Biometric application and classification of individuals using postural parameters
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 7, Issue 2
Abstract
This Biometrics refers to automatic recognition of individuals based on their physiological and/or behavioral characteristics. The displacement of the centre of pressure (COP) is a measure that has been successfully employed in studies regarding the postural control. So why not using the postural control as a behavioral characteristic to recognize individuals? The purpose of this study is to recognize individuals and to classify them by their age, gender, height and weight using postural features. The recognition approaches: Linear Discriminant Analysis (LDA), Support Vectors Machine (SVM) and K Nearest Neighbors (KNN) are applied to these biometric application. The postural features using in this application are extracted from data from twenty five healthy participants (average age 31 ± 11 years) standing in orthostatic position on an electromagnetic platform. The features are divided into three categories: classical features (extracted directly from the signals), mPCA features (extracted from the components trembling and rambling issued from the mPCA decomposition) and wavelet features (extracted from the components detail signal level 3 and detail signal level 2 issued from the wavelet decomposition. The results show that the ten subjects chosen for the recognition application are identified by the LDA with the rate of 80.43%. The classification applications (according to age, gender, height and weight) are performed for the all participants and the best resulted classification rates ranged from 82.61% to 93.48%. Most of these best rates are performed by the SVM classifiers using the totality of the features.
Authors and Affiliations
Dhouha Maatar, Régis Fournier, Zied Lachiri, Amine Naitali
Comparative Analysis of Kohonen-SOM and K-Means data mining algorithms based on Academic Activities
With the increasing demand of IT and subsequent growth in this sector, the high- dimensional data came into existence. Data Mining plays an important role in analyzing and extracting the useful information. The key infor...
Performance evaluation of conflict serializability against 2PL in Homogenous Distributed Database
There are many techniques in the recent years that provide the synchronization among the transactions using shared data like 2 phase locking protocol and time stamping in distributed database system. These techniques are...
Robust Singular Value Decomposition Algorithm for Unique Faces
It has been read and also seen by physical encounters that there found to be seven near resembling humans by appearance .Many a times one becomes confused with respect to identification of such near resembling faces wh...
Topological Properties of Rough Soft Formal Context
In this paper, the topological structure is discussed in the rough soft formal context. The rough soft formal context is defined on the rough formal context with some soft operators, the topology and the topological spac...
Intrusion Detection Techniques based on Cross Layer For Wireless Local Area Networks
In this paper, we propose to design a cross-layer based intrusion detection technique for wireless networks. In this technique a combined weight value is computed from the Received Signal Strength (RSS) and Time Taken fo...