Implementation of Enhanced Feedback in Automated Latent Fingerprint Matcher
Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 3
Abstract
Latent fingerprints are partial impressions of the finger inadvertently left behind on the surface of objects when they are touched or handled. It is not usually visible to the naked eye but may be detected with some chemical and physical methods. In crime scenes and forensic evidence latent fingerprints play an important role. Similarly latent fingerprint matching also plays an important role in identifying suspects and criminals. In most latent fingerprint matching techniques orientation field reconstruction and alignment techniques are considered. The proposed work uses a robust reconstruction algorithm using minutiae features in enhanced feedback mechanism for automatic latent fingerprint matching to increase the authentication rate. The main contribution of this work is to reduce the spurious minutiae and improve the matching accuracy of automatic latent fingerprint matching.
3-Total Super Product Cordial Labeling For Some Graphs
"In this paper we investigate a new labeling called 3-total super product cordial labeling. Suppose G=(V(G),E(G) ) be a graph with vertex set V(G) and edge set E(G). A vertex labeling f:V(G)→{0,1,2}. For each edge uv ass...
Perspective Solutions for Modern Schools Design in the Gaza Strip (Study Sase- UNRWA Schools)
"Abstract: Architectural design is the result of solutions carried out through a design process to solve the individual issues while at the same time resolving the global issue of the building proper. It is an intense an...
A Robust Audio Digital Watermarking Algorithm based on Psychoacoustics Model
Digital watermark technology is now drawing attention as a new method of protecting digital content from unauthorized copying. A novel audio watermarking algorithm is used to protect against unauthorized copying of digit...
Managing the Expectations between the Regulatory Authority and Consultants in the Environmental Impact Assessment System in Zimbabwe
This study explored the expectations between the regulatory authority (EMA) and consultants in the environmental impact assessment (EIA) system in Zimbabwe. The consultant
Highly Secured Lossless Image Cryptography Algorithm Based on Haar Wavelet Transform
Along with the rapid increasing growth of computer and network technologies, images are being transmitted more and more frequently. Security of image is a big issue. Image information is lively and visual, and has been a...