Latent fingerprints lifted from crime scenes often contain overlapping prints, which are
difficult to separate and match by state-of-the-art fingerprint matchers. The methods that have been
proposed to separate overlapping fingerprints and successful matching previously suffer from limited
accuracy of the estimated orientation field. In this paper, the robustness of overlapping fingerprints
separation is increased, particularly for low quality images. This algorithm reconstructs the
orientation fields of component prints by modeling fingerprint orientation fields. To facilitate this,
orientation cues of component fingerprints are utilized, which are manually marked by fingerprint
examiners. The effectiveness of this model has been evaluated.
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...IJCI JOURNAL
Fingerprint recognition is a promising factor for the Biometric Identification and authentication process.
Fingerprints are broadly used for personal identification due to its feasibility, distinctiveness, permanence,
accuracy and acceptability. This paper proposes a way to improve the Equal Error Rate (EER) in
fingerprint matching techniques in the domain of hybrid shape and orientation descriptor. This type of
fingerprint matching domain is popular due to capability of filtering false and strange minutiae pairings.
EER is calculated by using FMR and FNMR to check the performance of proposed technique.
DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NNIJCSEIT Journal
Scanning baggage by x-ray and analysing such images have become important technique for detecting
illicit materials in the baggage at Airports. In order to provide adequate security, a reliable and fast
screening technique is needed for baggage examination.This paper aims at providing an automatic method
for detecting concealed weapons, typically a gun in the baggage by employing image segmentation method
to extract the objects of interest from the image followed by applying feature extraction methods namely
Shape context descriptor and Zernike moments. Finally the objects are classified using fuzzy KNN as illicit
or non-illicit object.
Multiple features based fingerprint identification systemeSAT Journals
Abstract Security has become major issue now a day. In order to prevent unauthorized access of confidential data there is a need for accurate and reliable personal identification system. So, biometric based identification system is one of the best solutions. Fingerprint based system is one of oldest biometric identification systems. It is used in many commercial and security applications. Even with advent of technology in fingerprint identification system, the accurate extraction and matching of features from a fingerprint image is a challenging task. The task is much more challenging when fingerprint is affected by non-linear deformations such as rotation and translation. In this paper, fingerprint identification system using improved feature vector based algorithm is presented. In the algorithm Gabor filter is implemented to enhance the fingerprint image. The salient features minutiae (ridge endings) and reference point are extracted from the image. The Euclidian distances between reference point and each minutiae point are calculated and are arranged in ascending order. These are stored in database as feature vectors. The fingerprint matching is done based on the similarity rate between the feature vector of input fingerprint and the feature vectors stored in the database. Algorithms are implemented using Visual Studio 2010 in C++ language using Open CV libraries and tested on the fingerprint database created in the laboratory. Key Words: Fingerprint, Minutiae, Reference point, Euclidian distance, Similarity rate, Identification
An efficient method for recognizing the low quality fingerprint verification ...IJCI JOURNAL
In this paper, we propose an efficient method to provide personal identification using fingerprint to get better accuracy even in noisy condition. The fingerprint matching based on the number of corresponding minutia pairings, has been in use for a long time, which is not very efficient for recognizing the low quality fingerprints. To overcome this problem, correlation technique is used. The correlation-based fingerprint verification system is capable of dealing with low quality images from which no minutiae can be extracted reliably and with fingerprints that suffer from non-uniform shape distortions, also in case of damaged and partial images. Orientation Field Methodology (OFM) has been used as a preprocessing module, and it converts the images into a field pattern based on the direction of the ridges, loops and bifurcations in the image of a fingerprint. The input image is then Cross Correlated (CC) with all the images in the cluster and the highest correlated image is taken as the output. The result gives a good recognition rate, as the proposed scheme uses Cross Correlation of Field Orientation (CCFO = OFM + CC) for fingerprint identification.
A Novel Approach to Fingerprint Identification Using Gabor Filter-BankIDES Editor
Fingerprint Identification is a widely used Biometric
Identification mechanism. Up till now different techniques
have been proposed for having satisfactory Fingerprint
Identification. The widely used minutiae-based representation
did not utilize a significant component of the rich
discriminatory information available in the fingerprints. Local
ridge structures could not be completely characterized by
minutiae. The proposed filter-based algorithm uses a bank of
Gabor filters to capture both local and global details in a
fingerprint as a compact fixed length Finger Code. The
Fingerprint Identification is based on the Euclidean distance
between the two corresponding Finger Codes and hence is
extremely fast and accurate than the minutiae based one.
Accuracy of the system is 98.22%.
This paper introduces the implementation of fingerprint matching Minutiae Algorithm for Fingerprint
Matching. These algorithm increases the reliability accuracy of the fingerprint matching. The proposed method was
evaluated by means of experiment conducted on the FVC2002, FVC2004 database. Experimental results confirm
that the taking time of the fingerprint image matching is very less than the other methods. This algorithm is very
effective algorithm for the identification of fingerprint image.
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...IJCI JOURNAL
Fingerprint recognition is a promising factor for the Biometric Identification and authentication process.
Fingerprints are broadly used for personal identification due to its feasibility, distinctiveness, permanence,
accuracy and acceptability. This paper proposes a way to improve the Equal Error Rate (EER) in
fingerprint matching techniques in the domain of hybrid shape and orientation descriptor. This type of
fingerprint matching domain is popular due to capability of filtering false and strange minutiae pairings.
EER is calculated by using FMR and FNMR to check the performance of proposed technique.
DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NNIJCSEIT Journal
Scanning baggage by x-ray and analysing such images have become important technique for detecting
illicit materials in the baggage at Airports. In order to provide adequate security, a reliable and fast
screening technique is needed for baggage examination.This paper aims at providing an automatic method
for detecting concealed weapons, typically a gun in the baggage by employing image segmentation method
to extract the objects of interest from the image followed by applying feature extraction methods namely
Shape context descriptor and Zernike moments. Finally the objects are classified using fuzzy KNN as illicit
or non-illicit object.
Multiple features based fingerprint identification systemeSAT Journals
Abstract Security has become major issue now a day. In order to prevent unauthorized access of confidential data there is a need for accurate and reliable personal identification system. So, biometric based identification system is one of the best solutions. Fingerprint based system is one of oldest biometric identification systems. It is used in many commercial and security applications. Even with advent of technology in fingerprint identification system, the accurate extraction and matching of features from a fingerprint image is a challenging task. The task is much more challenging when fingerprint is affected by non-linear deformations such as rotation and translation. In this paper, fingerprint identification system using improved feature vector based algorithm is presented. In the algorithm Gabor filter is implemented to enhance the fingerprint image. The salient features minutiae (ridge endings) and reference point are extracted from the image. The Euclidian distances between reference point and each minutiae point are calculated and are arranged in ascending order. These are stored in database as feature vectors. The fingerprint matching is done based on the similarity rate between the feature vector of input fingerprint and the feature vectors stored in the database. Algorithms are implemented using Visual Studio 2010 in C++ language using Open CV libraries and tested on the fingerprint database created in the laboratory. Key Words: Fingerprint, Minutiae, Reference point, Euclidian distance, Similarity rate, Identification
An efficient method for recognizing the low quality fingerprint verification ...IJCI JOURNAL
In this paper, we propose an efficient method to provide personal identification using fingerprint to get better accuracy even in noisy condition. The fingerprint matching based on the number of corresponding minutia pairings, has been in use for a long time, which is not very efficient for recognizing the low quality fingerprints. To overcome this problem, correlation technique is used. The correlation-based fingerprint verification system is capable of dealing with low quality images from which no minutiae can be extracted reliably and with fingerprints that suffer from non-uniform shape distortions, also in case of damaged and partial images. Orientation Field Methodology (OFM) has been used as a preprocessing module, and it converts the images into a field pattern based on the direction of the ridges, loops and bifurcations in the image of a fingerprint. The input image is then Cross Correlated (CC) with all the images in the cluster and the highest correlated image is taken as the output. The result gives a good recognition rate, as the proposed scheme uses Cross Correlation of Field Orientation (CCFO = OFM + CC) for fingerprint identification.
A Novel Approach to Fingerprint Identification Using Gabor Filter-BankIDES Editor
Fingerprint Identification is a widely used Biometric
Identification mechanism. Up till now different techniques
have been proposed for having satisfactory Fingerprint
Identification. The widely used minutiae-based representation
did not utilize a significant component of the rich
discriminatory information available in the fingerprints. Local
ridge structures could not be completely characterized by
minutiae. The proposed filter-based algorithm uses a bank of
Gabor filters to capture both local and global details in a
fingerprint as a compact fixed length Finger Code. The
Fingerprint Identification is based on the Euclidean distance
between the two corresponding Finger Codes and hence is
extremely fast and accurate than the minutiae based one.
Accuracy of the system is 98.22%.
This paper introduces the implementation of fingerprint matching Minutiae Algorithm for Fingerprint
Matching. These algorithm increases the reliability accuracy of the fingerprint matching. The proposed method was
evaluated by means of experiment conducted on the FVC2002, FVC2004 database. Experimental results confirm
that the taking time of the fingerprint image matching is very less than the other methods. This algorithm is very
effective algorithm for the identification of fingerprint image.
The International Journal of Engineering and Science (IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
A Novel Approach for Detection of Fingerprint by Constructing Relational Grap...IDES Editor
Fingerprint is the dominant trait between different
biometrics like iris, retina, and face. A fingerprint is the
pattern of ridges and valleys on the surface on a fingertip.
Now days itself this method is very powerful because of their
immutability and uniqueness of patterns .immutability means
the patterns by ridges and valleys are permanent and
unchanged. Many techniques have been proposed for pattern
recognition in fingerprint, most of them being based on
minutiae and singular point. In the singular points method
we are extracting the core, delta, arch and whorl points. In
human fingerprint, it may contain more than one core point
or delta point by . By using these points we can construct a
graphical shape that is used for fingerprint identification. So
the whole image storing in database is replaced by some shape
or values. According to the position of each point the graphical
shape for each person is different from others, so comparing
with this shape can identify each person.
Object Capturing In A Cluttered Scene By Using Point Feature MatchingIJERA Editor
Capturing means getting or catching. This project contains an algorithm for capturing a specific target based on the points which corresponds between reference and target image. It can capture the objects in-plane rotation and also effective to small amount of out-of plane rotation also. This method of object capturing works best for objects that exhibit in a cluttered texture patterns, which give rise to unique point feature matches. When a part of object is occluded by other objects in the scene, only features of that part are missed. As long as there are enough features detected in the unoccluded part, the object can captured. The local representation is based on the appearance. There is no need to extract geometric primitives (e.g. lines) which are generally hard to detect reliably.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Enhanced Thinning Based Finger Print RecognitionIJCI JOURNAL
This paper is the implementation of fingerprint recognition system in which the matching is done using the
Minutiae points. The methodology is the extracting & applying matching procedure on the Minutiae points
between the sample fingerprint & fingerprint under question. The main functional blocks of this system
follows steps of Image Thinning, Image Segmentation, Minutiae (feature) point Extraction, & Minutiae
point Matching. The procedure of Enhanced Thinning included for the purpose of decreasing the size of the
memory space used by the fingerprint image database.
Offline Signiture and Numeral Recognition in Context of ChequeIJERA Editor
Signature is considered as one of the biometrics. Signature Verification System is required in almost all places where it is compulsory to authenticate a person or his/her credentials to proceed further transaction especially when it comes to bank cheques. For this purpose signature verification system must be powerful and accurate. Till date various methods have been used to make signature verification system powerful and accurate. Research here is related to offline signature verification. Shape Contexts have been used to verify whether 2 shapes are similar or not. It has been used for various applications such as digit recognition, 3D Object recognition, trademark retrieval etc. In this paper we present a modified version of shape context for signature verification on bank cheques using K-Nearest Neighbor classifier.
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLABAM Publications
Signature verification and recognition is a technology that can improve security in our day to day
transaction held in society. This paper presents a novel approach for offline signature verification. In this paper
offline signature verification using neural network is projected, where the signature is written on a paper are
obtained using a scanner or a camera captured and presented in an image format. For authentication of
signature, the proposed method is based on geometrical and statistical feature extraction and then the entire
database, features are trained using neural network .The extracted features of investigation signature are
compared with the previously trained features of the reference signature. This technique is suitable for various
applications such as bank transactions, passports with good authentication results etc
License plate recognition for toll payment applicationeSAT Journals
Abstract Automatic License Plate Recognition (ALPR) is the method for the extraction of vehicle license plate information from images. It can be used on various applications such as Pay-Per -Use roads (Electronic Toll Collection), Parking lots and arterial traffic conditions monitoring. Automatic License Plate Recognition uses infrared cameras to capture images under varied lighting and weather conditions. The objective of this paper is to implement K-Means Clustering Algorithm for License plate extraction & Maximally stable extreme region for license plate segmentation , Template matching method for license plate recognition & also payment in toll plaza and parking lots automatically by detecting the number plates of vehicles which in turn reduce the traffic and consumption of time in toll stations. Keywords: Automatic License Plate Recognition (ALPR), Maximally Stable Extreme Region (MSER), Template matching, and Character Recognition
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Enhanced Latent Fingerprint Segmentation through Dictionary Based ApproachEditor IJMTER
The accuracy of latent finger print matching compared to roll and plain finger print
matching is significantly lower due to background noise, poor ridge quality and overlapping
structured noise in latent images. In this paper the proposed algorithm is dictionary-based approach
for automatic segmentation and enhancement towards the goal of achieving “lights out” latent
identifications system. Total variation decomposition model with L1 fidelity regularization in latent
finger print image remove background noise. A coarse to fine strategy is used to improve robustness
and accuracy. It improves the computational efficiency of the algorithm.
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...IJECEIAES
The field of biometrics has evolved tremendously for over the last century. Yet scientists are still continuing to come up with precise and efficient algorithms to facilitate automatic fingerprint recognition systems. Like other applications, an efficient feature extraction method plays an important role in fingerprint based recognition systems. This paper proposes a novel feature extraction method using minutiae points of a fingerprint image and their intersections. In this method, initially, it calculates the ridge ends and ridge bifurcations of each fingerprint image. And then, it estimates the minutiae points for the intersection of each ridge end and ridge bifurcation. In the experimental evaluation, we tested the extracted features of our proposed model using a support vector machine (SVM) classifier and experimental results show that the proposed method can accurately classify different fingerprint images.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Enhanced Thinning Based Finger Print RecognitionIJCI JOURNAL
This paper is the implementation of fingerprint recognition system in which the matching is done using the Minutiae points. The methodology is the extracting & applying matching procedure on the Minutiae points between the sample fingerprint & fingerprint under question. The main functional blocks of this system follows steps of Image Thinning, Image Segmentation, Minutiae (feature) point Extraction, & Minutiae point Matching. The procedure of Enhanced Thinning included for the purpose of decreasing the size of the memory space used by the fingerprint image database.
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...IJCSES Journal
Automatic Fingerprint authentication for personal identification and verification has received considerable
attention over the past decades among various biometric techniques because of the distinctiveness and
persistence properties of fingerprints. Now fingerprints are set to explode in popularity as they are being
used to secure smart phones and to authorize payments in online stores. The main objective of this paper is
to review the extensive research work that has been done over the past decade and discuss the various
approaches proposed for fingerprint matching. The proposed methods were based on 2D correlation in the
spatial and frequency domains, Artificial Neural Networks, Hough transform, Fourier transform, graphs,
local texture, ridge geometry etc. All these different techniques have their pros and cons. This paper also
provides the performance comparison of several existing methods proposed by researchers in fing
Detection and rectification of distorted fingerprintsCloudTechnologies
We are the company providing Complete Solution for all Academic Final Year/Semester Student Projects. Our projects are
suitable for B.E (CSE,IT,ECE,EEE), B.Tech (CSE,IT,ECE,EEE),M.Tech (CSE,IT,ECE,EEE) B.sc (IT & CSE), M.sc (IT & CSE),
MCA, and many more..... We are specialized on Java,Dot Net ,PHP & Andirod technologies. Each Project listed comes with
the following deliverable: 1. Project Abstract 2. Complete functional code 3. Complete Project report with diagrams 4.
Database 5. Screen-shots 6. Video File
SERVICE AT CLOUDTECHNOLOGIES
IEEE, WEB, WINDOWS PROJECTS ON DOT NET, JAVA& ANDROID TECHNOLOGIES,EMBEDDED SYSTEMS,MAT LAB,VLSI DESIGN.
ME, M-TECH PAPER PUBLISHING
COLLEGE TRAINING
Thanks&Regards
cloudtechnologies
# 304, Siri Towers,Behind Prime Hospitals
Maitrivanam, Ameerpet.
Contact:-8121953811,8522991105.040-65511811
cloudtechnologiesprojects@gmail.com
http://cloudstechnologies.in/
The International Journal of Engineering and Science (IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
A Novel Approach for Detection of Fingerprint by Constructing Relational Grap...IDES Editor
Fingerprint is the dominant trait between different
biometrics like iris, retina, and face. A fingerprint is the
pattern of ridges and valleys on the surface on a fingertip.
Now days itself this method is very powerful because of their
immutability and uniqueness of patterns .immutability means
the patterns by ridges and valleys are permanent and
unchanged. Many techniques have been proposed for pattern
recognition in fingerprint, most of them being based on
minutiae and singular point. In the singular points method
we are extracting the core, delta, arch and whorl points. In
human fingerprint, it may contain more than one core point
or delta point by . By using these points we can construct a
graphical shape that is used for fingerprint identification. So
the whole image storing in database is replaced by some shape
or values. According to the position of each point the graphical
shape for each person is different from others, so comparing
with this shape can identify each person.
Object Capturing In A Cluttered Scene By Using Point Feature MatchingIJERA Editor
Capturing means getting or catching. This project contains an algorithm for capturing a specific target based on the points which corresponds between reference and target image. It can capture the objects in-plane rotation and also effective to small amount of out-of plane rotation also. This method of object capturing works best for objects that exhibit in a cluttered texture patterns, which give rise to unique point feature matches. When a part of object is occluded by other objects in the scene, only features of that part are missed. As long as there are enough features detected in the unoccluded part, the object can captured. The local representation is based on the appearance. There is no need to extract geometric primitives (e.g. lines) which are generally hard to detect reliably.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Enhanced Thinning Based Finger Print RecognitionIJCI JOURNAL
This paper is the implementation of fingerprint recognition system in which the matching is done using the
Minutiae points. The methodology is the extracting & applying matching procedure on the Minutiae points
between the sample fingerprint & fingerprint under question. The main functional blocks of this system
follows steps of Image Thinning, Image Segmentation, Minutiae (feature) point Extraction, & Minutiae
point Matching. The procedure of Enhanced Thinning included for the purpose of decreasing the size of the
memory space used by the fingerprint image database.
Offline Signiture and Numeral Recognition in Context of ChequeIJERA Editor
Signature is considered as one of the biometrics. Signature Verification System is required in almost all places where it is compulsory to authenticate a person or his/her credentials to proceed further transaction especially when it comes to bank cheques. For this purpose signature verification system must be powerful and accurate. Till date various methods have been used to make signature verification system powerful and accurate. Research here is related to offline signature verification. Shape Contexts have been used to verify whether 2 shapes are similar or not. It has been used for various applications such as digit recognition, 3D Object recognition, trademark retrieval etc. In this paper we present a modified version of shape context for signature verification on bank cheques using K-Nearest Neighbor classifier.
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLABAM Publications
Signature verification and recognition is a technology that can improve security in our day to day
transaction held in society. This paper presents a novel approach for offline signature verification. In this paper
offline signature verification using neural network is projected, where the signature is written on a paper are
obtained using a scanner or a camera captured and presented in an image format. For authentication of
signature, the proposed method is based on geometrical and statistical feature extraction and then the entire
database, features are trained using neural network .The extracted features of investigation signature are
compared with the previously trained features of the reference signature. This technique is suitable for various
applications such as bank transactions, passports with good authentication results etc
License plate recognition for toll payment applicationeSAT Journals
Abstract Automatic License Plate Recognition (ALPR) is the method for the extraction of vehicle license plate information from images. It can be used on various applications such as Pay-Per -Use roads (Electronic Toll Collection), Parking lots and arterial traffic conditions monitoring. Automatic License Plate Recognition uses infrared cameras to capture images under varied lighting and weather conditions. The objective of this paper is to implement K-Means Clustering Algorithm for License plate extraction & Maximally stable extreme region for license plate segmentation , Template matching method for license plate recognition & also payment in toll plaza and parking lots automatically by detecting the number plates of vehicles which in turn reduce the traffic and consumption of time in toll stations. Keywords: Automatic License Plate Recognition (ALPR), Maximally Stable Extreme Region (MSER), Template matching, and Character Recognition
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Enhanced Latent Fingerprint Segmentation through Dictionary Based ApproachEditor IJMTER
The accuracy of latent finger print matching compared to roll and plain finger print
matching is significantly lower due to background noise, poor ridge quality and overlapping
structured noise in latent images. In this paper the proposed algorithm is dictionary-based approach
for automatic segmentation and enhancement towards the goal of achieving “lights out” latent
identifications system. Total variation decomposition model with L1 fidelity regularization in latent
finger print image remove background noise. A coarse to fine strategy is used to improve robustness
and accuracy. It improves the computational efficiency of the algorithm.
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...IJECEIAES
The field of biometrics has evolved tremendously for over the last century. Yet scientists are still continuing to come up with precise and efficient algorithms to facilitate automatic fingerprint recognition systems. Like other applications, an efficient feature extraction method plays an important role in fingerprint based recognition systems. This paper proposes a novel feature extraction method using minutiae points of a fingerprint image and their intersections. In this method, initially, it calculates the ridge ends and ridge bifurcations of each fingerprint image. And then, it estimates the minutiae points for the intersection of each ridge end and ridge bifurcation. In the experimental evaluation, we tested the extracted features of our proposed model using a support vector machine (SVM) classifier and experimental results show that the proposed method can accurately classify different fingerprint images.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Enhanced Thinning Based Finger Print RecognitionIJCI JOURNAL
This paper is the implementation of fingerprint recognition system in which the matching is done using the Minutiae points. The methodology is the extracting & applying matching procedure on the Minutiae points between the sample fingerprint & fingerprint under question. The main functional blocks of this system follows steps of Image Thinning, Image Segmentation, Minutiae (feature) point Extraction, & Minutiae point Matching. The procedure of Enhanced Thinning included for the purpose of decreasing the size of the memory space used by the fingerprint image database.
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...IJCSES Journal
Automatic Fingerprint authentication for personal identification and verification has received considerable
attention over the past decades among various biometric techniques because of the distinctiveness and
persistence properties of fingerprints. Now fingerprints are set to explode in popularity as they are being
used to secure smart phones and to authorize payments in online stores. The main objective of this paper is
to review the extensive research work that has been done over the past decade and discuss the various
approaches proposed for fingerprint matching. The proposed methods were based on 2D correlation in the
spatial and frequency domains, Artificial Neural Networks, Hough transform, Fourier transform, graphs,
local texture, ridge geometry etc. All these different techniques have their pros and cons. This paper also
provides the performance comparison of several existing methods proposed by researchers in fing
Detection and rectification of distorted fingerprintsCloudTechnologies
We are the company providing Complete Solution for all Academic Final Year/Semester Student Projects. Our projects are
suitable for B.E (CSE,IT,ECE,EEE), B.Tech (CSE,IT,ECE,EEE),M.Tech (CSE,IT,ECE,EEE) B.sc (IT & CSE), M.sc (IT & CSE),
MCA, and many more..... We are specialized on Java,Dot Net ,PHP & Andirod technologies. Each Project listed comes with
the following deliverable: 1. Project Abstract 2. Complete functional code 3. Complete Project report with diagrams 4.
Database 5. Screen-shots 6. Video File
SERVICE AT CLOUDTECHNOLOGIES
IEEE, WEB, WINDOWS PROJECTS ON DOT NET, JAVA& ANDROID TECHNOLOGIES,EMBEDDED SYSTEMS,MAT LAB,VLSI DESIGN.
ME, M-TECH PAPER PUBLISHING
COLLEGE TRAINING
Thanks&Regards
cloudtechnologies
# 304, Siri Towers,Behind Prime Hospitals
Maitrivanam, Ameerpet.
Contact:-8121953811,8522991105.040-65511811
cloudtechnologiesprojects@gmail.com
http://cloudstechnologies.in/
Hybrid fingerprint matching algorithm for high accuracy and reliabilityeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet TransformAM Publications
Fingerprint recognition is one of the methods used in biometric system. Most of the biometric systems which are used for human identification or person’s identification. In this paper we are discussing minutiae matching and discrete wavelet transform and comparison of these two in fingerprint recognition. In this paper, firstly it uses fingerprint identification and performance in terms of equal error rate and then by calculating using discrete wavelet transform. The main aim of this paper is to create performing and accurate program for fingerprint identification.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Multibiometric systems are expected to be more reliable than unimodal biometric systems for personal identification due to the presence of multiple, fairly independent pieces of evidence e.g. Unique Identification Project "Aadhaar" of Government of India. In this paper, we present a novel wavelet based technique to perform fusion at the feature level and score level by considering two biometric modalities, face and fingerprint. The results indicate that the proposed technique can lead to substantial improvement in multimodal matching performance. The proposed technique is simple because of no preprocessing of raw biometric traits as well as no feature and score normalization.
Multi-feature Fusion Using SIFT and LEBP for Finger Vein RecognitionTELKOMNIKA JOURNAL
In this paper, multi-feature fusion using Scale Invariant Feature Transform (SIFT) and Local
Extensive Binary Pattern (LEBP) was proposed to obtain a feature that could resist degradation problems
such as scaling, rotation, translation and varying illumination conditions. SIFT feature had a capability to
withstand degradation due to changes in the condition of the image scale, rotation and translation.
Meanwhile, LEBP feature had resistance to gray level variations with richer and discriminatory local
characteristics information. Therefore the fusion technique is used to collect important information from
SIFT and LEBP feature.The resulting feature of multi-feature fusion using SIFT and LEBP feature would be
processed by Learning Vector Quantization (LVQ) method to determine whether the testing image could
be recognized or not. The accuracy value could achieve 97.50%, TPR at 0.9400 and FPR at 0.0128 in
optimum condition. That was a better result than only use SIFT or LEBP feature.
DCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITYIAEME Publication
This Research paper discusses the study and analysis conducted during this research on various techniques in biometric domain. A close glance on biometric enhancement techniques and their limitations are presented in this research paper. This process would enable researcher to understand the research contributions in the area of DCT and DFT based recognition and security, locate some crucial limitations of these notable research. This paper having summary about the different research papers that applicable to our topic of research which mentioned above. Biometric Recognition and security is a most important subject of research in this area of image processing.
We propose an image-based method using Contourlet transform [5] to detect liveness in fingerprint biometric systems. We observe that real and spoof fingerprint images exhibit
different textural characteristics. Wavelet transform although widely used for liveness detection is not the ideal one. Wavelets are not very effective in representing images containing lines and contours [5]. Recent Contourlet transform allows representing contours in a more efficient way than the wavelets [5]. Fingerprint is made of only contours of ridges; hence Contourlet transform is more suitable for fingerprint processing than the wavelets. Therefore, we use Contourlet energy and co-occurrence signatures to capture textural intricacies of images. After downsizing features with Plus l – take away r method, we test them on various classifiers: logistic regression, support vector machine and AdTree using our databases consisting of 185real, 90 Fun-Doh (Play-Doh) and 150 Gummy fingerprint images. We then select the best classifier and use at as a base classifier to form an ensemble classifier obtained by fusing a
stack of “K” base classifiers using the “Majority Voting Rule” (i.e. bagging). Experimentalresults indicate that, the new liveness detection approach is very promising as it needs only one
fingerprint and no extra hardware to detect vitality
We propose an image-based method using Contourlet transform [5] to detect liveness in
fingerprint biometric systems. We observe that real and spoof fingerprint images exhibit
different textural characteristics. Wavelet transform although widely used for liveness detection
is not the ideal one. Wavelets are not very effective in representing images containing lines and
contours [5]. Recent Contourlet transform allows representing contours in a more efficient way
than the wavelets [5]. Fingerprint is made of only contours of ridges; hence Contourlet
transform is more suitable for fingerprint processing than the wavelets. Therefore, we use
Contourlet energy and co-occurrence signatures to capture textural intricacies of images. After
downsizing features with Plus l – take away r method, we test them on various classifiers:
logistic regression, support vector machine and AdTree using our databases consisting of 185
real, 90 Fun-Doh (Play-Doh) and 150 Gummy fingerprint images. We then select the best
classifier and use at as a base classifier to form an ensemble classifier obtained by fusing a
stack of “K” base classifiers using the “Majority Voting Rule” (i.e. bagging). Experimental
results indicate that, the new liveness detection approach is very promising as it needs only one
fingerprint and no extra hardware to detect vitality
Similar to Separation of overlapping latent fingerprints (20)
Submission Deadline: 30th September 2022
Acceptance Notification: Within Three Days’ time period
Online Publication: Within 24 Hrs. time Period
Expected Date of Dispatch of Printed Journal: 5th October 2022
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
White layer thickness (WLT) formed and surface roughness in wire electric discharge turning (WEDT) of tungsten carbide composite has been made to model through response surface methodology (RSM). A Taguchi’s standard Design of experiments involving five input variables with three levels has been employed to establish a mathematical model between input parameters and responses. Percentage of cobalt content, spindle speed, Pulse on-time, wire feed and pulse off-time were changed during the experimental tests based on the Taguchi’s orthogonal array L27 (3^13). Analysis of variance (ANOVA) revealed that the mathematical models obtained can adequately describe performance within the parameters of the factors considered. There was a good agreement between the experimental and predicted values in this study.
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
The study explores the reasons for a transgender to become entrepreneurs. In this study transgender entrepreneur was taken as independent variable and reasons to become as dependent variable. Data were collected through a structured questionnaire containing a five point Likert Scale. The study examined the data of 30 transgender entrepreneurs in Salem Municipal Corporation of Tamil Nadu State, India. Simple Random sampling technique was used. Garrett Ranking Technique (Percentile Position, Mean Scores) was used as the analysis for the present study to identify the top 13 stimulus factors for establishment of trans entrepreneurial venture. Economic advancement of a nation is governed upon the upshot of a resolute entrepreneurial doings. The conception of entrepreneurship has stretched and materialized to the socially deflated uncharted sections of transgender community. Presently transgenders have smashed their stereotypes and are making recent headlines of achievements in various fields of our Indian society. The trans-community is gradually being observed in a new light and has been trying to achieve prospective growth in entrepreneurship. The findings of the research revealed that the optimistic changes are taking place to change affirmative societal outlook of the transgender for entrepreneurial ventureship. It also laid emphasis on other transgenders to renovate their traditional living. The paper also highlights that legislators, supervisory body should endorse an impartial canons and reforms in Tamil Nadu Transgender Welfare Board Association.
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
Since ages gender difference is always a debatable theme whether caused by nature, evolution or environment. The birth of a transgender is dreadful not only for the child but also for their parents. The pain of living in the wrong physique and treated as second class victimized citizen is outrageous and fully harboured with vicious baseless negative scruples. For so long, social exclusion had perpetuated inequality and deprivation experiencing ingrained malign stigma and besieged victims of crime or violence across their life spans. They are pushed into the murky way of life with a source of eternal disgust, bereft sexual potency and perennial fear. Although they are highly visible but very little is known about them. The common public needs to comprehend the ravaged arrogance on these insensitive souls and assist in integrating them into the mainstream by offering equal opportunity, treat with humanity and respect their dignity. Entrepreneurship in the current age is endorsing the gender fairness movement. Unstable careers and economic inadequacy had inclined one of the gender variant people called Transgender to become entrepreneurs. These tiny budding entrepreneurs resulted in economic transition by means of employment, free from the clutches of stereotype jobs, raised standard of living and handful of financial empowerment. Besides all these inhibitions, they were able to witness a platform for skill set development that ignited them to enter into entrepreneurial domain. This paper epitomizes skill sets involved in trans-entrepreneurs of Thoothukudi Municipal Corporation of Tamil Nadu State and is a groundbreaking determination to sightsee various skills incorporated and the impact on entrepreneurship.
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
The banking and financial services industries are experiencing increased technology penetration. Among them, the banking industry has made technological advancements to better serve the general populace. The economy focused on transforming the banking sector's system into a cashless, paperless, and faceless one. The researcher wants to evaluate the user's intention for utilising a mobile banking application. The study also examines the variables affecting the user's behaviour intention when selecting specific applications for financial transactions. The researcher employed a well-structured questionnaire and a descriptive study methodology to gather the respondents' primary data utilising the snowball sampling technique. The study includes variables like performance expectations, effort expectations, social impact, enabling circumstances, and perceived risk. Each of the aforementioned variables has a major impact on how users utilise mobile banking applications. The outcome will assist the service provider in comprehending the user's history with mobile banking applications.
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
Technology upgradation in banking sector took the economy to view that payment mode towards online transactions using mobile applications. This system enabled connectivity between banks, Merchant and user in a convenient mode. there are various applications used for online transactions such as Google pay, Paytm, freecharge, mobikiwi, oxygen, phonepe and so on and it also includes mobile banking applications. The study aimed at evaluating the predilection of the user in adopting digital transaction. The study is descriptive in nature. The researcher used random sample techniques to collect the data. The findings reveal that mobile applications differ with the quality of service rendered by Gpay and Phonepe. The researcher suggest the Phonepe application should focus on implementing the application should be user friendly interface and Gpay on motivating the users to feel the importance of request for money and modes of payments in the application.
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
The prototype of a voice-based ATM for visually impaired using Arduino is to help people who are blind. This uses RFID cards which contain users fingerprint encrypted on it and interacts with the users through voice commands. ATM operates when sensor detects the presence of one person in the cabin. After scanning the RFID card, it will ask to select the mode like –normal or blind. User can select the respective mode through voice input, if blind mode is selected the balance check or cash withdraw can be done through voice input. Normal mode procedure is same as the existing ATM.
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
There is increasing acceptability of emotional intelligence as a major factor in personality assessment and effective human resource management. Emotional intelligence as the ability to build capacity, empathize, co-operate, motivate and develop others cannot be divorced from both effective performance and human resource management systems. The human person is crucial in defining organizational leadership and fortunes in terms of challenges and opportunities and walking across both multinational and bilateral relationships. The growing complexity of the business world requires a great deal of self-confidence, integrity, communication, conflict and diversity management to keep the global enterprise within the paths of productivity and sustainability. Using the exploratory research design and 255 participants the result of this original study indicates strong positive correlation between emotional intelligence and effective human resource management. The paper offers suggestions on further studies between emotional intelligence and human capital development and recommends for conflict management as an integral part of effective human resource management.
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
Our life journey, in general, is closely defined by the way we understand the meaning of why we coexist and deal with its challenges. As we develop the "inspiration economy", we could say that nearly all of the challenges we have faced are opportunities that help us to discover the rest of our journey. In this note paper, we explore how being faced with the opportunity of being a close carer for an aging parent with dementia brought intangible discoveries that changed our insight of the meaning of the rest of our life journey.
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
The main objective of this study is to analyze the impact of aspects of Organizational Culture on the Effectiveness of the Performance Management System (PMS) in the Health Care Organization at Thanjavur. Organizational Culture and PMS play a crucial role in present-day organizations in achieving their objectives. PMS needs employees’ cooperation to achieve its intended objectives. Employees' cooperation depends upon the organization’s culture. The present study uses exploratory research to examine the relationship between the Organization's culture and the Effectiveness of the Performance Management System. The study uses a Structured Questionnaire to collect the primary data. For this study, Thirty-six non-clinical employees were selected from twelve randomly selected Health Care organizations at Thanjavur. Thirty-two fully completed questionnaires were received.
Living in 21st century in itself reminds all of us the necessity of police and its administration. As more and more we are entering into the modern society and culture, the more we require the services of the so called ‘Khaki Worthy’ men i.e., the police personnel. Whether we talk of Indian police or the other nation’s police, they all have the same recognition as they have in India. But as already mentioned, their services and requirements are different after the like 26th November, 2008 incidents, where they without saving their own lives has sacrificed themselves without any hitch and without caring about their respective family members and wards. In other words, they are like our heroes and mentors who can guide us from the darkness of fear, militancy, corruption and other dark sides of life and so on. Now the question arises, if Gandhi would have been alive today, what would have been his reaction/opinion to the police and its functioning? Would he have some thing different in his mind now what he had been in his mind before the partition or would he be going to start some Satyagraha in the form of some improvement in the functioning of the police administration? Really these questions or rather night mares can come to any one’s mind, when there is too much confusion is prevailing in our minds, when there is too much corruption in the society and when the polices working is also in the questioning because of one or the other case throughout the India. It is matter of great concern that we have to thing over our administration and our practical approach because the police personals are also like us, they are part and parcel of our society and among one of us, so why we all are pin pointing towards them.
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
The goal of this study was to see how talent management affected employee retention in the selected IT organizations in Chennai. The fundamental issue was the difficulty to attract, hire, and retain talented personnel who perform well and the gap between supply and demand of talent acquisition and retaining them within the firms. The study's main goals were to determine the impact of talent management on employee retention in IT companies in Chennai, investigate talent management strategies that IT companies could use to improve talent acquisition, performance management, career planning and formulate retention strategies that the IT firms could use. The respondents were given a structured close-ended questionnaire with the 5 Point Likert Scale as part of the study's quantitative research design. The target population consisted of 289 IT professionals. The questionnaires were distributed and collected by the researcher directly. The Statistical Package for Social Sciences (SPSS) was used to collect and analyse the questionnaire responses. Hypotheses that were formulated for the various areas of the study were tested using a variety of statistical tests. The key findings of the study suggested that talent management had an impact on employee retention. The studies also found that there is a clear link between the implementation of talent management and retention measures. Management should provide enough training and development for employees, clarify job responsibilities, provide adequate remuneration packages, and recognise employees for exceptional performance.
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
Globally, Millions of dollars were spent by the organizations for employing skilled Information Technology (IT) professionals. It is costly to replace unskilled employees with IT professionals possessing technical skills and competencies that aid in interconnecting the business processes. The organization’s employment tactics were forced to alter by globalization along with technological innovations as they consistently diminish to remain lean, outsource to concentrate on core competencies along with restructuring/reallocate personnel to gather efficiency. As other jobs, organizations or professions have become reasonably more appropriate in a shifting employment landscape, the above alterations trigger both involuntary as well as voluntary turnover. The employee view on jobs is also afflicted by the COVID-19 pandemic along with the employee-driven labour market. So, having effective strategies is necessary to tackle the withdrawal rate of employees. By associating Emotional Intelligence (EI) along with Talent Management (TM) in the IT industry, the rise in attrition rate was analyzed in this study. Only 303 respondents were collected out of 350 participants to whom questionnaires were distributed. From the employees of IT organizations located in Bangalore (India), the data were congregated. A simple random sampling methodology was employed to congregate data as of the respondents. Generating the hypothesis along with testing is eventuated. The effect of EI and TM along with regression analysis between TM and EI was analyzed. The outcomes indicated that employee and Organizational Performance (OP) were elevated by effective EI along with TM.
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
By implementing talent management strategy, organizations would have the option to retain their skilled professionals while additionally working on their overall performance. It is the course of appropriately utilizing the ideal individuals, setting them up for future top positions, exploring and dealing with their performance, and holding them back from leaving the organization. It is employee performance that determines the success of every organization. The firm quickly obtains an upper hand over its rivals in the event that its employees having particular skills that cannot be duplicated by the competitors. Thus, firms are centred on creating successful talent management practices and processes to deal with the unique human resources. Firms are additionally endeavouring to keep their top/key staff since on the off chance that they leave; the whole store of information leaves the firm's hands. The study's objective was to determine the impact of talent management on organizational performance among the selected IT organizations in Chennai. The study recommends that talent management limitedly affects performance. On the off chance that this talent is appropriately management and implemented properly, organizations might benefit as much as possible from their maintained assets to support development and productivity, both monetarily and non-monetarily.
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
Banking regulations act of India, 1949 defines banking as “acceptance of deposits for the purpose of lending or investment from the public, repayment on demand or otherwise and withdrawable through cheques, drafts order or otherwise”, the major participants of the Indian financial system are commercial banks, the financial institution encompassing term lending institutions. Investments institutions, specialized financial institution and the state level development banks, non banking financial companies (NBFC) and other market intermediaries such has the stock brokers and money lenders are among the oldest of the certain variants of NBFC and the oldest market participants. The asset quality of banks is one of the most important indicators of their financial health. The Indian banking sector has been facing severe problems of increasing Non- Performing Assets (NPAs). The NPAs growth directly and indirectly affects the quality of assets and profitability of banks. It also shows the efficiency of banks credit risk management and the recovery effectiveness. NPA do not generate any income, whereas, the bank is required to make provisions for such as assets that why is a double edge weapon. This paper outlines the concept of quality of bank loans of different types like Housing, Agriculture and MSME loans in state Haryana of selected public and private sector banks. This study is highlighting problems associated with the role of commercial bank in financing Small and Medium Scale Enterprises (SME). The overall objective of the research was to assess the effect of the financing provisions existing for the setting up and operations of MSMEs in the country and to generate recommendations for more robust financing mechanisms for successful operation of the MSMEs, in turn understanding the impact of MSME loans on financial institutions due to NPA. There are many research conducted on the topic of Non- Performing Assets (NPA) Management, concerning particular bank, comparative study of public and private banks etc. In this paper the researcher is considering the aggregate data of selected public sector and private sector banks and attempts to compare the NPA of Housing, Agriculture and MSME loans in state Haryana of public and private sector banks. The tools used in the study are average and Anova test and variance. The findings reveal that NPA is common problem for both public and private sector banks and is associated with all types of loans either that is housing loans, agriculture loans and loans to SMES. NPAs of both public and private sector banks show the increasing trend. In 2010-11 GNPA of public and private sector were at same level it was 2% but after 2010-11 it increased in many fold and at present there is GNPA in some more than 15%. It shows the dark area of Indian banking sector.
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
An experiment conducted in this study found that BaSO4 changed Nylon 6's mechanical properties. By changing the weight ratios, BaSO4 was used to make Nylon 6. This Researcher looked into how hard Nylon-6/BaSO4 composites are and how well they wear. Experiments were done based on Taguchi design L9. Nylon-6/BaSO4 composites can be tested for their hardness number using a Rockwell hardness testing apparatus. On Nylon/BaSO4, the wear behavior was measured by a wear monitor, pinon-disc friction by varying reinforcement, sliding speed, and sliding distance, and the microstructure of the crack surfaces was observed by SEM. This study provides significant contributions to ultimate strength by increasing BaSO4 content up to 16% in the composites, and sliding speed contributes 72.45% to the wear rate
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
The majority of the population in India lives in villages. The village is the back bone of the country. Village or rural industries play an important role in the national economy, particularly in the rural development. Developing the rural economy is one of the key indicators towards a country’s success. Whether it be the need to look after the welfare of the farmers or invest in rural infrastructure, Governments have to ensure that rural development isn’t compromised. The economic development of our country largely depends on the progress of rural areas and the standard of living of rural masses. Village or rural industries play an important role in the national economy, particularly in the rural development. Rural entrepreneurship is based on stimulating local entrepreneurial talent and the subsequent growth of indigenous enterprises. It recognizes opportunity in the rural areas and accelerates a unique blend of resources either inside or outside of agriculture. Rural entrepreneurship brings an economic value to the rural sector by creating new methods of production, new markets, new products and generate employment opportunities thereby ensuring continuous rural development. Social Entrepreneurship has the direct and primary objective of serving the society along with the earning profits. So, social entrepreneurship is different from the economic entrepreneurship as its basic objective is not to earn profits but for providing innovative solutions to meet the society needs which are not taken care by majority of the entrepreneurs as they are in the business for profit making as a sole objective. So, the Social Entrepreneurs have the huge growth potential particularly in the developing countries like India where we have huge societal disparities in terms of the financial positions of the population. Still 22 percent of the Indian population is below the poverty line and also there is disparity among the rural & urban population in terms of families living under BPL. 25.7 percent of the rural population & 13.7 percent of the urban population is under BPL which clearly shows the disparity of the poor people in the rural and urban areas. The need to develop social entrepreneurship in agriculture is dictated by a large number of social problems. Such problems include low living standards, unemployment, and social tension. The reasons that led to the emergence of the practice of social entrepreneurship are the above factors. The research problem lays upon disclosing the importance of role of social entrepreneurship in rural development of India. The paper the tendencies of social entrepreneurship in India, to present successful examples of such business for providing recommendations how to improve situation in rural areas in terms of social entrepreneurship development. Indian government has made some steps towards development of social enterprises, social entrepreneurship, and social in- novation, but a lot remains to be improved.
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
Distribution system is a critical link between the electric power distributor and the consumers. Most of the distribution networks commonly used by the electric utility is the radial distribution network. However in this type of network, it has technical issues such as enormous power losses which affect the quality of the supply. Nowadays, the introduction of Distributed Generation (DG) units in the system help improve and support the voltage profile of the network as well as the performance of the system components through power loss mitigation. In this study network reconfiguration was done using two meta-heuristic algorithms Particle Swarm Optimization and Gravitational Search Algorithm (PSO-GSA) to enhance power quality and voltage profile in the system when simultaneously applied with the DG units. Backward/Forward Sweep Method was used in the load flow analysis and simulated using the MATLAB program. Five cases were considered in the Reconfiguration based on the contribution of DG units. The proposed method was tested using IEEE 33 bus system. Based on the results, there was a voltage profile improvement in the system from 0.9038 p.u. to 0.9594 p.u.. The integration of DG in the network also reduced power losses from 210.98 kW to 69.3963 kW. Simulated results are drawn to show the performance of each case.
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
Manufacturing industries have witnessed an outburst in productivity. For productivity improvement manufacturing industries are taking various initiatives by using lean tools and techniques. However, in different manufacturing industries, frugal approach is applied in product design and services as a tool for improvement. Frugal approach contributed to prove less is more and seems indirectly contributing to improve productivity. Hence, there is need to understand status of frugal approach application in manufacturing industries. All manufacturing industries are trying hard and putting continuous efforts for competitive existence. For productivity improvements, manufacturing industries are coming up with different effective and efficient solutions in manufacturing processes and operations. To overcome current challenges, manufacturing industries have started using frugal approach in product design and services. For this study, methodology adopted with both primary and secondary sources of data. For primary source interview and observation technique is used and for secondary source review has done based on available literatures in website, printed magazines, manual etc. An attempt has made for understanding application of frugal approach with the study of manufacturing industry project. Manufacturing industry selected for this project study is Mahindra and Mahindra Ltd. This paper will help researcher to find the connections between the two concepts productivity improvement and frugal approach. This paper will help to understand significance of frugal approach for productivity improvement in manufacturing industry. This will also help to understand current scenario of frugal approach in manufacturing industry. In manufacturing industries various process are involved to deliver the final product. In the process of converting input in to output through manufacturing process productivity plays very critical role. Hence this study will help to evolve status of frugal approach in productivity improvement programme. The notion of frugal can be viewed as an approach towards productivity improvement in manufacturing industries.
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
In this paper, we investigated a queuing model of fuzzy environment-based a multiple channel queuing model (M/M/C) ( /FCFS) and study its performance under realistic conditions. It applies a nonagonal fuzzy number to analyse the relevant performance of a multiple channel queuing model (M/M/C) ( /FCFS). Based on the sub interval average ranking method for nonagonal fuzzy number, we convert fuzzy number to crisp one. Numerical results reveal that the efficiency of this method. Intuitively, the fuzzy environment adapts well to a multiple channel queuing models (M/M/C) ( /FCFS) are very well.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
2. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014
17 – 19, July 2014, Mysore, Karnataka, India
overlapping latent that will serve as a valuable tool in forensics. Note that in forensics, the matching
accuracy of latent is extremely critical.
78
Fig 1: A fingerprint image containing two overlapping latent prints
The prevailing procedure to recognize component fingerprints in an overlapped image is for
latent examiners to manually mark minutiae for each component fingerprint in the image, and then
feed this information to a fingerprint matcher. Manually marking minutiae in overlapped fingerprint
images is not only tedious, but also very difficult. Recently it has been proposed in algorithms to
separate two overlapping fingerprints with minimal markup. An improvement in the matching
accuracy of component fingerprints compared to the overlapping print by applying a relaxation
labeling based algorithm on relatively good quality overlapped images synthesized from the database
has already been performed. Figure 2 shows an example of synthesized overlapped fingerprint
images.
State-of-the-art overlapping fingerprints separation algorithms [3], [5] consist of three main
steps:
1. Orientation field is estimated from the overlapped fingerprint image by local Fourier analysis.
2. The mixed orientations in the overlapping area are separated into two components, one for each
component fingerprint, by using a relaxation labeling method.
3. Given the orientation fields of the component fingerprints, the two overlapping fingerprints are
separated by enhancing the overlapped fingerprint image with Gabor filters that are tuned
according to the orientation fields of component fingerprints.
For such an approach to be effective, it is critical to obtain accurate orientation fields of the
component fingerprints. The initial estimation of mixed orientation field is thus a bottleneck in these
relaxation labeling based methods. For poor quality overlapped latent images, it is very difficult to
automatically estimate ridge Orientations.
Comparing the overlapped latent image in Fig.1 (a) and the overlapped image in Fig.2, one
can easily see the challenges in separating low quality overlapping latent caused by complicated
background and unclear ridge structures in the images.
It is required to improve the robustness of overlapping fingerprint separation, particularly for
poor quality images. Here instead of separating the estimated mixed orientation field, the
reconstruction of the orientation fields of component fingerprints via modeling orientation fields and
then predicting unknown orientation fields based on a small number of manually marked orientation
cues in fingerprints is done. The fingerprint orientation field model not only ensures the local
smoothness of component orientation fields, but also serves as a global constraint on the
reconstructed orientation fields. For these reasons, the model based method significantly improves
the accuracy of overlapping fingerprints separation, especially for the practical scenario of poor
quality overlapped latent images.
3. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014
17 – 19, July 2014, Mysore, Karnataka, India
2. OVERVIEW OF SEPARATION ALGORITHM
79
To separate two overlapping fingerprints, region of interest (or ROI), singular points (Core
and delta), and a small number of orientation cues (represented by strokes) are provided for each
fingerprint. ROI masks out the regions of the individual components in overlapped image. Singular
points and orientation cues help identify the ridge patterns of overlapping fingerprints. Singular
points that are outside of the ROI and not visible in the image might also be marked with the best
guess of their positions. Such singular points are shown in green color in Fig.2. Orientation cues
specify the ridge orientations in some of the local blocks of a fingerprint, which together with
singular points (if any) are used to estimate the parameters of fingerprint orientation field model.
Given these model parameters, orientation estimates are more likely to be accurately predicted for
the fingerprint blocks. Again, these manual markups, much simpler than marking all the minutiae
points, ensure accurate separation of component fingerprints that is crucial for latent fingerprint
analysis. Given the reconstructed orientation fields of the two component fingerprints, the ridge
frequency in the two fingerprints can be estimated. Finally, the two overlapping fingerprints are
separated by enhancing the overlapped fingerprint image with Gabor filters that are tuned to their
respective orientation fields and ridge frequencies.
Fig 2: Processing steps in the proposed overlapping fingerprint Separation algorithm
3. ORIENTATION FIELD MODELING AND PREDICTION
The Orientation Field Modeling and Prediction involves 3 main processes for the proposed
algorithm:
1. Orientation Field Models
2. Orientation Field Reconstruction
3. Related work
Fig 3: Fingerprint orientation field
4. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014
17 – 19, July 2014, Mysore, Karnataka, India
5. 80
3.1 Orientation Field Models
The orientation field of a fingerprint represents the dominant local ridge orientations. Let
denote the region of interest in the input overlapping fingerprint. The fingerprint orientation field can
be then viewed as a function (x, y) of the location (x, y) , where (x, y) [0, ] represents the
dominant local ridge orientation at (x, y).
The fingerprint orientation field (x, y) is smooth in most locations of , except in the
regions around singular points
The Zero-Pole model for the orientation field generated by singular points is defined as
(1)
where z = x + i · y is a point in the fingerprint represented in the complex plane, zci and zdj
correspond, respectively, to the ith core and the jth delta, and K and L are the numbers of cores and
deltas in the fingerprint. In this model, cores are taken as zeros and deltas as poles in the complex
plane, and the orientation at a point z is determined by the sum of influence of all cores and deltas.
Fingerprints with the same singular points can have different orientation fields. In order to
more accurately approximate the fingerprint orientation field, a combination of a point-charge model
and a polynomial model is proposed.
The point-charge model, similar to the Zero-Pole model, describes the orientation field close
to singular points and the polynomial model approximates the orientation field in the rest part of
fingerprint, which is supposed to be smooth and continuous.
The main idea of the polynomial model is to approximate the cosine and sine components of
doubled orientations by using a linear combination of a set of basis functions. First remove the
influence of singular points from the orientation field by subtracting SP from , and then
approximate the residual orientation field with a set of basis functions.
Let R = – SP (2)
Be the residual orientation field (see Fig. 3(c)), and {Øi (x, y) | i = 0, 1, · · · , n} the set of
basis functions. The cosine and sine components of the doubled residual orientations can be
approximated by
!# $% '('# $# )'
*+
!# $% ,'('# $# )'
*+
- (3)
Where {ai, bi | i = 0, 1, · · · , n} are the coefficients of the model.
where a=(a0 , a1 , · ·· , an ) T,b=(b 0 , b 1 , · ·· , bn) T
3.2 Orientation field reconstruction
For orientation field prediction and reconstruction, only the orientations at a subset of are
assumed to be known (given cues); the orientations at remaining locations of are estimated based on
the model. Let us denote these two subsets as C and X ( = c Ux), respectively. For the
overlapping fingerprints separation problem, c corresponds to the blocks where local orientation
cues are given, and X is the set of other locations in the component fingerprint. Given a fingerprint
orientation field model, unknown orientations are predicted as follows:
(i) Compute the model coefficients based on the known orientations in C, and
(ii) Use the established model to estimate the orientations in X.
6. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014
17 – 19, July 2014, Mysore, Karnataka, India
81
More specifically, given the ROI, singular points, and the orientation cues in C, the model
coefficients are computed accordingly. The residual orientation at (x, y) j X (j = 1, 2, · · ·, mx
where mXis the total number of pixels or blocks in X) can be then estimated as
/0 1
7. 23
!# $.%
(4#56# 78
9:(4#56# 7
8
(4)
Finally, the orientation at (x, y)j x is obtained by adding back the influence of singular
points to the estimated residual orientation, i.e
3;# = 3;# = ?@A;# = (5)
Fig 4: Orientation field reconstruction
The reconstructed orientation field is, however, still not very accurate (note the upper left
corner and the region around the core in Fig. 4(b)). To obtain a more accurate reconstruction, instead
of predicting all the unknown orientations at once (one shot approach) ), we first predict the locations
in the neighborhood of C and then gradually predict the orientations at farther locations from C
based on both the known orientations in C and the previously predicted orientations.
The orientation field model parameters keep getting updated during the iterative process. At
each iteration, the known orientations in C and the previously predicted orientations are regularized
by substituting them with the output of the last updated model. Such regularization can gradually
correct the errors in the given cues in C and previous predictions. Fig. 4 shows the results on an
example overlapped fingerprint image. The orientation field reconstructed by the proposed iterative
algorithm is more accurate than that by one-shot prediction.
3.3 Related Work
Orientation field modeling and reconstruction are fundamental problems in many fingerprint
related applications, such as fingerprint ridge orientation extraction, fingerprint image enhancement,
fingerprint image reconstruction, and fingerprint matching. A number of different fingerprint
orientation field models have been proposed in the literature. Some of them describe the orientation
fields generated by singular points. These models, including the Zero-Pole model and its variants,
cannot handle the arch fingerprints which do not have any singular points or accurately approximate
the orientation fields far from singular points. The orientation fields nearby and far from singular
points are described, respectively, by a point-charge model and a polynomial model, and the two
models are combined by Weighted Summation.
In the polynomial models, a set of basis functions are needed to represent the fingerprint
orientation fields. While monomials were used earlier, later it was proposed to use Legendre
polynomials and trigonometric polynomials, both of which compose orthogonal bases and are
claimed to be effective in approximating fingerprint orientation fields without prior knowledge of
8. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014
17 – 19, July 2014, Mysore, Karnataka, India
singular points. Recently, the trigonometric polynomial based model (called FOMFE) to reconstruct
the full orientation fields from partial fingerprints.
82
4. SEPARATION PERFORMANCE
There is no public domain database of overlapping latent fingerprints. It is also difficult to
obtain such images from the forensics laboratories. Therefore, results are reported on the following
three scenarios.
1. Simulated overlapping live scan fingerprints
2. Simulated overlapping latent fingerprints
3. Real overlapping latent fingerprints
The performance and comparison of separation algorithms is based on the matching results
between the separated component fingerprints and the enrolled full fingerprints. Here up to fourth
order monomials are used as the basis functions for the proposed algorithm, and to compare the
proposed algorithm with the relaxation labeling approach in, two state-of-the-art COTS fingerprint
matchers are employed, referred to as COTS1 and COTS2.
TABLE 1: Three Databases Used In Experimental Evaluation
DB Image Type Source # Images
1
Simulated overlapping
live scan fingerprints
FVC2002
Db1-b
100
2
Simulated overlapping
latent fingerprints
NIST SD27
15
3
Real overlapping latent
fingerprints
Forensics lab
4
4.2 Comparison of Orientation Field Models
Most existing orientation field models which are based on singular points are not suitable for
latent fingerprints, and for the polynomial based models, different polynomial basis functions have
been proposed.
For all of the three types of polynomial basis functions, we set their order to four. Separate
the four real overlapping latent fingerprints by using different polynomial basis functions, and use
COTS2 matcher to match the separated component latent against the large background database used
in the previous section. Although the Legendre polynomial based model and FOMFE were initially
proposed without using singular points, for fair comparison in our experiments, we also apply them
in the case of using singular points
Fig 5: Four images of real overlapping latent.
9. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014
17 – 19, July 2014, Mysore, Karnataka, India
83
From these results, we can see that
(i) All the three orientation field models benefit from the use of singular points, particularly for
lower quality latent, and
(ii) None of the three models consistently performs better than the others, but the monomial based
model performs, on average, the best, especially when singular points are not used.
Fig 6: Impact of singular points
Figure 6 shows the reconstructed orientation fields by the proposed method with monomial
basis functions for the component latent in Fig. 5(c). The first component latent in Fig. 5(c) has such
a poor quality that its core points cannot be clearly located and only one possible delta close to its
boundary is marked. The reconstructed orientation fields of this component latent (see Figs. 6(b) and
6(c)) show that the marked delta does not help much and can even degrade the matching
performance for this very poor quality component latent. On the other hand, if the singular points can
be reliably marked in a component latent, for example, for the second component latent in Fig. 5(c)
The reconstructed orientation field is much more accurate when the reliable singular points
are used (see Figs. 13(e) and 13(f)), and thus the matching accuracy of the separated component
latent can be significantly improved.
Fig 7: Comparison between orientation field models
Figure 7 compares the reconstructed orientation fields for the second component latent in Fig.
5(d) by using monomial based, Legendre polynomial based, and FOMFE models when the cues in
Fig. 7(a) are provided.
10. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014
17 – 19, July 2014, Mysore, Karnataka, India
84
4.3 Impact of Markup Cues
In the last section, we demonstrated the importance of manually marked singular points in
orientation field reconstruction and overlapping fingerprints separation. In this section, we discuss
the impact of manually marked orientation cues on the separation performance of the proposed
model based method with monomial basis functions.
The manually marked orientation cues are essentially seeds to the proposed model based
separation method. It is thus important to provide a sufficient number of accurate orientation cues in
order for a reasonable reconstruction of fingerprint orientation field. General intuition would suggest
marking uniformly distributed orientation cues in fingerprints. Our experiments, however, show that
some regions in fingerprints are more critical and providing orientation cues in such regions can
significantly improve the reconstruction results. These regions are of high curvature, regions far from
singular points, and regions close to boundary.
5. ADVANTAGES AND DRAWBACKS
5.1 Advantages
The proposed algorithm can be applied in the fields such as:
1. Forensics
2. Crime investigation Department
3. Security and Defense
4. Improves the accuracy of overlapping fingerprints separation, especially for the practical
scenario of poor quality overlapped latent images.
5. The model based separation method proposed here provides a very useful interactive tool for
latent examiners.
5.2 Drawbacks
1. It is assumed that there are not more than two overlapped finger prints.
2. The algorithm needs manually marked regions.
3. A fully automated system could be developed.
6. CONCLUSION
Overlapping latent fingerprints are frequently encountered at crime scenes. The identification
of component fingerprints, both by latent examiners and by AFIS, is very challenging because of the
complex background, poor quality, and contaminated ridge structures. A model based method for
separating overlapping latent fingerprints is studied here. The proposed algorithm reconstructs the
orientation field of overlapping fingerprints based on a set of manually marked features, including
regions of interest, singular points, and orientation cues. Based on the underlying model of
fingerprint ridge orientation field, the proposed method can simultaneously predict unknown
orientations in fingerprints and regularize the estimated orientations.
Fingerprint orientation field models have been widely used for regularizing the estimation of
fingerprint ridge orientation field. Although the combination model based on the Zero-Pole model
and monomial basis functions which requires singular points, and the Legendre polynomial based
and FOMFE models, which do not need singular points is utilized, the approach neither depends on
nor requires any specific orientation field model.
11. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014
17 – 19, July 2014, Mysore, Karnataka, India
85
REFERENCES
[1] Qijun Zhao and Anil K. Jain, Fellow, IEEE, “Model Based Separation of Overlapping
Latent Fingerprints” vol. 7, no. 3, pp. 904 – 918, June 2011
[2] D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition
(Second Edition). Springer-Verlag, 2009.
[3] F. Chen, J. Feng, A. K. Jain, J. Zhou, and J. Zhang, “Separating overlapped fingerprints,”
IEEE Transactions on Information Forensicsand Security, vol. 6, no. 2, pp. 346–359, 2011.
[4] M. D. Garris and R. M. McCabe, “NIST Special Database 27: Fingerprint Minutiae from
Latent and Matching Tenprint Images,” June 2000,
[5] Y Shi, J Feng, and J Zhou, “Separating overlapped fingerprints using constrained relaxation
labeling” in Proc. International Joint Conferenceon Biometrics, 2011.