SELF LEARNING HAND RECOGNITION SYSTEM USING SOFT COMPUTING
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 1
Abstract
As the day to day security is a major concern the authentication problem is very crucial. The hand recognition system provides efficient way to produce the authentication using image processing. Hand recognition geometry as the name suggest uses the shape of the hand to identify the person. Unlike iris, face or fingerprints, the human hand is not unique. The existing systems use finger length, thickness and curvature for the purpose of verification but not for identification. Hand recognition geometry data is relatively easier to collect to other technologies e.g. for fingerprint collection good frictional skin is required by image systems. The main objective of this study is to develop a system which can increase the accuracy of the hand recognition using soft computing, the system should be capable to self-learn, about the correct and incorrect palm prints and add them to its database. A robust palm print recognition approach using neural network is proposed in this study. Neural networks offer a number of advantages, including requiring less formal statistical training, ability to implicitly detect complex nonlinear relationships between dependent and independent variables, ability to detect all possible interactions between predictor variables, and the availability of multiple training algorithms. Palm print recognition, Preprocessing, Feature extraction, Matching and Results and Feedback to the database are the six steps that are followed in the proposed approach.
Authors and Affiliations
Shashank Saxena , Mrs. Madhu Khurana
Workflow Scheduling Algorithms in Grid Computing
Grid computing is a process of aggregate the functionality of different geographically resources and provide services to the user. Scheduling is most popular research area in grid computing for achieving high performance...
Network Security Issues and Solutions
Network security is now days becoming more and more important because people like to connect with each other all the time via internet. Personal computer users, employees of professional organizations, government servant...
Customer Segmentation for Decision Support using Clustering and Association Rule based approaches
Key business areas that data mining techniques can be potentially applied to include business profitability, customer relationships, and business process efficieny. Customer Realtionship Management(CRM)has become a leadi...
A Study on signcryption Scheme Based on Eliptic Curve
Data exchange is more essential to share information in the age of information technology to achieve the different tasks. As the transmission media is unreliable it need protection of that data moves in an unsecure commu...
Operations on Signed Numbers
Signed integers are normally represented using 2’s complement representation. Addition and subtraction of signed numbers is done similar to that of unsigned numbers. However carry (or borrow) is simply ignored. Unlike un...