IEEE FORMAT



All the colleges prefer you to present paper in IEEE format. You need not to get scared by that the simple thing you need to take care is

Main title: Font size should be 14
for ex: If your giving a paper on Biometrics the name BIOMETRICS should have font size 14

Sub title: Font size 12
for ex: The subtitles inside the biometrics would be Abstract, Introduction, why biometrics etc

Content inside the sub title: Font size 10
for ex: The matter you fill in the abstract and all subtitles should be of font size 10

For all the above font style should be Times new roman

In microsoft word you will have a option on the top for line spacing you just click on that and select the option linespacing as 1.5

And also change it to A4 size and 2 column these options are also available on word just search for it you will find it on the top


posted under | 0 Comments

Student visa details

Student Visa

To apply for student visa a person needs to carry the following documents to the embassy :

An offer letter from a recognised University which has all the details regarding the course applied for, date of joining the course, the amount of fee to be paid, the duration of the course.

Fee Receipt. The process of payment of tuition fee as well as fee for the hostel may differ from University to University but usually a fee receipt confirming the payment of initial fee has to be carried with the offer letter.

Visa application form (Optional Form 156) duly filled in with one photograph to be pasted at the bottom right on the back of the application i.e. page 2 of the form.

A draft of Rs.1980/- (One Thousand Nine Hundred Eighty only) in favour of "American Embassy" payable at the city of application. This draft is application fee and needs to be attached to the visa application form (Optional Form 156) and is while handing over the application at the embassy. (This fee is non refundable and keeps changing with the changes in the exchange rate). In addition to the application fee, the visa fee, which is in accordance with the duration of the visa, is to be paid in cash/draft after the visa has been granted.

I - 20 form in duplicate received from the University on the official paper of the Immigration and Naturalisation Service Department in United States for the category under the Eligibility for Non-immigrant F-1 Student Status for overseas students.

All academic certificates i.e. Certificates, Transcripts and Marksheets in original of Senior Secondary, Higher Secondary, Graduation, Post Graduation, Certificates or Diplomas; and any other qualification that a student might be having. Besides academic certificates a student is also advised to carry two or three letter of recommendations and all certificates relating to extra curricular activities like sports, debates, music etc.

Additional results of examinations taken by the student depending on the course that the student has opted for may be required. These are TOEFL, GMAT, GRE or any other relevant exam that may be pertinent to the course opted for.

Financial Documents : The most important part of the documentation process is the financial documents. The concerned officer has to be convinced about the financial capability of the applicant and his sponsors as the education cost and cost of living expenses is very high as compared to India.
The financial documents include a C.A. (Chartered Accountant) Statement which would mention all the Immovable and Movable assets and the Annual Income of the sponsor and his family.

Immovable assets mean land, Building, Agricultural land, Commercial Property etc. Movable assets mean Bank Balances, Cash Balances, Bank Deposits, All types of Deposits, All types of Provident Funds (GPF, PPF etc.), Equity shares, Debentures, Bonds and all other types of Debt Instruments, Jewellery, Vehicles and Household Items. The last three items mentioned in the list of movable assets i.e. jewellery, vehicles and household items are only for reference as they do not form the part of funds which would be used to pay for the educational as well as other allied expenses. The most important part of the C.A. statement is the Annual Income of the sponsor and his family members. The annual income should be supported by the relevant documents such as :
Salaried Individuals : Salary Certificate and Income Tax return or Form 16
Self Employed : Professional - Income Tax Return

Business - Complete Balance Sheet with Profit & Loss statement and other relevant documents & Income Tax Return. If the company is Private Limited or Public Limited then one needs to attach a certified copy of Memorandum and Articles of Association of the company. Additional documents like Bank Statements, or Deposits etc. are always useful in determining the legal financial capability of the applicant.

(All financial documents should be carried to the embassy in Original and should be carried in proper files systematically arranged so that the visa officer can go through them and understand them easily).
Click here for the format of CA Statement

In all cases a person is required to carry cash for the visa fee which is payable once the visa is granted. The visa fee is different for different periods. The visa is usually granted for 1 year, 5 years or 10 years.

posted under | 0 Comments

Quantitative ability2

1-5:These questions are based on the following data

I was visiting my friend's house at Tuticorin for the first time. I knew that he has five children, two daughters and three sons. The daughters were Sonali and Monali and the sons were Surya, Sagar and Prithvi. When I stepped into the house I was greeted by Sagar and Sonali. Sagar introduced himself and told that he was twice as old as Sonali.The next to meet me was Monali who said that she and Sonali together were twice as old as Sagar. However Sagar felt relieved when Surya walked in and introduced himself and said that he and Sagar were twice as old as their sisters together. In the afternoon Prithivi came to my room when I was relaxing and said "Sorry Uncle, I was busy with my friends, since it is my 21st birthday today and hence could not meet you in the morning" When greeted him and said that it was fine, he looked relieved and said "you know uncle, that the three of us Sagar, Surya and me are five times as old as our sisters together" saying this he went away

1.What is the age of Surya?
(a)4 yrs (b)4 yrs 3 months (c)8 yrs (d)10 yrs 6 months

2.What is the age of Monali?
(a)4 yrs (b)4 yrs 6 months (c)5 yrs (d) 5 yrs 3 months

3.Who is the youngest of the siblings?
(a)Surya (b)Monali (c)Sonali (d)None of these

4.How amny yrs older than Sonali is Monali?
(a)3 yrs (b)3yrs 6 months (c)5 yrs 6 months (d)7 yrs

5.After how many yrs would Surya be twice as old as Sagar?
(a)2 yrs (b)2 yrs 6 months (c)3 yrs 6 months (d)It is not possible



sol: These type pf questions first assume the age as x or some parameter from the starting

Let Sonali's age be 'x'

Sagar introduced and said he was twice as Sonali so '2x'

Next, let Monali's age be 'y'

she said she and Sonali together is twice as Sagar so => x+y=2(2x)

=>y=3x;
Let the surya's age be 'z'
He said he and sagar are twice as old as his sisters =>z+2x=2(x+y)

=>z=2y;

Prithvi's age is 21 he mentioned there

He said he sagar and surya are 5 times older than their sisters

=>2x+2y+21=5(x+y)
=>21=3(x+y)
=>x+y=7

We know that y=3x => x=7/4 => 1 yr 9 months(Sonali's age)
Sagar's age=2(7/4)=3 1/2 yrs
Monalis age=3*(13/4)=5 1/4 yrs
Suray's age=6(1 3/4)=10 1/2 yrs

Paper presentation tips

Some tips for preparing your paper presentation
1.........First, organize your talk

2.........Read the entire paper at least 3 times.

3.........You need to be able to explain the details in the paper (even the ugly tricky notation)

4........ You need to be able to provide a critical analysis of the paper Check out references in the related work section of the paper. ( this will help you put the paper in context of a larger body of work and will help you critique the paper's results/contributions)

5.........A paper has many details but only one or two main ideas; structure your talk around these main ideas.

6........ Create a Talk Outline Your talk should be organized in a top-down manner.

7.......You should have the following main sections in your talk: Introduction, The Big Picture: what, why, how, and why we should care (motivation).
Be sure to include:
a statement of the problem being solved (what)
motivation and putting the work in context (why and why should we care)
a high-level view of the author's solution (how)

8...... Details of solution
<li> Results demonstrating/proving their solution
Critic of Work (possibly compare to related work)

Conclusions & Future Directions for this work
The talk should be organized as the important ideas first, the details second, conclusions last.
Each section of your talk should be organized in
a similar manor: high-level important points first, details second, summarize high-level points last.
If the paper is well written, you can
use the paper's organization as a guide.

9...... .Next, Design your slides
Slide Organization
Your slides should be organized like an
outline--a few main points, with sub points under each one. Your slides are a guide for your talk not a word-for-word copy of your talk.
List specific points that you want to talk about as
sub-topics of each main topic.
If there are particular details that you want
to discuss, outline them on the slide and keep written notes for you to refer to in your talk rather than writing all the details on the slide.

10...... Summarize Main Points
You should have a summary slide of the main ideas at the end. If applicable, Include a list of open questions from the paper It is okay to waste space Add just enough prose prose to present the main points and highlight the main parts of each point.
Use phrases rather than complete sentences and use
large fonts
You can use acronyms and abbreviations sparingly, however you
should say the complete name when you talk about about them.
For example, if
you abbreviate processes to procs on a slide,
say "processes" when you talk
about the point not "procs".
Similarly, if your create an acronym for your
super fast multi-cast
implementation SFMC and refer to the old slow multi-cast
implementation as OSMC, then say "our super fast multi-cast" and
"the old slow
multi-cast" rather than "SFMC" and "OSMC".
The exception is for well-known
acronyms such as PVM, MPI, API, JVM, etc.

11..... A picture is worth a thousand words Use figures and graphs to explain implementation and results. It is very hard to describe a system implementation without having a picture of the components of the system. I once attended a talk about Intel's I64 architecture where the speaker tried to discuss the details of the layout of the chip and the interactions between the components without having any figures. It made for a very bad talk and a very hostile audience.


12.....Number of Slides
As a general rule, it should take 2-3 minutes to talk through the material on one slide, so for a 45 minute talk you should have about 20 slides. If there is too much material in a paper to present completely in 45 minutes, then pick one part (the most interesting/important part) that you will discuss in detail, and present the other parts at a higher level. You can create back-up slides for specific details that you don't plan to talk about, but may get questions about.

13....Next, preparing your presentation

14.... Provide a talk road-map

Tell audience where you are going with your talk. Give audience a road-map of your talk at the beginning by using outline slides Immediately after the title slide, put up an outline slide and tell the audience the main organization of your talk. Another alternative is to first have a few slides motivating the paper's general topic, then put up an outline slide giving the audience a road-map of your talk.
It should be clear when you start a new high-level part of your talk
Use good transitions from one slide to the next, and from one main topic to the next..."We just talked about the implementation of foo <pause> now we will look at how well foo performs for synthetic and real workloads.
You may want to use the outline slide at other points in your talk to
provide a visual transition between parts.

15...... Repeat Your Point
There is a rule that says you have to tell your audience something
three times before the really hear it
them what you are going to say.
Say it.

Summarize what you said.

This is particularly important for figures and graphs.
For example:
This graph show how the A algorithm performs better than the B and C algorithms as the number of nodes increase
The X axis is number of nodes, the Y axis is execution time in seconds
The red curve shows the execution time of A as the number of nodes increases The blue curve shows ... you can see that as the number of nodes increases above N, the A algorithm performs better. This is because of increased message traffic in algorithms B and C as shown on the next slide... Explain concepts in your own words
It is certainly okay to lift key phrases from the paper to use in your talk. However, you should also try to summarize the main ideas of the paper in your own words.
Talk to the Audience
Don't read your slide off the screen, nor directly off the projector.
It is okay to stop for a second and refer to your notes if you need to.

practice

Give a practice run-through of your talk. Stand in a room for 1 hour and talk through all your slides (out loud). This should be a
timed dress rehearsal (don't stop and fix slides as you go). Members of your reading group should provide a practice audience for you.
: How to fight back &
A well organized, practiced talk will almost always go well. If you draw a blank, then looking at your slides will help you get back on track. Taking a deep breath will clam you down. One trick is to try to remember to take a deep breath between each slide. Slow down. Take a few seconds to think about a question that is being asked before you answer it. It is okay to pause for a few seconds between points and between slides; a second or two of silence between points is noticeable only to you, but if you are talking a mile a minute everyone will notice. Bring notes. if you are afraid that you will forget a point or will forget your elegant transition between slides 11 and 12, write these down on a piece of paper and bring it with you. However, you don't want to have a verbatim copy of your talk, instead write down key phrases that you want to remember to say. Give at least one practice talk to an audience. Be prepared to answer questions. You don't have to know the answer to every question, however you should be prepared to answer questions and able to answer most questions about the paper. Before you give the talk, think about what questions you are likely to get, and how you would answer them. You may want to have back-up slides ready for answering certain questions. It is okay to say "I don't know" or better yet "gee, I hadn't thought about that, but one possible approach would be to..." or to refer to your notes to answer questions.

posted under | 0 Comments

PAPER PRESENTATION TOPICS

I have listed few topics which can be helpful for you in choosing a paper presentation topic.

1.E-MINE: A novel web mining approach
2.BLUE-RAY DISC (Change in revolution of disk)
3.GESTURE RECOGNITION
4.BIOMETRICS IN SECURE e-TRANSACTIONS
5.FINGERPRINT RECOGNITION SYSTEM BY NEURAL NETWORKS
6.SEARCH FOR EXTRA TERRESTRIAL INTELLIGENCE USING SATELLITE COMMUNICATION
7.MATLAB Algorithm to the High Peak to Average Power Radio Solution for OFDM based 4G Wireless Communication system.
8.Sensor Fusion For Video Surveilllance
9.Three step diamond search algorithm for block matching motion estimation.
10.Emerging Trends In Robotics Using Neural Networks.
11.Embedded systems and vlsi an architectural approach to reduce leakage energy in memory.
12.Robotics and Automation(Snake Robots)
13.Micro Chip Production Using Extreme UV Lithography
14.Detecting Infrastructure damage caused by earthquakes
15.SIGMAX......endless talk time
16.A cognitive Radio Approach for Using of vitual unlicenced spectrum
17.zigbee
18.vsat
19.MEMS(Micro Electro-Mechanical System)
20.RED TACTION
21.TWD RADAR SATELLITE COMMUNICATIONS
22.Improving TCP performance over mobile ad hoc networks
23.E-WALLET
24.PLASMONICS
25.WIMAX

You may also want to check out some other paper presentations posted on this blog. Click here

Slides on biometrics

posted under | 0 Comments









BIOMETRICS

What is biometrics?

Biometrics is the method to recognize or verify the identity of an individual based on its unique physiological or behavioral characteristics such as Fingerprint, face, palm, iris, retinal, vein, voice and handwriting. Fingerprint verification is the most established and matured biometrics techniques. We will only focus on fingerprint technology hereafter.

Why biometrics?

Biometrics authenticates an individual based on its unique characteristics. One can consider himself as his own password, which can hardly be forgotten, stolen and forged. Thus, biometrics provides a securer solution comparing with PIN or Smart Card identification. Biometrics can also be widely found in many other applications such as time attendance management.

What are the biometrics applications?

The need for biometrics can be found in most of the security departments, military, government and commercial applications.

One of the major biometrics applications is access control. PIN and Smart Card system recognize the PIN or the card instead of you - it identifies what you posses. In other words, someone can claim that he is you by using your PIN or your smart card. However, a biometrics system with fingerprint technology recognizes your finger instead of the PIN or card - it identifies who you are. It will never grant access to anyone else except you.

Another major biometrics application is time attendance management. Most of the existing time attendance systems are based on smart card. Lost and damaged cards and cheating on the system can lead to huge financial loss to the company. Using employee's fingerprint to mark attendance instead is far more accurate, efficient, cost saving and cheat proof. The daily attendance report can help the HR manager to save a bundle of time.

How do my business and me benefit from biometrics and fingerprint technology?

With biometrics, you can expect:

1. Higher level of security - no one can steal or forge your fingerprint.

2. Lower maintenance cost - no need to replace lost keys or cards and no need to order new cards for new staffs.

3. More efficient - fast, accurate and cheat proof recognition. Daily report is at your finger tip.

4. Robust and reliable - fingerprint techniques had been tested and proven in Singapore since 1980s. It's mature and well established.

Biometrics

BIOMETRIC AVENUES FOR HUMAN IDENTIFICATION

ABSTRACT: -

In this paper we are going to present an advance technology of the biometry is the multi-biometric and its applications. At one end, there is a continuous and tremendous improvement in the lifestyle of humans while at the other end; the technological crimes are increasing rapidly. As there is a problem there must be a solution. The solution for the problem of illegal authentication is Biometrics. Biometrics is a means of using the physiological or behavioral characteristics of a person. Human identification performance reported so far using face or a finger image under certain conditions is good practice, however, there is still a great need for better performance in biometrics for use in video surveillance. One possible way to achieve improved performance is to combine information from multiple sources. Besides, such systems alleviate some of the problems that are faced by single biometrics-based systems like restricted degrees of freedom, spoof attacks, and unacceptable error rates. We present a prototype bimodal biometric identification system by merging face and finger images.

INTRODUCTION: -

Biometrics refers to the automatic identification of a person based on his or her physiological or behavioral characteristics. This identification method is preferred over traditional method involving passwords and PINs (personal identification numbers) for several reasons, including the person to be identified is required to be physically present at the point of identification and/or identification based on biometric techniques obviates the need to remember a password or carry a token. With the increased use of computers as vehicles of information technology, restricting access to sensitive/personal data is necessary. By replacing PINs, biometric techniques can potentially prevent unauthorized access to or fraudulent use of the following:

. ATMs

. Cellular phones

. Smart cards

. Desktop PCs

. Workstations

. Computer networks

PINs and passwords may be forgotten, and token-based identification methods such as passports and driver’s licenses may be forged, stolen, or lost. Thus, biometric systems of identification are enjoying a new interest. Various types of biometric systems are being used for real-time identification. The most popular are based on face recognition and fingerprint matching; however, other biometric systems use iris and retinal scans, speech, facial feature comparisons and facial thermo grams, and hand geometry. A biometric system is essentially a pattern-recognition system that makes a personal identification by determining the authenticity of a specific physiological or behavioral characteristic possessed by the user. An important issue in designing a practical system is to determine how an individual is identified. Depending on the context, a biometric system can be either a verification (authentication) or an identification system.

Biometrics Functionalities: -

The operation of a biometric identification system implicates in the domain of their methods of actuation, in other words, knowing the way in which a biometrical machine captures the analyzed individual's physical elements. The mechanism of a biometric identification system works with two main steps: registration and identification. Registration consists in storing the biological trait of an individual in a digital format, which will be used later to identify him/her. Once the individual is registered, when a new input is done, the identification process captures and converts the biological trait to the binary format and compares it to the stored one. The binary representation of a biological trait is called template. The generated template of the same individual can be not totally equal at different capture moments. This is due to noisy factors during the capture process (e.g. light, position, rotation, distortion. different sensors, etc). So, a biometric identification system has to work with statistics to

confirm a person’s identity .

There are two main functionalities within identification process: -

(i) Verification/authentication, which is the confirmation or denial of a person's claimed identity (“Am I who I claim I am?”). Usually, in this kind of functionality, Biometrics is combined with a traditional method, e.g., a person uses his/her personal magnetic card and then his/her finger to confirm that he/she is the real owner of the card; (ii) recognition/identification, which is the establishment of the identity from a set of known persons (“Who am I?”). In this case, after the input of the biometric data, the physical or behavioral trait of a person is compared to a number of database registers, until there is a matching register or the registers are over. The first functionality demands a combined traditional method, but requires less time to get a matching. Once the register exists, it is indexed and can be retrieved by the data from the traditional method (e.g., card number) then the biometric data in this same register are compared with inputted

one. Depending on the number of registers in the database and the admissible time for matching, one of the two functionalities is applied. Each approach has its own complexities and could probably be solved best by a specific biometric system, including the following:

. Physical biometrics:

¦ Fingerprint—Analyzing fingertip patterns

¦ Facial recognition/face location—Measuring facial characteristics

¦ Hand geometry—Measuring the shape of the hand

¦ Iris scan—Analyzing features of colored ring of the eye

¦ Retinal scan—Analyzing blood vessels in the eye

¦ vascular patterns—Analyzing vein patterns.

Fingerprint biometric system for

logon identification and authentication Iris recognition biometric system

Fingerprint Recognition:-.

Fingerprint recognition is one of the oldest biometric technologies, and its application in criminal identification, using eyesight, has been in use for more than 100 years. Today, computer software and hardware can perform the identification significantly more accurately and rapidly. Fingerprint technology is among the most developed biometric technologies, and its price is cost-effective enough to make its way into public use.

Most fingerprint matching systems are based on matching minutiae points between the query and the template fingerprint images. The matching of two minutiae sets is usually posed as a point pattern matching problem and the similarity between them is proportional to the number of matching minutiae pairs. The first stage of the minutiae-based technique is the minutiae extraction. Figure 8 shows a diagram of a minutiae extraction algorithm, composed by five components: orientation field estimation, fingerprint area location, ridge extraction, thinning, and minutiae extraction.

Minutiae-based matching problem can be formulated in the following way. Let T and I be

the template and the input fingerprint minutiae sets, respectively. In general, each minutiae is described by its x, y location coordinates and its angle è. A minutiae mj in I and a minutiae mi in T are considered “matching” if the spatial displacement between them is smaller than a given tolerance r0 and the direction difference between them is smaller than an angle tolerance è0.

Aligning the two fingerprints is a mandatory step of the fingerprint matching in order to maximized the number of matching minutiae. Correctly aligning two fingerprints requires geometrical transformations, such as: rotation, displacement, scale, and other distortion-tolerant transformations. After the alignment, a final matching score is computed by using the maximum number of mated pairs.

Figure 9. (a) and (b) Input and Template minutiae sets; (c) Input and Template fingerprint alignment; (d) Minutiae matching.

Challenges in Fingerprint Identification:-

Despite the efficacy of human identification based on fingerprint matching techniques, the fingerprint identification still presents some challenges, such as: approximately 3% of fingerprints are not of good quality; no proven contact less fingerprint sensor technology is currently available; the new compact solid-state sensors capture only small portion of the fingerprint; fingerprint impression is often left on the sensor; fingerprints are not universal; fingerprint sensors can be different during registration and identification (interoperability).

Iris Recognition: -

The most numerous and dense degrees-of-freedom (forms of variability across individuals), which are both stable over time and easily imaged, are found in the complex texture of the iris of either eye. This protected internal organ, whose pattern can be encoded from distances of up to almost a meter, reveals about 266 independent degrees-of-freedom of textural variation across individuals.

The iris is a structure of the human eye, composed of elastic connective tissue, the trabecular meshwork, whose prenatal morphogenesis is completed during the 8th month of gestation. It consists of pectinate ligaments adhering into a tangled mesh revealing striations, ciliary processes, crypts, rings, furrows, a corona, sometimes freckles, vasculature, and other features (Figure 1).

Figure 1. Iris structures .

5.1 Daugman’s Approach:-

The approach proposed by Daugman , for iris recognition is composed of three main stages: (i) localization, (ii) extraction/encoding, and (iii) comparison. Figure 11 shows a diagram of Daugman’s approach.

Figure 11. Daugman’s Approach Stages

The localization stage uses an integro-differential operator to locate the borders of the iri(the inner and outer boundaries of the iris), based on the ascension of the gradient to adjust the circular contours. This operator essentially is a circular edge detector and returns a “spike” when a candidate circle shares the pupil (iris) center coordinates and radius. If the eyelids intrude, they are detected and excluded.

The extraction stage is done by demodulation with complex-valued 2D wavelets Then, a double-dimensionless coordinate system is defined which maps the tissue in a manner that is invariant to changes in pupillary constriction and overall iris image size, and hence also invariant to camera zoom factor and distance to the eye. The coordinate system compensates automatically for the stretching of the iris tissue as the pupil dilates. Figure 12 shows the “IrisCode” resulted from a detected iris.

Figure 12. Isolation of an iris for encoding, and its resulting “Iris Code”.

The detailed iris pattern is encoded into a 256-byte “Iris Code” by demodulating it with 2D Gabor wavelets, which represent the texture by phasors in the complex plane. Each phasor angle is quantized into just the quadrant in which it lies for each local element of the iris pattern, and this operation is repeated all across the iris, at many different scales of analysis. The comparison of a stored template with an inputted one is done by the calculation of the Hamming distance (HD) between two 256-byte iris codes.

Limitations of Iris: -

Although the iris is one of the most reliable Biometrics traits, it has some limitations:

(i) Capturing an iris image involves cooperation from the user;

(ii) Cost of high performance iris systems is relatively high;

(iii) Iris images may be of poor quality resulting in failures to enroll;

(iv) Up to 7% iris scans can fail, due to anomalies, such as watery eyes, long eyelashes or hard contact lenses;

(v) Iris can change over time (e.g., as a result of eye disease), leading to false rejects;

(vi) Contact lens or photograph of a person's iris pattern can be used to spoof some iris recognition systems (however, a Fourier filter applied to a fake image can easily reveal four points of spurious energy, when a natural iris does not have these spurious coherences).

Multibiometrics:--

A biometric system that relies only on a single biometric identifier often presents limitations, such as:

(i) Non-universality for that single trait;

(ii) Noise in sensed data, and

(iii) Intra-class variations.

So, by using multiple sources of biometric simultaneously it is possible to integrate

information to enhance matching performance, increase the population coverage by reducing failure to enroll rate, and difficult spoofing.

The possible scenarios for multibiometrics include: the use of multiple algorithms for the same biometric trait recognition, each one exploring different features; the use of multiple sensor systems (for instance, for fingerprints it could be used a solid-state or an optical sensor); the use of multiple units of the same biometrics (for instance, the identification system can use fingerprints from different fingers); the use of multiple impressions systems; and, finally, the use of multiple biometric traits simultaneously (face and iris, for instance). Figure 13 illustrates these scenarios for multibiometrics systems.

Figure 13. Scenarios of multibiometric systems.

This technique was tested on a subset of 10 users who provided biometric data over a period of two months (approximately 30 samples per user per biometric). Figure 3 illustrates the case where reducing the face weight improves verification accuracy. Our experimental results indicate that employing user-specific weights further improves matching performance.

Applications: -

Biometrics is a rapidly evolving technology that is being widely used in forensics, such as criminal identification and prison security, and that has the potential to be used in a large range of civilian application areas. Biometrics can be used to prevent unauthorized access to ATMs, cellular phones, smart cards, desktop PCs, workstations, and computer networks. It can be used during transactions conducted by telephone and Internet (electronic commerce and electronic banking). In automobiles, biometrics can replace keys with keyless entry devices.

CONCLUSION: -

Multibiometric systems alleviate a few of the problems observed in unit modal biometric systems. Besides improving matching performance, they also address the problems of non-universality and spoofing. Multibiometric systems can integrate information at various levels, the most popular one being fusion at the matching score level where the scores by the individual matchers are integrated. The simple sum rule results in improved matching performance, which can be further improved by employing user-specific biometric weights. User specific weights aid in reducing the false reject rate, thereby enhancing user convenience. It must be noted that deploying a multibiometric system introduces some overhead in terms computational demands and costs. Therefore, it important the cost versus performance trade-off carefully studied before deploying these systems. Researchers from the National Institute of Science and Technology (NIST) used commercially available biometric products recently to acquire and test multibiometric data pertaining to 1,000 users. This is an indication of the increased attention that multibiometric systems are receiving from the government (for various national identification programs currently under implementation such as the US-VISIT program) as well as from researchers (see Matt Turk’s article in this section).

c

Newer Posts Older Posts Home

Followers

Mi perfil

My photo
People who read my blog regularly know what kinda person I am. For others who don't - I'm an information junkie..who likes to dig deep into things to find out what's happening in the world of education, business and management. I like investing in shares. I'm kinda sociable person - I go well with all kinda ppl..It's all about passion :)

Recent Comments