Soft Computing: Two-Step Feature Extraction-Based Biometric Authentication System
Journal Title: International Journal of Emerging Technologies in Computational and Applied Sciences - Year 2018, Vol 25, Issue 1
Abstract
There are many biometric authentication systems that have used different human traits either physiological or behavioural which are liable to forgery. Thus, the human tongue promises to deliver a level of uniqueness that other biometrics cannot match because it is immune to forgery. However, literature has revealed that a single feature extraction technique was not sufficient for effective and efficient treatment of biometrics because of lapses imposed by individual technique. This paperpresents the development of a tongue recognition system using Gabor filter and particle swarm optimization. One hundred and twenty tongue images of human tongues of different individuals, six tongue images with different expressions were captured each per person with a digital camera. The tongue images were pre-processed through extraction of region of interest and normalization usingbinary mask and histogram equalization; Gabor filter was used for feature extraction and particle swarm optimization (PSO) was used to select salient features.Some samples tongue images were matched with the stored extracted tongue images using Euclidean distance classifier. The results show that at threshold value of 0.50, G-PSO has a sensitivity, specificity and accuracy rate of 100.00%, 94.44% and 98.08% respectively compared to Gabor which has 94.12%, 88.89% and 92.31% respectively and PSO which has 97.06%, 88.89% and 94.23% respectively.
A systematic study on the genus Erodium in Kurdistan of Iraq
Sixty two specimens of Erodium were loaned by Howler Botanical Garden herbarium to RNG herbarium at the University of Reading, UK, beside quite many living taxon that naturally found in the fields of Kurdistan. Morpholog...
Bayesian Estimation of Minimum Uncertainties in Determining Parameters of Analytical Signal Consisting of Overlapping Symmetrical Peaks
We present the results of the error analysis of Bayesian estimates of peak parameters. The analysis was based on the sampling of the posterior distribution. Peak shape was modelled by Gaussian and Lorentzian functions .O...
Big Data and Cloud Computing in SDN
Data has become the most powerful and powerful application in all applications such as Smart Applications, IT industry, and IT business. Massive data such as the word used to identify datasets that exceed the size of the...
Pyrometallurgical recovery of Aluminum from Salt slag
Slag of aluminum is a residue which results during the melting process of primary and secondary aluminum production. Salt slag of aluminum is hazardous solid wastes due to the presence of the European Catalogue for Hazar...
Error Analysis in Determining Parameters of Overlapping Peaks Using Separation of Complex Spectra into Individual Components Case Study: Triplets
Based on the concept of Big Data Modeling, the errors in determining peak parameters of noisy Gaussian triplets using nonlinear least squares curve fitting have been evaluated. Calculations were performed using Gauss-New...