This document summarizes several techniques for iris recognition. It begins with an abstract describing iris recognition and its accuracy compared to other biometric traits. It then reviews four iris recognition techniques in the literature:
1. A technique using moment invariants and Euclidean or Mahalanobis distance classifiers that achieved 100% recognition rates.
2. A segmentation algorithm using Daugman's integro differential operator that improved discrimination capabilities over other methods.
3. A pupil localization technique using negative thresholds and neighbors, and iris boundary detection using contrast enhancement and thresholding, achieving accurate segmentation.
4. A technique using Gaussian mixture models, Gabor filter banks, and simulated annealing to generate iris masks and increase recognition rates
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Transform Domain Based Iris Recognition using EMD and FFTIOSRJVSP
Iris is one of the physiological trait which is used to identify the individuals. In this paper Transform Domain Based Iris Recognition using EMD and FFT is proposed. Circular Hough Transform is used in the Preprocessing stage to extract circular part of eye. The circular iris part is converted into rectangular rubber sheet model in Region of Interest (ROI).Empirical Mode Functions (EMF)’s are obtained by applying Empirical Mode Decomposition (EMD) on the Iris. FFT is also applied on ROI to extract the features. These features are added arithmetically to obtain final features. The features of the database are compared with test iris using Euclidian Distance(ED) to compute performance parameters. It is observed that the values of CRR and EER are better in the case of propsed algorithm compared to existing algorithms.
This document reviews various techniques for iris segmentation in iris recognition systems. It discusses integrodifferential operator and Hough transform approaches, as well as the Masek, fuzzy clustering, and pulling and pushing methods. Each approach has advantages and disadvantages. The Masek method achieves circular iris and pupil localization but has lower accuracy and speed. Fuzzy clustering provides better segmentation for non-cooperative iris recognition but requires an extensive search. The pulling and pushing method aims to develop a more accurate and rapid iris segmentation algorithm.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Iris recognition for personal identification using lamstar neural networkijcsit
One of the promising biometric recognition method is Iris recognition. This is because the iris texture provides many features such as freckles, coronas, stripes, furrows, crypts, etc. Those features are unique for different people and distinguishable. Such unique features in the anatomical structure of the iris make it
possible the differentiation among individuals. So during last year’s huge number of people have been
trying to improve its performance. In this article first different common steps for the Iris recognition system
is explained. Then a special type of neural network is used for recognition part. Experimental results show high accuracy can be obtained especially when the primary steps are done well.
International Journal of Computer Science, Engineering and Information Techno...ijcseit
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science, Engineering and Information Technology. The Journal looks for significant contributions to all major fields of the Computer Science and Information Technology in theoretical and practical aspects. The aim of the Journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
The document describes an algorithm for eye detection in face images. It begins with face detection using skin color detection in HSV color space. Then it finds the symmetric axis of the extracted face region using gradient orientation histograms to determine the location of the eyes. It further finds the symmetric axis within the eye region to locate the center of the eyes. The algorithm aims to accurately detect the eyes even when the face is rotated, which is important for applications like face recognition and gaze tracking.
The Biometric Algorithm based on Fusion of DWT Frequency Components of Enhanc...CSCJournals
The biometrics are used to authenticate a person effectively compared to conventional methods of identification. In this paper we propose the biometric algorithm based on fusion of Discrete Wavelet Transform(DWT) frequency components of enhanced iris image.The iris template is extracted from an eye image by considering horizontal pixels in an iris part.The iris template contrast is enhanced using Adaptive Histogram Equalization (AHE) and Histogram Equalization (HE).The DWT is applied on enhanced iris template.The features are formed by straight line fusion of low and high frequency coefficients of DWT.The Euclidian distance is used to compare final test features with database features. It is observed that the performance parameters are better in the case of proposed algorithm compared to existing algorithms.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Transform Domain Based Iris Recognition using EMD and FFTIOSRJVSP
Iris is one of the physiological trait which is used to identify the individuals. In this paper Transform Domain Based Iris Recognition using EMD and FFT is proposed. Circular Hough Transform is used in the Preprocessing stage to extract circular part of eye. The circular iris part is converted into rectangular rubber sheet model in Region of Interest (ROI).Empirical Mode Functions (EMF)’s are obtained by applying Empirical Mode Decomposition (EMD) on the Iris. FFT is also applied on ROI to extract the features. These features are added arithmetically to obtain final features. The features of the database are compared with test iris using Euclidian Distance(ED) to compute performance parameters. It is observed that the values of CRR and EER are better in the case of propsed algorithm compared to existing algorithms.
This document reviews various techniques for iris segmentation in iris recognition systems. It discusses integrodifferential operator and Hough transform approaches, as well as the Masek, fuzzy clustering, and pulling and pushing methods. Each approach has advantages and disadvantages. The Masek method achieves circular iris and pupil localization but has lower accuracy and speed. Fuzzy clustering provides better segmentation for non-cooperative iris recognition but requires an extensive search. The pulling and pushing method aims to develop a more accurate and rapid iris segmentation algorithm.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Iris recognition for personal identification using lamstar neural networkijcsit
One of the promising biometric recognition method is Iris recognition. This is because the iris texture provides many features such as freckles, coronas, stripes, furrows, crypts, etc. Those features are unique for different people and distinguishable. Such unique features in the anatomical structure of the iris make it
possible the differentiation among individuals. So during last year’s huge number of people have been
trying to improve its performance. In this article first different common steps for the Iris recognition system
is explained. Then a special type of neural network is used for recognition part. Experimental results show high accuracy can be obtained especially when the primary steps are done well.
International Journal of Computer Science, Engineering and Information Techno...ijcseit
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science, Engineering and Information Technology. The Journal looks for significant contributions to all major fields of the Computer Science and Information Technology in theoretical and practical aspects. The aim of the Journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
The document describes an algorithm for eye detection in face images. It begins with face detection using skin color detection in HSV color space. Then it finds the symmetric axis of the extracted face region using gradient orientation histograms to determine the location of the eyes. It further finds the symmetric axis within the eye region to locate the center of the eyes. The algorithm aims to accurately detect the eyes even when the face is rotated, which is important for applications like face recognition and gaze tracking.
The Biometric Algorithm based on Fusion of DWT Frequency Components of Enhanc...CSCJournals
The biometrics are used to authenticate a person effectively compared to conventional methods of identification. In this paper we propose the biometric algorithm based on fusion of Discrete Wavelet Transform(DWT) frequency components of enhanced iris image.The iris template is extracted from an eye image by considering horizontal pixels in an iris part.The iris template contrast is enhanced using Adaptive Histogram Equalization (AHE) and Histogram Equalization (HE).The DWT is applied on enhanced iris template.The features are formed by straight line fusion of low and high frequency coefficients of DWT.The Euclidian distance is used to compare final test features with database features. It is observed that the performance parameters are better in the case of proposed algorithm compared to existing algorithms.
IRDO: Iris Recognition by fusion of DTCWT and OLBPIJERA Editor
This document proposes a new iris recognition method called IRDO that fuses Dual Tree Complex Wavelet Transform (DTCWT) and Overlapping Local Binary Pattern (OLBP) features. DTCWT is used to extract micro-texture features from the iris, while OLBP enhances the extraction of edge features. Fusing these two methods results in improved matching performance and classification accuracy compared to state-of-the-the-art techniques. The proposed IRDO method achieves higher iris recognition rates as measured by Total Success Rate and Equal Error Rate.
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
Iris Recognition is a highly efficient biometric identification system with great possibilities for future in the
security systems area.Its robustness and unobtrusiveness, as opposed tomost of the currently deployed
systems, make it a good candidate to replace most of thesecurity systems around. By making use of the
distinctiveness of iris patterns, iris recognition systems obtain a unique mapping for each person.
Identification of this person is possible by applying appropriate matching algorithm.In this paper,
Daugman’s Rubber Sheet model is employed for irisnormalization and unwrapping, descriptive statistical
analysis of different feature detection operators is performed, features extracted is encoded using Haar
wavelets and for classification hammingdistance as a matching algorithm is used. The system was tested on
the UBIRIS database. The edge detection algorithm, Canny, is found to be the best one to extract most of
the iris texture. The success rate of feature detection using canny is 81%, False Accept Rate is 9% and
False Reject Rate is 10%.
A robust iris recognition method on adverse conditionsijcseit
As a stable biometric system, iris has recently attracted great attention among the researchers. However,
research is still needed to provide appropriate solutions to ensure the resistance of the system against error
factors. The present study has tried to apply a mask to the image so that the unexpected factors affecting
the location of the iris can be removed. So, pupil localization will be faster and robust. Then to locate the
exact location of the iris, a simple stage of boundary displacement due to the Canny edge detector has been
applied. Then, with searching left and right IRIS edge point, outer radios of IRIS will be detect. Through
the process of extracting the iris features, it has been sought to obtain the distinctive iris texture features by
using a discrete stationary wavelets transform 2-D (DSWT2). Using DSWT2 tool and symlet 4 wavelet,
distinctive features are extracted. To reduce the computational cost, the features obtained from the
application of the wavelet have been investigated and a feature selection procedure, using similarity
criteria, has been implemented. Finally, the iris matching has been performed using a semi-correlation
criterion. The accuracy of the proposed method for localization on CASIA-v1, CASIA-v3 is 99.73%,
98.24% and 97.04%, respectively. The accuracy of the feature extraction proposed method for CASIA3 iris
images database is 97.82%, which confirms the efficiency of the proposed method.
A Survey : Iris Based Recognition SystemsEditor IJMTER
The security is one of the important aspect of today's life. Iris recognization is one of the leading
research of security which is used to identify the individual person. Usually iris based biometric is more better
than other biometric in terms of accuracy, fast, stability, uniqueness. The iris recognition system works by
capturing and storing biometric information and then compare scanned copy of iris biometric with the stored iris
images in the database. There are several Iris Based Recognition Systems are developed so far. In this paper we
presented several iris techniques and create a base for our future roadmap.
Comparative Study of Lip Extraction Feature with Eye Feature Extraction Algor...Editor IJCATR
In recent time, along with the advances and new inventions in science and technology, fraud people and identity thieves are
also becoming smarter by finding new ways to fool the authorization and authentication process. So, there is a strong need of efficient
face recognition process or computer systems capable of recognizing faces of authenticated persons. One way to make face recognition
efficient is by extracting features of faces. This paper is to compare the relative efficiency of Lip Extraction and Eye extraction feature
for face recognition in biometric devices. Importance of this paper is to bring to the light which Feature Extraction method provides
better results under various conditions. For recognition experiments, I used face images of persons from different sets of YALE
database. In my dataset, there are total 132 images consisting of 11 persons & 12 face images of each person.
MULTI SCALE ICA BASED IRIS RECOGNITION USING BSIF AND HOG sipij
Iris is a physiological biometric trait, which is unique among all biometric traits to recognize person
effectively. In this paper we propose Multi-scale Independent Component Analysis (ICA) based Iris
Recognition using Binarized Statistical Image Features (BSIF) and Histogram of Gradient orientation
(HOG). The Left and Right portion is extracted from eye images of CASIA V 1.0 database leaving top and
bottom portion of iris. The multi-scale ICA filter sizes of 5X5, 7X7 and 17X17 are used to correlate with
iris template to obtain BSIF. The HOGs are applied on BSIFs to extract initial features. The final feature is
obtained by fusing three HOGs. The Euclidian Distance is used to compare the final feature of database
image with test image final features to compute performance parameters. It is observed that the
performance of the proposed method is better compared to existing methods.
This document presents a new iris segmentation method for iris recognition systems. The proposed method uses Canny edge detection and Hough transform to locate the iris boundary after finding the pupil boundary using image gray levels. Experiments on the CASIA iris image database of 756 images show the method can accurately detect the iris boundary in 99.2% of images. This is an improvement over other existing segmentation techniques. The key steps of the proposed method are preprocessing, segmentation using Canny edge detection and Hough transform, normalization using the rubber sheet model, feature encoding with Gabor wavelets, and matching with Hamming distance.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
Implementation of face and eye detection on DM6437 board using simulink modeljournalBEEI
Driver Assistance system is significant in drriver drowsiness to avoid on road accidents. The aim of this research work is to detect the position of driver’s eye for fatigue estimation. It is not unusual to see vehicles moving around even during the nights. In such circumstances there will be very high probability that a driver gets drowsy which may lead to fatal accidents. Providing a solution to this problem has become a motivating factor for this research, which aims at detecting driver fatigue. This research concentrates on locating the eye region failing which a warning signal is generated so as to alert the driver. In this paper, an efficient algorithm is proposed for detecting the location of an eye, which forms an invaluable insight for driver fatigue detection after the face detection stage. After detecting the eyes, eye tracking for input videos has to be achieved so that the blink rate of eyes can be determined.
1) The document presents a new face parts detection algorithm that combines the Viola-Jones object detection framework with geometric information of facial features.
2) It detects faces, then isolates regions of interest for the eyes, nose, and mouth. Eye pupils are located using iris recognition techniques.
3) The algorithm was tested on hundreds of images and showed promising results for automated facial feature detection.
IRJET- Survey on Face Detection MethodsIRJET Journal
The document reviews 15 papers on various face detection methods published between 2013 and 2018. It finds that the most popular feature extraction method is skin color segmentation, which achieves detection rates of 88-98%. The Viola-Jones method typically detects face regions as well as other body parts at a rate of 80-90%. Common face detection methods reviewed include skin color segmentation, Viola-Jones, Haar features, 3D mean shift, and Cascaded Head and Shoulder Detection. OpenCV, Python or MATLAB are typically used to implement real-time face detection systems.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
The document describes a proposed algorithm called Fusion of Hybrid Domain features for Iris Recognition (FHDIR).
The algorithm pre-processes iris images by resizing, binarization, cropping and splitting them. It then applies Fast Fourier Transform (FFT) to the left half of the iris image to extract features and applies Principal Component Analysis (PCA) to the right half to extract features. These feature sets are then fused using arithmetic addition to generate a final feature vector. Test iris features are compared to the database using Euclidean Distance for identification.
The proposed algorithm is evaluated on the CASIA iris database and is found to have better performance than existing algorithms in terms of false rejection rate, false acceptance rate, and true
IRJET-Unconstraint Eye Tracking on Mobile SmartphoneIRJET Journal
This document presents a study on developing an unconstrained eye tracking system using only the front camera of a mobile smartphone. It aims to create a low-cost eye tracking solution. The researchers designed techniques to detect faces, eyes and irises from camera images using Haar cascade classification and circular Hough transform. They tested the system under various conditions like lighting changes, wearing glasses, in dark environments, and while driving. The techniques were able to accurately detect eyes in different scenarios. The system has applications in areas like driving assistance systems and could be integrated into vehicles.
Abstract: This paper presents a new face parts information analyzer, as a promising model for detecting faces and locating the facial features in images. The main objective is to build fully automated human facial measurements systems from images with complex backgrounds. Detection of facial features such as eye, nose, and mouth is an important step for many subsequent facial image analysis tasks. The main study of face detection is detect the portion of part and mention the circle or rectangular of the every portion of body. In this paper face detection is depend upon the face pattern which is match the face from the pattern reorganization. The study present a novel and simple model approach based on a mixture of techniques and algorithms in a shared pool based on viola jones object detection framework algorithm combined with geometric and symmetric information of the face parts from the image in a smart algorithm.Keywords: Face detection, Video frames, Viola-Jones, Skin detection, Skin color classification, Face reorganization, Pattern reorganization. Skin Color.
Title: Face Detection Using Modified Viola Jones Algorithm
Author: Alpika Gupta, Dr. Rajdev Tiwari
International Journal of Recent Research in Mathematics Computer Science and Information Technology
ISSN 2350-1022
Paper Publications
Iris recognition is a method of biometric identification.
Biometric identification provides automatic recognition of an
individual based on the unique feature of physiological
characteristics or behavioral characteristic. Iris recognition is a
method of recognizing a person by analyzing the iris pattern.
This survey paper covers the different iris recognition techniques
and methods.
This document summarizes a study on iris segmentation and normalization techniques for iris recognition systems. It begins with an introduction to biometrics and iris recognition. It then describes the typical stages of an iris recognition system: segmentation, normalization, feature extraction and encoding, and matching. The document proposes improvements to earlier iris segmentation and normalization methods. It describes implementing Daugman's integro-differential operator for segmentation and his "rubber sheet" model for normalization. Experimental results on the CASIA iris image database show the segmentation, normalization, feature extraction and matching steps achieve an average hamming distance of 0.3486.
Iris segmentation analysis using integro differential operator and hough tran...Nadeer Abu Jraerr
This document presents a study on iris segmentation analysis using the integro-differential operator and Hough transform techniques in biometric systems. The study experiments with two iris segmentation techniques: the integro-differential operator and Hough transform. The Hough transform technique segmented iris images more successfully than the integro-differential operator, achieving a segmentation accuracy of 80.88% compared to 22.06% for the integro-differential operator. The Hough transform also had lower false rejection and recognition error rates. However, it has higher computational complexity than the integro-differential operator. The document concludes that the Hough transform technique resulted in better overall performance than the integro-differential operator for iris segmentation
The document proposes a unified framework for iris recognition that addresses challenges in unconstrained acquisition, robust matching, and privacy. It uses random projections and sparse representations to select good quality iris images, recognize iris patterns in a single step, and introduce cancelable templates for enhanced privacy without compromising security or recognition performance. Experimental results on public datasets demonstrate benefits of the proposed approach for robust and accurate iris recognition.
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...AM Publications
Biometric authentication scheme used for person identification. Biometric authentication scheme consists of
uniqueness for identifying human using physiological and behavioral characteristics. So this technique is used for
criminal identification and this technique is used in civil service areas. In order to provide security to the data (2, 2)
secret sharing scheme. Basically iris recognition is the most secured scheme. Visual cryptography is the techniques
that divide the secret into shares.
A Literature Review on Iris Segmentation Techniques for Iris Recognition SystemsIOSR Journals
This document reviews various techniques for iris segmentation in iris recognition systems. It discusses 8 techniques: (1) Integrodifferential operator, (2) Hough transform, (3) Masek method, (4) Fuzzy clustering algorithm, (5) Pulling and Pushing method, (6) Eight-neighbor connection based clustering, (7) Segmentation approach based on Fourier spectral density, and (8) Circular Gabor Filter. Each technique achieves some level of segmentation accuracy but also has disadvantages like high computational time, low accuracy, or poor performance on noisy images. The document concludes that a unified framework approach provides the highest overall segmentation accuracy for robustly segmenting iris images.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATIONsipij
There is considerable rise in the research of iris recognition system over a period of time. Most of the
researchers has been focused on the development of new iris pre-processing and recognition algorithms for
good quail iris images. In this paper, iris recognition system using Haar wavelet packet is presented.
Wavelet Packet Transform (WPT ) which is extension of discrete wavelet transform has multi-resolution
approach. In this iris information is encoded based on energy of wavelet packets.. Our proposed work
significantly decreases the error rate in recognition of noisy images. A comparison of this work with nonorthogonal Gabor wavelets method is done. Computational complexity of our work is also less as
compared to Gabor wavelets method.
IRDO: Iris Recognition by fusion of DTCWT and OLBPIJERA Editor
This document proposes a new iris recognition method called IRDO that fuses Dual Tree Complex Wavelet Transform (DTCWT) and Overlapping Local Binary Pattern (OLBP) features. DTCWT is used to extract micro-texture features from the iris, while OLBP enhances the extraction of edge features. Fusing these two methods results in improved matching performance and classification accuracy compared to state-of-the-the-art techniques. The proposed IRDO method achieves higher iris recognition rates as measured by Total Success Rate and Equal Error Rate.
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
Iris Recognition is a highly efficient biometric identification system with great possibilities for future in the
security systems area.Its robustness and unobtrusiveness, as opposed tomost of the currently deployed
systems, make it a good candidate to replace most of thesecurity systems around. By making use of the
distinctiveness of iris patterns, iris recognition systems obtain a unique mapping for each person.
Identification of this person is possible by applying appropriate matching algorithm.In this paper,
Daugman’s Rubber Sheet model is employed for irisnormalization and unwrapping, descriptive statistical
analysis of different feature detection operators is performed, features extracted is encoded using Haar
wavelets and for classification hammingdistance as a matching algorithm is used. The system was tested on
the UBIRIS database. The edge detection algorithm, Canny, is found to be the best one to extract most of
the iris texture. The success rate of feature detection using canny is 81%, False Accept Rate is 9% and
False Reject Rate is 10%.
A robust iris recognition method on adverse conditionsijcseit
As a stable biometric system, iris has recently attracted great attention among the researchers. However,
research is still needed to provide appropriate solutions to ensure the resistance of the system against error
factors. The present study has tried to apply a mask to the image so that the unexpected factors affecting
the location of the iris can be removed. So, pupil localization will be faster and robust. Then to locate the
exact location of the iris, a simple stage of boundary displacement due to the Canny edge detector has been
applied. Then, with searching left and right IRIS edge point, outer radios of IRIS will be detect. Through
the process of extracting the iris features, it has been sought to obtain the distinctive iris texture features by
using a discrete stationary wavelets transform 2-D (DSWT2). Using DSWT2 tool and symlet 4 wavelet,
distinctive features are extracted. To reduce the computational cost, the features obtained from the
application of the wavelet have been investigated and a feature selection procedure, using similarity
criteria, has been implemented. Finally, the iris matching has been performed using a semi-correlation
criterion. The accuracy of the proposed method for localization on CASIA-v1, CASIA-v3 is 99.73%,
98.24% and 97.04%, respectively. The accuracy of the feature extraction proposed method for CASIA3 iris
images database is 97.82%, which confirms the efficiency of the proposed method.
A Survey : Iris Based Recognition SystemsEditor IJMTER
The security is one of the important aspect of today's life. Iris recognization is one of the leading
research of security which is used to identify the individual person. Usually iris based biometric is more better
than other biometric in terms of accuracy, fast, stability, uniqueness. The iris recognition system works by
capturing and storing biometric information and then compare scanned copy of iris biometric with the stored iris
images in the database. There are several Iris Based Recognition Systems are developed so far. In this paper we
presented several iris techniques and create a base for our future roadmap.
Comparative Study of Lip Extraction Feature with Eye Feature Extraction Algor...Editor IJCATR
In recent time, along with the advances and new inventions in science and technology, fraud people and identity thieves are
also becoming smarter by finding new ways to fool the authorization and authentication process. So, there is a strong need of efficient
face recognition process or computer systems capable of recognizing faces of authenticated persons. One way to make face recognition
efficient is by extracting features of faces. This paper is to compare the relative efficiency of Lip Extraction and Eye extraction feature
for face recognition in biometric devices. Importance of this paper is to bring to the light which Feature Extraction method provides
better results under various conditions. For recognition experiments, I used face images of persons from different sets of YALE
database. In my dataset, there are total 132 images consisting of 11 persons & 12 face images of each person.
MULTI SCALE ICA BASED IRIS RECOGNITION USING BSIF AND HOG sipij
Iris is a physiological biometric trait, which is unique among all biometric traits to recognize person
effectively. In this paper we propose Multi-scale Independent Component Analysis (ICA) based Iris
Recognition using Binarized Statistical Image Features (BSIF) and Histogram of Gradient orientation
(HOG). The Left and Right portion is extracted from eye images of CASIA V 1.0 database leaving top and
bottom portion of iris. The multi-scale ICA filter sizes of 5X5, 7X7 and 17X17 are used to correlate with
iris template to obtain BSIF. The HOGs are applied on BSIFs to extract initial features. The final feature is
obtained by fusing three HOGs. The Euclidian Distance is used to compare the final feature of database
image with test image final features to compute performance parameters. It is observed that the
performance of the proposed method is better compared to existing methods.
This document presents a new iris segmentation method for iris recognition systems. The proposed method uses Canny edge detection and Hough transform to locate the iris boundary after finding the pupil boundary using image gray levels. Experiments on the CASIA iris image database of 756 images show the method can accurately detect the iris boundary in 99.2% of images. This is an improvement over other existing segmentation techniques. The key steps of the proposed method are preprocessing, segmentation using Canny edge detection and Hough transform, normalization using the rubber sheet model, feature encoding with Gabor wavelets, and matching with Hamming distance.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
Implementation of face and eye detection on DM6437 board using simulink modeljournalBEEI
Driver Assistance system is significant in drriver drowsiness to avoid on road accidents. The aim of this research work is to detect the position of driver’s eye for fatigue estimation. It is not unusual to see vehicles moving around even during the nights. In such circumstances there will be very high probability that a driver gets drowsy which may lead to fatal accidents. Providing a solution to this problem has become a motivating factor for this research, which aims at detecting driver fatigue. This research concentrates on locating the eye region failing which a warning signal is generated so as to alert the driver. In this paper, an efficient algorithm is proposed for detecting the location of an eye, which forms an invaluable insight for driver fatigue detection after the face detection stage. After detecting the eyes, eye tracking for input videos has to be achieved so that the blink rate of eyes can be determined.
1) The document presents a new face parts detection algorithm that combines the Viola-Jones object detection framework with geometric information of facial features.
2) It detects faces, then isolates regions of interest for the eyes, nose, and mouth. Eye pupils are located using iris recognition techniques.
3) The algorithm was tested on hundreds of images and showed promising results for automated facial feature detection.
IRJET- Survey on Face Detection MethodsIRJET Journal
The document reviews 15 papers on various face detection methods published between 2013 and 2018. It finds that the most popular feature extraction method is skin color segmentation, which achieves detection rates of 88-98%. The Viola-Jones method typically detects face regions as well as other body parts at a rate of 80-90%. Common face detection methods reviewed include skin color segmentation, Viola-Jones, Haar features, 3D mean shift, and Cascaded Head and Shoulder Detection. OpenCV, Python or MATLAB are typically used to implement real-time face detection systems.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
The document describes a proposed algorithm called Fusion of Hybrid Domain features for Iris Recognition (FHDIR).
The algorithm pre-processes iris images by resizing, binarization, cropping and splitting them. It then applies Fast Fourier Transform (FFT) to the left half of the iris image to extract features and applies Principal Component Analysis (PCA) to the right half to extract features. These feature sets are then fused using arithmetic addition to generate a final feature vector. Test iris features are compared to the database using Euclidean Distance for identification.
The proposed algorithm is evaluated on the CASIA iris database and is found to have better performance than existing algorithms in terms of false rejection rate, false acceptance rate, and true
IRJET-Unconstraint Eye Tracking on Mobile SmartphoneIRJET Journal
This document presents a study on developing an unconstrained eye tracking system using only the front camera of a mobile smartphone. It aims to create a low-cost eye tracking solution. The researchers designed techniques to detect faces, eyes and irises from camera images using Haar cascade classification and circular Hough transform. They tested the system under various conditions like lighting changes, wearing glasses, in dark environments, and while driving. The techniques were able to accurately detect eyes in different scenarios. The system has applications in areas like driving assistance systems and could be integrated into vehicles.
Abstract: This paper presents a new face parts information analyzer, as a promising model for detecting faces and locating the facial features in images. The main objective is to build fully automated human facial measurements systems from images with complex backgrounds. Detection of facial features such as eye, nose, and mouth is an important step for many subsequent facial image analysis tasks. The main study of face detection is detect the portion of part and mention the circle or rectangular of the every portion of body. In this paper face detection is depend upon the face pattern which is match the face from the pattern reorganization. The study present a novel and simple model approach based on a mixture of techniques and algorithms in a shared pool based on viola jones object detection framework algorithm combined with geometric and symmetric information of the face parts from the image in a smart algorithm.Keywords: Face detection, Video frames, Viola-Jones, Skin detection, Skin color classification, Face reorganization, Pattern reorganization. Skin Color.
Title: Face Detection Using Modified Viola Jones Algorithm
Author: Alpika Gupta, Dr. Rajdev Tiwari
International Journal of Recent Research in Mathematics Computer Science and Information Technology
ISSN 2350-1022
Paper Publications
Iris recognition is a method of biometric identification.
Biometric identification provides automatic recognition of an
individual based on the unique feature of physiological
characteristics or behavioral characteristic. Iris recognition is a
method of recognizing a person by analyzing the iris pattern.
This survey paper covers the different iris recognition techniques
and methods.
This document summarizes a study on iris segmentation and normalization techniques for iris recognition systems. It begins with an introduction to biometrics and iris recognition. It then describes the typical stages of an iris recognition system: segmentation, normalization, feature extraction and encoding, and matching. The document proposes improvements to earlier iris segmentation and normalization methods. It describes implementing Daugman's integro-differential operator for segmentation and his "rubber sheet" model for normalization. Experimental results on the CASIA iris image database show the segmentation, normalization, feature extraction and matching steps achieve an average hamming distance of 0.3486.
Iris segmentation analysis using integro differential operator and hough tran...Nadeer Abu Jraerr
This document presents a study on iris segmentation analysis using the integro-differential operator and Hough transform techniques in biometric systems. The study experiments with two iris segmentation techniques: the integro-differential operator and Hough transform. The Hough transform technique segmented iris images more successfully than the integro-differential operator, achieving a segmentation accuracy of 80.88% compared to 22.06% for the integro-differential operator. The Hough transform also had lower false rejection and recognition error rates. However, it has higher computational complexity than the integro-differential operator. The document concludes that the Hough transform technique resulted in better overall performance than the integro-differential operator for iris segmentation
The document proposes a unified framework for iris recognition that addresses challenges in unconstrained acquisition, robust matching, and privacy. It uses random projections and sparse representations to select good quality iris images, recognize iris patterns in a single step, and introduce cancelable templates for enhanced privacy without compromising security or recognition performance. Experimental results on public datasets demonstrate benefits of the proposed approach for robust and accurate iris recognition.
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...AM Publications
Biometric authentication scheme used for person identification. Biometric authentication scheme consists of
uniqueness for identifying human using physiological and behavioral characteristics. So this technique is used for
criminal identification and this technique is used in civil service areas. In order to provide security to the data (2, 2)
secret sharing scheme. Basically iris recognition is the most secured scheme. Visual cryptography is the techniques
that divide the secret into shares.
A Literature Review on Iris Segmentation Techniques for Iris Recognition SystemsIOSR Journals
This document reviews various techniques for iris segmentation in iris recognition systems. It discusses 8 techniques: (1) Integrodifferential operator, (2) Hough transform, (3) Masek method, (4) Fuzzy clustering algorithm, (5) Pulling and Pushing method, (6) Eight-neighbor connection based clustering, (7) Segmentation approach based on Fourier spectral density, and (8) Circular Gabor Filter. Each technique achieves some level of segmentation accuracy but also has disadvantages like high computational time, low accuracy, or poor performance on noisy images. The document concludes that a unified framework approach provides the highest overall segmentation accuracy for robustly segmenting iris images.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATIONsipij
There is considerable rise in the research of iris recognition system over a period of time. Most of the
researchers has been focused on the development of new iris pre-processing and recognition algorithms for
good quail iris images. In this paper, iris recognition system using Haar wavelet packet is presented.
Wavelet Packet Transform (WPT ) which is extension of discrete wavelet transform has multi-resolution
approach. In this iris information is encoded based on energy of wavelet packets.. Our proposed work
significantly decreases the error rate in recognition of noisy images. A comparison of this work with nonorthogonal Gabor wavelets method is done. Computational complexity of our work is also less as
compared to Gabor wavelets method.
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
Iris Recognition is a highly efficient biometric identification system with great possibilities for future in the security systems area.Its robustness and unobtrusiveness, as opposed tomost of the currently deployed systems, make it a good candidate to replace most of thesecurity systems around. By making use of the distinctiveness of iris patterns, iris recognition systems obtain a unique mapping for each person. Identification of this person is possible by applying appropriate matching algorithm.In this paper, Daugman’s Rubber Sheet model is employed for irisnormalization and unwrapping, descriptive statistical analysis of different feature detection operators is performed, features extracted is encoded using Haar wavelets and for classification hammingdistance as a matching algorithm is used. The system was tested on the UBIRIS database. The edge detection algorithm, Canny, is found to be the best one to extract most of the iris texture. The success rate of feature detection using canny is 81%, False Accept Rate is 9% and False Reject Rate is 10%.
A survey paper on various biometric security system methodsIRJET Journal
This document summarizes various biometric security systems for identification. It discusses fingerprint recognition, iris recognition, and face recognition methods. It provides an overview of different approaches that have been proposed, including using watermarking, edge detection techniques, adaptive boosting algorithms, and fuzzy logic. The document also analyzes the drawbacks of previous methods and proposes using a multimodal biometric system that fuses fingerprints, iris, and face for more secure identification. Overall, the document surveys different biometric identification techniques and highlights that a multimodal approach can help overcome limitations of individual methods.
Iris recognition based on 2D Gabor filterIJECEIAES
Iris recognition is a type of biometrics technology that is based on physiological features of the human body. The objective of this research is to recognize and identify iris among many irises that are stored in a visual database. This study employed a left and right iris biometric framework for inclusion decision processing by combining image processing and artificial bee colony. The proposed approach was evaluated on a visual database of 280 colored iris pictures. The database was then divided into 28 clusters. Images were preprocessed and texture features were extracted based Gabor filters to capture both local and global details within an iris. The technique begins by comparing the attributes of the online-obtained iris picture with those of the visual database. This technique either generates a reject or approve message. The consequences of the intended work reflect the output’s accuracy and integrity. This is due to the careful selection of attributes, besides the deployment of an artificial bee colony and data clustering, which decreased complexity and eventually increased identification rate to 100%. We demonstrate that the proposed method achieves state-of-the-art performance and that our recommended procedures outperform existing iris recognition systems.
A New Approach of Iris Detection and RecognitionIJECEIAES
This paper proposes an IRIS recognition and detection model for measuring the e-security. This proposed model consists of the following blocks: segmentation and normalization, feature encoding and feature extraction, and classification. In first phase, histogram equalization and canny edge detection is used for object detection. And then, Hough Transformation is utilized for detecting the center of the pupil of an IRIS. In second phase, Daugmen’s Rubber Sheet model and Log Gabor filter is used for normalization and encoding and as a feature extraction method GNS (Global Neighborhood Structure) map is used, finally extracted feature of GNS is feed to the SVM (Support Vector Machine) for training and testing. For our tested dataset, experimental results demonstrate 92% accuracy in real portion and 86% accuracy in imaginary portion for both eyes. In addition, our proposed model outperforms than other two conventional methods exhibiting higher accuracy.
IRJET- An Effective System to Detect Face Drowsiness Status using Local F...IRJET Journal
This document presents a system to detect driver drowsiness using local facial features and a hierarchical decision-making structure. The system calculates four parameters - closed eyes, open mouth, blink rate, and yawning rate - using image processing techniques. These parameters are prioritized using a harmony search algorithm and then fed into a neural network to detect drowsiness. The system was tested on the YawDD dataset and achieved a detection rate of 79-82%, outperforming previous methods by 4-14%.
Security for Identity Based Identification using Water Marking and Visual Cry...IRJET Journal
This document discusses using watermarking and visual cryptography for secure identity-based authentication. It proposes embedding an iris image using a watermarking algorithm and visual cryptography techniques for protection. Feature extraction and binomial distribution analysis are used to evaluate false acceptance and rejection rates to validate two algorithms, MASEK and Ma, for iris recognition on noisy images. The document also discusses discrete cosine transform (DCT) and discrete wavelet transform (DWT) techniques for image processing and compression in iris recognition systems.
IRJET - Facial Recognition based Attendance System with LBPHIRJET Journal
This document presents a facial recognition based attendance system using LBPH (Local Binary Pattern Histograms). It begins with an abstract describing the system which takes student attendance using facial identification from classroom camera images. It then discusses related work in attendance and face recognition systems. The proposed system workflow is described involving face detection, feature extraction using LBPH, template matching, and attendance recording. Experimental results demonstrate the system's ability to detect multiple faces and record attendance accurately in an Excel sheet with date/time. The conclusion discusses how the system reduces human effort for attendance and increases learning time compared to traditional methods.
Face Recognition Smart Attendance System: (InClass System)IRJET Journal
- The document describes a face recognition system called "InClass" to automate student attendance tracking. It aims to address issues with traditional manual attendance systems like being inaccurate, time-consuming, and difficult to maintain.
- The InClass system uses a CNN face detector to detect and identify students' faces from images captured with a camera. It can handle variations in lighting, angles, and occlusions. Matching faces to a database allows for automated attendance marking.
- The system aims to simplify the attendance process, reduce time and errors compared to existing biometric systems, and make attendance records easily accessible and storable digitally rather than on paper.
This document describes a technique for human iris recognition for biometric identification. It involves 6 major steps: image acquisition, localization, isolation, normalization, feature extraction, and matching. The iris is localized by detecting the pupil and outer iris boundaries using techniques like Canny edge detection and Hough transforms. The iris region is then isolated using masking. It is normalized and represented as a fixed-sized block. Features are extracted using techniques like Gabor filters and Haar wavelets to generate biometric templates. Templates are matched using Hamming distance to identify individuals in applications like border control, computer login, and financial transactions. The iris has properties that make it suitable and accurate for identification compared to other biometrics.
This document discusses various soft computing techniques for iris recognition, specifically focusing on two neural network approaches: Competitive neural network Learning Vector Quantization (LVQ) and Adaptive Resonance Associative Map (ARAM). It provides an overview of iris recognition as a biometric method, summarizes preprocessing steps like localization, segmentation, and normalization of iris images. It also describes feature extraction and matching steps. Finally, it defines artificial neural networks and discusses how LVQ and ARAM can be used for pattern matching in iris recognition applications.
This document proposes an efficient method for personal identification using iris recognition. It presents a new approach to creating a compact feature vector using wavelet transforms. It also introduces two mechanisms to improve a competitive learning method: initializing weight vectors uniformly and selecting winners based on multiple dimensions. Experimental results showed the proposed system could identify people efficiently and effectively.
This document summarizes an article that presents two methods for iris segmentation: 1) An automatic segmentation method that uses circular Hough transform to locate the iris boundaries and normalize the iris region using rubber sheet modeling. 2) A window technique that first finds the pupil's center and then detects edges on imaginary lines passing through the pupil center to segment the iris boundaries. Experiments showed the automatic method achieved 84% accuracy for pupil boundary detection while the window technique achieved 99% accuracy for pupil boundary detection and 79% accuracy for iris edge detection.
This document summarizes an article that presents two methods for iris segmentation: 1) An automatic segmentation method that uses circular Hough transform to locate the iris boundaries and normalize the iris region using rubber sheet modeling. This method achieves 84% accuracy. 2) A window technique that first finds the pupil center using thresholding and chain coding, then extracts information along radial lines from the pupil center to locate edges, achieving 99% accuracy for pupil boundary detection and 79% for iris edges. The document provides details on each step of the automatic segmentation method and explains the window technique at a high level.
An improved bovine_iris_segmentation_methodNoura Gomaa
The document proposes an improved method for bovine iris segmentation that detects the inner and outer edges of the iris through dynamic contour tracking and least squares ellipse fitting. It then normalizes and enhances the segmented iris region. Experimental results show the algorithm effectively segments the iris region and promotes iris feature extraction and matching, with benefits for meat food safety management.
IRJET - Human Eye Pupil Detection Technique using Center of Gravity MethodIRJET Journal
This document presents a pupil detection technique using the center of gravity method. It first applies Gaussian filtering, double thresholding, and morphological closing to an eye image to isolate the pupil region. It then uses the center of gravity method to calculate the x and y coordinates of the pupil center by dividing the total pixel values in each dimension by the total number of black pixels. Experimental results on the CASIA iris database demonstrate the accuracy of the proposed computationally efficient pupil detection method. A hardware implementation of the technique is also presented, which could be used for real-time iris localization in biometric recognition applications.
Secure System based on Dynamic Features of IRIS Recognitionijsrd.com
Basically, the idea behind this system is improvement in cybernetics, the biometric person identification technique based on the pattern of the human iris is well suited to be applied to access control. The human eye is sensitive to visible light. Security systems having realized the value of biometrics for two basic purposes: to verify or identify users. In this busy world, identification should be fast and efficient. In this paper I focus on an efficient methodology for identification and verification for iris detection using Haar transform and Minimum hamming distance. I use canny operator for the edge detection. This biological phenomenon contracts and dilates the two pupils synchronously when illuminating one of the eyes by visible light .I applied the Haar wavelet compressing the data. By comparing the quantized vectors using the Hamming Distance operator, we determine finally whether two irises are similar. The result shows that system is quite effective.
This document summarizes a research paper that presents a system for automatically counting faces in a classroom using MATLAB. The system first uses frame differencing and morphological processing to detect moving objects and edges. It then applies skin color detection and face feature detection to identify and count human faces in real-time video frames. The system was tested in a classroom environment and achieved accurate counts of students present. It provides an automated alternative to manual counting that saves teacher time and ensures accurate attendance records.
Similar to IRJET- Survey of Iris Recognition Techniques (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Design and optimization of ion propulsion dronebjmsejournal
Electric propulsion technology is widely used in many kinds of vehicles in recent years, and aircrafts are no exception. Technically, UAVs are electrically propelled but tend to produce a significant amount of noise and vibrations. Ion propulsion technology for drones is a potential solution to this problem. Ion propulsion technology is proven to be feasible in the earth’s atmosphere. The study presented in this article shows the design of EHD thrusters and power supply for ion propulsion drones along with performance optimization of high-voltage power supply for endurance in earth’s atmosphere.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.