Search results for "biometric"
showing 10 items of 87 documents
Fuzzy techniques for access and data management in home automation environments
2012
Home Automation Environments are characterized by the integration of electronic devices as well as by the performance of communication and control systems. Environment infrastructure has to meet several requirements including Quality of Service (QoS), safety, security, and energy saving. However, Home Automation deals with complex environments, so that advanced data management systems are required to meet the above constraints. Fuzzy Logic based techniques can be successful used to improve system performance management. This work proposes and describes the use and application of fuzzy rules on a two-tiered architecture integrating a biometric authentication module and communication real-tim…
Análisis Biométricos del Sapo Verde Siciliano, Bufo siculus (Stöck et al. 2008), Población que Vive en Sicilia (Italia)
2013
Morphometry structure of Sicilian green toad from the Nature Reserve "Monte Pellegrino" (north-western Sicily) was studied. A total of 666 individuals (354 males and 312 females) were captured in 2003 during reproduction period. Meaningful differences have statistically emerged among the two sexes and the body weight is the best parameter (up to 92% correct classification), followed by the length of the body (up to 90% correct classification). The simultaneous use of all the examined characters only increases of 1% the probability for correct discrimination of the sex. In comparison to the dimension of other green toad populations studied by other authors, the body size of this sicilian pop…
Sparse Sampling and Maximum Likelihood Estimation for Boolean Models
1991
A condition for practical independence of contact distribution functions in Boolean models is obtained. This result allows the authors to use maximum likelihcod methods, via sparse sampling, for estimating unknown parameters of an isotropic Boolean model. The second part of this paper is devoted to a simulation study of the proposed method. AMS classification: 60D05
Improvements and Modifications of Tarone's Multiple Test Procedure for Discrete Data
1998
Tarone (1990, Biometrics 46, 515-522) proposed a multiple test procedure for discrete test statistics improving the usual Bonferroni procedure. However, Tarone's procedure is not monotone depending on the predetermined multiple level a. Roth (1998, Journal of Statistical Planning and Inference, in press) developed a monotone version of Tarone's procedure. We present a similar procedure that is both monotone and an improvement of Tarone's proposal. Based on this extension, we derive a step-down procedure that is a corresponding improvement of Holm's (1979, Scandinavian Journal of Statistics 6, 65-70) sequentially rejective procedure. It is shown how adjusted p-values can be computed for the …
Tests for Differentiation in Gene Expression Using a Data-Driven Order or Weights for Hypotheses
2005
In the analysis of gene expression by microarrays there are usually few subjects, but high-dimensional data. By means of techniques, such as the theory of spherical tests or with suitable permutation tests, it is possible to sort the endpoints or to give weights to them according to specific criteria determined by the data while controlling the multiple type I error rate. The procedures developed so far are based on a sequential analysis of weighted p-values (corresponding to the endpoints), including the most extreme situation of weighting leading to a complete order of p-values. When the data for the endpoints have approximately equal variances, these procedures show good power properties…
<title>Face modeling: a real-time embedded implementation of a stereovision algorithm</title>
2001
The problem to acquire 3D data of human face can be applied in face recognition, virtual reality, and many other applications. It can be solved using stereovision. This technique consistes in acquiring data in three dimensions from two cameras. The aim is to implement an algorithmic chain which makes it possible to obtain a three-dimensional space from two two-dimensional spaces: two images coming from the two cameras. Several implementations have already been considered. We propose a new simple realtime implementation, based on a multiprocessor approach (FPGA-DSP) allowing to consider an embedded processing. Then we show our method which provides depth map of face, dense and reliable, and …
An affordable contactless security system access for restricted area
2016
International audience; We present in this paper a security system based on identity verification process and a low-cost smart camera , intended to avoid unauthorized access to restricted area. The Le2i laboratory has a longstanding experience in smart cameras implementation and design [1], for example in the case of real-time classical face detection [2] or human fall detection [3]. The principle of the system, fully thought and designed in our laboratory, is as follows: the allowed user presents a RFID card to the reader based on Odalid system [4]. The card ID, time and date of authorized access are checked using connection to an online server. In the same time, multi-modality identity ve…
Morphological and Biometric Features of Male BluethroatsLuscinia svecicain Central Iberia
2011
Summary. In order to test biometrics and plumage variability in bluethroats Luscinia svecica in central Iberia, 185 birds were captured in four areas (Sierra-Bejar, Sierra-Piedrahita, Sierra-Gredos and Sierra-Paramera). Older bluethroats were significantly larger than second calendar year birds in wing, tail, and total body lengths, but not in tarsus and bill lengths. A multivariate analysis of variance (MANOVA) and a principal component analysis (PCA) were used. Total body length only varied significantly between sampling areas: the birds from Sierra-Bejar were larger than those from Sierra-Gredos and Sierra-Paramera, but were similar to those of Sierra-Piedrahita. Birds with a white spot,…
Biometric sensors rapid prototyping on field-programmable gate arrays
2015
AbstractBiometric user authentication in large-scale distributed systems involves passive scanners and networked workstations and databases for user data acquisition, processing, and encryption. Unfortunately, traditional biometric authentication systems are prone to several attacks, such as Replay Attacks, Communication Attacks, and Database Attacks. Embedded biometric sensors overcome security limits of conventional software recognition systems, hiding its common attack points. The availability of mature reconfigurable hardware technology, such as field-programmable gate arrays, allows the developers to design and prototype the whole embedded biometric sensors. In this work, two strong an…
Palmprint and face score level fusion: hardware implementation of a contactless small sample biometric system
2011
Including multiple sources of information in personal identity recognition and verification gives the opportunity to greatly improve performance. We propose a contactless biometric system that combines two modalities: palmprint and face. Hardware implementations are proposed on the Texas Instrument Digital Signal Processor and Xilinx Field-Programmable Gate Array (FPGA) platforms. The algorithmic chain consists of a preprocessing (which includes palm extraction from hand images), Gabor feature extraction, comparison by Hamming distance, and score fusion. Fusion possibilities are discussed and tested first using a bimodal database of 130 subjects that we designed (uB database), and then two …