Search results for "biometric"

showing 10 items of 87 documents

Fuzzy techniques for access and data management in home automation environments

2012

Home Automation Environments are characterized by the integration of electronic devices as well as by the performance of communication and control systems. Environment infrastructure has to meet several requirements including Quality of Service (QoS), safety, security, and energy saving. However, Home Automation deals with complex environments, so that advanced data management systems are required to meet the above constraints. Fuzzy Logic based techniques can be successful used to improve system performance management. This work proposes and describes the use and application of fuzzy rules on a two-tiered architecture integrating a biometric authentication module and communication real-tim…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniWireless Sensor Networks Real-time scheduling Biometric Authentication Data Management Fuzzy Techniques
researchProduct

Análisis Biométricos del Sapo Verde Siciliano, Bufo siculus (Stöck et al. 2008), Población que Vive en Sicilia (Italia)

2013

Morphometry structure of Sicilian green toad from the Nature Reserve "Monte Pellegrino" (north-western Sicily) was studied. A total of 666 individuals (354 males and 312 females) were captured in 2003 during reproduction period. Meaningful differences have statistically emerged among the two sexes and the body weight is the best parameter (up to 92% correct classification), followed by the length of the body (up to 90% correct classification). The simultaneous use of all the examined characters only increases of 1% the probability for correct discrimination of the sex. In comparison to the dimension of other green toad populations studied by other authors, the body size of this sicilian pop…

SiciliaBiometrical analysisBufo siculusAnálisis biométricoSicily
researchProduct

Sparse Sampling and Maximum Likelihood Estimation for Boolean Models

1991

A condition for practical independence of contact distribution functions in Boolean models is obtained. This result allows the authors to use maximum likelihcod methods, via sparse sampling, for estimating unknown parameters of an isotropic Boolean model. The second part of this paper is devoted to a simulation study of the proposed method. AMS classification: 60D05

Statistics and ProbabilityBiometricsBoolean modelIsotropySampling (statistics)General MedicineLikelihood-ratio testStatisticsMaximum satisfiability problemStatistics Probability and UncertaintyAlgorithmIndependence (probability theory)Standard Boolean modelMathematicsBiometrical Journal
researchProduct

Improvements and Modifications of Tarone's Multiple Test Procedure for Discrete Data

1998

Tarone (1990, Biometrics 46, 515-522) proposed a multiple test procedure for discrete test statistics improving the usual Bonferroni procedure. However, Tarone's procedure is not monotone depending on the predetermined multiple level a. Roth (1998, Journal of Statistical Planning and Inference, in press) developed a monotone version of Tarone's procedure. We present a similar procedure that is both monotone and an improvement of Tarone's proposal. Based on this extension, we derive a step-down procedure that is a corresponding improvement of Holm's (1979, Scandinavian Journal of Statistics 6, 65-70) sequentially rejective procedure. It is shown how adjusted p-values can be computed for the …

Statistics and ProbabilityGeneral Immunology and MicrobiologyBiometricsComputer scienceTest proceduresApplied MathematicsInferenceGeneral MedicineExtension (predicate logic)General Biochemistry Genetics and Molecular Biologysymbols.namesakeBonferroni correctionMonotone polygonsymbolsGeneral Agricultural and Biological SciencesAlgorithmStatistical hypothesis testingBiometrics
researchProduct

Tests for Differentiation in Gene Expression Using a Data-Driven Order or Weights for Hypotheses

2005

In the analysis of gene expression by microarrays there are usually few subjects, but high-dimensional data. By means of techniques, such as the theory of spherical tests or with suitable permutation tests, it is possible to sort the endpoints or to give weights to them according to specific criteria determined by the data while controlling the multiple type I error rate. The procedures developed so far are based on a sequential analysis of weighted p-values (corresponding to the endpoints), including the most extreme situation of weighting leading to a complete order of p-values. When the data for the endpoints have approximately equal variances, these procedures show good power properties…

Statistics and ProbabilityModels StatisticalModels GeneticBiometricsGene Expression ProfilingWord error rateFamilywise error rateGeneral MedicineData-drivenWeightingData Interpretation StatisticalsortComputer Simulationp-valueStatistics Probability and UncertaintyAlgorithmAlgorithmsOligonucleotide Array Sequence AnalysisMathematicsType I and type II errorsBiometrical Journal
researchProduct

<title>Face modeling: a real-time embedded implementation of a stereovision algorithm</title>

2001

The problem to acquire 3D data of human face can be applied in face recognition, virtual reality, and many other applications. It can be solved using stereovision. This technique consistes in acquiring data in three dimensions from two cameras. The aim is to implement an algorithmic chain which makes it possible to obtain a three-dimensional space from two two-dimensional spaces: two images coming from the two cameras. Several implementations have already been considered. We propose a new simple realtime implementation, based on a multiprocessor approach (FPGA-DSP) allowing to consider an embedded processing. Then we show our method which provides depth map of face, dense and reliable, and …

StereopsisBiometricsbusiness.industryComputer scienceDepth mapFace (geometry)Pattern recognition (psychology)Computer visionArtificial intelligenceVirtual realitybusinessMetaverseFacial recognition systemSPIE Proceedings
researchProduct

An affordable contactless security system access for restricted area

2016

International audience; We present in this paper a security system based on identity verification process and a low-cost smart camera , intended to avoid unauthorized access to restricted area. The Le2i laboratory has a longstanding experience in smart cameras implementation and design [1], for example in the case of real-time classical face detection [2] or human fall detection [3]. The principle of the system, fully thought and designed in our laboratory, is as follows: the allowed user presents a RFID card to the reader based on Odalid system [4]. The card ID, time and date of authorized access are checked using connection to an online server. In the same time, multi-modality identity ve…

Support Vector MachineReal-time Image ProcessingBiometricsSmart CameraFace VerificationEigenFacesFace Detection[INFO.INFO-ES]Computer Science [cs]/Embedded Systems[ INFO.INFO-ES ] Computer Science [cs]/Embedded Systems[INFO.INFO-ES] Computer Science [cs]/Embedded Systems
researchProduct

Morphological and Biometric Features of Male BluethroatsLuscinia svecicain Central Iberia

2011

Summary. In order to test biometrics and plumage variability in bluethroats Luscinia svecica in central Iberia, 185 birds were captured in four areas (Sierra-Bejar, Sierra-Piedrahita, Sierra-Gredos and Sierra-Paramera). Older bluethroats were significantly larger than second calendar year birds in wing, tail, and total body lengths, but not in tarsus and bill lengths. A multivariate analysis of variance (MANOVA) and a principal component analysis (PCA) were used. Total body length only varied significantly between sampling areas: the birds from Sierra-Bejar were larger than those from Sierra-Gredos and Sierra-Paramera, but were similar to those of Sierra-Piedrahita. Birds with a white spot,…

Total Body LengthWingBiometricsPlumageEcologyLusciniaZoologyAnimal Science and ZoologyTotal bodyBiologySubspeciesbiology.organism_classificationEcology Evolution Behavior and SystematicsArdeola
researchProduct

Biometric sensors rapid prototyping on field-programmable gate arrays

2015

AbstractBiometric user authentication in large-scale distributed systems involves passive scanners and networked workstations and databases for user data acquisition, processing, and encryption. Unfortunately, traditional biometric authentication systems are prone to several attacks, such as Replay Attacks, Communication Attacks, and Database Attacks. Embedded biometric sensors overcome security limits of conventional software recognition systems, hiding its common attack points. The availability of mature reconfigurable hardware technology, such as field-programmable gate arrays, allows the developers to design and prototype the whole embedded biometric sensors. In this work, two strong an…

WorkstationBiometricsComputer sciencebusiness.industryData_MISCELLANEOUSFingerprint (computing)EncryptionBiometric Authentication Systems FPGA.Reconfigurable computinglaw.inventionSoftwareArtificial IntelligencelawEmbedded systembusinessField-programmable gate arrayReplay attackSoftwareThe Knowledge Engineering Review
researchProduct

Palmprint and face score level fusion: hardware implementation of a contactless small sample biometric system

2011

Including multiple sources of information in personal identity recognition and verification gives the opportunity to greatly improve performance. We propose a contactless biometric system that combines two modalities: palmprint and face. Hardware implementations are proposed on the Texas Instrument Digital Signal Processor and Xilinx Field-Programmable Gate Array (FPGA) platforms. The algorithmic chain consists of a preprocessing (which includes palm extraction from hand images), Gabor feature extraction, comparison by Hamming distance, and score fusion. Fusion possibilities are discussed and tested first using a bimodal database of 130 subjects that we designed (uB database), and then two …

[INFO.INFO-AR]Computer Science [cs]/Hardware Architecture [cs.AR]Image fusion[INFO.INFO-AR] Computer Science [cs]/Hardware Architecture [cs.AR]BiometricsComputer sciencebusiness.industryFeature extractionGeneral EngineeringWord error rate020207 software engineeringImage processing02 engineering and technologyFacial recognition systemAtomic and Molecular Physics and OpticsMultimodal biometricsPattern recognition (psychology)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputer visionArtificial intelligence[ INFO.INFO-AR ] Computer Science [cs]/Hardware Architecture [cs.AR]businessComputer hardware
researchProduct