To see the other types of publications on this topic, follow the link: Biometrical method.

Journal articles on the topic 'Biometrical method'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Biometrical method.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Chmielińska, Jolanta, and Jacek Jakubowski. "Biometrical driver face verification." AUTOBUSY – Technika, Eksploatacja, Systemy Transportowe 19, no. 6 (September 7, 2018): 68–72. http://dx.doi.org/10.24136/atest.2018.039.

Full text
Abstract:
The paper discusses the problem of face verification in a driver monitoring system for the purpose of traffic safety. Two different methods of face verification were proposed. Both of them are based on a convolutional neural network and were developed with the use of a transfer learning technique. In the paper, the results produced by both proposed method have been presented and compared. Moreover, their advantages and disadvantages have been discussed.
APA, Harvard, Vancouver, ISO, and other styles
2

Salman, Duha D., Raghad A. Azeez, and Adul mohssen J. Hossen. "Key Generation from Multibiometric System Using Meerkat Algorithm." Engineering and Technology Journal 38, no. 3B (December 25, 2020): 115–27. http://dx.doi.org/10.30684/etj.v38i3b.652.

Full text
Abstract:
Biometrics are short of revocability and privacy while cryptography cannot adjust the user’s identity. By obtaining cryptographic keys using biometrics, one can obtain the features such as revocability, assurance about user’s identity, and privacy. Multi-biometrical based cryptographic key generation approach has been proposed, subsequently, left and right eye and ear of a person are uncorrelated from one to other, and they are treated as two independent biometrics and combine them in our system. None-the-less, the encryption keys are produced with the use of an approach of swarm intelligence. Emergent collective intelligence in groups of simple autonomous agents is collectively termed as a swarm intelligence. The Meerkat Clan Key Generation Algorithm (MCKGA) is a method for the generation of a key stream for the encryption of the plaintext. This method will reduce and distribute the number of keys. Testing of system, it was found that the keys produced by the characteristics of the eye are better than the keys produced by the characteristics of the ear. The advantages of our approach comprise generation of strong and unique keys from users’ biometric data using MCKGA and it is faster and accurate in terms of key generation.
APA, Harvard, Vancouver, ISO, and other styles
3

Salman, Duha D., Raghad A. Azeez, and Adul mohssen J. Hossen. "Key Generation from Multibiometric System Using Meerkat Algorithm." Engineering and Technology Journal 38, no. 3B (December 25, 2020): 115–27. http://dx.doi.org/10.30684/etj.v38i3b.652.

Full text
Abstract:
Biometrics are short of revocability and privacy while cryptography cannot adjust the user’s identity. By obtaining cryptographic keys using biometrics, one can obtain the features such as revocability, assurance about user’s identity, and privacy. Multi-biometrical based cryptographic key generation approach has been proposed, subsequently, left and right eye and ear of a person are uncorrelated from one to other, and they are treated as two independent biometrics and combine them in our system. None-the-less, the encryption keys are produced with the use of an approach of swarm intelligence. Emergent collective intelligence in groups of simple autonomous agents is collectively termed as a swarm intelligence. The Meerkat Clan Key Generation Algorithm (MCKGA) is a method for the generation of a key stream for the encryption of the plaintext. This method will reduce and distribute the number of keys. Testing of system, it was found that the keys produced by the characteristics of the eye are better than the keys produced by the characteristics of the ear. The advantages of our approach comprise generation of strong and unique keys from users’ biometric data using MCKGA and it is faster and accurate in terms of key generation.
APA, Harvard, Vancouver, ISO, and other styles
4

Philippe, P. "Twinning causative origin investigated by Sartwell's biometrical method." American Journal of Human Biology 2, no. 2 (1990): 107–15. http://dx.doi.org/10.1002/ajhb.1310020203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bogdanov, M. A., V. M. Kartak, A. А. Dumchikov, and A. I. Fabarisova. "STATISTICAL ASSESSMENT OF BIOMETRICAL SIGNS BY ELECTROCARDIOGRAPHY." Russian Journal of Cardiology, no. 7 (August 14, 2018): 84–91. http://dx.doi.org/10.15829/1560-4071-2018-7-84-91.

Full text
Abstract:
Statistical analysis performed, of the informativity of biometric signs of electrocardiogram. It was found that amplitude and time parameters of PQST areas of electrocardiograms show enough dispersion and are not easily distinguished. For reliable biometric personality identification quite a range of such signs is needed. Based on the known signs, novel signs were formulated via the bootstrap method. The novel signs presented much lower dispersion. It was found, that reliable identification of personality is possible with combined usage of the amplitudes in Sand T-areas of cardiocycle.
APA, Harvard, Vancouver, ISO, and other styles
6

Santos, Filipe Martins, David Risco, Nayara Yoshie Sano, Gabriel Carvalho de Macedo, Wanessa Teixeira Gomes Barreto, Pilar Gonçalves, Pedro Fernández-Llario, and Heitor Miraglia Herrera. "An alternative method for determining the body condition index of the free-living South American coati." Neotropical Biology and Conservation 15, no. 4 (December 23, 2020): 561–69. http://dx.doi.org/10.3897/neotropical.15.e56578.

Full text
Abstract:
Assessing and monitoring the welfare of free-living mammals is not a usual process due to the logistical complications associated with their capture and sedation, collection and storage of biological samples and their release. In this context, non-invasive methods for monitoring wildlife constitute a good alternative approach for in situ conservation. Body condition index, as a measurement of health status, has been used in free-living mammals; its low value may be associated with negative effects on reproduction and survival. The present study aimed to generate an alternative and reliable non-invasive method and then determine the body condition index, based on previously-collected biometric measurements, without the need to capture and immobilise the animals. A total of 178 free-living Nasua nasua Linnaeus, 1766 were trapped, weighed and measured. Statistical methods were used, based on Boosted Regression Trees (BRT) using body mass, biometric measurements (body length, height and chest girth) and gender as explanatory variables. To assess the agreement between the real Body Condition Indices (BCIs) and the predicted values of BCIs, we explored the correlation between each model using the Bland-Altman method. This method showed a strong agreement between the predictive BRT models proposed (standardised residuals from a linear regression between body length and chest girth) and standardised residuals (linear regression between body mass and body length). The results obtained herein showed that BRT modelling, based on biometrical features, is an alternative way to verify the body conditions of coatis without the need to capture and immobilise the animals.
APA, Harvard, Vancouver, ISO, and other styles
7

Zintzaras, E., P. Bouka, and A. Kowald. "Biometrical evaluation of bioequivalence trials using a bootstrap individual direct curve comparison method." European Journal of Drug Metabolism and Pharmacokinetics 27, no. 1 (March 2002): 11–16. http://dx.doi.org/10.1007/bf03190400.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Stander, Mark, and Julian Stander. "A simple method for correcting for the Will Rogers phenomenon with biometrical applications." Biometrical Journal 62, no. 4 (January 20, 2020): 1080–89. http://dx.doi.org/10.1002/bimj.201900199.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Desrosiers, G., B. Vincent, C. Retière, and L. Boucher. "Comparaison de critères utilisables pour l'étude de la structure des populations du polychète Nereis virens (Sars)." Canadian Journal of Zoology 66, no. 6 (June 1, 1988): 1454–59. http://dx.doi.org/10.1139/z88-212.

Full text
Abstract:
The various biometrical criteria used in the study of the population structure of the annelid polychaete Nereis virens (Sars) are reviewed. This type of study, which requires the examination of large numbers of specimens representing all size classes, is sometimes complicated by the occurrence of autotomy, a phenomenon quite frequent in this species, and by mechanical breaks during sampling and sieving. Measurements such as total length, width of an anterior segment, and total weight are not good criteria. We have used a new biometrical criterium developed at the Laboratoire maritime de Dinard (France). This criterium is based on a partial weight of animals that have been put in formaldehyde and wiped; the weight is determined from an histogram in which breaking points are "ranked". This ponderal measurement has been compared with the linear measurement of the jaw length. The new method allows the manipulation of a larger number of individuals and it is easier and faster to use than the method based on jaw measurements.[Journal translation]
APA, Harvard, Vancouver, ISO, and other styles
10

Wu, Shu-Fei. "Bayesian Interval Estimation for the Two-Parameter Exponential Distribution Based on the Right Type II Censored Sample." Symmetry 14, no. 2 (February 10, 2022): 352. http://dx.doi.org/10.3390/sym14020352.

Full text
Abstract:
The Bayesian interval estimation of the scale parameter for two-parameter exponential distribution is proposed based on the right type II censored sample. Under this type of censoring, two methods of Bayesian joint confidence region of the two parameters are also proposed. The simulation results show that the Bayesian method has a higher coverage probability than the existing method, so the Bayesian method is recommended for use. This research is related to the topic of asymmetrical probability distributions and applications across disciplines. The predictive interval of the future observation based on the right type II censored sample is also provided. One biometrical example is given to illustrate the proposed methods for the Bayesian interval estimations and prediction interval.
APA, Harvard, Vancouver, ISO, and other styles
11

Diener, W., U. Mischke, E. Schlede, and D. Kayser. "The biometrical evaluation of the OECD modified version of the acute toxic class method (oral)." Archives of Toxicology 69, no. 10 (October 1995): 729–34. http://dx.doi.org/10.1007/bf03035438.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Salvi, Rutuja, Patricio Fuentealba, Jasmin Henze, Pinar Bisgin, Thomas Sühn, Moritz Spiller, Anja Burmann, Axel Boese, Alfredo Illanes, and Michael Friebe. "Vascular Auscultation of Carotid Artery: Towards Biometric Identification and Verification of Individuals." Sensors 21, no. 19 (October 7, 2021): 6656. http://dx.doi.org/10.3390/s21196656.

Full text
Abstract:
Background: Biometric sensing is a security method for protecting information and property. State-of-the-art biometric traits are behavioral and physiological in nature. However, they are vulnerable to tampering and forgery. Methods: The proposed approach uses blood flow sounds in the carotid artery as a source of biometric information. A handheld sensing device and an associated desktop application were built. Between 80 and 160 carotid recordings of 11 s in length were acquired from seven individuals each. Wavelet-based signal analysis was performed to assess the potential for biometric applications. Results: The acquired signals per individual proved to be consistent within one carotid sound recording and between multiple recordings spaced by several weeks. The averaged continuous wavelet transform spectra for all cardiac cycles of one recording showed specific spectral characteristics in the time-frequency domain, allowing for the discrimination of individuals, which could potentially serve as an individual fingerprint of the carotid sound. This is also supported by the quantitative analysis consisting of a small convolutional neural network, which was able to differentiate between different users with over 95% accuracy. Conclusion: The proposed approach and processing pipeline appeared promising for the discrimination of individuals. The biometrical recognition could clinically be used to obtain and highlight differences from a previously established personalized audio profile and subsequently could provide information on the source of the deviation as well as on its effects on the individual’s health. The limited number of individuals and recordings require a study in a larger population along with an investigation of the long-term spectral stability of carotid sounds to assess its potential as a biometric marker. Nevertheless, the approach opens the perspective for automatic feature extraction and classification.
APA, Harvard, Vancouver, ISO, and other styles
13

Taha, Mohammed, and Hanaa Ahmed. "Second-Order Statistical Methods GLCM for Authentication Systems." Iraqi Journal for Electrical and Electronic Engineering 17, no. 1 (March 21, 2021): 1–6. http://dx.doi.org/10.37917/ijeee.17.1.10.

Full text
Abstract:
For many uses, biometric systems have gained considerable attention. Iris identification was One of the most powerful sophisticated biometrical techniques for effective and confident authentication. The current iris identification system offers accurate and reliable results based on near-infrared light (NIR) images when images are taken in a restricted area with fixed-distance user cooperation. However, for the color eye images obtained under visible wavelength (VW) without collaboration among the users, the efficiency of iris recognition degrades because of noise such as eye blurring images, eye lashing, occlusion, and reflection. This work aims to use the Gray-Level Co- occurrence Matrix (GLCM) to retrieve the iris's characteristics in both NIR iris images and visible spectrum. GLCM is second-order Statistical-Based Methods for Texture Analysis. The GLCM-based extraction technology was applied after the preprocessing method to extract the pure iris region's characteristics. The Energy, Entropy, Correlation, homogeneity, and Contrast collection of second-order statistical features are determined from the generated co-occurrence matrix, Stored as a vector for numerical features. This approach is used and evaluated on the CASIA v1and ITTD v1 databases as NIR iris image and UBIRIS v1 as a color image. The results showed a high accuracy rate (99.2 %) on CASIA v1, (99.4) on ITTD v1, and (87%) on UBIRIS v1 evaluated by comparing to the other methods
APA, Harvard, Vancouver, ISO, and other styles
14

Hughes, Kimberly A. "Mutation and the evolution of ageing: from biometrics to system genetics." Philosophical Transactions of the Royal Society B: Biological Sciences 365, no. 1544 (April 27, 2010): 1273–79. http://dx.doi.org/10.1098/rstb.2009.0265.

Full text
Abstract:
A notable success for evolutionary genetics during the past century was to generate a coherent, quantitative explanation for an apparent evolutionary paradox: the tendency for multicellular organisms to show declining fitness with age (senescence, often referred to simply as ‘ageing’). This general theory is now widely accepted and explains most of the features of senescence that are observed in natural and laboratory populations, but specific instantiations of that theory have been more controversial. To date, most of the empirical tests of these models have relied on data generated from biometric experiments. Modern population genetics and genomics provide new, and probably more powerful, ways to test ideas that are still controversial more than half a century after the original theory was developed. System-genetic experiments have the potential to address both evolutionary and mechanistic questions about ageing by identifying causal loci and the genetic networks with which they interact. Both the biometrical approaches and the newer approaches are reviewed here, with an emphasis on the challenges and limitations that each method faces.
APA, Harvard, Vancouver, ISO, and other styles
15

Wu, Shu-Fei. "Interval Estimation for the Two-Parameter Exponential Distribution Based on the Upper Record Values." Symmetry 14, no. 9 (September 12, 2022): 1906. http://dx.doi.org/10.3390/sym14091906.

Full text
Abstract:
Using the data for upper record values, the interval estimation for the scale parameter of two-parameter exponential distribution is presented. In addition, two methods for the joint confidence region of two parameters are proposed. In terms of confidence region area, the simulation comparison of two methods of the confidence region is performed in this paper. The criterion of minimum confidence region area is used to obtain the optimal method of the confidence region. To illustrate our proposed interval estimation methods, one biometrical example is used and the corresponding confidence interval length and confidence region area are also calculated. Our research topic is related to the asymmetrical probability distributions and applications across disciplines.
APA, Harvard, Vancouver, ISO, and other styles
16

Lobantsov, V. V., I. A. Matveev, and A. B. Murynin. "A biometrical data quality analysis method to reliably evaluate the efficiency of recognition algorithms and systems." Pattern Recognition and Image Analysis 22, no. 4 (December 2012): 593–98. http://dx.doi.org/10.1134/s1054661812040116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Prasad, Gitanjali, Ishika Jain, Mickey Ashley Menezes, and Narendra Pal Singh Rathore. "Attendance: An Application Based on Facial Recognition." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (April 30, 2022): 2953–59. http://dx.doi.org/10.22214/ijraset.2022.41888.

Full text
Abstract:
Abstract: Attendance is an important aspect to record the presence of students. The presence of someone is a way to address that the student is carrying out their obligations to come. Usually, attendance is done manually using pen-paper. This digital era has brought forth new technologies that can help deal with this absence of students in organisations. Automatic Face Recognition (AFR) technologies have made many improvements as well as advancements in the field of biometrics. It uses RealTime Face Recognition as a solution to keep a record of the attendance. The Face recognition approach has proven to be the best of all Biometrical sources of identification. We propose a face recognition desktop application that will automatically update a student's attendance into the database on the web server, providing an ease to the faculty. Even students can know their attendance just by a login. A report based on student’s attendance can help in evaluating the attendance eligibility criteria. In this face recognition desktop application, we use Machine Learning and Deep Learning algorithms to capture multiple images of students to reduce human errors and proxy attendance. This desktop application is much more efficient and safer than the traditional pen paper method. Keywords: Attendance system, Automated attendance, Image Processing, Face detection, Feature matching, Face recognition.
APA, Harvard, Vancouver, ISO, and other styles
18

Jentys-Szaferowa, J. "Metody biometryczne w badaniu ewolucji historycznej roślin [The biometrical method in investigations of the historical evolution of plants]." Acta Societatis Botanicorum Poloniae 33, no. 1 (2015): 77–94. http://dx.doi.org/10.5586/asbp.1964.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

KELLY, JOHN K. "An experimental method for evaluating the contribution of deleterious mutations to quantitative trait variation." Genetical Research 73, no. 3 (June 1999): 263–73. http://dx.doi.org/10.1017/s0016672399003766.

Full text
Abstract:
Unconditionally deleterious mutations could be an important source of variation in quantitative traits. Deleterious mutations should be rare (segregating at low frequency in the population) and at least partially recessive. In this paper, I suggest that the contribution of rare, partially recessive alleles to quantitative trait variation can be assessed by comparing the relative magnitudes of two genetic variance components: the covariance of additive and homozygous dominance effects (Cad) and the additive genetic variance (Va). If genetic variation is due to rare recessives, then the ratio of Cad to Va should be equal to or greater than 1. In contrast, Cad/Va should be close to zero or even negative if variation is caused by alleles at intermediate frequencies. The ratio of Cad to Va can be estimated from phenotypic comparisons between inbred and outbred relatives, but such estimates are likely to be highly imprecise. Selection experiments provide an alternative estimator for Cad/Va, one with favourable statistical properties. When combined with other biometrical analyses, the ratio test can provide an incisive test of the deleterious mutation model.
APA, Harvard, Vancouver, ISO, and other styles
20

Šmelko, Š., and J. Merganič. "Some methodological aspects of the National Forest Inventory and Monitoring in Slovakia." Journal of Forest Science 54, No. 10 (October 24, 2008): 476–83. http://dx.doi.org/10.17221/26/2008-jfs.

Full text
Abstract:
The work presents the conceptual information about the National Forest Inventory and Monitoring in Slovakia. It introduces some methodological approaches to the field data collection (determination of tree heights by two-phase method, regression formulas for tree volumes and assortments of forest tree species, quantification of deadwood volume in sample plots) and biometrical models prepared for data processing and generalisation of the results. The design and conception of Slovak National Forest Inventory and Monitoring were set with the aim to enable providing complex and integrated information about the state and changes of production and ecological characteristics of the forest ecosystems.
APA, Harvard, Vancouver, ISO, and other styles
21

Admakin, O. I., I. A. Solop, and A. D. Oksentyuk. "Comparison of the efficiency of the indexes of Pont and Korkhause with Kernott technique in patients with narrowing of maxilla." Pediatric dentistry and dental profilaxis 20, no. 3 (October 10, 2020): 199–203. http://dx.doi.org/10.33925/1683-3031-2020-20-3-199-203.

Full text
Abstract:
Relevance. The narrowing of the maxilla is one of the most common pathologies in orthodontics. Recent studies show that the narrowing is always asymmetric which is connected to the rotation of the maxilla. To choose the treatment correctly one need a calculation that reveals the asymmetry, which is impossible with using standard indexes.Purpose – to compare efficiency of indexes of Pont and Korkhause with the Kernott's method in patients with narrowing of the maxilla.Materials and methods. The study involved 35 children aged from 8 to 12 years old undergoing dental treatment in the University Children's Clinical Hospital of the First Moscow State Medical University with no comorbidities. For every patient a gypsum model was prepared and after that to carry out the biometrical calculation. In this study two indexes were used: Pont's index and Korkhause's; using this standard analysis the narrowing of the maxilla was revealed. After using Pont's Index and Korkhaus analysis all the models were calculated by the method of Kernott with Kernott's dynamic pentagon.Results. As a result of the analysis of the control diagnostic models a narrowing of the maxilla in 69% of cases (n = 24) was revealed in all cases, the deviation of the size of the dentition was asymmetric. Thus, 65% of the surveyed models showed a narrowing on the right. This narrowing was of a different severity and averaged 15 control models.Conclusions. This shows that for the biometrics of diagnostic models it is necessary to use methods that allow to estimate the width of the dentition rows on the left and on the right separately. To correct the asymmetric narrowing of the dentition, it is preferable to use non-classical expanding devices that act equally on the left and right sides separetly.
APA, Harvard, Vancouver, ISO, and other styles
22

Andreeva, O. I., and O. A. Zaitsev. "Ethic principles of using genetic information during criminal jurisdictional activity." BULLETIN of L.N. Gumilyov Eurasian National University. Law Series 136, no. 3 (2021): 86–97. http://dx.doi.org/10.32523/2616-6844-2021-136-3-86-97.

Full text
Abstract:
The article considers how the principles of respect for the honor and dignity of the individual and privacy are implemented in the use of genetic information in criminal proceedings. The authors analyzed existed tendencies, directed to increase the extent of federal basis of genetic information due to extension of the list of subjects, liable to compulsory genetic registration, legal regulation of mechanism of using genetic information during criminal trial. The authors concluded that indiscriminate extension of subjects, liable to compulsory genome records, covered by accused (suspected) persons in a committing of a crime, or deposing genome information of acquitted persons in data bases, or deposing genome information of persons, whose criminal cases were closed due to rehabilitative circumstances, do not meet requirements of the protection of their rights and legal interests. It is proven that the production of genetic expert evidence should be proceeded based on court judgment, secured with additional guarantees that this genetic information won’t be revealed out of the investigation of a concrete criminal case. The method of obtaining biometrical materials should include following actions: informing a person about the purpose and means of its obtaining, his/her rights, his/her duties, his/her responsibilities, access conditions to obtained materials, reindefication and restrictions of anonymity or privacy. The storage procedure of genetic information should guarantee the protection of the private life of a person; provide controlled access to it and to biometrical materials by authorities.
APA, Harvard, Vancouver, ISO, and other styles
23

Dawidowicz, Andrzej L., Natalia B. Czapczyńska, and Dorota Wianowska. "Relevance of the Sea Sand Disruption Method (SSDM) for the Biometrical Differentiation of the Essential-Oil Composition from Conifers." Chemistry & Biodiversity 10, no. 2 (February 2013): 241–50. http://dx.doi.org/10.1002/cbdv.201200001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Biddle, Fred G., and Brenda A. Eales. "Lateral asymmetry of paw usage: phenotypic survey of constitutive and experience-conditioned paw-usage behaviours among common strains of the mouse." Genome 44, no. 4 (August 1, 2001): 539–48. http://dx.doi.org/10.1139/g01-045.

Full text
Abstract:
Left-right direction of paw usage in the mouse is defined by the right-paw entry (RPE) score, which is the number of reaches with the right paw to retrieve food from a small food tube in a total of 50 right- and left-paw reaches. Two qualitatively different paw-usage behaviours can be identified by the difference in the RPE scores from naive mice in left- or right-biased test chambers and their retest, 1 week later, in the opposite-biased test chamber. In mice with constitutive paw usage, the RPE score may respond to the direction of a biased test chamber, but it returns to the value that is expected for naive mice in the opposite-biased test chamber. In mice with experience-conditioned paw usage, the RPE score responds to the direction of a biased test chamber and does not return to its expected value in the opposite-biased test chamber. In this report, we document the alternate paw usage behaviours in an extended phenotypic survey of different strains that will be useful for its genetic analysis. We also validate an alternate biometrical method to identify constitutive and experience-conditioned paw usage that is based on the mean average RPE score from the biased test and opposite-biased retest of individual mice. This alternate biometrical method demonstrated that, in some strains with experience-conditioned paw usage, there may be asymmetry or an interaction between genotype and the direction of the test sequence. In addition, the strain survey demonstrated that the qualitative difference between constitutive and experience-conditioned paw usage is independent of the well-known quantitative difference in the degree of lateralization of preferred-paw usage.Key words: mouse, lateral asymmetry of paw usage, left and right handedness, behavioural genetics, constitutive behaviour, experience-conditioned behaviour.
APA, Harvard, Vancouver, ISO, and other styles
25

Aulisa, Angelo, Diletta Bandinelli, Martina Marsiolo, Francesco Falciglia, Marco Giordano, and Renato Toniolo. "Is Surface Topography Useful in the Diagnosis of Scoliosis? Validation of the Biometrical Holistic of Human Body (BHOHB)." Children 10, no. 2 (February 7, 2023): 320. http://dx.doi.org/10.3390/children10020320.

Full text
Abstract:
Background: The concern around repeated exposure to X-rays has been motivating doctors involved in scoliosis to seek alternative solutions. Surface topography (ST) analysis is a modern system that has been shown to have good results. The purpose of the study is to validate the new BHOHB hardware for the investigation of scoliosis in adolescents by comparing it to X-ray examinations and to assess the reliability of intraoperator and interoperator tests. Methods: Ninety-five patients were enrolled in our study. All the patients were analyzed via the BHOHB method 2 times by 2 independent physicians (t0) and for a second time 2 or 3 months later (t1). The Pearson correlation coefficient was used to evaluate the relationship between the measurements obtained by BHOHB and the gold standard. The intraclass correlation coefficient (ICC) was used to assess intra- and interoperator reliability. Statistical analysis was performed with the GraphPad Prism 8 software. Results: The correlations between the first and second operators in the measurements and between the BHOHB method and X-ray showed a very good to excellent r for both. A very good correlation was also confirmed for prominence measured by operators and by the BHOHB machine. Intra- and interoperator reliability was found to be very positive for both the first and the second physicians. Conclusions: We can state that ST can be useful for diagnosing and treating scoliosis. The recommendation is to use it primarily to evaluate the evolution of the curve, as in this mode, you can reduce the patient’s exposure to X-rays. The results indicate that BHOHB measures are comparable to radiographs and not influenced by the operator.
APA, Harvard, Vancouver, ISO, and other styles
26

Aleksandrov, N. M., V. D. Veshutkin, A. E. Zhukov, I. D. Veshaev, D. A. Kuptsov, and O. I. Uglev. "Factors of radial bone strength after marginal defect formation." Genij Ortopedii 27, no. 2 (April 2021): 187–98. http://dx.doi.org/10.18019/1028-4427-2021-27-2-187-198.

Full text
Abstract:
Purpose To determine the effect of biometrical parameters of the radial bone and due to edge defect formed on the radius strength properties using calculation methods. Materials and methods The study of bone strength affecting factors was conducted with the aid of experimental and calculation methods. Biometrical parameters were studied in 10 pairs of the human cadaveric radius as an intact bone initially and after the formation of rectangular or triangle-shaped edge cuts. To determine the stress-strain behaviour, mathematical calculations were performed based on the beam flexural theory for isotropic materials. Computation study were conducted using the finite element method with the NX Siemens software package. Based on assumed mathematical models, the actual areas of safe loads in the presence of cuts and values of destructive loads depending on the depth and shape of a cut taking into account the initial curvature of the bone as well as the criteria of a required residual strength in variation of influencing parameters were identified by means of calculations. Results It was established that an increase in bone curvature results in the reduction of longitudinal destructive loads and in increasing values of the normal strength. The 0.05 bone curvature combined with the 0.5 cut causes a decrease in the ultimate load by 20 times (up to 4.8 % for a rectangular cut and to 5.4 % for a triangular cut). A 0.5-deep cut in the bone which curvature is 0.05 enhances the normal stress by 6.9 times for a triangular cut and by 7.8 times for a rectangular one as compared to a bone without curvature. The critical values for the curvature and depth of the cut were established which permit to avoid additional bone reinforcement. Conclusion The strength of the radius with a maginal defect depends not only on the depth of a cut but on its location, shape and on the radius curvature.
APA, Harvard, Vancouver, ISO, and other styles
27

De Felice, Elena, Cesare Pacioni, Federico Maria Tardella, Cecilia Dall’Aglio, Antonio Palladino, and Paola Scocco. "A Novel Method for Increasing the Numerousness of Biometrical Parameters Useful for Wildlife Management: Roe Deer Mandible as Bone Model." Animals 10, no. 3 (March 11, 2020): 465. http://dx.doi.org/10.3390/ani10030465.

Full text
Abstract:
Study of dimensions (biometry) and shapes (geometric morphometry) of bone structures in ungulates is of extreme importance in wildlife population management. Unlike classical biometry, which involves the use of a caliper for measurements, geometric morphometry acquires, through software, a series of reference points (landmarks) from digital photos, providing a series of linear measures. A method to convert values obtained from the GeoGebra software into biometric measures is described. We took photos of 25 mandibles of adult roe deer and at the same time measured mandible length and teeth row length using a caliper. After image processing using GeoGebra, we calculated the conversion factor as the mean ratio between measures taken using GeoGebra and the caliper. The series of measurements, taken with two different methods (direct measurement using the caliper and conversion from GeoGebra output), showed a good degree of agreement. We used the conversion factor to obtain, from the GeoGebra database, four additional parameters of 50 mandibles. The analysis of variance showed that one parameter was significantly different between sexes (p = 0.04), demonstrating the usefulness of the measurement conversion. The conversion factor is helpful to improve classical biometric databases to better clarify the relationship between environment and wildlife status.
APA, Harvard, Vancouver, ISO, and other styles
28

Kulanbay, Sh B., G. S. Beketova, and E. N. Tulegenova. "RESEARCH AND DEVELOPMENT OF BIOMETRIC METHODS." Herald of the Kazakh-British technical university 20, no. 2 (July 2, 2023): 115–24. http://dx.doi.org/10.55452/1998-6688-2023-20-2-115-124.

Full text
Abstract:
Identification systems play a very important role in today's society. Complex security requirements have prompted experts to explore ways in which biometrics can be used to identify customers. In this article, the concept of biometrics, biometric data and its variants are considered. The purpose of the article is to study the process of identification, to produce its improved version and introduce innovation. Thus, the following points served as a research method:- Initialization.- Fitness functions.- Unclear clusterleu method.The results showed that the advancement of biometric systems and biometric sensors can improve the identity and prevent others from using the identity, the system has great potential to improve the security and accuracy of the biometric technology system. Biometric systems increase the security of users, as well as ensure accuracy in the identification of personal identity. Thus, the accuracy of the proposed method is compared with four modern methods. The comparison shows that the proposed approach provided a high accuracy of about 99.89% and a low error rate of 0.18%. It turns out that there is real potential for the integration of fingerprints and iris biometrics in many subjects with the appropriate assessment.
APA, Harvard, Vancouver, ISO, and other styles
29

Tot, Ivan, Jovan Bajčetić, Boriša Jovanović, Mladen Trikoš, Dušan Bogićević, and Tamara Gajić. "Biometric standards and methods." Vojnotehnicki glasnik 69, no. 4 (2021): 963–77. http://dx.doi.org/10.5937/vojtehg69-32296.

Full text
Abstract:
Introduction/purpose: Nowadays, user identification systems play a very important role in modern society. Complex security requirements have led experts to explore ways in which biometric data can be used to identify user identities. This paper presents an overview of biometric standards and methods which can be used to identify users in biometric systems, and therefore to protect information and communication systems. Methods: This paper deals with the problem of standardization in the field of biometrics. The first part of the paper presents concrete examples of the most widely used biometric standards. The second part of the paper gives an overview of the most used biometric methods. Results: The obtained results show that the development of biometric systems and biometric sensors contributes to better protection of identity from misuse, because biometric technologies have great potential for improving the security and accuracy of system operation. Biometric systems improve the security of users and also provide much greater precision in establishing identity. Conclusion: The development of biometric standards should focus on their interconnectivity, as well as on increasing connectivity with other IT standards.
APA, Harvard, Vancouver, ISO, and other styles
30

Kannengießer, Marc, Achim Langenbucher, and Edgar Janunts. "Individual IOL Surface Topography Analysis by the WaveMaster Reflex UV." BioMed Research International 2013 (2013): 1–7. http://dx.doi.org/10.1155/2013/363742.

Full text
Abstract:
Purpose. In order to establish inspection routines for individual intraocular lenses (IOLs), their surfaces have to be measured separately. Currently available measurement devices lack this functionality. The purpose of this study is to evaluate a new topography measurement device based on wavefront analysis for measuring individual regular and freeform IOL surfaces, the “WaveMaster Reflex UV” (Trioptics, Wedel, Germany).Methods. Measurements were performed on IOLs with increasingly complex surface geometries: spherical surfaces, surfaces modelled by higher-order Zernike terms, and freeform surfaces from biometrical patient data. Two independent parameters were measured: the sample’s radius of curvature (ROC) and its residual (difference of sample topography and its best-fit sphere). We used a quantitative analysis method by calculating the residuals’ root-mean-square (RMS) and peak-to-Valley (P2V) values.Results. The sample’s best-fit ROC differences increased with the sample’s complexity. The sample’s differences of RMS values were 80 nm for spherical surfaces, 97 nm for higher-order samples, and 21 nm for freeform surfaces. Graphical representations of both measurement and design topographies were recorded and compared.Conclusion. The measurements of spherical surfaces expectedly resulted in better values than those of freeform surfaces. Overall, the wavefront analysing method proves to be an effective method for evaluating individual IOL surfaces.
APA, Harvard, Vancouver, ISO, and other styles
31

HUANG, BUFU, MENG CHEN, KA KEUNG LEE, and YANGSHENG XU. "HUMAN IDENTIFICATION BASED ON GAIT MODELING." International Journal of Information Acquisition 04, no. 01 (March 2007): 27–38. http://dx.doi.org/10.1142/s0219878907001137.

Full text
Abstract:
Human gait is a dynamic biometrical feature which is complex and difficult to imitate. It is unique and more secure than static features such as passwords, fingerprints and facial features. In this paper, we present intelligent shoes for human identification based on human gait modeling and similarity evaluation with hidden Markov models (HMMs). Firstly we describe the intelligent shoe system for collecting human dynamic gait performance. Using the proposed machine learning method hidden Markov models, an individual wearer's gait model is derived and we then demonstrate the procedure for recognizing different wearers by analyzing the corresponding models. Next, we define a hidden-Markov-model-based similarity measure which allows us to evaluate resultant learning models. With the most likely performance criterion, it will help us to derive the similarity of individual behavior and its corresponding model. By utilizing human gait modeling and similarity evaluation based on hidden Markov models, the proposed method has produced satisfactory results for human identification during testing.
APA, Harvard, Vancouver, ISO, and other styles
32

Lavrynenko, Yu, R. Vozhegova, and O. Hozh. "Productivity of corn hybrids of different fao groups depending on microfertilizers and growth stimulants under irrigation in the south of Ukraine." Agricultural Science and Practice 3, no. 1 (April 15, 2016): 55–60. http://dx.doi.org/10.15407/agrisp3.01.055.

Full text
Abstract:
The purpose of the research is to identify effi cient microfertilizers and growth stimulants considering biologi- cal features of new corn hybrids of different FAO groups under irrigation conditions in the South of Ukraine and trace their impact on grain productivity of the plants. The methods of the research are the fi eld method – to study the interaction of the research object with experimental factors of the natural environment, to register the yield and evaluate the biometrical indices; the laboratory method – to measure soil moisture, grain moisture content and grain quality indices; the statistical method – to evaluate the reliability of the obtained results; the calculation methods – for economic and energetic assessment of the growing techniques used. The results of the research. The paper defi nes the impact of microfertilizers and growth stimulants on the yield and grain quality of the corn hybrids of different maturity groups and on the economic effi ciency of growing them. The conclusions of the research. Under irrigation conditions of the Southern Steppe of Ukraine it is recommended that the following hybrids should be grown in dark-chestnut soils: early maturity DN Pyvykha, medium-early Skadovskyi, medium maturity Kakhovskyi and medium-late Arabat, using the growth stimulants – treating the seeds with Sezam-Nano and fertilizing with Grainactive at the stage of 7–8 leaves.
APA, Harvard, Vancouver, ISO, and other styles
33

Ali, Nadir, M. Asghar Khattak, Samina Kanwal, Noreen Farid, Shehrbano Batool, and Mufassar Nishat. "Comparison of Forensic Value of Biometric Analysis in Face & Ear Recognition in the Punjabi Population, Pakistan." Pakistan Journal of Medical and Health Sciences 16, no. 12 (December 31, 2022): 614–16. http://dx.doi.org/10.53350/pjmhs20221612614.

Full text
Abstract:
Background: The use of face biometrics is very prevalent in forensic investigations for the identification of the perpetrators of crime due to the excessive use of CCTV footage that is usually available at the scene of a crime in urban settings. Ear biometric analysis of ear prints is also in vogue as a result of research advancements in the fields of biometrics. Keeping in view this scenario, it is the need of the hour to analyze the forensic value of this type of forensic evidence and compare these two tools of forensic biometrics. Purpose: To analyze and compare the forensic value of biometric analysis of face and ear print recognitions in the Punjabi population, in Punjab, Pakistan. Study design: This study is conducted by collecting the data from 100 samples of different people belonging to different backgrounds from different cities in Punjab, Pakistan after their informed consent and ethical approval. Their facial photographs and ear prints were collected for proceeding biometric analysis to form a database for comparison and recognition. Method and materials: After collecting data, the comparison is done to see whether we can recognize a person by only using ear print analysis or face biometrics after running a search in our own created database. Moreover, we also calculated the forensic values of this biometric analysis separately on its own and combined these two i.e., face and ear biometrics. . Furthermore, standard deviation, F-statistics, and Chitest p-value were also applied to see the power of discrimination of these two biometric methods of identification Results: In 100 samples, face recognition was proved to be 80 % recognition of identity as compared with only ear prints which showed 56 % accuracy in identifying the individuals who participated in this research. Furthermore, the combined result of both face recognition and ear biometrics showed 90 % recognition of the identity of the individuals. Statistical analysis proved that biometric analysis of the face for recognition of the identity of individuals was more valued as compared with ear print recognition. Also, it was found that if we combine these two methods of biometrics, the forensic value of recognition of individuals has increased and showed good results. Conclusion: The forensic value of biometric evidence of face and ear recognition is a very important tool for the forensic identification of individuals in crime scene investigations. Biometric facial recognition is better as compared to only ear print biometric analysis. Furthermore, using face and ear biometrics enhances the forensic value of biometric analysis. Keywords: Biometric analysis, Forensic value, face recognition, ear print recognition,
APA, Harvard, Vancouver, ISO, and other styles
34

Yaacob, Mohd Noorulfakhri, Syed Zulkarnain Syed Idrus, Wan Azani Wan Mustafa, Mohd Aminudin Jamlos, and Mohd Helmy Abd Wahab. "Identification of the Exclusivity of Individual’s Typing Style Using Soft Biometric Elements." Annals of Emerging Technologies in Computing 5, no. 5 (March 20, 2021): 10–26. http://dx.doi.org/10.33166/aetic.2021.05.002.

Full text
Abstract:
Biometric is used as a main security fence in a computer system. The unique characteristics of a person can be distinguished from each other. Human’s biometrics can be categorized into three types: morphological, biological and behavioural. Morphological biometrics uses physical features for recognition. Biological biometrics used to identify user based on biological features. Behavioural biometrics such as gender, culture, height and weight can be used as an additional security measure within a system. These biometric behavioural features are also known as soft biometric. This study uses soft biometric elements (gender, culture, region of birth and educational level) in the keystroke dynamic study to distinguish typing patterns in each of these categories. The Support Vector Machine (SVM) classification method is used to perform this classification for soft biometric identification. The results of this study have shown that soft biometrics in keystroke dynamic can be used to distinguish group of individuals typing.
APA, Harvard, Vancouver, ISO, and other styles
35

Choudhury, Bismita, Patrick Then, Biju Issac, Valliappan Raman, and Manas Kumar Haldar. "A Survey on Biometrics and Cancelable Biometrics Systems." International Journal of Image and Graphics 18, no. 01 (January 2018): 1850006. http://dx.doi.org/10.1142/s0219467818500067.

Full text
Abstract:
Now-a-days, biometric systems have replaced the password or token based authentication system in many fields to improve the security level. However, biometric system is also vulnerable to security threats. Unlike password based system, biometric templates cannot be replaced if lost or compromised. To deal with the issue of the compromised biometric template, template protection schemes evolved to make it possible to replace the biometric template. Cancelable biometric is such a template protection scheme that replaces a biometric template when the stored template is stolen or lost. It is a feature domain transformation where a distorted version of a biometric template is generated and matched in the transformed domain. This paper presents a review on the state-of-the-art and analysis of different existing methods of biometric based authentication system and cancelable biometric systems along with an elaborate focus on cancelable biometrics in order to show its advantages over the standard biometric systems through some generalized standards and guidelines acquired from the literature. We also proposed a highly secure method for cancelable biometrics using a non-invertible function based on Discrete Cosine Transformation (DCT) and Huffman encoding. We tested and evaluated the proposed novel method for 50 users and achieved good results.
APA, Harvard, Vancouver, ISO, and other styles
36

Lal, Mohan, Sunita Munda, Twahira Begum, and Sudin Kumar Pandey. "Identification of a Stable Rhizome Essential Oil-Rich Variety (Jor Lab SM-2) of Homalomena aromatica Schott., Through Biometrical Method." Journal of Essential Oil Bearing Plants 24, no. 5 (September 3, 2021): 1026–41. http://dx.doi.org/10.1080/0972060x.2021.1995510.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Noh, Hyung Wook, Chang-Geun Ahn, Seung-Hoon Chae, Yunseo Ku, and Joo Yong Sim. "Multichannel Acoustic Spectroscopy of the Human Body for Inviolable Biometric Authentication." Biosensors 12, no. 9 (August 31, 2022): 700. http://dx.doi.org/10.3390/bios12090700.

Full text
Abstract:
Specific features of the human body, such as fingerprint, iris, and face, are extensively used in biometric authentication. Conversely, the internal structure and material features of the body have not been explored extensively in biometrics. Bioacoustics technology is suitable for extracting information about the internal structure and biological and material characteristics of the human body. Herein, we report a biometric authentication method that enables multichannel bioacoustic signal acquisition with a systematic approach to study the effects of selectively distilled frequency features, increasing the number of sensing channels with respect to multiple fingers. The accuracy of identity recognition according to the number of sensing channels and the number of selectively chosen frequency features was evaluated using exhaustive combination searches and forward-feature selection. The technique was applied to test the accuracy of machine learning classification using 5,232 datasets from 54 subjects. By optimizing the scanning frequency and sensing channels, our method achieved an accuracy of 99.62%, which is comparable to existing biometric methods. Overall, the proposed biometric method not only provides an unbreakable, inviolable biometric but also can be applied anywhere in the body and can substantially broaden the use of biometrics by enabling continuous identity recognition on various body parts for biometric identity authentication.
APA, Harvard, Vancouver, ISO, and other styles
38

Alam*, Varisha, and Dr Mohammad Arif. "Classification of Large Biometric Data in Database System." International Journal of Innovative Technology and Exploring Engineering 10, no. 10 (August 30, 2021): 1–8. http://dx.doi.org/10.35940/ijitee.d8592.08101021.

Full text
Abstract:
"Biometrics" is got from the Greek word 'life' and 'measure' which implies living and evaluation take apart. It simply converts into "life estimation". Biometrics uses computerized acknowledgment of people, dependent on their social and natural attributes. Biometric character are data separated from biometric tests, which can use for examination with a biometric orientation. Biometrics involves techniques to unusually recognize people dependent on at least one inherent physical or behavior attribute. In software engineering, specifically, biometric is used as a form of character retrieve the Committee and retrieve command. Biometric identically utilized to recognize people in bunches that are in observation. Biometric has quickly risen like a auspicious innovation for validation and has effectively discovered a spot in most of the scientific safety regions. An effective bunching method suggest for dividing enormous biometrics data set through recognizable proof. This method depends on the changed B+ tree is decreasing the discs get to. It diminishes the information recovery time and also possible error rates. Hence, for bigger applications, the need to reduce the data set to a more adequate portion emerges to accomplish both higher paces and further developed precision. The main motivation behind ordering is to recover a small data set for looking through the inquiry
APA, Harvard, Vancouver, ISO, and other styles
39

Kobat, Mehmet Ali, and Turker Tuncer. "Coronary Angiography Print: An Automated Accurate Hidden Biometric Method Based on Filtered Local Binary Pattern Using Coronary Angiography Images." Journal of Personalized Medicine 11, no. 10 (October 1, 2021): 1000. http://dx.doi.org/10.3390/jpm11101000.

Full text
Abstract:
Background and purpose: Biometrics is a commonly studied research issue for both biomedical engineering and forensics sciences. Besides, the purpose of hidden biometrics is to discover hidden biometrics features. This work aims to demonstrate the biometric identification ability of coronary angiography images. Material and method: A new coronary angiography images database was collected to develop an automatic identification model. The used database was collected from 51 subjects and contains 2156 images. The developed model has to preprocess; feature generation using local binary pattern; feature selection with neighborhood component analysis; and classification phases. In the preprocessing phase; image rotations; median filter; Gaussian filter; and speckle noise addition functions have been used to generate filtered images. A multileveled extractor is presented using local binary pattern and maximum pooling together. The generated features are fed to neighborhood component analysis and the selected features are classified using k nearest neighbor classifier. Results: The presented angiography image identification method attained 99.86% classification accuracy on the collected database. Conclusions: The obtained findings demonstrate that the angiography images can be utilized as biometric identification. Moreover, we discover a new hidden biometric feature using coronary angiography images and name of this hidden biometric is coronary angiography print.
APA, Harvard, Vancouver, ISO, and other styles
40

Qian, Huihuan, Yongsheng Ou, Xinyu Wu, Xiaoning Meng, and Yangsheng Xu. "Support Vector Machine for Behavior-Based Driver Identification System." Journal of Robotics 2010 (2010): 1–11. http://dx.doi.org/10.1155/2010/397865.

Full text
Abstract:
We present an intelligent driver identification system to handle vehicle theft based on modeling dynamic human behaviors. We propose to recognize illegitimate drivers through their driving behaviors. Since human driving behaviors belong to a dynamic biometrical feature which is complex and difficult to imitate compared with static features such as passwords and fingerprints, we find that this novel idea of utilizing human dynamic features for enhanced security application is more effective. In this paper, we first describe our experimental platform for collecting and modeling human driving behaviors. Then we compare fast Fourier transform (FFT), principal component analysis (PCA), and independent component analysis (ICA) for data preprocessing. Using machine learning method of support vector machine (SVM), we derive the individual driving behavior model and we then demonstrate the procedure for recognizing different drivers by analyzing the corresponding models. The experimental results of learning algorithms and evaluation are described.
APA, Harvard, Vancouver, ISO, and other styles
41

Singh, Law Kumar, Munish Khanna, Shankar Thawkar, and Jagadeesh Gopal. "Robustness for Authentication of the Human Using Face, Ear, and Gait Multimodal Biometric System." International Journal of Information System Modeling and Design 12, no. 1 (January 2021): 39–72. http://dx.doi.org/10.4018/ijismd.2021010103.

Full text
Abstract:
Biometrics is the science that deals with personal human physiological and behavioral characteristics such as fingerprints, handprints, iris, voice, face recognition, signature recognition, ear recognition, and gait recognition. Recognition using a single trait has several problems and multimodal biometrics system is one of the solutions. In this work, the novel and imperative biometric feature gait is fused with face and ear biometric features for authentication and to overcome problems of the unimodal biometric recognition system. The authors have also applied various normalization methods to sort out the best solution for such a challenge. The feature fusion of the proposed multimodal biometric system has been tested using Min-Max and Z-score techniques. The computed results demonstrate that Z-Score outperforms the Min-Max technique. It is deduced that the Z-score is a promising method that generates a high recognition rate of 95% and a false acceptance rate of 10%.
APA, Harvard, Vancouver, ISO, and other styles
42

Arunarani, S., and R. Gobinath. "A survey on multimodal biometrics for human authentication." International Journal of Engineering & Technology 7, no. 3.3 (June 8, 2018): 273. http://dx.doi.org/10.14419/ijet.v7i2.33.14167.

Full text
Abstract:
Authentication process identifies an individual to get an endorsed access by entering their login credentials. The inconvenience with this method is the user must remember the keywords, and the passwords can be predicted or if it is hard to guess it will be cracked through brute force. Due to this fault, this method is lack of integrity. Biometrics sample recognize a person based on his behavioral or physiological char-acteristics. Unimodal biometric systems have to resist with a different types of problems such as inconsistent data, intra-class variations, deceit attacks and high error rates. Multimodal biometrics implements secure authentication using various biometric traits. This survey gives us a wide scope for improving and enhancing the biometric applications. In this paper, we have explained multimodal biometrics to decrease the error rate and increase the security.
APA, Harvard, Vancouver, ISO, and other styles
43

Joshi, Amogh. "Future of Cybersecurity: A Study on Biometric Scans." International Journal for Research in Applied Science and Engineering Technology 9, no. 11 (November 30, 2021): 1180–85. http://dx.doi.org/10.22214/ijraset.2021.38913.

Full text
Abstract:
Abstract: Biometrics is a statistical analysis of people's unique behavioral characteristics. The technology is used for CYBERSECURITY. The basics of biometric authentication is that to stop security breaches by analyzing a person’s unique behavioral characteristics. The term biometrics is derived from the Greek word’s “bios” meaning life and “metricos” meaning to measure. It refers to measurements of physical and biological characteristics of the human body. In this paper, we have studied some biometric methods such as facial recognition, iris recognition, Retinal Recognition, voice recognition. Keywords: Biometrics, Cybersecurity, Biometric Scan, Retinal Scan, Iris Scan, Gait, Voice Recognition.
APA, Harvard, Vancouver, ISO, and other styles
44

Sulavko, Alexey Е., and Alexander А. Khramov. "Biometric authentication method based on cepstral characteristics of external ear echograms and biometrics-to-code neural converter." Journal Of Applied Informatics 17, no. 1 (97) (January 30, 2022): 69–82. http://dx.doi.org/10.37791/2687-0649-2022-17-1-69-82.

Full text
Abstract:
Open biometric images (fingerprint, iris, face) are "in sight" and therefore compromised in the natural environment. In this work, it is proposed to use data on the internal structure of the outer ear obtained using echography as biometric images. The individual characteristics of the ear canal of subjects are hidden from direct observation and cannot be copied by photographing. The proposed authentication method is based on cepstral analysis of echograms of the ear canal using neural network biometrics to code converters, trained in accordance with GOST R 52633.5. The neural network biometrics-code converter allows you to associate a user's cryptographic key or password with his biometric image. This is a shallow neural network of one or two layers of neurons, which is configured to generate a key specified during training when an image of a known user arrives, and when an unknown image arrives at its inputs, generate a random code with high entropy. At the entrance to this network, cepstral signs of echograms were received. To apply the method in practice, you need a special device that combines a headphone with a sound-proof housing and a microphone. The results obtained can be called optimistic EER = 0.031 (FAR = 0.001 at FRR = 0.23). The use of neural network converters biometrics-code showed a relatively higher percentage of errors in comparison with multilayer neural networks and the naive Bayes classification scheme, however, neural network biometrics to code converters allows you to implement authentication in a protected mode. This means that the subject's biometric data will be protected from compromise at the stages of storage, execution and transmission via communication channels.
APA, Harvard, Vancouver, ISO, and other styles
45

Lu, Xiaomin, Ying He, and Samuel S. Wu. "Interval estimation in multi-stage drop-the-losers designs." Statistical Methods in Medical Research 27, no. 1 (March 14, 2016): 221–33. http://dx.doi.org/10.1177/0962280215626748.

Full text
Abstract:
Drop-the-losers designs have been discussed extensively in the past decades, mostly focusing on two-stage models. The designs with more than two stages have recently received increasing attention due to their improved efficiency over the corresponding two-stage designs. In this paper, we consider the problem of estimating and testing the effect of selected treatment under the setting of three-stage drop-the-losers designs. A conservative interval estimator is proposed, which is proved to have at least the specified coverage probability using a stochastic ordering approach. The proposed interval estimator is also demonstrated numerically to have narrower interval width but higher coverage rate than the bootstrap method proposed by Bowden and Glimm (Biometrical Journal, vol. 56, pp. 332–349) in most cases. It is also a straightforward derivation from the stochastic ordering result that the family-wise error rate is strongly controlled with the maximum achieved at the global null hypothesis.
APA, Harvard, Vancouver, ISO, and other styles
46

Sandhya, Mulagala, and Munaga V. N. K. Prasad. "Cancelable Fingerprint Cryptosystem Using Multiple Spiral Curves and Fuzzy Commitment Scheme." International Journal of Pattern Recognition and Artificial Intelligence 31, no. 04 (February 2, 2017): 1756004. http://dx.doi.org/10.1142/s0218001417560043.

Full text
Abstract:
The increased use of biometric-based authentication systems in a variety of applications has made biometric template protection an important issue. Unlike conventional systems, biometric cannot be revoked or changed. This made template protection a critical issue to be considered in the recent years. This paper proposes a cancelable fingerprint cryptosystem using multiple spiral curves and fuzzy commitment scheme. The method is built by combining cancelable biometrics and biometric cryptosystems. First, we compute transformed minutiae features using multiple spiral curves. Further, these transformed features are encrypted using fuzzy commitment scheme. Hence, a secure template is obtained. Experimental results and analysis prove the credibility of proposed method with recently presented methods of fingerprint template protection.
APA, Harvard, Vancouver, ISO, and other styles
47

S. Raju, A., and V. Udayashankara. "A Survey on Unimodal, Multimodal Biometrics and Its Fusion Techniques." International Journal of Engineering & Technology 7, no. 4.36 (December 9, 2018): 689. http://dx.doi.org/10.14419/ijet.v7i4.36.24224.

Full text
Abstract:
Presently, a variety of biometric modalities are applied to perform human identification or user verification. Unimodal biometric systems (UBS) is a technique which guarantees authentication information by processing distinctive characteristic sequences and these are fetched out from individuals. However, the performance of unimodal biometric systems restricted in terms of susceptibility to spoof attacks, non-universality, large intra-user variations, and noise in sensed data. The Multimodal biometric systems defeat various limitations of unimodal biometric systems as the sources of different biometrics typically compensate for the inherent limitations of one another. The objective of this article is to analyze various methods of information fusion for biometrics, and summarize, to conclude with direction on future research proficiency in a multimodal biometric system using ECG, Fingerprint and Face features. This paper is furnished as a ready reckoner for those researchers, who wish to persue their work in the area of biometrics.
APA, Harvard, Vancouver, ISO, and other styles
48

Kumar Singha, Anjani, Anshu Singla, and Rajneesh Kumar Pandey. "STUDY AND ANALYSIS ON BIOMETRICS AND FACE RECOGNITION METHODS." EPH - International Journal of Science And Engineering 2, no. 2 (June 27, 2016): 29–34. http://dx.doi.org/10.53555/eijse.v2i2.145.

Full text
Abstract:
Human Biometrics is a rising technology, which has been broadly used in forensics, safe access and top-security prison. A biometric system is primarily a pattern recognition system that recognizes a person by determining the verification by using his different biological features i.e. Fingerprint, retina-scan, iris scan, hand geometry, and face recognition are important physiological biometrics and behavioral trait are Voice recognition, keystroke-scan, and signature-scan. In this paper different biometrics techniques such as Iris scan, retina scan and face recognition techniques are discussed.
APA, Harvard, Vancouver, ISO, and other styles
49

Rajvanshi, Saumya, Shiv Chauhan, and Savneet Kaur. "A New Wave in Biometric System: Systematic Study." CGC International Journal of Contemporary Technology and Research 4, no. 2 (August 5, 2022): 300–305. http://dx.doi.org/10.46860/cgcijctr.2022.07.31.300.

Full text
Abstract:
Biometric system is a technique used to identify a person using its personal identification methods. The main concept of biometric systems is to provide confidentiality and security to the user. A number of biometric systems are introduced but some systems are widely used and are famous because of their usage and security they provide. Physiological and Behavioral biometrics are the two types of biometric systems. Biometric systems include physiological biometrics like face recognition, fingerprint recognition, iris recognition and behavioral biometrics like signature recognition and voice recognition. All these recognition systems are discussed in this research paper. Biometric systems work on three levels: Enrollment, Verification, and Identification. Enrollment is the process in which patterns are captured from the user and stored in the database. Verification means to confirm that the sample entered by the user belongs to him or not. When the user wants to access the data then the user must use his/her biometrics so that the system checks that the person who wants to access the data is the real owner of the data or not. This process is identification. All three levels are the working levels of the Biometric System. In earlier years, biometrics were used only at ground levels to provide basic security to data but now the tables have turned. It is playing a major role in providing security to our data. Biometrics are not only used in day-to-day life in phone unlocking, phone assistants, attendance systems but also used at advanced levels like in airports, border security, cloud computing etc. In this research paper, we will discuss the future scope of biometric systems and how it could even change the future.
APA, Harvard, Vancouver, ISO, and other styles
50

Omar, Bayan. "Fusion Method with Mean-discrete Algorithm in Feature level for Identical twins Identification." UHD Journal of Science and Technology 4, no. 2 (December 27, 2020): 141. http://dx.doi.org/10.21928/uhdjst.v4n2y2020.pp141-150.

Full text
Abstract:
The study on twins is an important form of study in the forensic and biometrics field as twins share similar genetic traits. A biometric is one of the common types of pattern recognition which acquires biometric data from a person. From these data, a feature is established and extracted where these features can be used to identify individual. Exiting works in biometric identification concentrate on unimodal biometric identification. The high similarity in a pair of twin’s biometric may lead to miss performance. Hence, due to their great accurateness, multimodal biometric systems have become more favored than unimodal biometric systems in identical twins identification. However, these systems are highly complex. We proposed Mean-Discrete feature based fusion algorithm for Kurdish handwriting and fingerprint for identical twins detection. Its viability and advantage over the unimodal biometric systems are highlighted. This paper employed 800 images from 50 pairs of identical twins from Kurdistan Region to carry out the experiment.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography