CHAPTER 6 MULTIMODAL BIOMETRIC RECOGNITION SYSTEM

Size: px
Start display at page:

Download "CHAPTER 6 MULTIMODAL BIOMETRIC RECOGNITION SYSTEM"

Transcription

1 123 CHAPTER 6 MULTIMODAL BIOMETRIC RECOGNITION SYSTEM Some of the challenges faced by the unimodal biometric systems are noisy data, lack of universal data, less performance improvement and vulnerable to spoof attacks. Hence, multimodal biometric system is preferred, which refers to the system that establishes identity based on combining two or more biometric traits, i.e., fuse multiple traits of an individual or extraction of multiple features and matching algorithms operating on the same biometric. The most compelling reason to combine different biometric traits is to improve the identification accuracy significantly and provide larger population coverage. This can be done when features extracted from different biometrics are statistically independent. 6.1 PROPOSED MULTIMODAL BIOMETRIC SYSTEM The block diagram of the proposed multimodal biometric recognition system is shown in Figure 6.1. The biometric images obtained from each modality are preprocessed, transformed using multi-resolution transforms such as Curvelet and Ridgelet, and then, features are extracted from these transformed output images. These extracted multi-resolution features are compared against the stored templates to generate the match scores.

2 124 DA Iris DA Fingerprint DA Face Preprocessing Preprocessing Preprocessing Multi-resolution Transforms Features Extraction Features Extraction Features Extraction Matching Score Matching Score Matching Score Score level Fusion Stored Templates Decision? Yes Genuine No Imposter DA Data Acquisition Figure 6.1 Block Diagram of Proposed Multimodal Biometric Recognition System A match score is a measure of similarity between the input and template biometric feature vectors. When match score output by different

3 125 biometric matchers are consolidated in order to arrive at a final recognition decision, fusion is said to be done at the match score level. This is also known as fusion at the measurement level or confidence level. After generating matching scores for each modality, the scores are normalized using various techniques such as min-max (MM), max (MX), median-mad (MAD), tanh (TH), double-sigmoid (DS), and z-score (ZS). 6.2 DIFFERENT LEVELS OF FUSION TECHNIQUES The various levels of fusion techniques are broadly categorized into two namely, pre-classification or fusion before matching, and postclassification or fusion after matching (Jain et al 2008). Different fusion techniques that can be accomplished at various levels in a biometric system are shown in Figure 6.2. Biometric Fusion Before matching After matching Sensor Level Feature Level Classifier Fusion Match-Score Level Rank Level Decision Level Figure 6.2 Different Levels of Fusion Techniques in a Biometric System

4 126 The sensor level and feature level techniques fall into the first category, while the second category fusion techniques are match-score level, rank level and decision level Sensor Level Fusion Technique It combines information at the raw data obtained using multiple sensors or multiple snapshots of a biometric using a single sensor. Mosaicing multiple samples of the same biometric is an example of this type of fusion Feature Level Fusion Technique It typically involves enhancing the feature vectors arising from multiple feature extractors and subjecting the fused feature vector to a feature transformation algorithm. This enables the system to compute discriminatory features that can enhance matching performance Match-Score Level Fusion Technique Each individual biometric process typically outputs a match score but possibly, multiple scores. The fusion process fuses these scores into a single score, which is then compared to the system acceptable threshold. If the classification approach to score fusion is allowed, then the output may be direct decisions instead of scores. Fusion methods at this level can be broadly classified into three categories namely, density-based, transformation-based and classifier-based schemes (Ross et al 2006). In the density-based scheme, a large number of training samples are necessary to reliably estimate the joint-density function especially if the dimensionality of the feature vector is large. In transformation-based scheme, a score normalization process is essential to transform the multiple match

5 127 scores generated by multiple matchers into a common domain. The goal of classifier-based scheme is to directly estimate the class rather than to compute an intermediate scalar value. This fusion scheme assumes the availability of a large representative number of genuine and impostor scores during the training phase of the classifier when its parameters are computed Rank Level Fusion Technique When a biometric system operates in the identification mode, the system output can be viewed as a ranking of the enrolled identities. In this case, the output indicates the set of possible matching identities sorted in decreasing order of confidence. The goal of rank level fusion scheme is to consolidate the rank output by the individual biometric subsystems in order to derive a consensus rank for each identity. This fusion technique does not need normalization techniques Decision Level Fusion Each individual biometric process outputs its Boolean result. The fusion process fuses them together by a combination algorithm such as AND, OR rules etc. Other decision level fusion technique includes majority voting, weighted majority voting, Bayesian decision fusion, etc. 6.3 PROPOSED SCORE LEVEL FUSION TECHNIQUES The matching scores at the output of the individual matchers may not be homogeneous. For example, one matcher may output a dissimilarity measure while another may output a similarity measure. Further, the scores of individual measures need not be on the same numerical scale and may follow different statistical distribution. Due to these reasons, score normalization is

6 128 essential to transform the scores of the individual matchers into a common domain prior to combining them Score Normalization Techniques Score normalization refers to changing the location and scale parameters of matching score distributions at the output of the individual matchers, so that the scores of different matchers are transformed into a common domain. When the parameters used for normalization are determined using a fixed training set, it is referred to as fixed score normalization. In such case, the matching score distribution of the training set is examined and a suitable model is chosen to fit the distribution. Based on the model, the normalization parameters are determined. In adaptive score normalization, the normalization parameters are estimated based on the current feature vector. This approach has the ability to adapt to variations in the input data such as the change in the length of the speech signal in speaker recognition systems. The score normalization techniques used in our work include min-max (MM), max (MX), median-mad (MAD), tanh (TH), double-sigmoid (DS), and Z-score (ZS) normalizations. Let M be the total number of matchers, X i be the set of all the raw output values (matching scores) of the corresponding matcher i and x i X i, i M, where x i is the output raw value of the matcher i. The corresponding normalized matching score is denoted as ns i is the set of normalized matching scores of the matcher i. NS i, where NS i Min-max normalization (MM): It is the simplest normalization technique that normalizes the numerical range of the scores to [0, 1] and also retains the shapes of the original distributions. The min-max normalization function is given by

7 129 where min(x i ) and max(x i ) are the minimum and maximum values of the matching scores. Max normalization (MX): This normalization technique is constructed from the above min-max normalization technique by assigning zero to the min value. The max normalization function is given by Median-MAD normalization (MAD): This normalization scheme would be relatively robust to the presence of noise in the training data and is given by The denominator value is Median Absolute Deviation (MAD), which is an estimate of the scale parameter of the feature value. Tanh-normalization (TH): It is similar to Z-score normalization, which is also computed using mean and standard deviation of the match scores. The tanh-normalization function is given as: where µ and respectively. denote the mean and standard deviation of the match scores

8 130 Double-sigmoid normalization (DS): This normalization scheme provides a linear transformation of the scores in the region of overlap, while the scores outside this region are transformed non-linearly. The double-sigmoid normalization function is given by where is the reference operating point and 1 and 2 denote the left and right edges of the region in which the function is linear. The function exhibits linear characteristics in the interval ( - 1, - 2). Z-score normalization (ZS): The most commonly used score normalization technique is the Z-score which is calculated using the arithmetic mean and standard deviation of the match scores. It is given by where µ i and i are the arithmetic mean and standard deviation respectively for the i th matcher. This scheme can be expected to perform well if the average and the variance of the score distributions of the matchers are available, if not known, they can be estimated based on the given training set. Table 6.1 shows the summary of the various matching score level normalization techniques as cited in Ross et al It states that the tanh and double sigmoid techniques are more robust and their efficiencies are high.

9 131 Table 6.1 Summary of Normalization Techniques Normalization techniques Robustness Efficiency Min-max No N/A Max No N/A Median-MAD Yes Moderate Tanh Yes High Double-sigmoid Yes High Z-score No High Various Score-level Fusion Techniques Consider NS iris, NS fp, and NS face as the normalized scores of iris, fingerprint and face respectively. Let a, b and c be the weights assigned respectively to the biometric modalities iris, fingerprint and face. During the implementation of weighted fusion techniques, three test cases are considered. For the first test case, equal weights (0.33) are assigned to all the three modalities and for the remaining two test cases, more weights are assigned to iris, next less weight to fingerprint and least weight to the face modality. The chosen weights are based on the possibility of spoofing attacks. Table 6.2 Different Weights Assignment Strategy Weights assigned for Test case # Iris Fingerprint Face

10 132 Since, this system aims to reduce (or) decrease the vulnerability of spoofing attacks, falsifying iris trait is tough when compared to fingerprint and is still tough when compared to the face modality. Hence, the iris modality is assigned with the highest weight thus leading to better multimodal recognition rate. a takes the value either 0.33 or b takes either 0.3 or 0.33 c takes either 0.2 or 0.3 or 0.33, as listed in Table 6.2. The eight score level fusion techniques namely sum, mean, product, min, max, median, tanh and exponential methods are considered and are listed in Table 6.3. Here, NS final denotes the final normalized score after applying individual fusion techniques. Table 6.3 Various Score Level Fusion Techniques Fusion techniques Formula Weighted Sum Weighted Mean Weighted Min Weighted Max Weighted Median Weighted Product Weighted Tanh Weighted Exponential

11 Decision-Making Technique Threshold value is chosen adaptively by collecting the wrongly classified subjects minimum match scores and applying them in the corresponding fusion techniques. A user is considered to be genuine, if the match score value after fusion is less than the chosen threshold; otherwise as an imposter. 6.4 EXPERIMENTAL RESULTS AND DISCUSSION The proposed multimodal biometric recognition system is tested with the virtual multimodal database formed from the public biometric database. To demonstrate the effectiveness of the proposed methodologies on the virtual multimodal database, the public database considered here are CASIA-IrisV3-Interval database for Iris, FVC2004 DB1_A for fingerprint and ORL database for face. The subjects chosen from each biometric trait is forty with eight samples per subject, leading to 160 images for training and 160 for testing for each biometric modality. Table 6.4 Recognition Rate of the Public Database Modality No. of Subjects Recognition No. of images used for Rate (%) training testing CT RT Iris Fingerprint Face The reason for choosing forty subjects is that the ORL database contains a maximum of forty subjects and reason for choosing eight samples per subject,

12 134 is that FVC2004 DB1_A database as a maximum of eight samples per subject. Table 6.4 illustrates the recognition rate of individual biometric traits from the public biometric database. It is seen from the Table 6.4 that the Ridgelet Transform performs better for iris images and Curvelet Transform performs better for fingerprint and face images Recognition Results for Virtual Multimodal Database Table 6.5 shows the multimodal biometric recognition rate using different normalization and fusion techniques for the virtual multimodal database by considering the above mentioned three test-cases. Eight different score fusion techniques and six different normalization techniques are considered for experimentation. The experimented results are shown in the Table 6.5. Each row in the table defines different fusion techniques and each column defines various normalization techniques. Table 6.5 Recognition Rate using Different Normalization and Fusion Techniques for Virtual Multimodal Database (a) Test Case-1 (b) Test Case-2 and (c) Test Case-3 Normalization techniques Fusion techniques MM MX MAD TH DS ZS Weighted Sum Weighted Mean Weighted Min Weighted Max Weighted Median Weighted Product Weighted Tanh Weighted Exponential (a)

13 135 Table 6.5 (Continued) Normalization techniques Fusion techniques MM MX MAD TH DS ZS Weighted Sum Weighted Mean Weighted Min Weighted Max Weighted Median Weighted Product Weighted Tanh Weighted Exponential (b) Fusion techniques Normalization techniques MM MX MAD TH DS ZS Weighted Sum Weighted Mean Weighted Min Weighted Max Weighted Median Weighted Product Weighted Tanh Weighted Exponential (c) In the case of virtual multimodal database recognition rates, from Table 6.5, it is clearly seen that for the test case-1, % is obtained for the weighted-product fusion technique; for the test case-2, the maximum

14 136 recognition rate of 97.5 % is obtained for weighted-max fusion technique; for the test case-3, the recognition rate of % is achieved for weighted-min, weighted-product and weighted-tanh fusion techniques Recognition Results for Self-built Multimodal Database Table 6.6 shows the multimodal biometric recognition rate for the self-built multimodal database for the above mentioned three test cases. Table 6.6 Recognition Rate using Different Normalization and Fusion Techniques for Self-Built Multimodal Database (a) Test Case-1 (b) Test Case-2 and (c) Test Case-3 Normalization techniques Fusion techniques MM MX MAD TH DS ZS Weighted Sum Weighted Mean Weighted Min Weighted Max Weighted Median Weighted Product Weighted Tanh Weighted Exponential (a)

15 137 Table 6.6 (Continued) Normalization techniques Fusion techniques MM MX MAD TH DS ZS Weighted Sum Weighted Mean Weighted Min Weighted Max Weighted Median Weighted Product Weighted Tanh Weighted Exponential (b) Normalization techniques Fusion techniques MM MX MAD TH DS ZS Weighted Sum Weighted Mean Weighted Min Weighted Max Weighted Median Weighted Product Weighted Tanh Weighted Exponential (c) From Table 6.6, it is observed for the self-built biometric data set that the 100 % recognition rate is achieved for many score normalization and fusion techniques. The test case-3, i.e., weight assignments of 0.5 for iris, 0.3 for fingerprint and 0.2 for face, results in better performance in an overall sense, for all fusion and normalization techniques while weighted-min fusion

16 138 technique outperforms other fusion techniques with 100 % recognition rate for almost all normalization techniques and for the three test cases, as evident from Table PERFORMANCE COMPARISON Liu et al 2009 used three biometric traits namely iris, fingerprint and face with forty subjects and obtained a recognition rate of 95.6% using score level fusion by employing the Gabor Wavelet and the Posterior Union Decision-Based Neural Network (PUDBNN) while our proposed work, achieves a recognition rate of 99.38% for forty subjects which is shown in Table 6.7. Genuine Acceptance Rate (GAR) obtained for the self-built multimodal database is 99.5%. Table 6.7 Performance Comparison with Liu et al (2009) (Against Score Level Fusion) Recognition Rate (in %) Modalities Liu et al (2009) method Proposed method Iris Fingerprint Face Iris + Fingerprint + Face Gan et al (2008) conducted experiments on ORL face database and CASIA iris database. They extracted the two features using Two-Dimensional Discrete Cosine Transform (2-D DCT) and used the Kernel Fisher Discriminant Analysis (KFDA) to produce the optimal discriminant feature at the feature level. They considered 7 frontal samples per subject with front 4 samples for each class as training samples, and the remainder 3

17 139 samples for each class as testing samples. Their obtained correct recognition rate based on appointed and random training and test samples were 96.67% and 94.17% respectively. Our experimental results done on the face and iris database produced the recognition rates of 97.5 % and % at the feature level for the appointed and random training and test samples respectively. It is shown in Table 6.8. Table 6.8 Performance Comparison with Gan et al (2008) (Against Feature Level Fusion) RR of Gan (in %) method RR of proposed method (in %) Al-Hijaili & AbdulAziz (2011) performed the fusion of two features obtained from the iris and face modalities at the matching score-level by assigning weights 0.8 and 0.2 for the iris and face respectively. Iris and face images were recognized using the method proposed by Masek (2003) and Turk & Pentland (1991) respectively. The recognition rates for iris and face images were 95.63% and 75 % for 40 subjects respectively. When the two scores were fused at the score-level, the obtained recognition rate after fusion was % and the genuine acceptance rate (GAR) was 98 %. Our proposed method has provided a recognition rate of 100% at the score level, with a genuine acceptance rate (GAR) of 98%. The recognition rates (RR) of these works are tabulated in Table 6.9.

18 140 Table 6.9 Performance Comparison with Al-Hijaili & AbdulAziz (2011) (Against Score Level Fusion) RR of Al-Hijaili & AbdulAziz (2011) method (in %) RR of proposed method (in %) The improvement in the performance is due to the extraction of statistical / co-occurrence features by deploying multi-resolution transforms such as Curvelet and Ridgelet. Also, the match-score level fusion technique with high weightage assigned to iris biometric modality leads to better recognition rate. 6.7 SUMMARY The proposed framework for multimodal biometric recognition system extracts the multi-resolution features from the Curvelet and Ridgelet transformed output images and the extracted features are matched at the matching score level. The performance of the multimodal biometric system is examined with different score normalization techniques and fusion methods by assigning different weights on both virtual and self-built multimodal database. The proposed weighted-min fusion technique performs well among all the normalization techniques. It is proved that the combination of iris, fingerprint and face biometric modalities for the proposed multimodal biometric recognition system has higher performance than each unimodal separately. The next chapter concludes this thesis work and addresses the scope for further enhancements in this work.

INTEGRATION OF MULTIPLE CUES IN BIOMETRIC SYSTEMS

INTEGRATION OF MULTIPLE CUES IN BIOMETRIC SYSTEMS INTEGRATION OF MULTIPLE CUES IN BIOMETRIC SYSTEMS By Karthik Nandakumar A THESIS Submitted to Michigan State University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Department

More information

The Scientific Data Mining Process

The Scientific Data Mining Process Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In

More information

Multimodal Biometric Recognition Security System

Multimodal Biometric Recognition Security System Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security

More information

Discriminative Multimodal Biometric. Authentication Based on Quality Measures

Discriminative Multimodal Biometric. Authentication Based on Quality Measures Discriminative Multimodal Biometric Authentication Based on Quality Measures Julian Fierrez-Aguilar a,, Javier Ortega-Garcia a, Joaquin Gonzalez-Rodriguez a, Josef Bigun b a Escuela Politecnica Superior,

More information

Multi-Factor Biometrics: An Overview

Multi-Factor Biometrics: An Overview Multi-Factor Biometrics: An Overview Jones Sipho-J Matse 24 November 2014 1 Contents 1 Introduction 3 1.1 Characteristics of Biometrics........................ 3 2 Types of Multi-Factor Biometric Systems

More information

MULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT

MULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 111-115 MULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT A. Jaya Lakshmi 1, I. Ramesh Babu 2,

More information

Biometric Authentication using Online Signatures

Biometric Authentication using Online Signatures Biometric Authentication using Online Signatures Alisher Kholmatov and Berrin Yanikoglu alisher@su.sabanciuniv.edu, berrin@sabanciuniv.edu http://fens.sabanciuniv.edu Sabanci University, Tuzla, Istanbul,

More information

Biostatistics: DESCRIPTIVE STATISTICS: 2, VARIABILITY

Biostatistics: DESCRIPTIVE STATISTICS: 2, VARIABILITY Biostatistics: DESCRIPTIVE STATISTICS: 2, VARIABILITY 1. Introduction Besides arriving at an appropriate expression of an average or consensus value for observations of a population, it is important to

More information

Efficient on-line Signature Verification System

Efficient on-line Signature Verification System International Journal of Engineering & Technology IJET-IJENS Vol:10 No:04 42 Efficient on-line Signature Verification System Dr. S.A Daramola 1 and Prof. T.S Ibiyemi 2 1 Department of Electrical and Information

More information

Face detection is a process of localizing and extracting the face region from the

Face detection is a process of localizing and extracting the face region from the Chapter 4 FACE NORMALIZATION 4.1 INTRODUCTION Face detection is a process of localizing and extracting the face region from the background. The detected face varies in rotation, brightness, size, etc.

More information

Securing Electronic Medical Records using Biometric Authentication

Securing Electronic Medical Records using Biometric Authentication Securing Electronic Medical Records using Biometric Authentication Stephen Krawczyk and Anil K. Jain Michigan State University, East Lansing MI 48823, USA, krawcz10@cse.msu.edu, jain@cse.msu.edu Abstract.

More information

SIGNATURE VERIFICATION

SIGNATURE VERIFICATION SIGNATURE VERIFICATION Dr. H.B.Kekre, Dr. Dhirendra Mishra, Ms. Shilpa Buddhadev, Ms. Bhagyashree Mall, Mr. Gaurav Jangid, Ms. Nikita Lakhotia Computer engineering Department, MPSTME, NMIMS University

More information

Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security

Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security , pp. 239-246 http://dx.doi.org/10.14257/ijsia.2015.9.4.22 Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security R.Divya #1 and V.Vijayalakshmi #2 #1 Research Scholar,

More information

Environmental Remote Sensing GEOG 2021

Environmental Remote Sensing GEOG 2021 Environmental Remote Sensing GEOG 2021 Lecture 4 Image classification 2 Purpose categorising data data abstraction / simplification data interpretation mapping for land cover mapping use land cover class

More information

USER AUTHENTICATION USING ON-LINE SIGNATURE AND SPEECH

USER AUTHENTICATION USING ON-LINE SIGNATURE AND SPEECH USER AUTHENTICATION USING ON-LINE SIGNATURE AND SPEECH By Stephen Krawczyk A THESIS Submitted to Michigan State University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE

More information

Biometrics and Cyber Security

Biometrics and Cyber Security Biometrics and Cyber Security Key Considerations in Protecting Critical Infrastructure Now and In The Future Conor White, Chief Technology Officer, Daon Copyright Daon, 2009 1 Why is Cyber Security Important

More information

International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014

International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014 Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College

More information

Securing Electronic Medical Records Using Biometric Authentication

Securing Electronic Medical Records Using Biometric Authentication Securing Electronic Medical Records Using Biometric Authentication Stephen Krawczyk and Anil K. Jain Michigan State University, East Lansing MI 48823, USA {krawcz10,jain}@cse.msu.edu Abstract. Ensuring

More information

Classification of Fingerprints. Sarat C. Dass Department of Statistics & Probability

Classification of Fingerprints. Sarat C. Dass Department of Statistics & Probability Classification of Fingerprints Sarat C. Dass Department of Statistics & Probability Fingerprint Classification Fingerprint classification is a coarse level partitioning of a fingerprint database into smaller

More information

Chapter 6. The stacking ensemble approach

Chapter 6. The stacking ensemble approach 82 This chapter proposes the stacking ensemble approach for combining different data mining classifiers to get better performance. Other combination techniques like voting, bagging etc are also described

More information

Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems

Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems

More information

STATS8: Introduction to Biostatistics. Data Exploration. Babak Shahbaba Department of Statistics, UCI

STATS8: Introduction to Biostatistics. Data Exploration. Babak Shahbaba Department of Statistics, UCI STATS8: Introduction to Biostatistics Data Exploration Babak Shahbaba Department of Statistics, UCI Introduction After clearly defining the scientific problem, selecting a set of representative members

More information

Efficient Attendance Management: A Face Recognition Approach

Efficient Attendance Management: A Face Recognition Approach Efficient Attendance Management: A Face Recognition Approach Badal J. Deshmukh, Sudhir M. Kharad Abstract Taking student attendance in a classroom has always been a tedious task faultfinders. It is completely

More information

PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION

PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION Introduction In the previous chapter, we explored a class of regression models having particularly simple analytical

More information

Introduction to Pattern Recognition

Introduction to Pattern Recognition Introduction to Pattern Recognition Selim Aksoy Department of Computer Engineering Bilkent University saksoy@cs.bilkent.edu.tr CS 551, Spring 2009 CS 551, Spring 2009 c 2009, Selim Aksoy (Bilkent University)

More information

A Comparative Study on ATM Security with Multimodal Biometric System

A Comparative Study on ATM Security with Multimodal Biometric System A Comparative Study on ATM Security with Multimodal Biometric System K.Lavanya Assistant Professor in IT L.B.R.College of Engineering, Mylavaram. lavanya.kk2005@gmail.com C.Naga Raju Associate Professor

More information

addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from

addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent

More information

2.11 CMC curves showing the performance of sketch to digital face image matching. algorithms on the CUHK database... 40

2.11 CMC curves showing the performance of sketch to digital face image matching. algorithms on the CUHK database... 40 List of Figures 1.1 Illustrating different stages in a face recognition system i.e. image acquisition, face detection, face normalization, feature extraction, and matching.. 10 1.2 Illustrating the concepts

More information

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT

More information

Bachelor's Degree in Business Administration and Master's Degree course description

Bachelor's Degree in Business Administration and Master's Degree course description Bachelor's Degree in Business Administration and Master's Degree course description Bachelor's Degree in Business Administration Department s Compulsory Requirements Course Description (402102) Principles

More information

D-optimal plans in observational studies

D-optimal plans in observational studies D-optimal plans in observational studies Constanze Pumplün Stefan Rüping Katharina Morik Claus Weihs October 11, 2005 Abstract This paper investigates the use of Design of Experiments in observational

More information

Chapter 4. Probability and Probability Distributions

Chapter 4. Probability and Probability Distributions Chapter 4. robability and robability Distributions Importance of Knowing robability To know whether a sample is not identical to the population from which it was selected, it is necessary to assess the

More information

FPGA Implementation of Human Behavior Analysis Using Facial Image

FPGA Implementation of Human Behavior Analysis Using Facial Image RESEARCH ARTICLE OPEN ACCESS FPGA Implementation of Human Behavior Analysis Using Facial Image A.J Ezhil, K. Adalarasu Department of Electronics & Communication Engineering PSNA College of Engineering

More information

Information Fusion in Low-Resolution Iris Videos using Principal Components Transform

Information Fusion in Low-Resolution Iris Videos using Principal Components Transform Information Fusion in Low-Resolution Iris Videos using Principal Components Transform Raghavender Jillela, Arun Ross West Virginia University {Raghavender.Jillela, Arun.Ross}@mail.wvu.edu Patrick J. Flynn

More information

Christfried Webers. Canberra February June 2015

Christfried Webers. Canberra February June 2015 c Statistical Group and College of Engineering and Computer Science Canberra February June (Many figures from C. M. Bishop, "Pattern Recognition and ") 1of 829 c Part VIII Linear Classification 2 Logistic

More information

Artificial Neural Network for Speech Recognition

Artificial Neural Network for Speech Recognition Artificial Neural Network for Speech Recognition Austin Marshall March 3, 2005 2nd Annual Student Research Showcase Overview Presenting an Artificial Neural Network to recognize and classify speech Spoken

More information

Classification of Bad Accounts in Credit Card Industry

Classification of Bad Accounts in Credit Card Industry Classification of Bad Accounts in Credit Card Industry Chengwei Yuan December 12, 2014 Introduction Risk management is critical for a credit card company to survive in such competing industry. In addition

More information

Making Sense of the Mayhem: Machine Learning and March Madness

Making Sense of the Mayhem: Machine Learning and March Madness Making Sense of the Mayhem: Machine Learning and March Madness Alex Tran and Adam Ginzberg Stanford University atran3@stanford.edu ginzberg@stanford.edu I. Introduction III. Model The goal of our research

More information

FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM

FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

Digital image processing

Digital image processing 746A27 Remote Sensing and GIS Lecture 4 Digital image processing Chandan Roy Guest Lecturer Department of Computer and Information Science Linköping University Digital Image Processing Most of the common

More information

Support Vector Machines for Dynamic Biometric Handwriting Classification

Support Vector Machines for Dynamic Biometric Handwriting Classification Support Vector Machines for Dynamic Biometric Handwriting Classification Tobias Scheidat, Marcus Leich, Mark Alexander, and Claus Vielhauer Abstract Biometric user authentication is a recent topic in the

More information

MBA 611 STATISTICS AND QUANTITATIVE METHODS

MBA 611 STATISTICS AND QUANTITATIVE METHODS MBA 611 STATISTICS AND QUANTITATIVE METHODS Part I. Review of Basic Statistics (Chapters 1-11) A. Introduction (Chapter 1) Uncertainty: Decisions are often based on incomplete information from uncertain

More information

FEGYVERNEKI SÁNDOR, PROBABILITY THEORY AND MATHEmATICAL

FEGYVERNEKI SÁNDOR, PROBABILITY THEORY AND MATHEmATICAL FEGYVERNEKI SÁNDOR, PROBABILITY THEORY AND MATHEmATICAL STATIsTICs 4 IV. RANDOm VECTORs 1. JOINTLY DIsTRIBUTED RANDOm VARIABLEs If are two rom variables defined on the same sample space we define the joint

More information

Component Ordering in Independent Component Analysis Based on Data Power

Component Ordering in Independent Component Analysis Based on Data Power Component Ordering in Independent Component Analysis Based on Data Power Anne Hendrikse Raymond Veldhuis University of Twente University of Twente Fac. EEMCS, Signals and Systems Group Fac. EEMCS, Signals

More information

Statistics I for QBIC. Contents and Objectives. Chapters 1 7. Revised: August 2013

Statistics I for QBIC. Contents and Objectives. Chapters 1 7. Revised: August 2013 Statistics I for QBIC Text Book: Biostatistics, 10 th edition, by Daniel & Cross Contents and Objectives Chapters 1 7 Revised: August 2013 Chapter 1: Nature of Statistics (sections 1.1-1.6) Objectives

More information

Under Real Spoofing Attacks

Under Real Spoofing Attacks Security Evaluation of Biometric Authentication Systems Under Real Spoofing Attacks Battista Biggio, Zahid Akhtar, Giorgio Fumera, Gian Luca Marcialis, and Fabio Roli Department of Electrical and Electronic

More information

LAB 4 INSTRUCTIONS CONFIDENCE INTERVALS AND HYPOTHESIS TESTING

LAB 4 INSTRUCTIONS CONFIDENCE INTERVALS AND HYPOTHESIS TESTING LAB 4 INSTRUCTIONS CONFIDENCE INTERVALS AND HYPOTHESIS TESTING In this lab you will explore the concept of a confidence interval and hypothesis testing through a simulation problem in engineering setting.

More information

Foundation of Quantitative Data Analysis

Foundation of Quantitative Data Analysis Foundation of Quantitative Data Analysis Part 1: Data manipulation and descriptive statistics with SPSS/Excel HSRS #10 - October 17, 2013 Reference : A. Aczel, Complete Business Statistics. Chapters 1

More information

Conclusions and Future Directions

Conclusions and Future Directions Chapter 9 This chapter summarizes the thesis with discussion of (a) the findings and the contributions to the state-of-the-art in the disciplines covered by this work, and (b) future work, those directions

More information

Biometric Performance Testing Methodology Standards. Michael Thieme, Vice President IBG, A Novetta Solutions Company

Biometric Performance Testing Methodology Standards. Michael Thieme, Vice President IBG, A Novetta Solutions Company Biometric Performance Testing Methodology Standards Michael Thieme, Vice President IBG, A Novetta Solutions Company Overview Published standards In-development ISO/IEC standards Scope and status 2 Published

More information

Lean Six Sigma Analyze Phase Introduction. TECH 50800 QUALITY and PRODUCTIVITY in INDUSTRY and TECHNOLOGY

Lean Six Sigma Analyze Phase Introduction. TECH 50800 QUALITY and PRODUCTIVITY in INDUSTRY and TECHNOLOGY TECH 50800 QUALITY and PRODUCTIVITY in INDUSTRY and TECHNOLOGY Before we begin: Turn on the sound on your computer. There is audio to accompany this presentation. Audio will accompany most of the online

More information

AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION

AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION Saurabh Asija 1, Rakesh Singh 2 1 Research Scholar (Computer Engineering Department), Punjabi University, Patiala. 2 Asst.

More information

Lesson 4 Measures of Central Tendency

Lesson 4 Measures of Central Tendency Outline Measures of a distribution s shape -modality and skewness -the normal distribution Measures of central tendency -mean, median, and mode Skewness and Central Tendency Lesson 4 Measures of Central

More information

Security Issues in Smart Infrastructures for MMBS of Wireless Images for ATM banking

Security Issues in Smart Infrastructures for MMBS of Wireless Images for ATM banking Security Issues in Smart Infrastructures for MMBS of Wireless s for ATM banking S.Koteswari #1, Dr.P.John Paul *2,S.Indrani ~3 # 1 Associate. Professor, Dept of ECE, D.N.R Engineering College, Bhimavaram,W.G.Dist,

More information

White Paper Think BIG

White Paper Think BIG White Paper Think BIG Fusion of Biometric and Biographic Data In Large-Scale Identification Projects WCC is a global leader in search and match technology with a market leading platform for identification

More information

Biometric Authentication using Online Signature

Biometric Authentication using Online Signature University of Trento Department of Mathematics Outline Introduction An example of authentication scheme Performance analysis and possible improvements Outline Introduction An example of authentication

More information

Introduction; Descriptive & Univariate Statistics

Introduction; Descriptive & Univariate Statistics Introduction; Descriptive & Univariate Statistics I. KEY COCEPTS A. Population. Definitions:. The entire set of members in a group. EXAMPLES: All U.S. citizens; all otre Dame Students. 2. All values of

More information

Assessment. Presenter: Yupu Zhang, Guoliang Jin, Tuo Wang Computer Vision 2008 Fall

Assessment. Presenter: Yupu Zhang, Guoliang Jin, Tuo Wang Computer Vision 2008 Fall Automatic Photo Quality Assessment Presenter: Yupu Zhang, Guoliang Jin, Tuo Wang Computer Vision 2008 Fall Estimating i the photorealism of images: Distinguishing i i paintings from photographs h Florin

More information

ANN Based Fault Classifier and Fault Locator for Double Circuit Transmission Line

ANN Based Fault Classifier and Fault Locator for Double Circuit Transmission Line International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Special Issue-2, April 2016 E-ISSN: 2347-2693 ANN Based Fault Classifier and Fault Locator for Double Circuit

More information

ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan

ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification

More information

1. Classification problems

1. Classification problems Neural and Evolutionary Computing. Lab 1: Classification problems Machine Learning test data repository Weka data mining platform Introduction Scilab 1. Classification problems The main aim of a classification

More information

Bayesian probability theory

Bayesian probability theory Bayesian probability theory Bruno A. Olshausen arch 1, 2004 Abstract Bayesian probability theory provides a mathematical framework for peforming inference, or reasoning, using probability. The foundations

More information

Learning Example. Machine learning and our focus. Another Example. An example: data (loan application) The data and the goal

Learning Example. Machine learning and our focus. Another Example. An example: data (loan application) The data and the goal Learning Example Chapter 18: Learning from Examples 22c:145 An emergency room in a hospital measures 17 variables (e.g., blood pressure, age, etc) of newly admitted patients. A decision is needed: whether

More information

Visual-based ID Verification by Signature Tracking

Visual-based ID Verification by Signature Tracking Visual-based ID Verification by Signature Tracking Mario E. Munich and Pietro Perona California Institute of Technology www.vision.caltech.edu/mariomu Outline Biometric ID Visual Signature Acquisition

More information

Point Biserial Correlation Tests

Point Biserial Correlation Tests Chapter 807 Point Biserial Correlation Tests Introduction The point biserial correlation coefficient (ρ in this chapter) is the product-moment correlation calculated between a continuous random variable

More information

Review Jeopardy. Blue vs. Orange. Review Jeopardy

Review Jeopardy. Blue vs. Orange. Review Jeopardy Review Jeopardy Blue vs. Orange Review Jeopardy Jeopardy Round Lectures 0-3 Jeopardy Round $200 How could I measure how far apart (i.e. how different) two observations, y 1 and y 2, are from each other?

More information

4. Continuous Random Variables, the Pareto and Normal Distributions

4. Continuous Random Variables, the Pareto and Normal Distributions 4. Continuous Random Variables, the Pareto and Normal Distributions A continuous random variable X can take any value in a given range (e.g. height, weight, age). The distribution of a continuous random

More information

Abstract. 1. Introduction. 1.1. Methodology

Abstract. 1. Introduction. 1.1. Methodology Fingerprint Recognition System Performance in the Maritime Environment Hourieh Fakourfar 1, Serge Belongie 2* 1 Department of Electrical and Computer Engineering, and 2 Department of Computer Science and

More information

Multisensor Data Fusion and Applications

Multisensor Data Fusion and Applications Multisensor Data Fusion and Applications Pramod K. Varshney Department of Electrical Engineering and Computer Science Syracuse University 121 Link Hall Syracuse, New York 13244 USA E-mail: varshney@syr.edu

More information

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA natarajan.meghanathan@jsums.edu

More information

Authentication Scheme for ATM Based On Biometric K. Kavitha, II-MCA IFET COLLEGE OF ENGINEERING DEPARTMENT OF COMPUTER APPLICATIONS

Authentication Scheme for ATM Based On Biometric K. Kavitha, II-MCA IFET COLLEGE OF ENGINEERING DEPARTMENT OF COMPUTER APPLICATIONS Authentication Scheme for ATM Based On Biometric K. Kavitha, II-MCA IFET COLLEGE OF ENGINEERING DEPARTMENT OF COMPUTER APPLICATIONS ABSTRACT: Biometrics based authentication is a potential candidate to

More information

Gamma Distribution Fitting

Gamma Distribution Fitting Chapter 552 Gamma Distribution Fitting Introduction This module fits the gamma probability distributions to a complete or censored set of individual or grouped data values. It outputs various statistics

More information

Online Learning in Biometrics: A Case Study in Face Classifier Update

Online Learning in Biometrics: A Case Study in Face Classifier Update Online Learning in Biometrics: A Case Study in Face Classifier Update Richa Singh, Mayank Vatsa, Arun Ross, and Afzel Noore Abstract In large scale applications, hundreds of new subjects may be regularly

More information

Standardization and Its Effects on K-Means Clustering Algorithm

Standardization and Its Effects on K-Means Clustering Algorithm Research Journal of Applied Sciences, Engineering and Technology 6(7): 399-3303, 03 ISSN: 040-7459; e-issn: 040-7467 Maxwell Scientific Organization, 03 Submitted: January 3, 03 Accepted: February 5, 03

More information

B-bleaching: Agile Overtraining Avoidance in the WiSARD Weightless Neural Classifier

B-bleaching: Agile Overtraining Avoidance in the WiSARD Weightless Neural Classifier B-bleaching: Agile Overtraining Avoidance in the WiSARD Weightless Neural Classifier Danilo S. Carvalho 1,HugoC.C.Carneiro 1,FelipeM.G.França 1, Priscila M. V. Lima 2 1- Universidade Federal do Rio de

More information

Determining optimal window size for texture feature extraction methods

Determining optimal window size for texture feature extraction methods IX Spanish Symposium on Pattern Recognition and Image Analysis, Castellon, Spain, May 2001, vol.2, 237-242, ISBN: 84-8021-351-5. Determining optimal window size for texture feature extraction methods Domènec

More information

Object Recognition and Template Matching

Object Recognition and Template Matching Object Recognition and Template Matching Template Matching A template is a small image (sub-image) The goal is to find occurrences of this template in a larger image That is, you want to find matches of

More information

Lecture 14. Point Spread Function (PSF)

Lecture 14. Point Spread Function (PSF) Lecture 14 Point Spread Function (PSF), Modulation Transfer Function (MTF), Signal-to-noise Ratio (SNR), Contrast-to-noise Ratio (CNR), and Receiver Operating Curves (ROC) Point Spread Function (PSF) Recollect

More information

Curriculum Map Statistics and Probability Honors (348) Saugus High School Saugus Public Schools 2009-2010

Curriculum Map Statistics and Probability Honors (348) Saugus High School Saugus Public Schools 2009-2010 Curriculum Map Statistics and Probability Honors (348) Saugus High School Saugus Public Schools 2009-2010 Week 1 Week 2 14.0 Students organize and describe distributions of data by using a number of different

More information

Lecture 9: Introduction to Pattern Analysis

Lecture 9: Introduction to Pattern Analysis Lecture 9: Introduction to Pattern Analysis g Features, patterns and classifiers g Components of a PR system g An example g Probability definitions g Bayes Theorem g Gaussian densities Features, patterns

More information

Structural Health Monitoring Tools (SHMTools)

Structural Health Monitoring Tools (SHMTools) Structural Health Monitoring Tools (SHMTools) Parameter Specifications LANL/UCSD Engineering Institute LA-CC-14-046 c Copyright 2014, Los Alamos National Security, LLC All rights reserved. May 30, 2014

More information

STATISTICA Formula Guide: Logistic Regression. Table of Contents

STATISTICA Formula Guide: Logistic Regression. Table of Contents : Table of Contents... 1 Overview of Model... 1 Dispersion... 2 Parameterization... 3 Sigma-Restricted Model... 3 Overparameterized Model... 4 Reference Coding... 4 Model Summary (Summary Tab)... 5 Summary

More information

Palmprint Recognition. By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap

Palmprint Recognition. By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap Palmprint Recognition By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap Palm print Palm Patterns are utilized in many applications: 1. To correlate palm patterns with medical disorders, e.g. genetic

More information

Multimedia Document Authentication using On-line Signatures as Watermarks

Multimedia Document Authentication using On-line Signatures as Watermarks Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824

More information

Template and Database Security in Biometrics Systems: A Challenging Task

Template and Database Security in Biometrics Systems: A Challenging Task Template and Database Security in Biometrics Systems: A Challenging Task Manvjeet Kaur Lecturer CSE Deptt. Dr. Sanjeev Sofat Prof. and Head CSE Deptt. Deepak Saraswat ME (CSE) Student ABSTRACT Security

More information

The Role of Size Normalization on the Recognition Rate of Handwritten Numerals

The Role of Size Normalization on the Recognition Rate of Handwritten Numerals The Role of Size Normalization on the Recognition Rate of Handwritten Numerals Chun Lei He, Ping Zhang, Jianxiong Dong, Ching Y. Suen, Tien D. Bui Centre for Pattern Recognition and Machine Intelligence,

More information

The Development of a Pressure-based Typing Biometrics User Authentication System

The Development of a Pressure-based Typing Biometrics User Authentication System The Development of a Pressure-based Typing Biometrics User Authentication System Chen Change Loy Adv. Informatics Research Group MIMOS Berhad by Assoc. Prof. Dr. Chee Peng Lim Associate Professor Sch.

More information

Face Recognition: Impostor-based Measures of Uniqueness and Quality

Face Recognition: Impostor-based Measures of Uniqueness and Quality To appear: Proceedings of the IEEE Conference on Biometrics: Theory, Applications, and Systems, 22. Face Recognition: Impostor-based Measures of Uniqueness and Quality Brendan F. Klare Noblis Falls Church,

More information

Structural Health Monitoring Tools (SHMTools)

Structural Health Monitoring Tools (SHMTools) Structural Health Monitoring Tools (SHMTools) Getting Started LANL/UCSD Engineering Institute LA-CC-14-046 c Copyright 2014, Los Alamos National Security, LLC All rights reserved. May 30, 2014 Contents

More information

CA200 Quantitative Analysis for Business Decisions. File name: CA200_Section_04A_StatisticsIntroduction

CA200 Quantitative Analysis for Business Decisions. File name: CA200_Section_04A_StatisticsIntroduction CA200 Quantitative Analysis for Business Decisions File name: CA200_Section_04A_StatisticsIntroduction Table of Contents 4. Introduction to Statistics... 1 4.1 Overview... 3 4.2 Discrete or continuous

More information

CHAPTER 7 CONCLUSION AND FUTURE WORK

CHAPTER 7 CONCLUSION AND FUTURE WORK 158 CHAPTER 7 CONCLUSION AND FUTURE WORK The aim of this thesis was to present robust watermarking techniques for medical image. Section 7.1, consolidates the contributions made by the researcher and Section

More information

Machine Learning and Data Mining. Fundamentals, robotics, recognition

Machine Learning and Data Mining. Fundamentals, robotics, recognition Machine Learning and Data Mining Fundamentals, robotics, recognition Machine Learning, Data Mining, Knowledge Discovery in Data Bases Their mutual relations Data Mining, Knowledge Discovery in Databases,

More information

Measuring Line Edge Roughness: Fluctuations in Uncertainty

Measuring Line Edge Roughness: Fluctuations in Uncertainty Tutor6.doc: Version 5/6/08 T h e L i t h o g r a p h y E x p e r t (August 008) Measuring Line Edge Roughness: Fluctuations in Uncertainty Line edge roughness () is the deviation of a feature edge (as

More information

Data Exploration Data Visualization

Data Exploration Data Visualization Data Exploration Data Visualization What is data exploration? A preliminary exploration of the data to better understand its characteristics. Key motivations of data exploration include Helping to select

More information

BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES

BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 123 CHAPTER 7 BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 7.1 Introduction Even though using SVM presents

More information

Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks

Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks Ph. D. Student, Eng. Eusebiu Marcu Abstract This paper introduces a new method of combining the

More information

How To Run Statistical Tests in Excel

How To Run Statistical Tests in Excel How To Run Statistical Tests in Excel Microsoft Excel is your best tool for storing and manipulating data, calculating basic descriptive statistics such as means and standard deviations, and conducting

More information

How To Identify A Churner

How To Identify A Churner 2012 45th Hawaii International Conference on System Sciences A New Ensemble Model for Efficient Churn Prediction in Mobile Telecommunication Namhyoung Kim, Jaewook Lee Department of Industrial and Management

More information

VEHICLE TRACKING USING ACOUSTIC AND VIDEO SENSORS

VEHICLE TRACKING USING ACOUSTIC AND VIDEO SENSORS VEHICLE TRACKING USING ACOUSTIC AND VIDEO SENSORS Aswin C Sankaranayanan, Qinfen Zheng, Rama Chellappa University of Maryland College Park, MD - 277 {aswch, qinfen, rama}@cfar.umd.edu Volkan Cevher, James

More information

Evaluation of Feature Selection Methods for Predictive Modeling Using Neural Networks in Credits Scoring

Evaluation of Feature Selection Methods for Predictive Modeling Using Neural Networks in Credits Scoring 714 Evaluation of Feature election Methods for Predictive Modeling Using Neural Networks in Credits coring Raghavendra B. K. Dr. M.G.R. Educational and Research Institute, Chennai-95 Email: raghavendra_bk@rediffmail.com

More information