As of now, the performance of keystroke dynamics biometric in user recognition is not acceptable in practice due to intra-class variations, high failure to enroll rate (FER) or various troubles in data acquisition met...
详细信息
The proceedings contain 123 papers. The special focus in this conference is on Research in Intelligent and computing in Engineering. The topics include: Concept of cancer treatment by heating methodology of microwave;...
ISBN:
(纸本)9789811527791
The proceedings contain 123 papers. The special focus in this conference is on Research in Intelligent and computing in Engineering. The topics include: Concept of cancer treatment by heating methodology of microwave;dynamics of self-guided rocket control with the optimal angle coordinate system combined with measuring target parameters for frequency modulated continuous wave radar;an approach of utilizing binary bat algorithm for pattern nulling;An application of WSN in smart aquaculture farming;a newly developed approach for transmit beamforming in multicast transmission;post-quantum commutative deniable encryption algorithm;Indoor positioning using BLE iBeacon, smartphone sensors, and distance-based position correction algorithm;assessing the transient structure with respect to the voltage stability in large power system;cellular automata approach for optimizing radio coverage: A case study on archipelago surveillance;smart bicycle: IoT-based transportation service;LNA nonlinear distortion impacts in multichannel direct RF digitization receivers and linearization techniques;novel approach to detect and extract the contents in a picture or image;Modified biological model of meat in the frequency range from 50 Hz to 1 MHz;A research on clustering and identifying automated communication in the HTTP environment;Sequential all-digital background calibration for channel mismatches in time-interleaved ADC;Comparison BICM-ID to turbo code in wide band communication systems in the future;a design of a vestibular disorder evaluation system;about model separation techniques and control problems of wheeled mobile robots;Fuzzy supply chain performance measurement model based on SCOR 12.0;lightweight convolution neural network based on feature concatenate for facial expression recognition;light fidelity system.
Security and identity have become one of the primary concerns of the people in this digital world. Person authentication and identification is transforming the way these services are provided. Earlier it was mainly ac...
详细信息
ISBN:
(纸本)9789811513381;9789811513374
Security and identity have become one of the primary concerns of the people in this digital world. Person authentication and identification is transforming the way these services are provided. Earlier it was mainly achieved through passwords and patterns but with significant advancements in face recognition technologies, it has been exploited in providing authentication in smart phones and computers. Face recognition (FR) extends its use in applications like face tagging in social media, surveillance system at theaters, airports and so on. The proposed mathematical model employs linear algebra and mathematical simulations for the task of person identification. Kernel singular value decomposition is used to denoise the facial image which is then passed to a feature detector and descriptor based on nonlinear diffusion filtering. The obtained descriptors are quantized into a vector using an encoding model called VLAD which uses k-means++ for clustering. Further, classification is done using Gradient boosting decision trees. The pipeline proposed aims at reducing the average computational power and also enhancing the efficiency of the system. The proposed system has been tested on the three benchmark datasets namely Face 95, Face 96 and Grimace.
Face recognition is immensely proliferating as a research area in the paradigm of Computer Vision as it provides an extensive choice of applications in surveillance and commercial domains. This paper throws light upon...
详细信息
ISBN:
(纸本)9789811513381;9789811513374
Face recognition is immensely proliferating as a research area in the paradigm of Computer Vision as it provides an extensive choice of applications in surveillance and commercial domains. This paper throws light upon the comparison of various dense feature descriptors (Dense SURF, Dense SIFT, Dense ORB) with each other and also with their classical counterparts (SURF, SIFT, ORB) using a novel technique for recognition. This proposed technique uses Laplacian of Gaussian filter for enhancement of the image. It applies various dense and classical feature descriptors on the enhanced image and outputs a feature vector. In order to achieve high performance, this feature vector is given to Fisher vector since Fisher Vector is a feature patch-aggregation method. Finally, extended nearest neighbor Classifier is used for classification over the orthodox k-nearest classifier. Experiments were carried out on three diverse datasets-ORL, Faces94, and Grimace. On scrutinizing the results, Dense SIFT and Dense ORB were found to be preeminent as measured by various performance metrics. 98.44 on Grimace, 98.15 on Faces94.
This work presents ensemble forecasting of monthly electricity demand using pattern similarity-based forecasting methods (PSFMs). PSFMs applied in this study include k-nearest neighbor model, fuzzy neighborhood model,...
详细信息
Person identification based on touch screen gestures is a well-known method of authentication in mobile devices. Usually it is only checked if the user entered the correct pattern. Taking into account other biometric ...
详细信息
ISBN:
(纸本)9783030209124;9783030209117
Person identification based on touch screen gestures is a well-known method of authentication in mobile devices. Usually it is only checked if the user entered the correct pattern. Taking into account other biometric data based on the speed and shape of finger movements can provide higher security while the convenience of this authorisation method is not impacted. In this work the application of Sequential Joint Functional Principal Analysis (FPCA) as a dimensionality reduction method for gesture data is explored. Performance of the classifier is measured using 5-fold stratified cross-validation on a set of gestures collected from 12 people. The effects of sampling rate on classification performance is also measured. It is shown that the Support Vector Machine classifier reaches the accuracy of 79% using features obtained using the Sequential Joint FPCA, compared to 70% in the case of Euclidean PCA.
The proceedings contain 50 papers. The special focus in this conference is on Innovative computing and Communication. The topics include: Comparative Study of TDMA-Based MAC Protocols in VANET: A Mirror Review;node Au...
ISBN:
(纸本)9789811503238
The proceedings contain 50 papers. The special focus in this conference is on Innovative computing and Communication. The topics include: Comparative Study of TDMA-Based MAC Protocols in VANET: A Mirror Review;node Authentication in IoT-Enabled Sensor Network Using Middleware;an Efficient Data Aggregation Approach for Prolonging Lifetime of Wireless Sensor Network;a Comprehensive Review of Keystroke Dynamics-Based Authentication Mechanism;performance Analysis of Routing Protocols in Wireless Sensor Networks;Controlled Access Energy Coding (CAEC) for Wireless Adhoc Network;ioT-Based HelpAgeSensor Device for Senior Citizens;Optimization of LEACH for Developing Effective Energy-Efficient Protocol in WSN;automated Vehicle Management System Using Wireless Technology;a Supply Chain Replenishment Inflationary Inventory Model with Trade Credit;experimental Analysis of OpenStack Effect on Host Resources Utilization;customer Churn Prediction in Telecommunications Using Gradient Boosted Trees;efficient Evolutionary Approach for Virtual Machine Placement in Cloud Data Center;SCiJP: Solving computing Issues by Java Design pattern;permissioned Blockchain-Based Agriculture Network in Rootnet Protocol;load Balancing and Fault Tolerance-Based Routing in Wireless Sensor Networks;a Novel Context Migration Model for Fog-Enabled Cross-Vertical IoT Applications;equity Data Distribution Algorithms on Identical Routers;improved Leakage Current Performance in Domino Logic Using Negative Differential Resistance Keeper;an Efficient Parking Solution for Shopping Malls Using Hybrid Fog Architecture;Sensor’s Energy and Performance Enhancement Using LIBP in Contiki with Cooja;effect of Dropout and Batch Normalization in Siamese Network for Face recognition;Analysis and Mitigation of DDoS Flooding Attacks in software Defined Networks;Analysis of Impact of Network Topologies on Network Performance in SDN.
This study investigated the capacity of a deep neural network to distinguish tea types based on their aromas. The data set of aromas from tea leaves, which contained sensor responses measured with a gas-sensing system...
详细信息
ISBN:
(纸本)9781538692455
This study investigated the capacity of a deep neural network to distinguish tea types based on their aromas. The data set of aromas from tea leaves, which contained sensor responses measured with a gas-sensing system using a mass-sensitive chemical sensor comprised of an array of quartz crystal resonators coated with plasma organic polymer films, was used to evaluate the recognition accuracy. To define the input vectors of the deep neural network in aroma recognition experiments, frequency analysis using a continuous wavelet transform, with the Morlet function as the mother wavelet, was used to extract features from the sensor signals of the data set. The deep neural network achieved a recognition accuracy of 100% for the three tea types: oolong, jasmine and pu'erh, and the base gas of dehumidified indoor air. Comparing the recognition accuracy of the deep neural network to that obtained from other patternrecognition methods, such as naive Bayes and random forests, the experimental results demonstrated the effectiveness of applying a deep neural network to this task.
Fingerprint recognition is the most employed biometric method for identification and verification purposes. Fingerprint images are classified into five categories according to the morphology of their ridges, which dec...
详细信息
ISBN:
(纸本)9781728183282
Fingerprint recognition is the most employed biometric method for identification and verification purposes. Fingerprint images are classified into five categories according to the morphology of their ridges, which decreases the database penetration rate on an identification scheme. The classification procedure mainly starts with the feature extraction from the fingerprint sample, based on minutiae obtained from terminations and bifurcations of ridges. Afterward, the classification process is usually carried out by some artificial neural networks under supervised learning. Recently, convolutional neural networks are utilized as a potential alternative, by showing accuracies close to 100% with a high cost of learning times even using high-performance computing. On the other hand, the extreme learning machine (ELM) has emerged as a novel algorithm for the single-hidden layer feed-forward neural network, because of its good generalization performance at extremely fast learning speed. In this work, we introduce the ELMs for the fingerprint classification problem. The superior ELMs are given by the mapping activation function and the number of hidden nodes that maximize the accuracy of the classification;a heuristic approach is carried out to find these parameters. The studied databases are the NIST-4 and SFINGE, which are composed by different quantity and quality of fingerprint samples. Results show that ELM classification by using the feature descriptor of Hong08 achieves very high accuracy and low penetration rate, reducing severally the training time in comparison with deep learning approaches.
暂无评论