, ieee final year projects, final year students projects, students projects in java, students projects download, students projects in java with source code, students projects architecture, free ieee papers
A Hybrid Filtering Technique for Random Valued Impulse Noise Elimination on D...IDES Editor
A novel adaptive network fuzzy inference system
(ANFIS) based filter is presented for the enhancement of
images corrupted by random valued impulse noise (RVIN).
This technique is performed in two steps. In the first step,
impulse noise using an Asymmetric Trimmed Median Filter
(ATMF). In the second step, image restoration is obtained by
an appropriately combining ATMF with ANFIS at the removal
of higher level of RVIN on the digital images. Three well
known images are selected for training and the internal
parameters of the neuro-fuzzy network are adaptively
optimized by training. This technique offers excellent line,
edge, and fine detail preservation performance while, at the
same time, effectively enhancing digital images. Extensive
simulation results were realized for ANFIS network and
different filters are compared. Results show that the proposed
filter is superior performance in terms of image denoising
and edges and fine details preservation properties.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Face Detection in Digital Image: A Technical ReviewIJERA Editor
Face detection is the method of focusing faces in input image is an important part of any face processing system. In Face detection, segmentation plays the major role to detect the face. There are many contests for effective and efficient face detection. The aim of this paper is to present a review on several algorithms and methods used for face detection. We read the various surveys and related various techniques according to how they extract features and what learning algorithms are adopted for. Face detection system has two major phases, first to segment skin region from an image and second to decide these regions cover human face or not. There are number of algorithms used in face detection namely Genetic, Hausdorff Distance etc.
Scene Text Detection of Curved Text Using Gradiant Vector Flow MethodIJTET Journal
Abstract--Text detection and recognition is a hot topic for researchers in the field of image processing and multimedia. Content based Image Retrieval (CBIR) community fills the semantic gap between low-level and high-level features. For text detection and extraction that achieve reasonable accuracy for multi-oriented text and natural scene text (camera images), several methods have been developed. In general most of the methods use classifier and large number of training samples to improve the accuracy in text detection. In general, connected components are used to tackle the multi-orientation problem. The connected component analysis based features with classifier training, work well for achieving better accuracy when the images are highly contrast. However, when the same methods used directly for text detection in video it results in disconnections, loss of shapes etc, because of low contrast and complex background. For such cases, deciding geometrical features of the components and classifier is not that easy. To overcome from this problem the proposed research uses Gradiant Vector Flow and Grouping based Method for Arbitrarily Oriented Scene text Detection method. The GVF of edge pixels in the Sobel edge map of the input frame is explored to identify the dominant edge pixels which represent text components. The method extracts dominant pixel’s edge components corresponding to the Sobel edge map, which is called Text Candidates (TC) of the text lines. Experimental results on different datasets including text data that is oriented arbitrary, non-horizontal text data also horizontal text data, Hua’s data and ICDAR-03 data (Camera images) show that the proposed method outperforms existing methods.
International Refereed Journal of Engineering and Science (IRJES) is a peer reviewed online journal for professionals and researchers in the field of computer science. The main aim is to resolve emerging and outstanding problems revealed by recent social and technological change. IJRES provides the platform for the researchers to present and evaluate their work from both theoretical and technical aspects and to share their views.
FINGERPRINT CLASSIFICATION MODEL BASED ON NEW COMBINATION OF PARTICLE SWARM O...IAEME Publication
Fingerprint is one of the broadly utilized biometric distinguishing proof to
recognize the persons due steady and worthiness. The classification of fingerprints
gives indexing to the dataset to decrease the seeking and matching manner. There
researches have been developed numerous approaches for fingerprint classification
model, for example, the Neural Network (NN) methods and support vector machine.
Nevertheless, there are a lot of developments to develop the classification procedure.
In this paper, a new classification model based on PSO-SVM technique is used to
achieve fingerprint classification process. The proposed methodology comprises three
phases: preprocessing phases, feature extraction phase and classification phase using
the proposed PSO-SVM model. The CASIA V5 fingerprint dataset and a property
dataset are adopted in this study to test the proposed model. The experimental results
showed that the proposed PSO-SVM classification model was better than the standard
SVM in terms of accuracy, sensitivity and specificity for both datasets.
Stereo matching based on absolute differences for multiple objects detectionTELKOMNIKA JOURNAL
This article presents a new algorithm for object detection using stereo camera system. The problem to get an accurate object detion using stereo camera is the imprecise of matching process between two scenes with the same viewpoint. Hence, this article aims to reduce the incorrect matching pixel with four stages. This new algorithm is the combination of continuous process of matching cost computation, aggregation, optimization and filtering. The first stage is matching cost computation to acquire preliminary result using an absolute differences method. Then the second stage known as aggregation step uses a guided filter with fixed window support size. After that, the optimization stage uses winner-takes-all (WTA) approach which selects the smallest matching differences value and normalized it to the disparity level. The last stage in the framework uses a bilateral filter. It is effectively further decrease the error on the disparity map which contains information of object detection and locations. The proposed work produces low errors (i.e., 12.11% and 14.01% nonocc and all errors) based on the KITTI dataset and capable to perform much better compared with before the proposed framework and competitive with some newly available methods.
Realtime face matching and gender prediction based on deep learningIJECEIAES
Face analysis is an essential topic in computer vision that dealing with human faces for recognition or prediction tasks. The face is one of the easiest ways to distinguish the identity people. Face recognition is a type of personal identification system that employs a person’s personal traits to determine their identity. Human face recognition scheme generally consists of four steps, namely face detection, alignment, representation, and verification. In this paper, we propose to extract information from human face for several tasks based on recent advanced deep learning framework. The proposed approach outperforms the results in the state-of-the-art.
Artificial Neural Network (ANN) is a fast-growing method which has been used in different
industries during recent years. The main idea for creating ANN which is a subset of artificial
intelligence is to provide a simple model of human brain in order to solve complex scientific and
industrial problems. ANNs are high-value and low-cost tools in modelling, simulation, control,
condition monitoring, sensor validation and fault diagnosis of different systems. It have high
flexibility and robustness in modeling, simulating and diagnosing the behavior of rotating machines
even in the presence of inaccurate input data. They can provide high computational speed for
complicated tasks that require rapid response such as real-time processing of several simultaneous
signals. ANNs can also be used to improve efficiency and productivity of energy in rotating
equipment
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
2. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 4, August 2019 : 2425 - 2432
2426
step, the pre-processing is allowed to improve overall quality of the captured image. Through, it is frequently
difficult to realize this process because the presence of large amount noisy areas in the image [5-6].
After that, the segmentation is applied. It is the process of separation in image into two regions: the region of
the fingerprint image that contains all important data needed for recognition is called foreground region,
while the regions which have been the blurred or noisy area are called background region. In the next step,
the features points are extracted from a pre-processed fingerprint image such as ridge ending and bifurcation
uniformly called minutiae. In the last step, generally, the matching of the extracted the feature points in order
to perform the identification of the person.
Automatic segmentation has attracted considerable amount of reach interest in the last decade.
Therefore, in this paper, improved fingerprint segmentation method using two machine learning models is
presented. In our algorithm, we have been used particular filtering method to evaluate the quality of image
acquired. After that, the fingerprint image is partitioned into non-overlapping blocks of particular size.
Moreover, for each block, the feature vector is represented by its: variance, difference of mean, gradient
coherence, ridge orientation and energy spectrum. Furthermore, the local variance thresholding is used to
distinct between the features which will be computed or considered as null. The first machine learning,
K-means classifier, is trained for dividing each extracted feature into two classes (foreground area and
background area). Finally, the second one (DBSCAN clustering) is used to remove some misclassified blocks
due to K-means classification. Thus, the contour smoothing is performed to enhance the images segmented of
fingerprints. The rest of the paper is separated into four sections. In the section 2, the related works in the
field are reviewed. Section 3 discusses the proposed segmentation algorithm. Experimental results for four
databases have been analysed and discussed in Section 4. Finally, the conclusion is presented in
the last section.
2. RELATED WORKS
The fingerprint image segmentation is one of the principal stage for automated fingerprint
recognition system. This pre-processing stage allows to separate the fingerprint region from a captured image
with two areas: foreground and background [7]. Most existing techniques of segmentation are based on the
feature of pixel intensity in a block because it is computationally faster than others based only on the pixel
intensity [8-10]. For fingerprint segmentation, there are so various methods have been proposed in the state-
of-the-art. Here, we briefly review these methods.
Li, et al. [11] proposed a segmentation technique by calculating gray contract and Fourier spectrum
energy ratio for each block in fingerprint image and then classified these block by linear support vector
machine approach. Finally, morphological operations are used to improve the segmented image.
Akram, et al. presented a segmentation method by computing mean, variance and gradient deviation
information of each block in fingerprint image. The segmentation image of fingerprint is obtained by using
the linear classifier [12]. Li, et al. [13] suggested a method for fingerprint image segmentation using a novel
approach of K-Means. the fingerprint image is divided into non-overlapping blocks. Furthermore, for each
block, the variance, direction and energy spectrum are extracted to construct feature vectors and then,
classified these characteristics by K-means clustering algorithm. Finally, used the post-processing to remove
the remaining isolated blocks in foreground or background region. In Yang, et al. [14-15] have been
subjected a novel algorithm of fingerprint images segmentation by using an unsupervised learning method
based on K-means classifier. Thus, for each block, the average and coherence data is computed in order to
divide the image into two regions by using K-means clustering approach. The correlation based fingerprint
image segmentation is used in [16]. Fahmy, et al. [17] proposed a technique that utilizes morphological
processing to extract the foreground from the fingerprint image. After the division of image into non-
overlapping blocks, this method used the feature vector for each block to realize fingerprint segmentation.
Then, the adaptive thresholding is used to convert the fingerprint image to a binary one. Next, some
morphological operations (closing and opening) are applied, to segmented the image. Finally, the complex
Fourier series expansion are performed to smooth the segmented contour. In this algorithm, the image is
separated into blocks and sub-blocks. Afterwards, the thresholding level have been applied for segmentation.
Das, et al. [18] achieved the fingerprint segmentation by computing block based statistics and morphological
operations. Abboud, et al. [19] presented a new segmentation technique by statistical computing: mean,
variance and coherence features of each block in fingerprint image based on an automatic threshold values
and Otsu’s method. Finally, the filing the gaps is applied to remove the noise in some regions in foreground
or background by using particular sets of rules based on neighboring regions.
3. Int J Elec & Comp Eng ISSN: 2088-8708
Improving of fingerprint segmentation images based on K-means and DBSCAN… (El mehdi Cherrat)
2427
3. PROPOSED APPROACH
Our proposed method is improved the fingerprint image segmentation based on K-Means and
DBSCAN clustering. A robust and effective fingerprint image segmentation algorithm is important phase for
a fingerprint recognition system. In this section, we detail the proposed technique which is illustrated in
Figure 1. The details of each phase are represented in the following.
Figure 1. Block diagram of proposed algorithm for fingerprint image segmentation
3.1. Pre-processing
In this phase, Sobel and TopHat filter method have been used to improve the quality of the
fingerprint image. Sobel structuring operators Sobelx and Sobely for image are represented in (1).
Sobelx=(
-1 0 1
-2 0 2
-1 0 1
) , Sobely= (
-1 -2 -1
0 0 0
1 2 1
) (1)
The gradient Gx and gradient Gy of pixels are defined from image Img by (2).
Gx= Sobelx* Img , Gy= Sobely* Img (2)
The result of gradient is combined to find the absolute magnitude (the output edge). This result is
described as follows:
G(x,y)=√Gx
2
+ Gy
2
(3)
The fingerprint image is ameliorated after normalisation and Sobel technique. However, the
fingerprint image is more improved by using the TopHat technique. This filter is a process that extracts
details and small elements from image. TopHat filtering is based on dilation, erosion, opening and closing
method. The morphological dilation and erosion operation for image Img of size x×y with structuring element
Se are defined by (4) and (5) respectively:
[ Img⊕ Se ](x,y) =max(s,t)∈Se
{ Img (x+s,y+t)} (4)
[ Img⊖ Se ](x,y) = min(s,t)∈Se
{ Img (x+s,y+t)} (5)
The opening and closing process for image Img with structuring element Se are described by
combining the erosion and dilatation operation given by (6) and (7) respectively:
Img○ Se = ( Img⊖ 𝑆𝑒) ⊕ 𝑆𝑒 (6)
Img ● Se = ( Img⊕ 𝑆𝑒) ⊖ 𝑆𝑒 (7)
The opening TopHatop and closing TopHatcl operations for image Img with structuring element Se
are represented by (8) and (9) respectively:
TopHatop(Img) = Img – (Img○ 𝑆𝑒)
(8)
TopHatcl(Img) = Img – (Img ● 𝑆𝑒) (9)
4. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 4, August 2019 : 2425 - 2432
2428
3.2. Segmentation
After the pre-processing phase, the fingerprint image is divided into non-overlapping local blocks of
size w×w. Further, to every block, the characteristic vector is classified into two classes: foreground and
background region by using K-means classification.
3.2.1. Characteristics extraction
The characteristic vector is represented, for each block in fingerprint image, by its three categories
namely: image intensity based characteristics, gradient based characteristics and ridge based characteristics.
a. Image intensity based characteristics
The change in intensity values is usually specific along the ridges and no-ridges when compared to
background areas in fingerprint image. General image intensity based characteristics can be used to define
the most intensity such as difference of mean, which is the difference between the local intensity mean and
the global intensity mean, and variance blocks in given image Img of size x×y. These proprieties are computed
by (11) and (12) respectively.
𝐼 𝑚𝑔𝑀𝑒𝑎𝑛𝐿(𝑥, 𝑦) =
1
W2 ∑ ∑ Img(x,y)
w
y=1
w
x=1
(10)
𝐶ℎ 𝐷𝑖𝑓𝑓𝑀𝑒𝑎𝑛(𝑥, 𝑦) = 𝐼 𝑚gMeanL(𝑥, 𝑦) − 𝐼 𝑚gMeanG (11)
where ImgMeanL is the mean intensity of the local block of image and ImgMeanG is the mean intensity of the
global image.
𝐶ℎ 𝑉𝑎𝑟(𝑥, 𝑦) =
1
𝑊2
∑ ∑(𝐼 𝑚𝑔(𝑥, 𝑦) − 𝐼 𝑚𝑔𝑀𝑒𝑎𝑛𝐿)
2
𝑤
𝑦=1
𝑤
𝑥=1
(12)
b. Gradient based characteristics
The gradient is utilized to obtain the directional variation in intensity value along a direction of
image Img of size x×y. Characteristics such as gradient cohrence and ridge direction can be classified into
gradient based characteristics. The gradient coherence and ridge direction features are calculated
by (16) and (20) respectively.
𝐶ℎ 𝐶𝑜ℎ𝑒𝑟𝑒𝑛𝑐𝑒(𝑥, 𝑦) = √
(𝐺 𝐶𝑜ℎ𝑥(𝑥, 𝑦) − 𝐺 𝐶𝑜ℎ𝑦(𝑥, 𝑦)) + 4𝐺 𝐶𝑜ℎ𝑥𝑦(𝑥, 𝑦)2
𝐺 𝐶𝑜ℎ𝑥(𝑥, 𝑦) + 𝐺 𝐶𝑜ℎ𝑦(𝑥, 𝑦)
(13)
Where
𝐺 𝐶𝑜ℎ𝑥(𝑥, 𝑦) = ∑ ∑(𝐺𝑥
2
(𝑥, 𝑦))
𝑤
𝑦=1
𝑤
𝑥=1
(14)
𝐺 𝐶𝑜ℎ𝑦(𝑥, 𝑦) = ∑ ∑(𝐺 𝑦
2
(𝑥, 𝑦))
𝑤
𝑦=1
𝑤
𝑥=1
(15)
𝐺 𝐶𝑜ℎ𝑥𝑦(𝑥, 𝑦) = ∑ ∑(𝐺𝑥
2(𝑥, 𝑦) ∗ 𝐺 𝑦
2
(𝑥, 𝑦))
𝑤
𝑦=1
𝑤
𝑥=1
(16)
The gradient Gx and gradient Gy are defined by (3).
𝑆𝑞1 = ∑ ∑(𝐺 𝑥
2
(𝑥, 𝑦) − 𝐺 𝑦
2
(𝑥, 𝑦))
𝑤
𝑦=1
𝑤
𝑥=1
(17)
𝑆 𝑞2 = ∑ ∑ 2 Gx(x,y)* Gy(x,y)
𝑤
𝑦=1
𝑤
𝑥=1
(18)
𝐷(𝑥, 𝑦) =
1
2
tan−1
(
𝑆𝑞2
𝑆𝑞1
)
(19)
5. Int J Elec & Comp Eng ISSN: 2088-8708
Improving of fingerprint segmentation images based on K-means and DBSCAN… (El mehdi Cherrat)
2429
𝐶ℎ 𝐷𝑖𝑟𝑒𝑐𝑡(𝑥, 𝑦)=
{
π
4
Sq1
=0,Sq2
<0
3π
4
Sq1
=0,Sq2
≥0
D(x,y)+
π
2
Sq1
>0
D(x,y) Sq1
<0,Sq2
≤0
D(x,y)+π Sq1
<0,Sq2
>0
(20)
c. Gradient based characteristics
Characteristics such as ridge frequency (energy spectrum) which is computes by using Fourier
transform for each local block of image Img of size x×y can be grouped as ridge based characteristics.
This feature is compute by (22).
𝐹(𝑘, 𝑙) = ∑ ∑ 𝐼 𝑚𝑔(𝑥, 𝑦)𝑒−𝑖2𝜋(
𝑘𝑥
𝑤 +
𝑙𝑦
𝑤
)
𝑤
𝑦=1
𝑤
𝑥=1
(21)
𝐶ℎ 𝐹𝑟𝑒𝑞(𝑥, 𝑦) = √ 𝑅𝐸 (𝐹(𝑘, 𝑙))
2
+ 𝐼𝑀(𝐹(𝑘, 𝑙))
2
(22)
where k,l ϵ {1,…..w} and < (x, y)(k, l) >= xk + yl.
3.2.2. Local variance thresholding
The variance local thresholding decides whether or not the region in fingerprint image needs to
compute another characteristic for segmentation. The local variance is calculated in given image Img of size
x×y by (12). If local intensity variance in a w×w image block is greater than 0, the other characteristic of the
block will be computed otherwise are considered as null. Therefore, from Table 1, in DB1 it is observed that
the difference of the processing time of our proposed segmentation is achieved almost 10 seconds for an
obtained fingerprint image. Additionally, it is shown that the average segmentation time in 4 databases is less
than other method based on K-means segmentation which the block is represented just by 3-dimensional
characteristic vector [13].
Table 1. Comparison of segmentation time in second for each database in FVC2004
Databases K-means with 3 features [13] Our Algorithm with 5 features
DB1 17,46 7,95
DB2 17,52 18,66
DB3 17,78 18,30
DB4 17,68 19,66
Avg 17,61 16,14
3.2.3. K-means clustering
In our proposed method, K-means classifier is utilized to classify the five extracted characteristics,
variance, difference of mean, gradient coherence, ridge direction and energy spectrum, from each local block
in fingerprint image in order to distinct the foreground area to the noisy background area. The characteristic
extraction vector for each block is represented by (23). On the one hand, the K-means algorithm is a
popularly unsupervised machine learning models [20] used for clustering technique of the data [21]. On the
other hand, it is simplified to implementation, eased of interpretation, faster and adapted to sparse data.
K-means classification is represented as follows. Firstly, this approach selects randomly the number of
clusters and assigns the cluster with closest centroids; then it determines each data point to the nearest
centroids and for every cluster, the new centroids are recalculated, and this process is repeated until some
condition is verified [22].
Ch 𝑉𝑒𝑐𝑡𝑜𝑟(𝑥, 𝑦) = [𝐶ℎ 𝐷𝑖𝑓𝑓𝑀𝑒𝑎𝑛, 𝐶ℎ 𝑉𝑎𝑟, 𝐶ℎ 𝐶𝑜ℎ𝑒𝑟𝑒𝑛𝑐𝑒, 𝐶ℎ 𝐷𝑖𝑟𝑒𝑐𝑡, 𝐶ℎ 𝐹𝑟𝑒𝑞] (23)
3.2.4. DBSCAN algorithm
DBSCAN, Density-Based Spatial Clustering of Applications with Noise, is another model of
machine learning and clustering analysis algorithm proposed by Martin Ester et al. [23]. DBSCAN is one of
the most commonly used cluster analysis algorithms. This algorithm is density-based: given a set of points in
a dataset, the algorithm can the nearby points are grouped together (points with many adjacent points) and the
outliers in the low density area are marked. The general algorithm of DBSCAN Clustering is shown in
6. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 4, August 2019 : 2425 - 2432
2430
algorithm 2. The reason of using DBSCAN over other clustering algorithms is that it does not demand a fixed
number of groups in dataset. It also recognizes outliers as noise which simply introduces them into the cluster
even if the data points are very different. In addition, it is a good place to find groups of any size and shape.
In our propsed algorithm, DBSCAN Clustering is used to achieve more compact blocks for reducing the
misclassification region due to the K-means algorithm .Figure 2 presents the result using the DBSCAN
algorithm. Finaly, the contour smoothing (filtering in a complex Fourier transform domain [24]) as post-
processing technique to smoothen the edges of mask [17].
Algorithm 1 DBSCAN Clustring
INPUT: Dataset, eps, min_points where Dataset = set of classified instances, eps=distance,
min_points = minimum number of points to create dense region.
OUTPUT: Output all clusters in Dataset marked with Cluster_Label or noise
procedure mark all cluster in Dataset as unvisited
Cluster_Label←1
for each unvisited cluster x in Dataset do
ZFindNeighbours(x,eps,min_points)
if |Z| < min_points then
mark x as noise
else
mark x and each cluster of Z with Cluster_Label
queueList←all unvisited clusters of Z
until queueList is empty do
y←delete a cluster from queueList
Z←FindNeighbours(y, eps, min_points)
If |Z| minpts then
for each cluster w in Z do
mark w with Cluster_Label
if w is unvisited
queueList←w queueList
end for
mark y as visited
end until
end if
mark x as visited
Cluster_Label← Cluster_Label+1
end for
end procedure
Figure 2. Removing the misclassification region by DBSCAN algorithm:
(a) Original image; (b) Our K-means classification; (c) Our K-means and DBSCAN classification
4. RESULTS AND DISCUSSION
The experimental operation platform in this study is described as follows: the host configuration:
CPU Intel Core2 Duo at 2.00 GHz, RAM 3.00 GB, runtime environment: Microsoft Visual Studio C++ 2013
with OpenCV library. In order to better verify our algorithm, the following segmentation methods are
adopted in the experiment: SVM [9], K-means with 3-dimension feature [13], MP [17], ACT [19]. These
segmentation algorithms were compared to each other. In order tovalidate the proposed algorithm, the results
have been tested on the public Fingerprint Verification Competition 2004 dataset [25] which contains
4 databases, namely DBl, DB2, DB3 and DB4. The performance measure is used the number of
misclassification as defined by (25).
7. Int J Elec & Comp Eng ISSN: 2088-8708
Improving of fingerprint segmentation images based on K-means and DBSCAN… (El mehdi Cherrat)
2431
𝑃𝑟𝑜𝑏1 =
𝑁𝑏𝑟𝑏𝑒
𝑁𝑏𝑟𝑏
, 𝑃𝑟𝑜𝑏2 =
𝑁𝑏𝑟𝑓𝑒
𝑁𝑏𝑟𝑓
(24)
ProbErr=Avg( 𝑃𝑟𝑜𝑏1, 𝑃𝑟𝑜𝑏12) (25)
where Nbrbe is number of background classified error, Nbrb is the total number of true background regions in
the fingerprint image and Prob1 is the probability that a foreground region is classified as background. Nbrfe
is the number of foreground classified error, Nbrf is the total number of true foreground regions in the
fingerprint image and Prob2 is the probability that a background region is classified as foreground. The
probability of error ProbErr is the average of Prob1 and Prob2.
The existing algorithms of fingerprint image segmentation, SVM [11], K-Means with 3-dimension
feature [13], MP [17] and ATC [19], are implemented for comparison of segmentation performance.
The comparison be tween proposed method and others works in measure of average segmentation error for
fingerprint images at different databases is shown in Table 2. From Table 2, in The SVM [11] and K-Means
with 3-dimension feature [13], the corresponding value for misclassification rate in DB1 is 18,75%, 20,28%
respectively. Furthermore, the error rate of segmentation in MP [17], ATC [19] and our proposed method is
0,28%,13,31% and 0,30% respectively. In the second database, if SVM [11], K-Means with 3-dimension
feature [13], MP[17] and ATC [19] give 34,56%, 22,30%, 2,92%, 29,79% respectively in segmentation rate
however our proposed method takes minimum error rate as 1,66%. Likewise, in the last database,
misclassification rate (1,09%) is clearly less for the proposed algorithm compared to other techniques in the
third database. SVM [11] has failed to classify better the forwound and background region (error rate as
28,89%) in the fourth database. thus, our system has succeeded to reduce 0,63% of segmentation error than
K-Means with 3-dimensions features [13], MP [17] and ATC [19] which give 5,06%, 1,31% and 17,36%
respectively. The proposed algorithm results show a better performance respect to other algorithms with
average misclassification rate as 0,67% at different databases of fingerprint images. The means of these
results shows that our algorithm is improved the recognition accurate rate of the person.From these existing
works, it is worthy to say that the results of proposed method are clearly superior in term segmentation error
rate. The Figure 3 represents the visual results of the proposed algorithm and the other techniques. When we
compared to the existing works in this figure. We can say that our proposed is efficient and reduced error rate
of segmentation.The visual quality results of segmented image indicate that the proposed algorithm adapts
and gives better results in term of segmentation in different environments than the comparative techniques
for accuracy segmentation.
Table 2. Comparison of segmentation misclassification using different algorithms in FVC2004
Databases SVM [11] K-means [13] MP [17] ATC [19] Proposed Algorithm
D1
D2
D3
D4
Avg
18,75%
34,56%
1,32%
28,89%
28,38%
20,28%
22,30%
12,60%
5,06%
15,06%
0,28%
2,92%
2,54%
1,31%
1,76%
13,31%
29,79%
19.44%
17,36%
19,98%
0,30%
1,66%
1,09%
0,63%
0,92%
Figure 3. Segmentation results using different methods in DB2:
(a) Original image, (b) SVM [11], (c) K-means [13], (d) MP [17], (e) ATC [19], (f) Proposed method
5. CONCLUSION
This paper has proposed an improved method of fingerprint segmentation images based on K-Means
classification and DBSCAN clustering. Our proposed system is presented in three steps. In the first step,
the quality of fingerprint images is enhanced using Soble and TopHat filtering method. In the second step,
8. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 4, August 2019 : 2425 - 2432
2432
K-means approach is applied for each local block to classify the image into foreground and background
region using five-dimensional characteristic vector extraction. Moreover, the processing time of
segmentation is faster than another algorithm based on just 3 dimensions features due to the local variance
thresholding. In the final step, DBSCAN algorithm is used to remove some misclassified blocks due to the
K-means clustering and contour smoothing is achieved to improve the image segmented. Simulation results
show significantly that the proposed method is efficacy some recent existing techniques in average
segmentation error rate. Therefore, it affects the performance of the system to have a higher accurate
recognition rate of the person.
REFERENCES
[1] E.M Cherrat, R. Alaoui, H. Bouzahir, W. Jenkal, "High density salt-and-pepper noise suppression using adaptive
dual threshold decision based algorithm in fingerprint images," IEEE Intelligent Systems &Computer Vision,
pp. 1-4, 2017.
[2] S.R. Borra, G.J Reddy, E. S. Reddy, "An Efficient Fingerprint Identification using Neural Network and BAT
Algorithm," International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 2, pp. 1194-1213,
2018.
[3] P. Wang,"Pattern recognition, machine intelligence and biometrics," Springer Berlin Heidelberg, 2011.
[4] A. Ross and J. Anil, "Biometric sensor interoperability: A case study in fingerprints," In ECCV Workshop BioAW,
pp. 134-145, 2004.
[5] M. N. Abdulwahed and A. kamil Ahmed, "Underwater Image de-nosing using discrete wavelet transform and pre-
whitening filter," TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 16, no. 6, 2018.
[6] R.M. Zayed, "Optimum Image Filters for Various Types of Noise," TELKOMNIKA Telecommunication Computing
Electronics and Control, vol. 16, no. 5, 2018.
[7] B. Stojanovi, O. Marques, and A. Nekovi, "Latent overlapped fingerprint separation: a review," Multimedia Tools
and Applications, 76(15), pp.16263-16290, 2017.
[8] C. Wu, S. Tulyakov, V. Govindaraju, "Robust point-based feature fingerprint segmentation algorithm," Advances in
Biometrics, pp.1095-1103, 2007.
[9] E. Zhu, J. Yin, C. Hu, G. Zhang, "A systematic method for fingerprint ridge orientation estimation and image
segmentation,". Pattern Recognition, 39(8), pp.1452-1472, 2006.
[10] N.V. Boulgouris, K.N. Plataniotis, E. Micheli-Tzanakou, "Biometrics: theory, methods, and applications," John
Wiley & Sons, (Vol. 9), 2009.
[11] Y. X. Li, X.Q. Peng and S. Li, "Fingerprint image segmentation method based on linear support vector machine,"
Application Research of Computers, 25(12), pp. 3669-3670, 2008.
[12] M. U. Akram, A. Ayaz and J. Imtiaz, "Morphological and gradient based fingerprint image segmentation",
International Conference on Information and Communication Technologies (ICICT), pp. 14, 2011.
[13] H. Li and Y. Ping, "A novel approach of K-means based fingerprint segmentation algorithm", In Instrumentation &
Measurement, Sensor Network and Automation, IEEE International Symposium on, Vol. 1, pp. 218-221, 2012.
[14] G. Yang, G.-T. Zhou, Y. Yin, and X. Yang, "K-Means Based Fingerprint Segmentation with Sensor
Interoperability," EURASIP J. Adv.Signal Process, vol. 2010, no. 1, p. 729378, 2010.
[15] G. Yang, Y. Li, Y. Yin, and Y.-S. Li, "Two-Level Evaluation on Sensor Interoperability of Features in Fingerprint
Image Segmentation," Sensors, vol. 12, no. 12, pp. 31863199, 2012.
[16] S. R.Suralkar and P. M. Patil, "Correlation based Fingerprint Image Segmentation," Int. J. Comput. Appl., vol. 68,
no. 7, pp. 13, 2013.
[17] M. F. Fahmy and M. A. Thabet, "A fingerprint segmentation technique based on morphological processing,"
In Signal Processing and Information Technology (ISSPIT), IEEE International Symposium on,
pp. 000215-000220, 2013.
[18] D. Das and S. Mukhopadhyay, "Fingerprint Image Segmentation Using Block-Based Statistics and Morphological
Filtering," Arab. J. Sci. Eng., vol. 40, no. 11, pp. 31613171, 2015.
[19] A.A, Abbood,S. Ghazali, A.R, Atheer Akram and U.P. Sabine, "Segmentation and enhancement of fingerprint
images based on automatic threshold calculations," In International Conference of Reliable Information and
Communication Technology Springer, pp.400-411, 2017.
[20] V. Mhaske-Dhamdhere and S. Vanjale, "A novel approach for phishing emails real time classification using
k-means algorithm," International Journal of Engineering and Technology, 7, no. 1.2 , 96-100, 2018.
[21] G. Gan and M.K.P. Ng, "k-means clustering with outlier removal," Pattern Recognition Letters, 90, pp.8-14, 2017.
[22] J. Qin, W. Fu, H. Gao and W.X. Zheng, "Distributed K-Means Algorithm and Fuzzy C-Means Algorithm for
Sensor Networks Based on Multiagent Consensus Theory," IEEE transactions on cybernetics, 47(3), pp.772-783,
2017.
[23] Ester, Martin, H.P Kriegel, J. Sander, X. Xu, "A density-based algorithm for discovering clusters in large spatial
databases with noise," In Kdd, vol. 96, no. 34, pp. 226-231, 1996.
[24] R. C. Gonzalez and R. E. Woods, "Digial Image Processing," Prentice Hall, 2003.
[25] D. Maio, D. Maltoni, R. Cappelli et al, "Fvc2004: Third fingerprint verification competition biometric
authentication," Springer Berlin Heidelberg, pp. 1-7, 2004.