A Third Generation Automated Teller Machine Using Universal Subscriber Module with Iris Recognition
|
|
|
- Augustus Marshall
- 10 years ago
- Views:
Transcription
1 A Third Generation Automated Teller Machine Using Universal Subscriber Module with Iris Recognition B.Sundar Raj Assistant rofessor, Det of CSE, Bharath University, Chennai, TN, India. ABSTRACT: This aer resents a current invention in the generation of Automatic Teller Machines with Iris recognition for high security. In this the ATM machine is designed to be accessed with a SIM card used for identification and authentication urose and biometric technique such as Iris recognition is deloyed here for a high security access environment. The Microcontroller used here is AT89S51.GSM module scans the SIM and matches the number with the number stored in the database. Iris scanner scans the Iris, which is converted into a code and comared with the temlate stored in the database by using MATLAB.Voice annunciation module and Alert module are added u with the ATM as additional features. KEYWORDS: Alert module; AT89S51; Biometrics; GSM module; Iris recognition; SIM card; Voice annunciation module. I. INTRODUCTION ATMs have become very oular with the general ublic for their availability and general user friendliness. ATMs are now found in many locations. For examle, ATMs are tyically found in restaurants, suermarkets, Convenience stores, malls, schools, gas stations, hotels, work locations, banking centers, airorts, entertainment establishments, transortation facilities ATMs are tyically available to consumers on a continuous basis such that consumers have the ability to carry out their ATM financial transactions and/or banking functions at any time of the day and on any day of the week. In real time ATM cards are being used as a form of identification and authentication. But there is a highest ossibility for the ATM cards to be theft or lost and even if the card is bent or heated, it becomes useless to access the ATM machine. With the increase of automated teller machine (ATM) frauds, new authentication mechanisms are develoed to overcome security roblems. One inherent roblem with ATM cards is the ossibility of loss or theft and it should be carried for each and every transaction, which we forget to do in many cases. This roblem has romoted interest in biometric identification methods, including iris recognition. The iris is chosen due to its unique biological roerties, excetionally suited for identification. It is rotected from the environment, stable over time, unique in shae and contains a high amount of discriminating information. This Proosed aer uses IRIS recognition system which is a comuter alication for automatically identifying or verifying a erson by an image of the IRIS from the IRIS scanner fitted with the ATM machine, oerated using our SIM in the mobile hone. Thus this aer rooses a method to integrate iris recognition in ATM with SIM instead of ATM cards to develo a high security access environment. II. HARDWARE DESCRIPTION A. Power Suly The ower suly circuit is built using filters, rectifiers, and then voltage regulators. The inut is a 230V AC suly, which is converted into a DC voltage when it asses through the rectifier circuit. The outut of the rectifier circuit is an unregulated DC voltage, through the regulator circuit (LM7805). Hence the final outut obtained from the ower suly circuit is +5V DC suly. B. Microcontroller A microcontroller is heart of the embedded system. It contains a rocessor core, memory, and rogrammable inut/outut eriherals. The microcontroller used here is AT89S51 from ATMEL with 4K Bytes of In-System Programmable (ISP) Flash Memory, 128 x 8-bit Internal RAM and 4.0V to 5.5V Oerating Range. The image that is Coyright to IJIRCCE 565
2 obtained from the iris scanner is fed into the microcontroller such that the inut image of the iris is matched with the image that is already stored in the database. Figure 1: Block Diagram C. Alarm Unit A buzzer or beeer is a signaling device; it is usually electronic and is tyically used in automobiles, household aliances such as a microwave oven, or game shows etc. Initially this device was based on an electromechanical system which was identical to an electric bell without the metal gong (which makes the ringing noise).the alarm is activated when there is a wrong erson accessing the account. The wrong client access can be found when the SIM number and the IRIS image do not match with that of the reviously stored information in the database. D. GSM Modem A GSM modem is a wireless modem that works with a GSM wireless network. A wireless modem behaves like a dial-u modem. The main difference between them is that a dial-u modem sends and receives data through a fixed telehone line while a wireless modem sends and receives data through radio waves. A GSM modem can be an external device; it contains a SIM scanning device. Tyically, an external GSM modem is connected to a comuter through a serial cable or a USB cable. Comuter can oerate the GSM modem using AT commands, through which a message can be sent as well as received. GSM modems suort an extended set of AT commands. E. Voice Annunciation Unit The voice annunciation unit is connected with one of the orts in the microcontroller. Eight different voices can be enabled using this voice chi. Each rocess is intimated using voice annunciation unit. F. Serial Communication Serial communication is the rocess of sending data one bit at a time, sequentially, over a communication channel or comuter bus. Here serial communication between the comuter and the microcontroller takes lace through max232 IC. The MAX232 is an integrated circuit that converts signals from an RS-232 serial ort to signals suitable for use in TTL comatible digital logic circuits. III. SIM CARD RECOGNITION One of the key features of GSM is the Subscriber Identity Module, commonly known as a SIM card. A subscriber identity module or subscriber identification module (SIM) is an integrated circuit that securely stores the International Mobile Subscriber Identity (IMSI) and the related key used to identify and authenticate subscribers on mobile telehony devices (such as mobile hones and comuters).sim cards are identified on their individual oerator networks by a unique IMSI. Coyright to IJIRCCE 566
3 Figure 2: SIM Recognition Proces The SIM is inserted in the GSM Module; the SIM scanning device in the GSM Module scan s the SIM and retrieves the SIM number from it. This retrieved SIM number is comared with the reviously stored SIM number in the database. If the SIM number matches with that of the database, then further rocess of scanning and recognizing the iris of the authenticated erson takes lace. IV. IRIS RECOGNITION SYSTEM The iris is the colored ortion of the eye that surrounds the uil as shown in Fig. 3. It controls light levels inside the eye similar to the aerture of a camera. The round oening in the center of the iris is called the uil. The iris is embedded with tiny muscles that dilate and constrict the uil size. It is full of richly textured atterns that are distinct from erson to erson, and in fact are distinct from left eye to right eye of the same erson. Figure 3: Image of the eye Generally, an iris recognition system is comosed of many stages as shown in Fig. 4. Firstly, an image of the erson's eye is catured and rerocessed. Secondly, the image is localized to determine the iris boundaries. Thirdly, the iris boundary coordinates are converted to the stretched olar coordinates to normalize the scale and illumination of the iris in the image. Fourthly, features reresenting the iris atterns are extracted based on texture analysis. Finally, the erson is identified by comaring his/her features with an iris feature database. Figure 4: Block diagram for Iris Recognition system A. Image Acquisition The iris image should be rich in iris texture as the feature extraction stage deends uon the image quality. The following attentions have been taken care at the time of grabbing the image. High resolution and good sharness: It is necessary for the accurate detection of outer and inner circle boundaries. Good lighting condition: The system of diffused light is used to revent sotlight effect. B. Iris Localization The acquired iris image has to be rerocessed to detect the iris, which is an annular ortion between the uil (inner boundary) and the sclera (outer boundary). The first ste in iris localization is to detect uil which is the black circular Coyright to IJIRCCE 567
4 art surrounded by iris tissues. The center of uil can be used to detect the outer radius of iris atterns. The imortant stes involved are: (a) Puil detection (b) Outer iris localization (a) Puil Detection The iris image is converted into gray scale to remove the effect of illumination. As uil is the largest black area in the intensity image, its edges can be detected easily from the binarized image by using suitable threshold on the intensity image. But the roblem of binarization arises in case of ersons having dark iris. Thus the localization of uil fails in such cases. In order to overcome these roblems Circular Hough Transformation for uil detection can be used. The basic idea of this technique is to find curves that can be arameterized like straight lines, olynomials, circles, etc., in a suitable arameter sace. The transformation is able to overcome artifacts such as shadows and noise. The rocedure first finds the intensity image gradient at all the locations in the given image by convolving with the sobel filters. The gradient images (G vertical and G Horizontal ) along x and y direction, is obtained by kernels that detect horizontal and vertical changes in the image. The sobel filter kernels are C vertical ={ ; 0 0 0;1 2 1} (1) C horizontal ={-1 0 1;-2 0 2;-1 0 1} The absolute value of the gradient images along the vertical and horizontal direction is obtained to form an absolute gradient image using the equation G G G (2) abs Vertical Horizontal Where Vertical is the convolution of image with C vertical and G horizontal is the convolution of image with C horizontal. The absolute gradient image is used to find edges using Canny [7]. The edge image is scanned for ixel (P) having true value and the center is determined with the hel of the following equations xc x r * cos( ) (3) yc y r * sin( ) Where x, y is the coordinates at ixel P and r is the ossible range of radius values, θ ranges from [0: π] For a articular value of r, the values of xc and yc are obtained and stored in an accumlator and the accumulator counter is incremented every time the values of xc and yc satisfy image dimension criteria. The maximum value of accumulator counter gives the centre of the uil along with the radius as shown in Figure 5. Figure 5: Stes involved in detection of inner uil boundary (b) Outer Iris Localization External noise is removed by blurring the intensity image. But too much blurring may dilate the boundaries of the edge or may make it difficult to detect the outer iris boundary, searating the eyeball and sclera. After filtering, the contrast of image is enhanced to have shar variation at image boundaries using histogram equalization as shown in Figure 6(a). This contrast enhanced image is used for finding the outer iris boundary by drawing concentric circles, as shown in Figure 6(b), of different radii from the uil center and the intensities lying over the erimeter of the circle are summed u. Among the candidate iris circles, the circle having a maximum change in intensity with resect to the revious drawn circle is the iris outer boundary. Figure 6(c) shows an examle of localized iris image. Figure 6: (a) Contrast enhanced image (b) Concentric circles of different radii (c) Localized Iris image Coyright to IJIRCCE 568
5 C. Iris Normalization Once the iris region is segmented, the next stage is to normalize this art, to enable generation of the "iriscode" and their comarisons. Since variations in the eye, like otical size of the iris, osition of uil in the iris, and the iris orientation change erson to erson, it is required to normalize the iris image so that the reresentation is common to all with similar dimensions. Normalization rocess involves unwraing the iris and converting it into its olar equivalent as shown in Fig. 7 Figure 7: Generating normalized iris image The remaing of the iris region from the Cartesian coordinates to the normalized non-concentric olar reresentation is modeled as: I( x(, ), y(, )) I (, ) with x (, ) x x (, ) x i 0 y (, ) y 0 i0 ( ) r ( ) r *cos( ) *sin( ) ( ) r *cos( ) i yi (, ) xi0( ) ri *sin( ) (4) Where r and r i are resectively the radius of uil and the iris, while (x (θ), y (θ)) and (x i (θ), y i (θ)) are the coordinates of the uillary and limbic boundaries in the direction θ. The value of θ belongs to [0; 2 ], ρ belongs to [0; 1]. Figure 8: Normalized Iris image D. Feature extraction The Wavelet transform is used to extract features from the enhanced iris images. Haar wavelet is used as the mother wavelet. The Wavelet transform breaks an image down into four sub-samled images. The results consist of one image that has been high-ass filtered in the horizontal and vertical directions (HH or diagonal coefficients), one that has been low-ass filtered in the vertical and high-ass filtered in the horizontal (LH or horizontal coefficients), one that has been lowass filtered in the horizontal and high-ass filtered in the vertical (HL or vertical coefficients), and one that has been low-ass filtered in both directions (LL or details coefficient). In order to generate the binary data, feature vector is encoded by using two and four level quantization as shown in Fig. 7, which shows the rocess used for obtaining the feature vectors with the otimized dimension. Here, H and L refer to the high-ass and the low-ass filter, resectively, and HH indicates that the high-ass filter is alied to the signals of both axes. Coyright to IJIRCCE 569
6 Figure 9: Organization of feature vector (Black indicates 4 levels quantization, grey indicates two levels quantization) E. Identification The last module of an iris recognition system is used for matching two iris temlates. Its urose is to measure how similar or different the temlates are and to decide whether they belong to the same individual or not. An aroriate match metric can be based on direct oint-wise comarisons between the hase codes. The test of matching is imlemented by the XOR oerator that is alied to the encoded feature vector of any two iris atterns. The XOR oerator detects disagreement between any corresonding air of bits. The system quantifies this matter by comuting the ercentage of mismatched bits between a air of iris reresentations, i.e., the normalized Hamming distance. Let X and Y are two iris temlates to be comared and N is the total number of bits so, HD is equal to the number of disagreed bits divided by N as shown in equation 5. (5) In order to avoid rotation inconsistencies which occur due to head tilts, the iris temlate is shifted right and left by 8 bits. It may be easily shown that scrolling the temlate in olar coordinates is equivalent to iris rotation in Cartesian coordinates. The system erforms matching of two temlates several times while shifting one of them to four different locations. The smallest HD value amongst all these values is selected, which gives the matching decision. If HD <= 0.32 decide that it is same erson If HD > 0.32 decide that it is different erson V.OVERALL FLOWCHART OF THE PROJECT The first ste is to insert the SIM in the GSM Module; the SIM scanning device in the GSM Module will scan s the SIM and retrieves the SIM number from it. This retrieved SIM number is comared with the reviously stored SIM number in the database. If the SIM number matches with that of the database, then further rocess of scanning and recognizing the iris takes lace. The second ste is the caturing of an IRIS image. This would normally be done using a CCD camera. The IRIS image is converted into binary code and assed to the database for recognition (identification or verification). Coyright to IJIRCCE 570
7 Figure 10: Overall flowchart of the roject This would normally involve a number of stes such as localization, normalization, feature extraction etc. Then the IRIS image and the temlate of IRIS is to be comared to those in the database. The matching for IRIS is done through Hamming Distance. The match can either be a true match which would lead to access the ATM account or it might be a false which means the unauthenticated erson is trying to access the account and the alarm rings. VII. CONCLUSION We have successfully develoed a new tye of ATM system with Iris Recognition and universal subscriber module, caable of comaring two digital eye-images and universasl subscriber module for scanning the sim s number. This identification system is quite simle requiring few comonents and is effective enough to be integrated within security systems that require an identity check. The errors that occurred can be easily overcome by the use of stable equiment. Judging by clear identification and verification we can exect ATM systems would rovide a secure high security to become the leading technology. REFERENCES [1]G.Gimini Sahaya Glory, Sanjana Devi.V.V. Imroving ATM security via face recognition (IEEE 2011) [2]Mohammed A. M. Abdullah F. H. A. Al-Dulaimi,Waleed Al-Nuaimy Ali Al-Ataby. University of Mosul,University of Liverool. Smart card with iris recognition for high security access environment. (IEEE 2011) [3]Mansi Jhamb, Vinod Kumar Khera USIT, Guru Gobind Singh Inderrastha University Delhi, India Guru Tegh Bahadur Institute Of technology, GGSIPU,Delhi. IRIS Based Human Recognition System (IEEE 2010) [4]Yan Sui., Xukai Zou. and Eliza Yingzi Du, Biometrics-based authentication: a new aroach, Indiana University Purdue University Indianaolis, Indiana 46202, USA (IEEE 2011). [5] C. H. Daouk, L. A. El-Esber, F. D. Kammoun and M. A. Al Alaoui Electrical and Comuter Engineering Deartment, Faculty of Engineering and ArchitectureAmerican University of Beirut IRIS RECOGNITION (IEEE 2002) [6] Yun Yang. JiaMi School of Electrical and Information Engineering Shaanxi University of Science & Technology Xi' an, China A TM terminal design is based on fingerrint recognition ( 2010 IEEE) [7] Mansi Jhamb1, Vinod Kumar Khera2 USIT, Guru Gobind Singh Inderrastha University Delhi, India1 Guru Tegh Bahadur Institute Of technology, GGSIPU,Delhi2 IRIS Based Human Recognition System ( IEEE 2010 ) [8] David Marius Daniel, Borda Monica Faculty Of Electronics,Telecommunications And Information Technology, Technical University Of Cluj- Naoca, Cluj-Naoca, Romania Person Authentication Technique Using Human Iris Recognition (IEE 2010) Coyright to IJIRCCE 571
HALF-WAVE & FULL-WAVE RECTIFICATION
HALF-WAE & FULL-WAE RECTIFICATION Objectives: HALF-WAE & FULL-WAE RECTIFICATION To recognize a half-wave rectified sinusoidal voltage. To understand the term mean value as alied to a rectified waveform.
Alpha Channel Estimation in High Resolution Images and Image Sequences
In IEEE Comuter Society Conference on Comuter Vision and Pattern Recognition (CVPR 2001), Volume I, ages 1063 68, auai Hawaii, 11th 13th Dec 2001 Alha Channel Estimation in High Resolution Images and Image
A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm
International Journal of Comuter Theory and Engineering, Vol. 7, No. 4, August 2015 A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm Xin Lu and Zhuanzhuan Zhang Abstract This
ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS
ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS Liviu Grigore Comuter Science Deartment University of Illinois at Chicago Chicago, IL, 60607 [email protected] Ugo Buy Comuter Science
One-Chip Linear Control IPS, F5106H
One-Chi Linear Control IPS, F5106H NAKAGAWA Sho OE Takatoshi IWAMOTO Motomitsu ABSTRACT In the fi eld of vehicle electrical comonents, the increasing demands for miniaturization, reliability imrovement
Modeling and Simulation of an Incremental Encoder Used in Electrical Drives
10 th International Symosium of Hungarian Researchers on Comutational Intelligence and Informatics Modeling and Simulation of an Incremental Encoder Used in Electrical Drives János Jób Incze, Csaba Szabó,
An Associative Memory Readout in ESN for Neural Action Potential Detection
g An Associative Memory Readout in ESN for Neural Action Potential Detection Nicolas J. Dedual, Mustafa C. Ozturk, Justin C. Sanchez and José C. Princie Abstract This aer describes how Echo State Networks
CABRS CELLULAR AUTOMATON BASED MRI BRAIN SEGMENTATION
XI Conference "Medical Informatics & Technologies" - 2006 Rafał Henryk KARTASZYŃSKI *, Paweł MIKOŁAJCZAK ** MRI brain segmentation, CT tissue segmentation, Cellular Automaton, image rocessing, medical
Concurrent Program Synthesis Based on Supervisory Control
010 American Control Conference Marriott Waterfront, Baltimore, MD, USA June 30-July 0, 010 ThB07.5 Concurrent Program Synthesis Based on Suervisory Control Marian V. Iordache and Panos J. Antsaklis Abstract
Load Balancing Mechanism in Agent-based Grid
Communications on Advanced Comutational Science with Alications 2016 No. 1 (2016) 57-62 Available online at www.isacs.com/cacsa Volume 2016, Issue 1, Year 2016 Article ID cacsa-00042, 6 Pages doi:10.5899/2016/cacsa-00042
This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.
This document is downloaded from DR-NTU, Nanyang Technological University Library, Singaore. Title Automatic Robot Taing: Auto-Path Planning and Maniulation Author(s) Citation Yuan, Qilong; Lembono, Teguh
Automatic Search for Correlated Alarms
Automatic Search for Correlated Alarms Klaus-Dieter Tuchs, Peter Tondl, Markus Radimirsch, Klaus Jobmann Institut für Allgemeine Nachrichtentechnik, Universität Hannover Aelstraße 9a, 0167 Hanover, Germany
Module 5. Three-phase AC Circuits. Version 2 EE IIT, Kharagpur
Module 5 Three-hase AC Circuits ersion EE T, Kharagur esson 9 Three-hase Delta- Connected Balanced oad ersion EE T, Kharagur n the revious (first) lesson of this module, the two tyes of connections (star
Sage Timberline Office
Sage Timberline Office Get Started Document Management 9.8 NOTICE This document and the Sage Timberline Office software may be used only in accordance with the accomanying Sage Timberline Office End User
Re-Dispatch Approach for Congestion Relief in Deregulated Power Systems
Re-Disatch Aroach for Congestion Relief in Deregulated ower Systems Ch. Naga Raja Kumari #1, M. Anitha 2 #1, 2 Assistant rofessor, Det. of Electrical Engineering RVR & JC College of Engineering, Guntur-522019,
Local Connectivity Tests to Identify Wormholes in Wireless Networks
Local Connectivity Tests to Identify Wormholes in Wireless Networks Xiaomeng Ban Comuter Science Stony Brook University [email protected] Rik Sarkar Comuter Science Freie Universität Berlin [email protected]
Design of A Knowledge Based Trouble Call System with Colored Petri Net Models
2005 IEEE/PES Transmission and Distribution Conference & Exhibition: Asia and Pacific Dalian, China Design of A Knowledge Based Trouble Call System with Colored Petri Net Models Hui-Jen Chuang, Chia-Hung
NOISE ANALYSIS OF NIKON D40 DIGITAL STILL CAMERA
NOISE ANALYSIS OF NIKON D40 DIGITAL STILL CAMERA F. Mojžíš, J. Švihlík Detartment of Comuting and Control Engineering, ICT Prague Abstract This aer is devoted to statistical analysis of Nikon D40 digital
CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS
Review of the Air Force Academy No (23) 203 CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS Cătălin CIOACĂ Henri Coandă Air Force Academy, Braşov, Romania Abstract: The
Synopsys RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Development FRANCE
RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Develoment FRANCE Synosys There is no doubt left about the benefit of electrication and subsequently
Softmax Model as Generalization upon Logistic Discrimination Suffers from Overfitting
Journal of Data Science 12(2014),563-574 Softmax Model as Generalization uon Logistic Discrimination Suffers from Overfitting F. Mohammadi Basatini 1 and Rahim Chiniardaz 2 1 Deartment of Statistics, Shoushtar
Static and Dynamic Properties of Small-world Connection Topologies Based on Transit-stub Networks
Static and Dynamic Proerties of Small-world Connection Toologies Based on Transit-stub Networks Carlos Aguirre Fernando Corbacho Ramón Huerta Comuter Engineering Deartment, Universidad Autónoma de Madrid,
Service Network Design with Asset Management: Formulations and Comparative Analyzes
Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with
Sage Document Management. User's Guide Version 12.1
Sage Document Management User's Guide Version 12.1 NOTICE This is a ublication of Sage Software, Inc. Version 12.1. November, 2012 Coyright 2012. Sage Software, Inc. All rights reserved. Sage, the Sage
Sage Document Management. User's Guide Version 13.1
Sage Document Management User's Guide Version 13.1 This is a ublication of Sage Software, Inc. Version 13.1 Last udated: June 19, 2013 Coyright 2013. Sage Software, Inc. All rights reserved. Sage, the
A Certification Authority for Elliptic Curve X.509v3 Certificates
A Certification Authority for Ellitic Curve X509v3 Certificates Maria-Dolores Cano, Ruben Toledo-Valera, Fernando Cerdan Det of Information Technologies & Communications Technical University of Cartagena
Point Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11)
Point Location Prerocess a lanar, olygonal subdivision for oint location ueries. = (18, 11) Inut is a subdivision S of comlexity n, say, number of edges. uild a data structure on S so that for a uery oint
Storage Basics Architecting the Storage Supplemental Handout
Storage Basics Architecting the Storage Sulemental Handout INTRODUCTION With digital data growing at an exonential rate it has become a requirement for the modern business to store data and analyze it
FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES
Document: MRM-1004-GAPCFR11 (0005) Page: 1 / 18 FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES AUDIT TRAIL ECO # Version Change Descrition MATRIX- 449 A Ga Analysis after adding controlled documents
DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON
DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON Rosario Esínola, Javier Contreras, Francisco J. Nogales and Antonio J. Conejo E.T.S. de Ingenieros Industriales, Universidad
Service Network Design with Asset Management: Formulations and Comparative Analyzes
Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with
Secure synthesis and activation of protocol translation agents
Home Search Collections Journals About Contact us My IOPscience Secure synthesis and activation of rotocol translation agents This content has been downloaded from IOPscience. Please scroll down to see
C-Bus Voltage Calculation
D E S I G N E R N O T E S C-Bus Voltage Calculation Designer note number: 3-12-1256 Designer: Darren Snodgrass Contact Person: Darren Snodgrass Aroved: Date: Synosis: The guidelines used by installers
Memory management. Chapter 4: Memory Management. Memory hierarchy. In an ideal world. Basic memory management. Fixed partitions: multiple programs
Memory management Chater : Memory Management Part : Mechanisms for Managing Memory asic management Swaing Virtual Page relacement algorithms Modeling age relacement algorithms Design issues for aging systems
An inventory control system for spare parts at a refinery: An empirical comparison of different reorder point methods
An inventory control system for sare arts at a refinery: An emirical comarison of different reorder oint methods Eric Porras a*, Rommert Dekker b a Instituto Tecnológico y de Estudios Sueriores de Monterrey,
Web Application Scalability: A Model-Based Approach
Coyright 24, Software Engineering Research and Performance Engineering Services. All rights reserved. Web Alication Scalability: A Model-Based Aroach Lloyd G. Williams, Ph.D. Software Engineering Research
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Bharath K M, Rohit C V Student of B.E Electronics and Communication Coorg Institute of Technology,
Measuring relative phase between two waveforms using an oscilloscope
Measuring relative hase between two waveforms using an oscilloscoe Overview There are a number of ways to measure the hase difference between two voltage waveforms using an oscilloscoe. This document covers
A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION
9 th ASCE Secialty Conference on Probabilistic Mechanics and Structural Reliability PMC2004 Abstract A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION
A Simple Model of Pricing, Markups and Market. Power Under Demand Fluctuations
A Simle Model of Pricing, Markus and Market Power Under Demand Fluctuations Stanley S. Reynolds Deartment of Economics; University of Arizona; Tucson, AZ 85721 Bart J. Wilson Economic Science Laboratory;
Comparing Dissimilarity Measures for Symbolic Data Analysis
Comaring Dissimilarity Measures for Symbolic Data Analysis Donato MALERBA, Floriana ESPOSITO, Vincenzo GIOVIALE and Valentina TAMMA Diartimento di Informatica, University of Bari Via Orabona 4 76 Bari,
Multiperiod Portfolio Optimization with General Transaction Costs
Multieriod Portfolio Otimization with General Transaction Costs Victor DeMiguel Deartment of Management Science and Oerations, London Business School, London NW1 4SA, UK, [email protected] Xiaoling Mei
TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES
TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES C. Gutiérrez, S. Servigne, R. Laurini LIRIS, INSA Lyon, Bât. Blaise Pascal, 20 av. Albert Einstein 69621 Villeurbanne, France
HIGH PROTECTION HUMAN IRIS AUTHENTICATION IN NEW ATM TERMINAL DESIGN USING BIOMETRICS MECHANISM
Volume 3, No. 11, November 2012 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info HIGH PROTECTION HUMAN IRIS AUTHENTICATION IN NEW ATM TERMINAL DESIGN USING
Monitoring Frequency of Change By Li Qin
Monitoring Frequency of Change By Li Qin Abstract Control charts are widely used in rocess monitoring roblems. This aer gives a brief review of control charts for monitoring a roortion and some initial
Failure Behavior Analysis for Reliable Distributed Embedded Systems
Failure Behavior Analysis for Reliable Distributed Embedded Systems Mario Tra, Bernd Schürmann, Torsten Tetteroo {tra schuerma tetteroo}@informatik.uni-kl.de Deartment of Comuter Science, University of
The Online Freeze-tag Problem
The Online Freeze-tag Problem Mikael Hammar, Bengt J. Nilsson, and Mia Persson Atus Technologies AB, IDEON, SE-3 70 Lund, Sweden [email protected] School of Technology and Society, Malmö University,
Title: Stochastic models of resource allocation for services
Title: Stochastic models of resource allocation for services Author: Ralh Badinelli,Professor, Virginia Tech, Deartment of BIT (235), Virginia Tech, Blacksburg VA 2461, USA, [email protected] Phone : (54) 231-7688,
COST CALCULATION IN COMPLEX TRANSPORT SYSTEMS
OST ALULATION IN OMLEX TRANSORT SYSTEMS Zoltán BOKOR 1 Introduction Determining the real oeration and service costs is essential if transort systems are to be lanned and controlled effectively. ost information
Situation Based Strategic Positioning for Coordinating a Team of Homogeneous Agents
Situation Based Strategic Positioning for Coordinating a Team of Homogeneous Agents Luís Paulo Reis, Nuno Lau 2 and Eugénio Costa Oliveira LIACC Artificial Intelligence and Comuter Science Lab., University
The impact of metadata implementation on webpage visibility in search engine results (Part II) q
Information Processing and Management 41 (2005) 691 715 www.elsevier.com/locate/inforoman The imact of metadata imlementation on webage visibility in search engine results (Part II) q Jin Zhang *, Alexandra
IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATM P.Nagarajan PG Scholar ECE Department, Bannari Amman Institute of Technology, [email protected] Dr. Ramesh S M Associate. Professor ECE Department,
INFERRING APP DEMAND FROM PUBLICLY AVAILABLE DATA 1
RESEARCH NOTE INFERRING APP DEMAND FROM PUBLICLY AVAILABLE DATA 1 Rajiv Garg McCombs School of Business, The University of Texas at Austin, Austin, TX 78712 U.S.A. {[email protected]} Rahul
Moving Objects Tracking in Video by Graph Cuts and Parameter Motion Model
International Journal of Comuter Alications (0975 8887) Moving Objects Tracking in Video by Grah Cuts and Parameter Motion Model Khalid Housni, Driss Mammass IRF SIC laboratory, Faculty of sciences Agadir
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Khatmode Ranjit P 1, Kulkarni Ramchandra V 2, Ghodke Bharat S 3, Prof. P. P. Chitte 4, Prof. Anap S. D 5 1 Student
Factoring Variations in Natural Images with Deep Gaussian Mixture Models
Factoring Variations in Natural Images with Dee Gaussian Mixture Models Aäron van den Oord, Benjamin Schrauwen Electronics and Information Systems deartment (ELIS), Ghent University {aaron.vandenoord,
An important observation in supply chain management, known as the bullwhip effect,
Quantifying the Bullwhi Effect in a Simle Suly Chain: The Imact of Forecasting, Lead Times, and Information Frank Chen Zvi Drezner Jennifer K. Ryan David Simchi-Levi Decision Sciences Deartment, National
STATISTICAL CHARACTERIZATION OF THE RAILROAD SATELLITE CHANNEL AT KU-BAND
STATISTICAL CHARACTERIZATION OF THE RAILROAD SATELLITE CHANNEL AT KU-BAND Giorgio Sciascia *, Sandro Scalise *, Harald Ernst * and Rodolfo Mura + * DLR (German Aerosace Centre) Institute for Communications
Rummage Web Server Tuning Evaluation through Benchmark
IJCSNS International Journal of Comuter Science and Network Security, VOL.7 No.9, Setember 27 13 Rummage Web Server Tuning Evaluation through Benchmark (Case study: CLICK, and TIME Parameter) Hiyam S.
THE RELATIONSHIP BETWEEN EMPLOYEE PERFORMANCE AND THEIR EFFICIENCY EVALUATION SYSTEM IN THE YOTH AND SPORT OFFICES IN NORTH WEST OF IRAN
THE RELATIONSHIP BETWEEN EMPLOYEE PERFORMANCE AND THEIR EFFICIENCY EVALUATION SYSTEM IN THE YOTH AND SPORT OFFICES IN NORTH WEST OF IRAN *Akbar Abdolhosenzadeh 1, Laya Mokhtari 2, Amineh Sahranavard Gargari
Chapter 5 Understanding Input. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 5 Understanding Input Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define input and differentiate among a program, command, and user response Identify
Simulink Implementation of a CDMA Smart Antenna System
Simulink Imlementation of a CDMA Smart Antenna System MOSTAFA HEFNAWI Deartment of Electrical and Comuter Engineering Royal Military College of Canada Kingston, Ontario, K7K 7B4 CANADA Abstract: - The
Free Software Development. 2. Chemical Database Management
Leonardo Electronic Journal of Practices and echnologies ISSN 1583-1078 Issue 1, July-December 2002. 69-76 Free Software Develoment. 2. Chemical Database Management Monica ŞEFU 1, Mihaela Ligia UNGUREŞAN
Migration to Object Oriented Platforms: A State Transformation Approach
Migration to Object Oriented Platforms: A State Transformation Aroach Ying Zou, Kostas Kontogiannis Det. of Electrical & Comuter Engineering University of Waterloo Waterloo, ON, N2L 3G1, Canada {yzou,
X How to Schedule a Cascade in an Arbitrary Graph
X How to Schedule a Cascade in an Arbitrary Grah Flavio Chierichetti, Cornell University Jon Kleinberg, Cornell University Alessandro Panconesi, Saienza University When individuals in a social network
Drinking water systems are vulnerable to
34 UNIVERSITIES COUNCIL ON WATER RESOURCES ISSUE 129 PAGES 34-4 OCTOBER 24 Use of Systems Analysis to Assess and Minimize Water Security Risks James Uber Regan Murray and Robert Janke U. S. Environmental
Managing specific risk in property portfolios
Managing secific risk in roerty ortfolios Andrew Baum, PhD University of Reading, UK Peter Struemell OPC, London, UK Contact author: Andrew Baum Deartment of Real Estate and Planning University of Reading
RFID Based Real Time Password Authentication System for ATM
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 RFID Based Real Time Password Authentication System for ATM Soniya B. Milmile 1 Prof.
Keywords ATM Terminal, Finger Print Recognition, Biometric Verification, PIN
ATM Terminal Security Using Fingerprint Reconition. Prof. B.Jolad, Tejshree Salunkhe, Rutuja Patil, Puja Shindgi Padmashree Dr. D. Y. Patil Institute Of Engineering and Technology,Pimpri,Pune - 411018
A Modified Measure of Covert Network Performance
A Modified Measure of Covert Network Performance LYNNE L DOTY Marist College Deartment of Mathematics Poughkeesie, NY UNITED STATES lynnedoty@maristedu Abstract: In a covert network the need for secrecy
Implementation of Statistic Process Control in a Painting Sector of a Automotive Manufacturer
4 th International Conference on Industrial Engineering and Industrial Management IV Congreso de Ingeniería de Organización Donostia- an ebastián, etember 8 th - th Imlementation of tatistic Process Control
Time-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes
Time-Cost Trade-Offs in Resource-Constraint Proect Scheduling Problems with Overlaing Modes François Berthaut Robert Pellerin Nathalie Perrier Adnène Hai February 2011 CIRRELT-2011-10 Bureaux de Montréal
United Arab Emirates University College of Sciences Department of Mathematical Sciences HOMEWORK 1 SOLUTION. Section 10.1 Vectors in the Plane
United Arab Emirates University College of Sciences Deartment of Mathematical Sciences HOMEWORK 1 SOLUTION Section 10.1 Vectors in the Plane Calculus II for Engineering MATH 110 SECTION 0 CRN 510 :00 :00
Evaluating a Web-Based Information System for Managing Master of Science Summer Projects
Evaluating a Web-Based Information System for Managing Master of Science Summer Projects Till Rebenich University of Southamton [email protected] Andrew M. Gravell University of Southamton [email protected]
SD05C through SD24C. Single Line TVS Diode for ESD Protection in Portable Electronics PRELIMINARY Features. PROTECTION PRODUCTS Description
Descrition The SDxxC TS diodes are designed to relace multilayer varistors (MLs) in ortable alications such as cell hones, notebook comuters, and DA s. They offer suerior electrical characteristics such
Efficient Training of Kalman Algorithm for MIMO Channel Tracking
Efficient Training of Kalman Algorithm for MIMO Channel Tracking Emna Eitel and Joachim Seidel Institute of Telecommunications, University of Stuttgart Stuttgart, Germany Abstract In this aer, a Kalman
MODEL OF THE PNEUMATIC DOUBLE ACTING CYLINDER COMPILED BY RHD RESISTANCES
Journal of alied science in the thermodynamics and fluid mechanics Vol. 3, No. 1/009, ISSN 180-9388 MODEL OF THE PNEUMATIC DOUBLE ACTING CYLINDER COMPILED BY RHD RESISTANCES *Lukáš DVOŘÁK * Deartment of
Buffer Capacity Allocation: A method to QoS support on MPLS networks**
Buffer Caacity Allocation: A method to QoS suort on MPLS networks** M. K. Huerta * J. J. Padilla X. Hesselbach ϒ R. Fabregat O. Ravelo Abstract This aer describes an otimized model to suort QoS by mean
Interbank Market and Central Bank Policy
Federal Reserve Bank of New York Staff Reorts Interbank Market and Central Bank Policy Jung-Hyun Ahn Vincent Bignon Régis Breton Antoine Martin Staff Reort No. 763 January 206 This aer resents reliminary
Introduction to NP-Completeness Written and copyright c by Jie Wang 1
91.502 Foundations of Comuter Science 1 Introduction to Written and coyright c by Jie Wang 1 We use time-bounded (deterministic and nondeterministic) Turing machines to study comutational comlexity of
A Multivariate Statistical Analysis of Stock Trends. Abstract
A Multivariate Statistical Analysis of Stock Trends Aril Kerby Alma College Alma, MI James Lawrence Miami University Oxford, OH Abstract Is there a method to redict the stock market? What factors determine
Machine Learning with Operational Costs
Journal of Machine Learning Research 14 (2013) 1989-2028 Submitted 12/11; Revised 8/12; Published 7/13 Machine Learning with Oerational Costs Theja Tulabandhula Deartment of Electrical Engineering and
Dynamic Load Balance for Approximate Parallel Simulations with Consistent Hashing
Dynamic Load Balance for Aroximate Parallel Simulations with Consistent Hashing Roberto Solar Yahoo! Labs Santiago, Chile [email protected] Veronica Gil-Costa Universidad Nacional de San Luis, Argentina
DESIGN OF SMS ENABLED CAR SECURITY SYSTEM
DESIGN OF SMS ENABLED CAR SECURITY SYSTEM K. A. Amusa Federal University of Agriculture, Abeokuta, O. O. Nuga Federal University of Agriculture, Abeokuta, A. A. Adetomi Federal University of Agriculture,
Corporate Compliance Policy
Cororate Comliance Policy English Edition FOREWORD Dear Emloyees, The global nature of Bayer s oerations means that our activities are subject to a wide variety of statutory regulations and standards
Optimal Routing and Scheduling in Transportation: Using Genetic Algorithm to Solve Difficult Optimization Problems
By Partha Chakroborty Brics "The roblem of designing a good or efficient route set (or route network) for a transit system is a difficult otimization roblem which does not lend itself readily to mathematical
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
Joint Production and Financing Decisions: Modeling and Analysis
Joint Production and Financing Decisions: Modeling and Analysis Xiaodong Xu John R. Birge Deartment of Industrial Engineering and Management Sciences, Northwestern University, Evanston, Illinois 60208,
