Fingerprint Verification Based on Invariant Moment Features and Nonlinear BPNN

Size: px
Start display at page:

Download "Fingerprint Verification Based on Invariant Moment Features and Nonlinear BPNN"

Transcription

1 800 International Journal o Control, Autoation, and Systes, vol. 6, no. 6, pp , Deceber 008 Fingerprint Veriication Based on Invariant Moent Features and Nonlinear BPNN Ju Cheng Yang and Dong Sun Park* Abstract: A ingerprint veriication syste based on a set o invariant oent eatures and a nonlinear Back Propagation Neural Network (BPNN) veriier is proposed. An iage-based ethod with invariant oent eatures or ingerprint veriication is used to overcoe the deerits o traditional inutiae-based ethods and other iage-based ethods. The proposed syste contains two stages: an o-line stage or teplate processing and an on-line stage or testing with input ingerprints. The syste preprocesses ingerprints and reliably detects a unique reerence point to deterine a Region-o-Interest (ROI). A total o our sets o seven invariant oent eatures are extracted ro our partitioned sub-iages o an ROI. Matching between the eature vectors o a test ingerprint and those o a teplate ingerprint in the database is evaluated by a nonlinear BPNN and its perorance is copared with other ethods in ters o absolute distance as a siilarity easure. The experiental results show that the proposed ethod with BPNN atching has a higher atching accuracy, while the ethod with absolute distance has a aster atching speed. Coparison results with other aous ethods also show that the proposed ethod outperors the in veriication accuracy. Keywords: Absolute distance, BPNN, ingerprint atching, ingerprint veriication, invariant oent eatures, neural network. 1. INTRODUCTION Aong all the bioetric indicators, ingerprints have one o the highest levels o reliability and have been extensively used by orensic experts in criinal investigations. Fingerprint veriication has eerged as one o the ost reliable eans o bioetric authentication due to its universality, distinctiveness, peranence and accuracy. Various approaches o ingerprint veriication syste have been proposed in the literature. Two ain categories or ingerprint veriication are inutiaebased ethods [8,10] and iage-based ethods [1,7,9, Manuscript received Noveber 6, 007; revised October 30, 008; accepted Noveber 3, 008. Recoended by Guest Editor Phill Kyu Rhee. This work was supported by Hankuk University o Foreign Studies Research Fund o 008. Ju Cheng Yang is with the Departent o Coputer Science and Engineering, Hankuk University o Foreign Studies, Yongin, , Korea, and he is also with the School o Inoration Technology, Jiangxi University o Finance and Econoics, Nanchang, Jiangxi, , P. R. China, and was with the Division o Electronics & Inoration Engineering, Chonbuk National University, Jeonju, Jeonbuk , Korea (e-ails: yangjucheng@ gail.co, yangjucheng@hotail.co). Dong Sun Park is with the Division o Electronics & Inoration Engineering, Chonbuk National University, Jeonju, Jeonbuk , Korea (e-ail: dspark@chonbuk. ac.kr). * Corresponding author ]. The ore popular and widely used techniques, inutiae-based ethods, use a eature vector extracted ro the ingerprints and stored as sets o points in a ulti-diensional plane. A eature vector ay contain eatures o inutiae such as positions, orientations and types. It essentially consists o inding the best alignent between eatures o inutiae in teplates and those in ingerprints under veriication. The disadvantages o inutiae-based ethods are that they ay not utilize the rich discriinatory inoration available in the ingerprints and it ay have a high coputational coplexity [14]. Iage-based ethods use dierent types o eatures ro the ingerprint ridge patterns such as local orientation and requency, ridge shape and texture inoration. The eatures ay be extracted ore reliably than detecting inutiae ro ingerprints. Aong various iage-based atching ethods, a Gabor ilter based ethod [7] and its iproved version [16] show relatively high perorance coparing to previous works. In order to iprove the atching accuracy even or rotated inputs, they used an approxiated approach by representing each ingerprint with ten associated teplates with dierent angles. Hence these ethods inherently require a larger storage space and a signiicantly high processing tie as well as the perorance degradation ro the approxiation. Tico et al. [17] propose a transor-based ethod

2 Fingerprint Veriication Based on Invariant Moent Features and Nonlinear BPNN 801 using Digital Wavelet Transor (DWT) eatures, while Aornraksa et al. [1] propose using Digital Cosine Transor (DCT) eatures. The transor ethods show a high atching accuracy or inputs identical to one in its own database. However, these ethods have not considered the invariance to an aine transor to deal with dierent input conditions. Another ethod with the integrated Wavelet and Fourier-Mellin Transor (WFMT) [9] uses ultiple WFMT eatures to deal with the variability o input ingerprint iages. This ethod, however, is not suitable or all types o ingerprint iages by choosing a core point as a reerence point. In our previous work [19], the ingerprint veriication using invariant oents with the learning vector quantization neural network is proposed. We use a ixed-size ROI to extract seven invariant oents as a eature vector. However, this ethod ay not deal with the cases that a reerence point is located near the ri o the ingerprint iage, and the eatures or the whole ROI ay not consider the eect o non-linear distortions. To overcoe the shortcoings o these ethods, in this paper, a ingerprint veriication syste based on a set o invariant oent eatures and a nonlinear BPNN is proposed. A ingerprint iage is irst preprocessed to enhance an original iage by Short Tie Fourier Transor (STFT) analysis []. The algorith siultaneously estiates all the intrinsic properties o the ingerprints to enhance the ingerprint iage copletely. In addition, it is also capable o connecting broken ridges and separating erged ridges, and this can iprove a reliable detection o unique reerence point. A unique reerence point or all types o ingerprints, including partial ingerprints, is to align a teplate to an input ingerprints beore extracting eatures and it is deterined by the coplex iltering ethods [1,15]. The coplex ilter is applied to ridge orientation ield iage to detect the position o a reerence point with the axiu curvature. The orientation o this point is deterined by using the Least Mean Square (LMS) orientation estiation algorith [5], which estiates the orientation ield using the gradient at each pixel and soothes it with a Gaussian window. Invariant oents are one o the principal approaches used in iage processing to describe the texture o a region. The seven oents used in this paper are invariant to translation, rotation, and scale changes [4], so they are able to handle the various input conditions. To signiicantly reduce the eects ro noise and non-linear distortions, and thus better preserves the local inoration, we use our sets o seven invariant oent eatures extracted ro our partitioned sub-iages o ROI. An ROI is a region centered with a reerence point in an enhanced ingerprint iage with its orientation ield. The invariant eatures ro our regions adjusted by its orientation ield can iprove the tie-consuing alignent o transoration and rotation occurred at other ethods [7,16]. A BPNN is adopted to veriy the identiication o an input ingerprint by easuring siilarity between eature vectors o test ingerprint iages and those o teplate iages. The nonlinear neural network veriier is trained to deterine whether the input atches to a teplate in a database. Using a nonlinear BPNN as a veriier ay provide the lexible syste with high atching accuracy. For a coparison study, an absolute distance easure which weights each eleent with the axiu o the each two input vectors is also used to evaluate the veriication syste in atching accuracy. The absolute distance is siple and ast and hence it has an advantage in atching speed. Coparing with soe noted ethods, our proposed ethod perors better o accuracy, too. The paper is organized as ollows: the ingerprint veriication syste is briely reviewed in Section. In Section 3, the proposed veriication syste with eature extraction and atching ethods are explained in details. Experiental results are shown in Section 4. Finally, conclusion rearks are given in Section 5.. INVARIANT MOMENTS ANALYSIS Moent eatures can provide the properties o invariance to scale, position, and rotation [4]. We used oent analysis to extract invariant eatures ro partitioned sub-iages in an ROI. This section gives a brie description o the oent analysis. For a -D continuous unction (x,y), the oent o order (p + q) is deined as pq + + = p q x y ( x, y) dxdy or p, q= 0, 1,, (1) The central oents are deined as p q µ pq = ( x x) ( y y) ( x, y) dxdy () where x = and y = I (x,y) is a digital iage, then () becoes ( ) p q µ pq = x x ( y y) ( x, y), (3) x y

3 80 Ju Cheng Yang and Dong Sun Park and the noralized central oents, denotedη deined as pq, are µ pq p+ q η pq =, where γ = + 1, γ µ 00 or p+q =,3,. (4) A set o seven invariant oents can be derived ro the second and third oents proposed by Hu [6]. As the equations shown below, Hu derived the expressions ro algebraic invariants applied to the oent generating unction under a rotation transoration. They consist o groups o nonlinear centralized oent expressions. The result is a set o absolute orthogonal oent invariants that can be used or scale, position, and rotation invariant pattern identiication. = + φ1 η0 η0, φ = ( η0 η0) + 4 η11, φ3 = η30 η1 + η1 η03 φ4 = ( η30 + η1) + ( η1+ η03), ( 3 ) (3 3 ), φ = ( η 3 η )( η + η )[( η + η ) ( η1 + η03) ] + (3 η η )( η + η )[3( η + η ) ( η1 + η03) ], 6 = ( 0 0)( )[ ( η30 + η1) ( η1 + η03) ] φ η η η η + 4 η11( η30 + η1 )( η1 + η03), φ = (3 η η )( η + η ) η30 + η1 η1 + η03 [( ) 3( ) ] + (3 η η )( η + η ) η30 + η1 η1 + η03 [3( ) ( ) ]. 3. PROPOSED FINGERPRINT VERIFICATION SYSTEM (5) The ingerprint veriication syste contains two stages: the o-line stage and the on-line stage, as shown in Fig. 1. In the o-line stage, ingerprint iages o the dierent individuals to be veriied are irst processed by a eature extraction odule and then the extracted eatures are stored as teplates in a database or later use. In the on-line stage, a ingerprint iage o an individual to be veriied irst processed by a eature extraction odule; the extracted eatures are then ed to a atching odule with one s identity ID, which atches the against Fig. 1. Overview o the ingerprint veriication syste. Fig.. Flowchart o the whole ipleentation schee o the ingerprint veriication syste. one s own teplates in the database. Both stages contain the sae eature extraction odule, which consists o our ain steps as depicted as shown in Fig. : STFT enhanceent, deterination o reerence point, deterination o ROI and partition, and invariant oent analysis. At the last part o the whole veriication syste, the atching is ipleented with absolute distance or BPNN STFT enhanceent The irst step is to enhance the ingerprint iage using STFT analysis []. The perorance o a ingerprint atching algorith depends critically upon the quality o the input ingerprint iage. While the quality o a ingerprint iage ay not be objectively easured, it roughly corresponds to the clarity o the ridge structure in the ingerprint iage, and hence it is necessary to enhance the ingerprint iage. Since the ingerprint iage ay be thought o as a syste o oriented texture with non-stationary properties, traditional Fourier analysis is not adequate to analyze the iage copletely as the STFT analysis does. The algorith or iage enhanceent consists o two stages as suarized below: Stage 1: STFT analysis 1. For each overlapping block in an iage, generate and reconstruct a ridge orientation iage by coputing gradients o pixels in a block, and a ridge requency iage through obtaining the FFT value o

4 Fingerprint Veriication Based on Invariant Moent Features and Nonlinear BPNN 803 the block, and an energy iage by suing the power o FFT value;. Soothen the orientation iage using vector average to yield a soothed orientation iage, and generate a coherence iage using the soothed orientation iage; 3. Generate a region ask by thresholding the energy iage; Stage : Enhanceent 4. For each overlapping block in the iage, the next our sub-steps are applied. a. Generate an angular ilter Fa centered on the orientation in the soothed orientation iage with a bandwidth inversely proportional to coherence iage; b. Generate a radial ilter Fr centered on requency iage; c. Filter a block in the FFT doain, F=F Fa Fr; d. Generate the enhanced block by inverse Fourier transor IFFT(F); 5. Reconstruct the enhanced iage by coposing enhanced blocks, and yield the inal enhanced iage with the region ask. 3.. Deterination o reerence point In the second step, we deterine the reerence point ro the enhanced iage. The reerence point is deined as the point o the axiu curvature on the convex ridge [11], which is usually located in the central area o ingerprint. The reliable detection o the position o a reerence point can be accoplished by detecting the axiu curvature using coplex iltering ethods [1,15]. They apply coplex ilters to ridge orientation ield iage generated ro original ingerprint iage. The reliable detection o reerence point with the coplex iltering ethods as suarized below: 1. For each overlapping block in an iage; a. Generate a ridge orientation iage with the sae ethod in STFT analysis; b. Apply the corresponding coplex ilter h= ( x+ iy) g( x, y) centered at the pixel orientation in the orientation iage, where and g( xy, ) = exp{ (( x + y ) /( σ ))} indicate the order o the coplex ilter and a Gaussian window, respectively; c. For = 1, the ilter response o each block can be obtained by a convolution, h* O( x, y ) = t t g( y) (( xgx ( )) Oxy (, )) + igx ( ) (( ygy ( ) O ( xy, ))), where Oxy (, ) represents the pixel orientation in the orientation iage;. Reconstruct the iltered iage by coposing iltered blocks. It is worth to ention that the ulti-resolution ethod [15] can overcoe the orientation iled (a) (b) Fig. 3. (a) Original ingerprint (size 96x560) (b) deterined reerence point. estiation error or the poor quality iages. In this algorith, however, since ingerprint iages are enhanced irst, the orientation ields ro the enhanced iages are accurate enough or reerence point deterination. So we just apply the coplex ilters on the orientation ield o the enhanced iage to increase the processing speed. The axiu response o the coplex ilter in the iltered iage can be considered as the reerence point. Since there is only one output, the unique output point is taken as the reerence point. The LMS orientation estiation algorith [5] is used to deterine the orientation o reerence point. It is entioned that we use a pixel-wise ethod to instead the block-wise ethod as in [5]. Then, i we know the precise position o the reerence point, we can deterine its orientation accurately by the LMS orientation estiation algorith. Thereore the 0 0 position and the orientation ( θ0 [0,180 ) ) in the enhanced iage becoe those o a reerence point. An exaple o the experients with an original ingerprint is shown in Fig. 3(a). The deterined reerence point is shown in Fig. 3(b). We can see the deterined result is accurate both in position and orientation Deterination o ROI and partition The third step is to crop the ingerprint iage based on the reerence point into an ROI. In order to speed up the overall process, we use only a predeined area (ROI) around the reerence point at the center or eature extraction instead o using the entire ingerprint. The center o the cropped iage centers the position o the reerence point and parallels the orientation o the reerence point. Figs. 4(a) and (b) deonstrate the eature extraction ro ROIs centered

5 804 Ju Cheng Yang and Dong Sun Park Table 1. Seven invariant oents with the dierent sub-iages o the original ingerprint iage (IM= Invariant Moent, S=sub-iages). IM(Log) S1 S S3 S4 φ φ φ φ φ φ φ (a) (b) Fig. 4. (a) (b) deonstrate the eature extraction ro ROIs centered on the deterined reerence point o an input ingerprint and a teplate one, respectively. Fig. 5. Method or partitioning the ROI into 4 subiages. on the deterined reerence point o two input ingerprints o a person, respectively. Since the ROIs centered on the sae area around the reerence point, the eatures are assured to be extracted, and they are invariant to rotation and translation. The size o the ROI can be experientally deterined. In this paper, a size o ROI is used. In order to reduce the eects o noise and nonlinear distortions, the ROI is partitioned into our saller sub-iages (4 quadrants) in an anticlockwise sequence as depicted in Fig. 5. So each sub-iage has a size o Invariant oent eatures At the ourth step, we apply the invariant oent analysis introduced in Section on each sub-iage respectively. For each sub-iage, a set o seven invariant oents is coputed, so our sets o invariant oents o the sub-iages are extracted as eatures to represent a ingerprint. Let [ φ k1, φ k, φ k7 ] ( k= 1 or, 3, 4) as a set o invariant oents, the total eature vectors are the cobination o the 4 sets o invariant oents V=[ φ 11, φ 1, φ 17, φ 1, φ, φ 7, φ 31, φ 3, φ 37, φ 41, φ 4, φ 47 ]. The length o the total eature vectors is 8. An exaple o these invariant oent values is listed as in Table Matching Matching with absolute distance Absolute distance is used to easure the siilarity between the eature vectors o the input ingerprint with those o the teplates ingerprint stored in the database. Let V 1 = { a1, a,..., an} and V = { b1, b,..., bn} (n=8) denote the eature vectors o the two ingerprints to atched, T denotes the thresholds used in the atching process. The dierence vector Vd o the two ingerprint eature vectors is calculated as in (6). V d a1 b1 a b an bn =,... (6) ax( a1, b1) ax( a, b) ax( an, bn) We deine the absolute distance o the two atching vectors as in (7). R n ai bi = i= 1 ax( ai, bi ) (7) Then the inal decision o atching result is deterined by (8). accept i R < T (8) reject i R T In this equation the thresholds T varies according to the quality o the ingerprint iages. The quality o ingerprint iages can be varied depending on sensors, thus the threshold should be adjusted on a speciic sensor. According to the experient, the better the ingerprint iage is, the larger T should be. In this paper, T is deterined experientally and set to 1.0.

6 Fingerprint Veriication Based on Invariant Moent Features and Nonlinear BPNN Matching with BPNN Instead o using the distance easures, a set o three-layer BPNNs are used to veriy a atching between eature vectors o input ingerprint and those o a teplate ingerprint. The nuber o the BPNN is the sae with the veriying persons. The structure o the BPNNs consists o input layer, one hidden layer and output layer. For each input ingerprint and its teplate ingerprint, we copute axiu, iniu and average eleents o the input vector V 1, the teplate vector V and the dierence vector V d as the input o the BPNNs. The axiu values are V d ax, V V ax, the iniu values are V in, 1ax, 1in, V V in, and the average values are V, 1 avg, d davg V V. Since the output is to judge whether avg the input ingerprint is atch or non-atch according to the identity ID, we can take the atching process as a two-class proble. There are 9 input eatures and output classes, so the input layer neurons and the output layer neuron are 9 and 1 respectively. The nuber o the hidden layer neurons is obtained epirically. In order to train the BPNN with a atch or non-atch case, we label the class values as 1 or 0. That is, 1 eans the atch and 0 eans non-atch. So the desired output values can be distributed intelligently by the BPNN. In the training (o-line) stage, a set o { V d ax, V V ax, V in, V in, V, V 1, V 1ax, avg d davg avg } are ed to the corresponding BPNN with indicating their corresponding class. The eatures are coputed ro the training data, each contains two eature vectors o the input ingerprint and teplate ingerprint as well as a dierence vector o the. While, in the testing (on-line) stage, a set o { V d ax, V V ax, V d in, V 1in, V in, V 1, V } are ed to the BPNN to 1ax, davg, V avg avg produce the output values. Siilarly, the eatures are coputed ro the testing data, each contains two eature vectors o the test ingerprint and the corresponding teplate ingerprint with the querying ID as well as a dierence vector o the. The eleent o the output values C n is restricted in the range o [0, 1]. With the thresholds T l and T h, the atching result can be described as in (9). accept i Cn Th (9) reject i Cn < Tl In this equation, the thresholds, T h and T l are the thresholds o accept and reject respectively. In the experients, T l was set to and T h was set to EXPERIMENTAL RESULTS The ingerprint iage database used in this experient is the FVC00 ingerprint database set a [0], which contains our distinct databases: DB1_a, DB_a, DB3_a and DB4_a. The resolution o DB1_a, DB3_a, and DB4_a is 500 dpi, and that o DB_a is 569 dpi. Each database consists o 800 ingerprint iages in 56 gray scale levels (100 persons, 8 ingerprints per person). For those reerence points o the ingerprint iages were near or on the border o the ingerprint iages due to the sall sensor sizes, the ROIs would be ailed to acquire or coputing the eatures, so we chose to replace the eatures using the average two eatures ro the ront and next ipressions o the current ipressions, the siilar process can be extended to those containing ore rejected ipressions. In the experients o absolute distance atching, the average o the training saples per person was taken as the teplate ingerprint. The teplate eature vector o each person was coputed ro all the average eature vectors o the training ingerprints o the person. Training patterns were selected on the irst 6 ingerprints o per person (6/8=75%) in each database, while all the 8 ingerprints o per person in each database were used or testing. That is, 600 (800 75%=600) patterns in each database was used or training, and tests were perored on all 800 patterns. In the experients o BPNN atching, 100 BPNNs each with 9 input layer neurons and 1 output layer neuron was trained on the 600 o patterns in each database, and test was perored on all patterns, too. So the training data contained 100 6=600 atch saples and 99 6=594 non-atch saples, totally 1194 saples or each BPNN. And the testing data contained 800 test saples. The training data and testing data were noralized by dividing the axiu values o each colun into (0, 1] beore training and testing network to avoid non-convergence. The training paraeters were decided by experients. Learning rate was set to 0.01, epoch was 5000, and ean absolute error was Experientally, the optial nuber o hidden layer neurons was deterined to 15. The perorance evaluation protocol used in FVC00 is adopted in the experients [13]. The Equal Error Rate (EER), revised EER (EER*), Reject Enroll (REJEnroll), Reject Match (REJMatch), Average Enroll Tie (AETie) and Average Match Tie (AMTie) are coputed on the our databases. To copute the False Acceptance Rate (FAR) and the False Reject Rate (FRR), the genuine atch and ipostor atch were perored. For genuine atch, each test ipression o each person was copared

7 806 Ju Cheng Yang and Dong Sun Park with the teplate o the sae person. Since there are 100 persons, the nuber o atches was 100 8=800. For ipostor atch, the test ipression o each person was copared with the teplate o other persons. The nuber o atches was =7900. The FRR and FAR are deined as ollows: Nuber o rejected genuine clais FRR = 100%, Total nuber o genuine accesses (10) Nuber o accepted iposter clais FAR = 100%. Total nuber o iposter accesses (11) The EER is used as a perorance indicator. The EER indicates the point where the FRR and FAR are equal. The tests were executed on Pentiu IV 1GHz achines. The perorances o our proposed ethod with two atching ethods over the our databases o FVC00 were shown in Tables and 3, respectively. Fro the tables, we can ind that the average EER values o absolute distance atching and that o BPNN atching over our databases are 4.91% and 3.69%, respectively. And the average enroll tie o absolute distance atching and those o BPNN atching over our databases are 0.43 and 0.77 seconds, and the average atch tie are 0.10 and 0.19 seconds, respectively. So BPNN atching has a higher atching accuracy, while absolute distance atching has a aster atching speed. It is because that training the BPNN is uch tie consuing. For evaluating the recognition rate perorance, the Receiver Operating Characteristic (ROC) is used as another perorance indicator. An ROC is a plot o Genuine Acceptance Rate (GAR=1-FRR) against FAR. In order to exaine and prove the perorance o the proposed ethod, a nuber o experients coparing perorance to other renowned ethods were carried out on the FVC00 database. Three atching ethods, proposed in reerences [1,9], and [16], were selected or coparison. (1) Method o Aornraksa [1]: the ingerprint atcher uses DCT eatures with the sae paraeters as in their paper. () Method o Jin [9]: the ingerprint atcher uses WFMT raework with our ultiple training WFMT eatures. (3) Method o Sha [16]: This is the Gabor ilter based ethod with the sae paraeters as in their paper. For the experients in the proposed ethod, the size o an ROI and the partitioned sub-iages are identical with those introduced in the previous subsection. The BPNN is used as the atching ethod in this experient. Fig. 6 shows the ROC curves o the ethods o Aornraksa, Jin, Sha and along with our proposed ethod on databases FVC00 DB1_a. For the Table. Perorances o the proposed ethod with the absolute distance atching over the our databases o FVC00. database EER EER* REJ Enroll REJ Match AE Tie AM Tie DB1_a 3.35% 3.35% 0.00% 0.00% 0.37sec 0.08sec DB_a 6.1% 6.1% 0.00% 0.00% 0.44sec 0.10sec DB3_a 5.78% 5.78% 0.00% 0.00% 0.3sec 0.05sec DB4_a 4.8% 4.8% 0.00% 0.00% 0.57sec 0.17sec Average 4.91% 4.91% 0.00% 0.00% 0.43sec 0.10sec Table 3. Perorances o the proposed ethod with BPNN atching over the our databases o FVC00. database EER EER* REJ Enroll REJ Match AE Tie AM Tie DB1_a.73%.73% 0.00% 0.00% 0.59sec 0.15sec DB_a 3.6% 3.6% 0.00% 0.00% 0.64sec 0.19sec DB3_a 4.94% 4.94% 0.00% 0.00% 0.85sec 0.16sec DB4_a 3.81% 3.81% 0.00% 0.00% 0.98sec 0.5sec Average 3.69% 3.69% 0.00% 0.00% 0.77sec 0.19sec Fig. 6. ROC curves coparing the recognition rate perorance o the proposed ethod with the ethods o Aornranksa, Jin and Sha on database FVC00 DB1_a. Table 4. The GAR(%) under a FAR(%) value o 0.8% o the proposed ethod coparing with the ethod o Aornraksa, Jin, and Sha over the our databases o FVC00. Methods DB1_a DB_a DB3_a DB4_a Average Method o Aornraksa 91.4% 85.7% 8.1% 9.6% 87.9% Method o Sha 9.7% 88.9% 85.3% 93.% 90.0% Method o Jin 94.3% 9.4% 90.6% 94.9% 93.1% Our proposed ethod 96.4% 95.8% 94.% 97.3% 95.9%

8 Fingerprint Veriication Based on Invariant Moent Features and Nonlinear BPNN 807 experients, as shown in the igure, since the curve o the proposed algorith is above those o the other three ethods, it eans that the atching accuracy o the proposed algorith is greater than the others. Table 4 illustrates the average GAR(%) under a FAR(%) o 0.8% with the ethods o Aornranksa, Jin, Sha and our proposed ethod are 87.9%, 90.0%, 93.1% and 95.9% respectively over the our databases o FVC00. It shows that the average GAR(%) o our proposed ethod is ore than.8% higher than any other ethods. 5. CONCLUSIONS In this paper, a ingerprint veriication syste based on invariant oent eatures and nonlinear BPNN is proposed. A preprocessing enhanceent with the STFT analysis akes the algorith highly robust to poor-quality ingerprint iages and iproves the atching accuracy. Under the help o the enhanceent, the reerence point can be reliably and accurately deterined with the coplex iltering ethods and LMS orientation estiation algorith. Using the invariant oent analysis on sub-iages, the extracted eatures have bound the eects o noise and non-linear distortions, while utilizing the invariant ability to the aine transorations o eatures to handle various input conditions. Matching the ingerprints is ipleented by two easures: absolute distance and BPNN. The axiu, iniu and average eleents o the vectors o input ingerprint, teplate ingerprint and the dierence vectors o the are used as the BPNN inputs. As an excellent nonlinear classiier, the BPNN can iprove the whole atching perorance. The experiental results show that both absolute distance and BPNN can be used or ingerprint veriication. The BPNN atching has a higher atching accuracy, while the absolute distance atching has a aster atching speed. Thereore, we can choose dierent atching ethods or dierent application cases. Copared with soe noted ethods, we ind that our proposed ethod also perors uch better in atching accuracy. Further work should be proceeded to iprove robustness and reliability o our proposed ethod. REFERENCES [1] T. Aornraksa and S. Tachaphetpiboon, Fingerprint recognition using DCT eatures, Electronics Letters, vol. 4, no. 9, pp. 5-53, 006. [] S. Chikkerur, A. N. Cartwright, and V. Govindaraju, Fingerprint enhanceent using STFT analysis, Pattern Recognition, vol. 40, no.1, pp , 007. [3] L. Fausett, Fundaentals o Neural Networks Architecture, Algorith and Application, Prentice Hall, [4] R. C. Gonzalez and R. E. woods, Digital Iage Processing, nd Edition, Prentice Hall, 00. [5] L. Hong, Y. Wang, and A. K. Jain, Fingerprint iage enhanceent: Algorith and perorance evaluation, Transactions on Pattern Analysis and Machine Intelligence, vol. 1, no. 4, pp , [6] M. K. Hu, Visual pattern recognition by oent invariants, IRE Trans. on Inoration Theory, vol. 8, pp , 196. [7] A. K. Jain, S. Prabhakar, L. Hong, and S. Pankanti, Filterbank-based ingerprint atching, IEEE Trans. on Iage Processing, vol. 9, pp , 000. [8] X. Jang and W. Y. Yau, Fingerprint inutiae atching based on the local and global structures, Proc. o Int. Con. on Pattern Recognition, vol., pp , 000. [9] A. T. B. Jin, D. N. C. Ling, and O. T. Song, An eicient ingerprint veriication syste using integrated wavelet and Fourier-Mellin invariant transor, Iage and Vision Coputing, vol., no. 6, pp , 004. [10] J. Liu, Z. Huang, and K. Chan, Direct inutiae extraction ro gray-level ingerprint iage by relationship exaination, Proc. o Int. Con. on Iage Processing, vol., pp , 000. [11] M. Liu, X. D. Jiang, and A. Kot, Fingerprint reerence-point detection, EURASIP Journal on Applied Signal Processing, vol. 005, no. 4, pp , 005. [1] M. Liu, X. D. Jiang, and A. Kot, Fingerprint retrieval by coplex ilter Responses, Proc. o Int. Con. on Pattern Recognition, HongKong, pp , 006. [13] D. Maio, D. Maltoni, R. Cappelli, J. L. Wayan, and A. K. Jain, FVC00: Second ingerprint veriication copetition, Proc. 16th Int l Con. Pattern Recognition, vol. 3, pp , 00. [14] D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook o Fingerprint Recognition, Springer, Berlin, 003. [15] K. Nilsson and J. Bigun, Localization o corresponding points in ingerprints by coplex iltering, Pattern Recognition Letters, vol. 4, pp , 003. [16] L. F. Sha, F. Zhao, and X. O. Tang, Iproved ingercode or ilterbank-based ingerprint atching, Proc. o Int. Con. on Iage Processing, vol., pp , 003. [17] M. Tico, P. Kuosanen, and J. Saarinen, Wavelet doain eatures or ingerprint recognition, Electronics Letters, vol. 37, no.1, pp. 1-, 001.

9 808 Ju Cheng Yang and Dong Sun Park [18] J. C. Yang and D. S. Park, A ingerprint veriication algorith using tessellated invariant oent eatures, Neurocoputing, vol. 71, no. 10-1, pp , 008. [19] J. C. Yang, S. Yoon, and D. S. Park, Applying learning vector quantization neural network or ingerprint atching, Lecture Notes in Artiicial Intelligence (LNAI 4304), Springer, Berlin, pp , 006. [0] Ju Cheng Yang received the B.S. degree ro South-central University or Nationalities, China in 00, and the M.S. and Ph.D. degrees ro Chonbuk National University, South Korea in 004 and 008. He did his post-doc at the Advanced Graduate Education Center o Jeonbuk or Electronics and Inoration Technol ogy-bk1 (AGECJEIT-BK1), Chonbuk National University, South Korea. His research interests include iage processing, pattern recognition, bioetrics, coputer vision and artiicial intelligence. He has published over 0 papers in related international conerences and journals. He has served as editors o any journals such as Inoration Technology Journal and Journal o Applied Sciences and reviewers any conerences such as VISAPP 06, ICNC 06- FSKD 06, IPCV 08. He is a eber o IEEE. Dong Sun Park is a Proessor in Chonbuk National University, South Korea. He received the B.S. in Korea University, South Korea and the M.S., Ph.D. degrees in University o Missouri, USA. His research area is iage processing, pattern recognition, coputer vision and artiicial Intelligence. He has published lots o papers in the international conerences and journals. He is an Association Meber o IEEE Coputer Society.

Role of Assembling Invariant Moments and SVM in Fingerprint Recognition

Role of Assembling Invariant Moments and SVM in Fingerprint Recognition 56 Role of Assembling Invariant Moments SVM in Fingerprint Recognition 1 Supriya Wable, 2 Chaitali Laulkar 1, 2 Department of Computer Engineering, University of Pune Sinhgad College of Engineering, Pune-411

More information

A method to determine relative stroke detection efficiencies from multiplicity distributions

A method to determine relative stroke detection efficiencies from multiplicity distributions A ethod to deterine relative stroke detection eiciencies ro ultiplicity distributions Schulz W. and Cuins K. 2. Austrian Lightning Detection and Inoration Syste (ALDIS), Kahlenberger Str.2A, 90 Vienna,

More information

A practical approach to real-time application of speaker recognition using wavelets and linear algebra

A practical approach to real-time application of speaker recognition using wavelets and linear algebra A practical approach to real-tie application o speaker recognition using wavelets and linear algebra Duc Son Pha, Michael C. Orr, Brian Lithgow and Robert Mahony Departent o Electrical and Coputer Systes

More information

Pattern Recognition and Machine Learning. Artificial Neural networks

Pattern Recognition and Machine Learning. Artificial Neural networks Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2016/2017 Lessons 9 11 Jan 2017 Outline Artificial Neural networks Notation...2 Convolutional Neural Networks...3

More information

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes

More information

Analysis of Hu's Moment Invariants on Image Scaling and Rotation

Analysis of Hu's Moment Invariants on Image Scaling and Rotation Edith Cowan University Research Online ECU Publications Pre. 11 1 Analysis of Hu's Moent Invariants on Iage Scaling and Rotation Zhihu Huang Edith Cowan University Jinsong Leng Edith Cowan University 1.119/ICCET.1.548554

More information

Ensemble Based on Data Envelopment Analysis

Ensemble Based on Data Envelopment Analysis Enseble Based on Data Envelopent Analysis So Young Sohn & Hong Choi Departent of Coputer Science & Industrial Systes Engineering, Yonsei University, Seoul, Korea Tel) 82-2-223-404, Fax) 82-2- 364-7807

More information

Pattern Recognition and Machine Learning. Artificial Neural networks

Pattern Recognition and Machine Learning. Artificial Neural networks Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2017 Lessons 7 20 Dec 2017 Outline Artificial Neural networks Notation...2 Introduction...3 Key Equations... 3 Artificial

More information

Non-Parametric Non-Line-of-Sight Identification 1

Non-Parametric Non-Line-of-Sight Identification 1 Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,

More information

HYBRID FAST ALGORITHM FOR S TRANSFORMS

HYBRID FAST ALGORITHM FOR S TRANSFORMS 8th European Signal Processing Conerence (EUSIPCO-) Aalborg Denar August -7 HYBRID FAST ALGORITHM FOR S TRASFORMS Soo-Chang Pei Jian-Jiun Ding Pai-Wei Wag and Wen Fu Wang Departent o Electrical Engineering

More information

Topic 5a Introduction to Curve Fitting & Linear Regression

Topic 5a Introduction to Curve Fitting & Linear Regression /7/08 Course Instructor Dr. Rayond C. Rup Oice: A 337 Phone: (95) 747 6958 E ail: rcrup@utep.edu opic 5a Introduction to Curve Fitting & Linear Regression EE 4386/530 Coputational ethods in EE Outline

More information

Intelligent Systems: Reasoning and Recognition. Artificial Neural Networks

Intelligent Systems: Reasoning and Recognition. Artificial Neural Networks Intelligent Systes: Reasoning and Recognition Jaes L. Crowley MOSIG M1 Winter Seester 2018 Lesson 7 1 March 2018 Outline Artificial Neural Networks Notation...2 Introduction...3 Key Equations... 3 Artificial

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

Nonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy

Nonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy Storage Capacity and Dynaics of Nononotonic Networks Bruno Crespi a and Ignazio Lazzizzera b a. IRST, I-38050 Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I-38050 Povo (Trento) Italy INFN Gruppo

More information

Pattern Recognition and Machine Learning. Learning and Evaluation for Pattern Recognition

Pattern Recognition and Machine Learning. Learning and Evaluation for Pattern Recognition Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2017 Lesson 1 4 October 2017 Outline Learning and Evaluation for Pattern Recognition Notation...2 1. The Pattern Recognition

More information

Boundary and Region based Moments Analysis for Image Pattern Recognition

Boundary and Region based Moments Analysis for Image Pattern Recognition ISSN 1746-7659, England, UK Journal of Inforation and Coputing Science Vol. 10, No. 1, 015, pp. 040-045 Boundary and Region based Moents Analysis for Iage Pattern Recognition Dr. U Ravi Babu 1, Dr Md Mastan

More information

Ch 12: Variations on Backpropagation

Ch 12: Variations on Backpropagation Ch 2: Variations on Backpropagation The basic backpropagation algorith is too slow for ost practical applications. It ay take days or weeks of coputer tie. We deonstrate why the backpropagation algorith

More information

Arithmetic Unit for Complex Number Processing

Arithmetic Unit for Complex Number Processing Abstract Arithetic Unit or Coplex Nuber Processing Dr. Soloon Khelnik, Dr. Sergey Selyutin, Alexandr Viduetsky, Inna Doubson, Seion Khelnik This paper presents developent o a coplex nuber arithetic unit

More information

Application of Differential Geometry in Magnetic Levitation Control

Application of Differential Geometry in Magnetic Levitation Control Appl. Math. In. Sci. 8, No. 5, 2437-2442 (2014) 2437 Applied Matheatics & Inoration Sciences An International Journal http:dx.doi.org10.12785ais080539 Application o Dierential Geoetry in Magnetic Levitation

More information

Proc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES

Proc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Proc. of the IEEE/OES Seventh Working Conference on Current Measureent Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Belinda Lipa Codar Ocean Sensors 15 La Sandra Way, Portola Valley, CA 98 blipa@pogo.co

More information

Multi-Scale/Multi-Resolution: Wavelet Transform

Multi-Scale/Multi-Resolution: Wavelet Transform Multi-Scale/Multi-Resolution: Wavelet Transfor Proble with Fourier Fourier analysis -- breaks down a signal into constituent sinusoids of different frequencies. A serious drawback in transforing to the

More information

Pattern Recognition and Machine Learning. Artificial Neural networks

Pattern Recognition and Machine Learning. Artificial Neural networks Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2016 Lessons 7 14 Dec 2016 Outline Artificial Neural networks Notation...2 1. Introduction...3... 3 The Artificial

More information

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter

More information

LONG-TERM PREDICTIVE VALUE INTERVAL WITH THE FUZZY TIME SERIES

LONG-TERM PREDICTIVE VALUE INTERVAL WITH THE FUZZY TIME SERIES Journal of Marine Science and Technology, Vol 19, No 5, pp 509-513 (2011) 509 LONG-TERM PREDICTIVE VALUE INTERVAL WITH THE FUZZY TIME SERIES Ming-Tao Chou* Key words: fuzzy tie series, fuzzy forecasting,

More information

SPECTRUM sensing is a core concept of cognitive radio

SPECTRUM sensing is a core concept of cognitive radio World Acadey of Science, Engineering and Technology International Journal of Electronics and Counication Engineering Vol:6, o:2, 202 Efficient Detection Using Sequential Probability Ratio Test in Mobile

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

Kernel Methods and Support Vector Machines

Kernel Methods and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley ENSIAG 2 / osig 1 Second Seester 2012/2013 Lesson 20 2 ay 2013 Kernel ethods and Support Vector achines Contents Kernel Functions...2 Quadratic

More information

Sexually Transmitted Diseases VMED 5180 September 27, 2016

Sexually Transmitted Diseases VMED 5180 September 27, 2016 Sexually Transitted Diseases VMED 518 Septeber 27, 216 Introduction Two sexually-transitted disease (STD) odels are presented below. The irst is a susceptibleinectious-susceptible (SIS) odel (Figure 1)

More information

I. Understand get a conceptual grasp of the problem

I. Understand get a conceptual grasp of the problem MASSACHUSETTS INSTITUTE OF TECHNOLOGY Departent o Physics Physics 81T Fall Ter 4 Class Proble 1: Solution Proble 1 A car is driving at a constant but unknown velocity,, on a straightaway A otorcycle is

More information

Estimating Parameters for a Gaussian pdf

Estimating Parameters for a Gaussian pdf Pattern Recognition and achine Learning Jaes L. Crowley ENSIAG 3 IS First Seester 00/0 Lesson 5 7 Noveber 00 Contents Estiating Paraeters for a Gaussian pdf Notation... The Pattern Recognition Proble...3

More information

An Improved Particle Filter with Applications in Ballistic Target Tracking

An Improved Particle Filter with Applications in Ballistic Target Tracking Sensors & ransducers Vol. 72 Issue 6 June 204 pp. 96-20 Sensors & ransducers 204 by IFSA Publishing S. L. http://www.sensorsportal.co An Iproved Particle Filter with Applications in Ballistic arget racing

More information

Optimization of Flywheel Weight using Genetic Algorithm

Optimization of Flywheel Weight using Genetic Algorithm IN: 78 7798 International Journal o cience, Engineering and Technology esearch (IJET) Volue, Issue, March 0 Optiization o Flywheel Weight using Genetic Algorith A. G. Appala Naidu*, B. T.N. Charyulu, C..C.V.aanaurthy

More information

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering

More information

Multi-view Discriminative Manifold Embedding for Pattern Classification

Multi-view Discriminative Manifold Embedding for Pattern Classification Multi-view Discriinative Manifold Ebedding for Pattern Classification X. Wang Departen of Inforation Zhenghzou 450053, China Y. Guo Departent of Digestive Zhengzhou 450053, China Z. Wang Henan University

More information

NBN Algorithm Introduction Computational Fundamentals. Bogdan M. Wilamoswki Auburn University. Hao Yu Auburn University

NBN Algorithm Introduction Computational Fundamentals. Bogdan M. Wilamoswki Auburn University. Hao Yu Auburn University NBN Algorith Bogdan M. Wilaoswki Auburn University Hao Yu Auburn University Nicholas Cotton Auburn University. Introduction. -. Coputational Fundaentals - Definition of Basic Concepts in Neural Network

More information

Using a De-Convolution Window for Operating Modal Analysis

Using a De-Convolution Window for Operating Modal Analysis Using a De-Convolution Window for Operating Modal Analysis Brian Schwarz Vibrant Technology, Inc. Scotts Valley, CA Mark Richardson Vibrant Technology, Inc. Scotts Valley, CA Abstract Operating Modal Analysis

More information

Hand Written Digit Recognition Using Backpropagation Neural Network on Master-Slave Architecture

Hand Written Digit Recognition Using Backpropagation Neural Network on Master-Slave Architecture J.V.S.Srinivas et al./ International Journal of Coputer Science & Engineering Technology (IJCSET) Hand Written Digit Recognition Using Backpropagation Neural Network on Master-Slave Architecture J.V.S.SRINIVAS

More information

A Smoothed Boosting Algorithm Using Probabilistic Output Codes

A Smoothed Boosting Algorithm Using Probabilistic Output Codes A Soothed Boosting Algorith Using Probabilistic Output Codes Rong Jin rongjin@cse.su.edu Dept. of Coputer Science and Engineering, Michigan State University, MI 48824, USA Jian Zhang jian.zhang@cs.cu.edu

More information

Principal Components Analysis

Principal Components Analysis Principal Coponents Analysis Cheng Li, Bingyu Wang Noveber 3, 204 What s PCA Principal coponent analysis (PCA) is a statistical procedure that uses an orthogonal transforation to convert a set of observations

More information

Qualitative Modelling of Time Series Using Self-Organizing Maps: Application to Animal Science

Qualitative Modelling of Time Series Using Self-Organizing Maps: Application to Animal Science Proceedings of the 6th WSEAS International Conference on Applied Coputer Science, Tenerife, Canary Islands, Spain, Deceber 16-18, 2006 183 Qualitative Modelling of Tie Series Using Self-Organizing Maps:

More information

Recovering Data from Underdetermined Quadratic Measurements (CS 229a Project: Final Writeup)

Recovering Data from Underdetermined Quadratic Measurements (CS 229a Project: Final Writeup) Recovering Data fro Underdeterined Quadratic Measureents (CS 229a Project: Final Writeup) Mahdi Soltanolkotabi Deceber 16, 2011 1 Introduction Data that arises fro engineering applications often contains

More information

Warning System of Dangerous Chemical Gas in Factory Based on Wireless Sensor Network

Warning System of Dangerous Chemical Gas in Factory Based on Wireless Sensor Network 565 A publication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 59, 07 Guest Editors: Zhuo Yang, Junie Ba, Jing Pan Copyright 07, AIDIC Servizi S.r.l. ISBN 978-88-95608-49-5; ISSN 83-96 The Italian Association

More information

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China 6th International Conference on Machinery, Materials, Environent, Biotechnology and Coputer (MMEBC 06) Solving Multi-Sensor Multi-Target Assignent Proble Based on Copositive Cobat Efficiency and QPSO Algorith

More information

Chapter 6 1-D Continuous Groups

Chapter 6 1-D Continuous Groups Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:

More information

Extension of CSRSM for the Parametric Study of the Face Stability of Pressurized Tunnels

Extension of CSRSM for the Parametric Study of the Face Stability of Pressurized Tunnels Extension of CSRSM for the Paraetric Study of the Face Stability of Pressurized Tunnels Guilhe Mollon 1, Daniel Dias 2, and Abdul-Haid Soubra 3, M.ASCE 1 LGCIE, INSA Lyon, Université de Lyon, Doaine scientifique

More information

HIGH RESOLUTION NEAR-FIELD MULTIPLE TARGET DETECTION AND LOCALIZATION USING SUPPORT VECTOR MACHINES

HIGH RESOLUTION NEAR-FIELD MULTIPLE TARGET DETECTION AND LOCALIZATION USING SUPPORT VECTOR MACHINES ICONIC 2007 St. Louis, O, USA June 27-29, 2007 HIGH RESOLUTION NEAR-FIELD ULTIPLE TARGET DETECTION AND LOCALIZATION USING SUPPORT VECTOR ACHINES A. Randazzo,. A. Abou-Khousa 2,.Pastorino, and R. Zoughi

More information

Sharp Time Data Tradeoffs for Linear Inverse Problems

Sharp Time Data Tradeoffs for Linear Inverse Problems Sharp Tie Data Tradeoffs for Linear Inverse Probles Saet Oyak Benjain Recht Mahdi Soltanolkotabi January 016 Abstract In this paper we characterize sharp tie-data tradeoffs for optiization probles used

More information

CHAPTER 8 : A PARALLEL TWO DIMENSIONAL WAVELET PACKET TRANSFORM AND ITS APPLICATION TO MATRIX-VECTOR MULTIPLICATION.

CHAPTER 8 : A PARALLEL TWO DIMENSIONAL WAVELET PACKET TRANSFORM AND ITS APPLICATION TO MATRIX-VECTOR MULTIPLICATION. HAPTR 8 : A PARALLL TWO DIMNSIONAL WAVLT PAKT TRANSFORM AND ITS APPLIATION TO MATRIX-VTOR MULTIPLIATION. ric GOIRAND Mladen Victor WIKRHAUSR Washington University Departent o Matheatics Brookings Drive,

More information

Efficient Filter Banks And Interpolators

Efficient Filter Banks And Interpolators Efficient Filter Banks And Interpolators A. G. DEMPSTER AND N. P. MURPHY Departent of Electronic Systes University of Westinster 115 New Cavendish St, London W1M 8JS United Kingdo Abstract: - Graphical

More information

Tracking using CONDENSATION: Conditional Density Propagation

Tracking using CONDENSATION: Conditional Density Propagation Tracking using CONDENSATION: Conditional Density Propagation Goal Model-based visual tracking in dense clutter at near video frae rates M. Isard and A. Blake, CONDENSATION Conditional density propagation

More information

Combining Classifiers

Combining Classifiers Cobining Classifiers Generic ethods of generating and cobining ultiple classifiers Bagging Boosting References: Duda, Hart & Stork, pg 475-480. Hastie, Tibsharini, Friedan, pg 246-256 and Chapter 10. http://www.boosting.org/

More information

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis City University of New York (CUNY) CUNY Acadeic Works International Conference on Hydroinforatics 8-1-2014 Experiental Design For Model Discriination And Precise Paraeter Estiation In WDS Analysis Giovanna

More information

Upper bound on false alarm rate for landmine detection and classification using syntactic pattern recognition

Upper bound on false alarm rate for landmine detection and classification using syntactic pattern recognition Upper bound on false alar rate for landine detection and classification using syntactic pattern recognition Ahed O. Nasif, Brian L. Mark, Kenneth J. Hintz, and Nathalia Peixoto Dept. of Electrical and

More information

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis E0 370 tatistical Learning Theory Lecture 6 (Aug 30, 20) Margin Analysis Lecturer: hivani Agarwal cribe: Narasihan R Introduction In the last few lectures we have seen how to obtain high confidence bounds

More information

N-Point. DFTs of Two Length-N Real Sequences

N-Point. DFTs of Two Length-N Real Sequences Coputation of the DFT of In ost practical applications, sequences of interest are real In such cases, the syetry properties of the DFT given in Table 5. can be exploited to ake the DFT coputations ore

More information

Kernel based Object Tracking using Color Histogram Technique

Kernel based Object Tracking using Color Histogram Technique Kernel based Object Tracking using Color Histogra Technique 1 Prajna Pariita Dash, 2 Dipti patra, 3 Sudhansu Kuar Mishra, 4 Jagannath Sethi, 1,2 Dept of Electrical engineering, NIT, Rourkela, India 3 Departent

More information

A Novel Breast Mass Diagnosis System based on Zernike Moments as Shape and Density Descriptors

A Novel Breast Mass Diagnosis System based on Zernike Moments as Shape and Density Descriptors A Novel Breast Mass Diagnosis Syste based on Zernike Moents as Shape and Density Descriptors Air Tahasbi 1,2, *, Fateeh Saki 2, Haed Aghapanah 3, Shahriar B. Shokouhi 2 1 Departent of Electrical Engineering,

More information

Fast Structural Similarity Search of Noncoding RNAs Based on Matched Filtering of Stem Patterns

Fast Structural Similarity Search of Noncoding RNAs Based on Matched Filtering of Stem Patterns Fast Structural Siilarity Search of Noncoding RNs Based on Matched Filtering of Ste Patterns Byung-Jun Yoon Dept. of Electrical Engineering alifornia Institute of Technology Pasadena, 91125, S Eail: bjyoon@caltech.edu

More information

NUMERICAL MODELLING OF THE TYRE/ROAD CONTACT

NUMERICAL MODELLING OF THE TYRE/ROAD CONTACT NUMERICAL MODELLING OF THE TYRE/ROAD CONTACT PACS REFERENCE: 43.5.LJ Krister Larsson Departent of Applied Acoustics Chalers University of Technology SE-412 96 Sweden Tel: +46 ()31 772 22 Fax: +46 ()31

More information

Acoustic Source Localization and Discrimination in Urban Environments

Acoustic Source Localization and Discrimination in Urban Environments Acoustic Source Localization and Discriination in Urban Environents Manish Kushwaha, Xenoon Koutsouos, Peter Volgyesi and Aos Ledeczi Institute or Sotware Integrated Systes (ISIS) Departent o Electrical

More information

Fault Diagnosis of Planetary Gear Based on Fuzzy Entropy of CEEMDAN and MLP Neural Network by Using Vibration Signal

Fault Diagnosis of Planetary Gear Based on Fuzzy Entropy of CEEMDAN and MLP Neural Network by Using Vibration Signal ITM Web of Conferences 11, 82 (217) DOI: 1.151/ itconf/2171182 IST217 Fault Diagnosis of Planetary Gear Based on Fuzzy Entropy of CEEMDAN and MLP Neural Networ by Using Vibration Signal Xi-Hui CHEN, Gang

More information

A Simple Regression Problem

A Simple Regression Problem A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where

More information

Handwriting Detection Model Based on Four-Dimensional Vector Space Model

Handwriting Detection Model Based on Four-Dimensional Vector Space Model Journal of Matheatics Research; Vol. 10, No. 4; August 2018 ISSN 1916-9795 E-ISSN 1916-9809 Published by Canadian Center of Science and Education Handwriting Detection Model Based on Four-Diensional Vector

More information

Least Squares Fitting of Data

Least Squares Fitting of Data Least Squares Fitting of Data David Eberly, Geoetric Tools, Redond WA 98052 https://www.geoetrictools.co/ This work is licensed under the Creative Coons Attribution 4.0 International License. To view a

More information

INTELLECTUAL DATA ANALYSIS IN AIRCRAFT DESIGN

INTELLECTUAL DATA ANALYSIS IN AIRCRAFT DESIGN INTELLECTUAL DATA ANALYSIS IN AIRCRAFT DESIGN V.A. Koarov 1, S.A. Piyavskiy 2 1 Saara National Research University, Saara, Russia 2 Saara State Architectural University, Saara, Russia Abstract. This article

More information

ZISC Neural Network Base Indicator for Classification Complexity Estimation

ZISC Neural Network Base Indicator for Classification Complexity Estimation ZISC Neural Network Base Indicator for Classification Coplexity Estiation Ivan Budnyk, Abdennasser Сhebira and Kurosh Madani Iages, Signals and Intelligent Systes Laboratory (LISSI / EA 3956) PARIS XII

More information

Forecasting Financial Indices: The Baltic Dry Indices

Forecasting Financial Indices: The Baltic Dry Indices International Journal of Maritie, Trade & Econoic Issues pp. 109-130 Volue I, Issue (1), 2013 Forecasting Financial Indices: The Baltic Dry Indices Eleftherios I. Thalassinos 1, Mike P. Hanias 2, Panayiotis

More information

SHORT TIME FOURIER TRANSFORM PROBABILITY DISTRIBUTION FOR TIME-FREQUENCY SEGMENTATION

SHORT TIME FOURIER TRANSFORM PROBABILITY DISTRIBUTION FOR TIME-FREQUENCY SEGMENTATION SHORT TIME FOURIER TRANSFORM PROBABILITY DISTRIBUTION FOR TIME-FREQUENCY SEGMENTATION Fabien Millioz, Julien Huillery, Nadine Martin To cite this version: Fabien Millioz, Julien Huillery, Nadine Martin.

More information

A New Algorithm for Reactive Electric Power Measurement

A New Algorithm for Reactive Electric Power Measurement A. Abiyev, GAU J. Soc. & Appl. Sci., 2(4), 7-25, 27 A ew Algorith for Reactive Electric Power Measureent Adalet Abiyev Girne Aerican University, Departernt of Electrical Electronics Engineering, Mersin,

More information

Pattern Classification using Simplified Neural Networks with Pruning Algorithm

Pattern Classification using Simplified Neural Networks with Pruning Algorithm Pattern Classification using Siplified Neural Networks with Pruning Algorith S. M. Karuzzaan 1 Ahed Ryadh Hasan 2 Abstract: In recent years, any neural network odels have been proposed for pattern classification,

More information

Keywords: Estimator, Bias, Mean-squared error, normality, generalized Pareto distribution

Keywords: Estimator, Bias, Mean-squared error, normality, generalized Pareto distribution Testing approxiate norality of an estiator using the estiated MSE and bias with an application to the shape paraeter of the generalized Pareto distribution J. Martin van Zyl Abstract In this work the norality

More information

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation Course Notes for EE227C (Spring 2018): Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee227c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee227c@berkeley.edu October

More information

Accuracy of the Scaling Law for Experimental Natural Frequencies of Rectangular Thin Plates

Accuracy of the Scaling Law for Experimental Natural Frequencies of Rectangular Thin Plates The 9th Conference of Mechanical Engineering Network of Thailand 9- October 005, Phuket, Thailand Accuracy of the caling Law for Experiental Natural Frequencies of Rectangular Thin Plates Anawat Na songkhla

More information

EMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS

EMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS EMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS Jochen Till, Sebastian Engell, Sebastian Panek, and Olaf Stursberg Process Control Lab (CT-AST), University of Dortund,

More information

A Graphical Model Approach to Source Localization in Wireless Sensor Networks

A Graphical Model Approach to Source Localization in Wireless Sensor Networks A Graphical Model Approach to Source Localization in Wireless Sensor Networks Manish Kushwaha, Xenoon Koutsoukos Institute or Sotware Integrated Systes (ISIS) Departent o Electrical Engineering and Coputer

More information

Interactive Markov Models of Evolutionary Algorithms

Interactive Markov Models of Evolutionary Algorithms Cleveland State University EngagedScholarship@CSU Electrical Engineering & Coputer Science Faculty Publications Electrical Engineering & Coputer Science Departent 2015 Interactive Markov Models of Evolutionary

More information

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding IEEE TRANSACTIONS ON INFORMATION THEORY (SUBMITTED PAPER) 1 Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding Lai Wei, Student Meber, IEEE, David G. M. Mitchell, Meber, IEEE, Thoas

More information

Dual porosity DRM formulation for flow and transport through fractured porous media

Dual porosity DRM formulation for flow and transport through fractured porous media Boundary Eleents XXVII 407 Dual porosity DRM orulation or lo and transport through ractured porous edia T. aardzioska & V. Popov Wessex Institute o Technology, UK Abstract The ain objective o this ork

More information

e-companion ONLY AVAILABLE IN ELECTRONIC FORM

e-companion ONLY AVAILABLE IN ELECTRONIC FORM OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer

More information

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay

More information

Boosting with log-loss

Boosting with log-loss Boosting with log-loss Marco Cusuano-Towner Septeber 2, 202 The proble Suppose we have data exaples {x i, y i ) i =... } for a two-class proble with y i {, }. Let F x) be the predictor function with the

More information

CS Lecture 13. More Maximum Likelihood

CS Lecture 13. More Maximum Likelihood CS 6347 Lecture 13 More Maxiu Likelihood Recap Last tie: Introduction to axiu likelihood estiation MLE for Bayesian networks Optial CPTs correspond to epirical counts Today: MLE for CRFs 2 Maxiu Likelihood

More information

AN IMPROVED FUZZY TIME SERIES THEORY WITH APPLICATIONS IN THE SHANGHAI CONTAINERIZED FREIGHT INDEX

AN IMPROVED FUZZY TIME SERIES THEORY WITH APPLICATIONS IN THE SHANGHAI CONTAINERIZED FREIGHT INDEX Journal of Marine Science and Technology, Vol 5, No, pp 393-398 (01) 393 DOI: 106119/JMST-01-0313-1 AN IMPROVED FUZZY TIME SERIES THEORY WITH APPLICATIONS IN THE SHANGHAI CONTAINERIZED FREIGHT INDEX Ming-Tao

More information

Detection and Estimation Theory

Detection and Estimation Theory ESE 54 Detection and Estiation Theory Joseph A. O Sullivan Sauel C. Sachs Professor Electronic Systes and Signals Research Laboratory Electrical and Systes Engineering Washington University 11 Urbauer

More information

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words)

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words) 1 A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine (1900 words) Contact: Jerry Farlow Dept of Matheatics Univeristy of Maine Orono, ME 04469 Tel (07) 866-3540 Eail: farlow@ath.uaine.edu

More information

Damage Detection using Stochastic Subspace Identification

Damage Detection using Stochastic Subspace Identification Daage Detection using Stochastic Subspace Identiication S. H. Si 1 and B. F. Spencer, Jr. 2 1 Departent o Civil and Environental Engineering, University o Illinois at Urbana-Chapaign, Urbana, IL 6181,

More information

Predicting FTSE 100 Close Price Using Hybrid Model

Predicting FTSE 100 Close Price Using Hybrid Model SAI Intelligent Systes Conference 2015 Noveber 10-11, 2015 London, UK Predicting FTSE 100 Close Price Using Hybrid Model Bashar Al-hnaity, Departent of Electronic and Coputer Engineering, Brunel University

More information

A Generalized Permanent Estimator and its Application in Computing Multi- Homogeneous Bézout Number

A Generalized Permanent Estimator and its Application in Computing Multi- Homogeneous Bézout Number Research Journal of Applied Sciences, Engineering and Technology 4(23): 5206-52, 202 ISSN: 2040-7467 Maxwell Scientific Organization, 202 Subitted: April 25, 202 Accepted: May 3, 202 Published: Deceber

More information

arxiv: v3 [cs.ds] 22 Mar 2016

arxiv: v3 [cs.ds] 22 Mar 2016 A Shifting Bloo Filter Fraewor for Set Queries arxiv:1510.03019v3 [cs.ds] Mar 01 ABSTRACT Tong Yang Peing University, China yangtongeail@gail.co Yuanun Zhong Nanjing University, China un@sail.nju.edu.cn

More information

An improved self-adaptive harmony search algorithm for joint replenishment problems

An improved self-adaptive harmony search algorithm for joint replenishment problems An iproved self-adaptive harony search algorith for joint replenishent probles Lin Wang School of Manageent, Huazhong University of Science & Technology zhoulearner@gail.co Xiaojian Zhou School of Manageent,

More information

A MESHSIZE BOOSTING ALGORITHM IN KERNEL DENSITY ESTIMATION

A MESHSIZE BOOSTING ALGORITHM IN KERNEL DENSITY ESTIMATION A eshsize boosting algorith in kernel density estiation A MESHSIZE BOOSTING ALGORITHM IN KERNEL DENSITY ESTIMATION C.C. Ishiekwene, S.M. Ogbonwan and J.E. Osewenkhae Departent of Matheatics, University

More information

A proposal for a First-Citation-Speed-Index Link Peer-reviewed author version

A proposal for a First-Citation-Speed-Index Link Peer-reviewed author version A proposal for a First-Citation-Speed-Index Link Peer-reviewed author version Made available by Hasselt University Library in Docuent Server@UHasselt Reference (Published version): EGGHE, Leo; Bornann,

More information

2 Q 10. Likewise, in case of multiple particles, the corresponding density in 2 must be averaged over all

2 Q 10. Likewise, in case of multiple particles, the corresponding density in 2 must be averaged over all Lecture 6 Introduction to kinetic theory of plasa waves Introduction to kinetic theory So far we have been odeling plasa dynaics using fluid equations. The assuption has been that the pressure can be either

More information

ANALYSIS OF HALL-EFFECT THRUSTERS AND ION ENGINES FOR EARTH-TO-MOON TRANSFER

ANALYSIS OF HALL-EFFECT THRUSTERS AND ION ENGINES FOR EARTH-TO-MOON TRANSFER IEPC 003-0034 ANALYSIS OF HALL-EFFECT THRUSTERS AND ION ENGINES FOR EARTH-TO-MOON TRANSFER A. Bober, M. Guelan Asher Space Research Institute, Technion-Israel Institute of Technology, 3000 Haifa, Israel

More information

1 Bounding the Margin

1 Bounding the Margin COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #12 Scribe: Jian Min Si March 14, 2013 1 Bounding the Margin We are continuing the proof of a bound on the generalization error of AdaBoost

More information

IAENG International Journal of Computer Science, 42:2, IJCS_42_2_06. Approximation Capabilities of Interpretable Fuzzy Inference Systems

IAENG International Journal of Computer Science, 42:2, IJCS_42_2_06. Approximation Capabilities of Interpretable Fuzzy Inference Systems IAENG International Journal of Coputer Science, 4:, IJCS_4 6 Approxiation Capabilities of Interpretable Fuzzy Inference Systes Hirofui Miyajia, Noritaka Shigei, and Hiroi Miyajia 3 Abstract Many studies

More information

Approach to Operational Experimental Estimation of Static Stresses of Elements of Mechanical Structures

Approach to Operational Experimental Estimation of Static Stresses of Elements of Mechanical Structures Journal o Physics: Conerence Series PAPE OPE ACCESS Approach to Operational Eperiental Estiation o Static Stresses o Eleents o Mechanical Structures o cite this article: A V Sedov et al 8 J Phys: Con Ser

More information

Comparison of Stability of Selected Numerical Methods for Solving Stiff Semi- Linear Differential Equations

Comparison of Stability of Selected Numerical Methods for Solving Stiff Semi- Linear Differential Equations International Journal of Applied Science and Technology Vol. 7, No. 3, Septeber 217 Coparison of Stability of Selected Nuerical Methods for Solving Stiff Sei- Linear Differential Equations Kwaku Darkwah

More information

Multiscale Entropy Analysis: A New Method to Detect Determinism in a Time. Series. A. Sarkar and P. Barat. Variable Energy Cyclotron Centre

Multiscale Entropy Analysis: A New Method to Detect Determinism in a Time. Series. A. Sarkar and P. Barat. Variable Energy Cyclotron Centre Multiscale Entropy Analysis: A New Method to Detect Deterinis in a Tie Series A. Sarkar and P. Barat Variable Energy Cyclotron Centre /AF Bidhan Nagar, Kolkata 700064, India PACS nubers: 05.45.Tp, 89.75.-k,

More information

Statistical Logic Cell Delay Analysis Using a Current-based Model

Statistical Logic Cell Delay Analysis Using a Current-based Model Statistical Logic Cell Delay Analysis Using a Current-based Model Hanif Fatei Shahin Nazarian Massoud Pedra Dept. of EE-Systes, University of Southern California, Los Angeles, CA 90089 {fatei, shahin,

More information