Search results for: biometric fingerprints
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 138

Search results for: biometric fingerprints

48 Isotopes Used in Comparing Indigenous and International Walnut (Juglans regia L.) Varieties

Authors: Raluca Popescu, Diana Costinel, Elisabeta-Irina Geana, Oana-Romina Botoran, Roxana-Elena Ionete, Yazan Falah Jadee 'Alabedallat, Mihai Botu

Abstract:

Walnut production is high in Romania, different varieties being cultivated dependent on high yield, disease resistance or quality of produce. Walnuts have a highly nutritional composition, the kernels containing essential fatty acids, where the unsaturated fraction is higher than in other types of nuts, quinones, tannins, minerals. Walnut consumption can lower the cholesterol, improve the arterial function and reduce inflammation. The purpose of this study is to determine and compare the composition of walnuts of indigenous and international varieties all grown in Romania, in order to identify high-quality indigenous varieties. Oil has been extracted from the nuts of 34 varieties, the fatty acids composition and IV (iodine value) being afterwards measured by NMR. Furthermore, δ13C of the extracted oil had been measured by IRMS to find specific isotopic fingerprints that can be used in authenticating the varieties. Chemometrics had been applied to the data in order to identify similarities and differences between the varieties. The total saturated fatty acids content (SFA) varied between n.d. and 23% molar, oleic acid between 17 and 35%, linoleic acid between 38 and 59%, linolenic acid between 8 and 14%, corresponding to iodine values (IV - total amount of unsaturation) ranging from 100 to 135. The varieties separated in four groups according to the fatty acids composition, each group containing an international variety, making possible the classification of the indigenous ones. At both ends of the unsaturation spectrum, international varieties had been found.

Keywords: δ13C-IRMS, fatty acids composition, 1H-NMR, walnut varieties

Procedia PDF Downloads 271
47 Analyzing Extended Reality Technologies for Human Space Exploration

Authors: Morgan Kuligowski, Marientina Gotsis

Abstract:

Extended reality (XR) technologies share an intertwined history with spaceflight and innovation. New advancements in XR technologies offer expanding possibilities to advance the future of human space exploration with increased crew autonomy. This paper seeks to identify implementation gaps between existing and proposed XR space applications to inform future mission planning. A review of virtual reality, augmented reality, and mixed reality technologies implemented aboard the International Space Station revealed a total of 16 flown investigations. A secondary set of ground-tested XR human spaceflight applications were systematically retrieved from literature sources. The two sets of XR technologies, those flown and those existing in the literature were analyzed to characterize application domains and device types. Comparisons between these groups revealed untapped application areas for XR to support crew psychological health, in-flight training, and extravehicular operations on future flights. To fill these roles, integrating XR technologies with advancements in biometric sensors and machine learning tools is expected to transform crew capabilities.

Keywords: augmented reality, extended reality, international space station, mixed reality, virtual reality

Procedia PDF Downloads 188
46 Identity Management in Virtual Worlds Based on Biometrics Watermarking

Authors: S. Bader, N. Essoukri Ben Amara

Abstract:

With the technological development and rise of virtual worlds, these spaces are becoming more and more attractive for cybercriminals, hidden behind avatars and fictitious identities. Since access to these spaces is not restricted or controlled, some impostors take advantage of gaining unauthorized access and practicing cyber criminality. This paper proposes an identity management approach for securing access to virtual worlds. The major purpose of the suggested solution is to install a strong security mechanism to protect virtual identities represented by avatars. Thus, only legitimate users, through their corresponding avatars, are allowed to access the platform resources. Access is controlled by integrating an authentication process based on biometrics. In the request process for registration, a user fingerprint is enrolled and then encrypted into a watermark utilizing a cancelable and non-invertible algorithm for its protection. After a user personalizes their representative character, the biometric mark is embedded into the avatar through a watermarking procedure. The authenticity of the avatar identity is verified when it requests authorization for access. We have evaluated the proposed approach on a dataset of avatars from various virtual worlds, and we have registered promising performance results in terms of authentication accuracy, acceptation and rejection rates.

Keywords: identity management, security, biometrics authentication and authorization, avatar, virtual world

Procedia PDF Downloads 243
45 Triangular Geometric Feature for Offline Signature Verification

Authors: Zuraidasahana Zulkarnain, Mohd Shafry Mohd Rahim, Nor Anita Fairos Ismail, Mohd Azhar M. Arsad

Abstract:

Handwritten signature is accepted widely as a biometric characteristic for personal authentication. The use of appropriate features plays an important role in determining accuracy of signature verification; therefore, this paper presents a feature based on the geometrical concept. To achieve the aim, triangle attributes are exploited to design a new feature since the triangle possesses orientation, angle and transformation that would improve accuracy. The proposed feature uses triangulation geometric set comprising of sides, angles and perimeter of a triangle which is derived from the center of gravity of a signature image. For classification purpose, Euclidean classifier along with Voting-based classifier is used to verify the tendency of forgery signature. This classification process is experimented using triangular geometric feature and selected global features. Based on an experiment that was validated using Grupo de Senales 960 (GPDS-960) signature database, the proposed triangular geometric feature achieves a lower Average Error Rates (AER) value with a percentage of 34% as compared to 43% of the selected global feature. As a conclusion, the proposed triangular geometric feature proves to be a more reliable feature for accurate signature verification.

Keywords: biometrics, euclidean classifier, features extraction, offline signature verification, voting-based classifier

Procedia PDF Downloads 349
44 Offline Signature Verification in Punjabi Based On SURF Features and Critical Point Matching Using HMM

Authors: Rajpal Kaur, Pooja Choudhary

Abstract:

Biometrics, which refers to identifying an individual based on his or her physiological or behavioral characteristics, has the capabilities to the reliably distinguish between an authorized person and an imposter. The Signature recognition systems can categorized as offline (static) and online (dynamic). This paper presents Surf Feature based recognition of offline signatures system that is trained with low-resolution scanned signature images. The signature of a person is an important biometric attribute of a human being which can be used to authenticate human identity. However the signatures of human can be handled as an image and recognized using computer vision and HMM techniques. With modern computers, there is need to develop fast algorithms for signature recognition. There are multiple techniques are defined to signature recognition with a lot of scope of research. In this paper, (static signature) off-line signature recognition & verification using surf feature with HMM is proposed, where the signature is captured and presented to the user in an image format. Signatures are verified depended on parameters extracted from the signature using various image processing techniques. The Off-line Signature Verification and Recognition is implemented using Mat lab platform. This work has been analyzed or tested and found suitable for its purpose or result. The proposed method performs better than the other recently proposed methods.

Keywords: offline signature verification, offline signature recognition, signatures, SURF features, HMM

Procedia PDF Downloads 359
43 Offline Signature Verification Using Minutiae and Curvature Orientation

Authors: Khaled Nagaty, Heba Nagaty, Gerard McKee

Abstract:

A signature is a behavioral biometric that is used for authenticating users in most financial and legal transactions. Signatures can be easily forged by skilled forgers. Therefore, it is essential to verify whether a signature is genuine or forged. The aim of any signature verification algorithm is to accommodate the differences between signatures of the same person and increase the ability to discriminate between signatures of different persons. This work presented in this paper proposes an automatic signature verification system to indicate whether a signature is genuine or not. The system comprises four phases: (1) The pre-processing phase in which image scaling, binarization, image rotation, dilation, thinning, and connecting ridge breaks are applied. (2) The feature extraction phase in which global and local features are extracted. The local features are minutiae points, curvature orientation, and curve plateau. The global features are signature area, signature aspect ratio, and Hu moments. (3) The post-processing phase, in which false minutiae are removed. (4) The classification phase in which features are enhanced before feeding it into the classifier. k-nearest neighbors and support vector machines are used. The classifier was trained on a benchmark dataset to compare the performance of the proposed offline signature verification system against the state-of-the-art. The accuracy of the proposed system is 92.3%.

Keywords: signature, ridge breaks, minutiae, orientation

Procedia PDF Downloads 122
42 The Disposable Identities; Enabling Trust-by-Design to Build Sustainable Data-Driven Value

Authors: Lorna Goulden, Kai M. Hermsen, Jari Isohanni, Mirko Ross, Jef Vanbockryck

Abstract:

This article introduces disposable identities, with reference use cases and explores possible technical approaches. The proposed approach, when fully developed as an open-source toolkit, enables developers of mobile or web apps to employ a self-sovereign identity and data privacy framework, in order to rebuild trust in digital services by providing greater transparency, decentralized control, and GDPR compliance. With a user interface for the management of self-sovereign identity, digital authorizations, and associated data-driven transactions, the advantage of Disposable Identities is that they may also contain verifiable data such as the owner’s photograph, official or even biometric identifiers for more proactive prevention of identity abuse. These Disposable Identities designed for decentralized privacy management can also be time, purpose and context-bound through a secure digital contract; with verification functionalities based on tamper-proof technology.

Keywords: dentity, trust, self-sovereign, disposable identity, privacy toolkit, decentralised identity, verifiable credential, cybersecurity, data driven business, PETs, GDPRdentity, trust, self-sovereign, disposable identity, privacy toolkit, decentralised identity, verifiable credential, cybersecurity, data driven business, PETs, GDPRI

Procedia PDF Downloads 194
41 ECG Based Reliable User Identification Using Deep Learning

Authors: R. N. Begum, Ambalika Sharma, G. K. Singh

Abstract:

Identity theft has serious ramifications beyond data and personal information loss. This necessitates the implementation of robust and efficient user identification systems. Therefore, automatic biometric recognition systems are the need of the hour, and ECG-based systems are unquestionably the best choice due to their appealing inherent characteristics. The CNNs are the recent state-of-the-art techniques for ECG-based user identification systems. However, the results obtained are significantly below standards, and the situation worsens as the number of users and types of heartbeats in the dataset grows. As a result, this study proposes a highly accurate and resilient ECG-based person identification system using CNN's dense learning framework. The proposed research explores explicitly the calibre of dense CNNs in the field of ECG-based human recognition. The study tests four different configurations of dense CNN which are trained on a dataset of recordings collected from eight popular ECG databases. With the highest FAR of 0.04 percent and the highest FRR of 5%, the best performing network achieved an identification accuracy of 99.94 percent. The best network is also tested with various train/test split ratios. The findings show that DenseNets are not only extremely reliable but also highly efficient. Thus, they might also be implemented in real-time ECG-based human recognition systems.

Keywords: Biometrics, Dense Networks, Identification Rate, Train/Test split ratio

Procedia PDF Downloads 133
40 Potential Use of Leaching Gravel as a Raw Material in the Preparation of Geo Polymeric Material as an Alternative to Conventional Cement Materials

Authors: Arturo Reyes Roman, Daniza Castillo Godoy, Francisca Balarezo Olivares, Francisco Arriagada Castro, Miguel Maulen Tapia

Abstract:

Mining waste–based geopolymers are a sustainable alternative to conventional cement materials due to their contribution to the valorization of mining wastes as well as to the new construction materials with reduced fingerprints. The objective of this study was to determine the potential of leaching gravel (LG) from hydrometallurgical copper processing to be used as a raw material in the manufacture of geopolymer. NaOH, Na2SiO3 (modulus 1.5), and LG were mixed and then wetted with an appropriate amount of tap water, then stirred until a homogenous paste was obtained. A liquid/solid ratio of 0.3 was used for preparing mixtures. The paste was then cast in cubic moulds of 50 mm for the determination of compressive strengths. The samples were left to dry for 24h at room temperature, then unmoulded before analysis after 28 days of curing time. The compressive test was conducted in a compression machine (15/300 kN). According to the laser diffraction spectroscopy (LDS) analysis, 90% of LG particles were below 500 μm. The X-ray diffraction (XRD) analysis identified crystalline phases of albite (30 %), Quartz (16%), Anorthite (16 %), and Phillipsite (14%). The X-ray fluorescence (XRF) determinations showed mainly 55% of SiO2, 13 % of Al2O3, and 9% of CaO. ICP (OES) concentrations of Fe, Ca, Cu, Al, As, V, Zn, Mo, and Ni were 49.545; 24.735; 6.172; 14.152, 239,5; 129,6; 41,1;15,1, and 13,1 mg kg-1, respectively. The geopolymer samples showed resistance ranging between 2 and 10 MPa. In comparison with the raw material composition, the amorphous percentage of materials in the geopolymer was 35 %, whereas the crystalline percentage of main mineral phases decreased. Further studies are needed to find the optimal combinations of materials to produce a more resistant and environmentally safe geopolymer. Particularly are necessary compressive resistance higher than 15 MPa are necessary to be used as construction unit such as bricks.

Keywords: mining waste, geopolymer, construction material, alkaline activation

Procedia PDF Downloads 66
39 The Study of Stable Isotopes (18O, 2H & 13C) in Kardeh River and Dam Reservoir, North-Eastern Iran

Authors: Hossein Mohammadzadeh, Mojtaba Heydarizad

Abstract:

Among various water resources, the surface water has a dominant role in providing water supply in the arid and semi-arid region of Iran. Andarokh-Kardeh basin is located in 50 km from Mashhad city - the second biggest city of Iran (NE of Iran), draining by Kardeh river which provides a significant portion of potable and irrigation water needs for Mashhad. The stable isotopes (18O, 2H,13C-DIC, and 13C-DOC), as reliable and precious water fingerprints, have been measured in Kardeh river (Kharket, Mareshk, Jong, All and Kardeh stations) and in Kardeh dam reservoirs (at five different sites S1 to S5) during March to June 2011 and June 2012. On δ18O vs. δ2H diagram, the river samples were plotted between Global and Eastern Mediterranean Meteoric Water lines (GMWL and EMMWL) which demonstrate that various moisture sources are providing humidity for precipitation events in this area. The enriched δ18O and δ2H values (-6.5 ‰ and -44.5 ‰ VSMOW) of Kardeh dam reservoir are compared to Kardeh river (-8.6‰and-54.4‰), and its deviation from Mashhad meteoric water line (MMWL- δ2H=7.16δ18O+11.22) is due to evaporation from the open surface water body. The enriched value of δ 13C-DIC and high amount of DIC values (-7.9 ‰ VPDB and 57.23 ppm) in the river and Kardeh dam reservoir (-7.3 ‰ VPDB and 55.53 ppm) is due to dissolution of Mozdooran Carbonate Formation lithology (Jm1 to Jm3 units) (contains enriched δ13C DIC values of 9.2‰ to 27.7‰ VPDB) in the region. Because of the domination of C3 vegetations in Andarokh_Kardeh basin, the δ13C-DOC isotope of the river (-28.4‰ VPDB) and dam reservoir (-32.3‰ VPDB) demonstrate depleted values. Higher DOC concentration in dam reservoir (2.57 ppm) compared to the river (0.72 ppm) is due to more biologogical activities and organic matters in dam reservoir.

Keywords: Dam reservoir, Iran, Kardeh river, Khorasan razavi, Stable isotopes

Procedia PDF Downloads 247
38 The Reproducibility and Repeatability of Modified Likelihood Ratio for Forensics Handwriting Examination

Authors: O. Abiodun Adeyinka, B. Adeyemo Adesesan

Abstract:

The forensic use of handwriting depends on the analysis, comparison, and evaluation decisions made by forensic document examiners. When using biometric technology in forensic applications, it is necessary to compute Likelihood Ratio (LR) for quantifying strength of evidence under two competing hypotheses, namely the prosecution and the defense hypotheses wherein a set of assumptions and methods for a given data set will be made. It is therefore important to know how repeatable and reproducible our estimated LR is. This paper evaluated the accuracy and reproducibility of examiners' decisions. Confidence interval for the estimated LR were presented so as not get an incorrect estimate that will be used to deliver wrong judgment in the court of Law. The estimate of LR is fundamentally a Bayesian concept and we used two LR estimators, namely Logistic Regression (LoR) and Kernel Density Estimator (KDE) for this paper. The repeatability evaluation was carried out by retesting the initial experiment after an interval of six months to observe whether examiners would repeat their decisions for the estimated LR. The experimental results, which are based on handwriting dataset, show that LR has different confidence intervals which therefore implies that LR cannot be estimated with the same certainty everywhere. Though the LoR performed better than the KDE when tested using the same dataset, the two LR estimators investigated showed a consistent region in which LR value can be estimated confidently. These two findings advance our understanding of LR when used in computing the strength of evidence in handwriting using forensics.

Keywords: confidence interval, handwriting, kernel density estimator, KDE, logistic regression LoR, repeatability, reproducibility

Procedia PDF Downloads 96
37 Iris Feature Extraction and Recognition Based on Two-Dimensional Gabor Wavelength Transform

Authors: Bamidele Samson Alobalorun, Ifedotun Roseline Idowu

Abstract:

Biometrics technologies apply the human body parts for their unique and reliable identification based on physiological traits. The iris recognition system is a biometric–based method for identification. The human iris has some discriminating characteristics which provide efficiency to the method. In order to achieve this efficiency, there is a need for feature extraction of the distinct features from the human iris in order to generate accurate authentication of persons. In this study, an approach for an iris recognition system using 2D Gabor for feature extraction is applied to iris templates. The 2D Gabor filter formulated the patterns that were used for training and equally sent to the hamming distance matching technique for recognition. A comparison of results is presented using two iris image subjects of different matching indices of 1,2,3,4,5 filter based on the CASIA iris image database. By comparing the two subject results, the actual computational time of the developed models, which is measured in terms of training and average testing time in processing the hamming distance classifier, is found with best recognition accuracy of 96.11% after capturing the iris localization or segmentation using the Daughman’s Integro-differential, the normalization is confined to the Daugman’s rubber sheet model.

Keywords: Daugman rubber sheet, feature extraction, Hamming distance, iris recognition system, 2D Gabor wavelet transform

Procedia PDF Downloads 36
36 Contactless Attendance System along with Temperature Monitoring

Authors: Nalini C. Iyer, Shraddha H., Anagha B. Varahamurthy, Dikshith C. S., Ishwar G. Kubasad, Vinayak I. Karalatti, Pavan B. Mulimani

Abstract:

The current scenario of the pandemic due to COVID-19 has led to the awareness among the people to avoid unneces-sary contact in public places. There is a need to avoid contact with physical objects to stop the spreading of infection. The contactless feature has to be included in the systems in public places wherever possible. For example, attendance monitoring systems with fingerprint biometric can be replaced with a contactless feature. One more important protocol followed in the current situation is temperature monitoring and screening. The paper describes an attendance system with a contactless feature and temperature screening for the university. The system displays a QR code to scan, which redirects to the student login web page only if the location is valid (the location where the student scans the QR code should be the location of the display of the QR code). Once the student logs in, the temperature of the student is scanned by the contactless temperature sensor (mlx90614) with an error of 0.5°C. If the temperature falls in the range of the desired value (range of normal body temperature), then the attendance of the student is marked as present, stored in the database, and the door opens automatically. The attendance is marked as absent in the other case, alerted with the display of temperature, and the door remains closed. The door is automated with the help of a servomotor. To avoid the proxy, IR sensors are used to count the number of students in the classroom. The hardware system consisting of a contactless temperature sensor and IR sensor is implemented on the microcontroller, NodeMCU.

Keywords: NodeMCU, IR sensor, attendance monitoring, contactless, temperature

Procedia PDF Downloads 157
35 Improving Fingerprinting-Based Localization System Using Generative AI

Authors: Getaneh Berie Tarekegn

Abstract:

A precise localization system is crucial for many artificial intelligence Internet of Things (AI-IoT) applications in the era of smart cities. Their applications include traffic monitoring, emergency alarming, environmental monitoring, location-based advertising, intelligent transportation, and smart health care. The most common method for providing continuous positioning services in outdoor environments is by using a global navigation satellite system (GNSS). Due to nonline-of-sight, multipath, and weather conditions, GNSS systems do not perform well in dense urban, urban, and suburban areas.This paper proposes a generative AI-based positioning scheme for large-scale wireless settings using fingerprinting techniques. In this article, we presented a semi-supervised deep convolutional generative adversarial network (S-DCGAN)-based radio map construction method for real-time device localization. It also employed a reliable signal fingerprint feature extraction method with t-distributed stochastic neighbor embedding (t-SNE), which extracts dominant features while eliminating noise from hybrid WLAN and long-term evolution (LTE) fingerprints. The proposed scheme reduced the workload of site surveying required to build the fingerprint database by up to 78.5% and significantly improved positioning accuracy. The results show that the average positioning error of GAILoc is less than 0.39 m, and more than 90% of the errors are less than 0.82 m. According to numerical results, SRCLoc improves positioning performance and reduces radio map construction costs significantly compared to traditional methods.

Keywords: location-aware services, feature extraction technique, generative adversarial network, long short-term memory, support vector machine

Procedia PDF Downloads 22
34 Allometric Models for Biomass Estimation in Savanna Woodland Area, Niger State, Nigeria

Authors: Abdullahi Jibrin, Aishetu Abdulkadir

Abstract:

The development of allometric models is crucial to accurate forest biomass/carbon stock assessment. The aim of this study was to develop a set of biomass prediction models that will enable the determination of total tree aboveground biomass for savannah woodland area in Niger State, Nigeria. Based on the data collected through biometric measurements of 1816 trees and destructive sampling of 36 trees, five species specific and one site specific models were developed. The sample size was distributed equally between the five most dominant species in the study site (Vitellaria paradoxa, Irvingia gabonensis, Parkia biglobosa, Anogeissus leiocarpus, Pterocarpus erinaceous). Firstly, the equations were developed for five individual species. Secondly these five species were mixed and were used to develop an allometric equation of mixed species. Overall, there was a strong positive relationship between total tree biomass and the stem diameter. The coefficient of determination (R2 values) ranging from 0.93 to 0.99 P < 0.001 were realised for the models; with considerable low standard error of the estimates (SEE) which confirms that the total tree above ground biomass has a significant relationship with the dbh. The F-test value for the biomass prediction models were also significant at p < 0.001 which indicates that the biomass prediction models are valid. This study recommends that for improved biomass estimates in the study site, the site specific biomass models should preferably be used instead of using generic models.

Keywords: allometriy, biomass, carbon stock , model, regression equation, woodland, inventory

Procedia PDF Downloads 421
33 Blade Runner and Slavery in the 21st Century

Authors: Bülent Diken

Abstract:

This paper looks to set Ridley Scott’s original film Blade Runner (1982) and Denis Villeneuve’s Blade Runner 2049 (2017) in order to provide an analysis of both films with respect to the new configurations of slavery in the 21st century. Both Blade Runner films present a de-politicized society that oscillates between two extremes: the spectral (the eye, optics, digital communications) and the biopolitical (the body, haptics). On the one hand, recognizing the subject only as a sign, the society of the spectacle registers, identifies, produces and reproduces the subject as a code. At the same time, though, the subject is constantly reduced to a naked body, to bare life, for biometric technologies to scan it as a biological body or body parts. Being simultaneously a pure code (word without body) and an instrument slave (body without word), the replicants are thus the paradigmatic subjects of this society. The paper focuses first on the similarity: both films depict a relationship between masters and slaves, that is, a despotic relationship. The master uses the (body of the) slave as an instrument, as an extension of his own body. Blade Runner 2019 frames the despotic relation in this classical way through its triangulation with the economy (the Tyrell Corporation) and the slave-replicants’ dissent (rejecting their reduction to mere instruments). In a counter-classical approach, in Blade Runner 2049, the focus shifts to another triangulation: despotism, economy (the Wallace Corporation) and consent (of replicants who no longer perceive themselves as slaves).

Keywords: Blade Runner, the spectacle, bio-politics, slavery, imstrumentalisation

Procedia PDF Downloads 41
32 The Biofertilizer Effect of Pseudomonas of Salt Soils of the North-West Algerian, Study of Comportment of Bean (Vicia Faba)

Authors: Djoudi Abdelhak, Djibaoui Rachid, Reguieg Yassaad Houcine

Abstract:

Our study focuses on the identification of some species of Pseudomonas (P4, P5, P7 and P8) isolated from saline soils in northwestern Algeria and the effect of their metabolites on the growth of Alternaria alternata the causative agent of the blight of the bean disease (Vicia faba). We are also interested in stimulating the growth of this plant species in saline conditions (60 mM/l NaCl) and the absence of salts. The analysis focuses on rates of inhibition of mycelial growth of Alternaria alternata strain and the rate of growth of plants inoculated with strains of Pseudomonas expressed by biometrics. According to the results of the in-vitro test, P5 and P8 species and their metabolites showed a significant effect on mycelia growth and production of spores of Alternaria alternata. The in-vivo test shows that the species P8 and P5 were significantly and positively influencing the growth in biometric parameters of the bean in saline and salt-free condition. Inoculation with strain P5 has promoted the growth of the bean in stem height, stem fresh weight and dry weight of stems of 108.59%, 115.28%, 104.33%, respectively, in the presence of salt Inoculation with strain P5 has fostered the growth of the bean stem fresh weight of 112.47% in the presence of salt The effect of Pseudomonas species on the development of Vicia faba and the growth of Alternaria alternata is considering new techniques and methods of biological production and crop protection.

Keywords: pseudomonas, vicia faba, alternaria alternata, promoting of plant growth

Procedia PDF Downloads 368
31 Study of Pseudomonas as Biofertiliser in Salt-Affected Soils of the Northwestern Algeria: Solubilisation of Calcium Phosphate and Growth Promoting of Broad Bean (Vcia faba)

Authors: A. Djoudi, R. Djibaou, H. A. Reguieg Yssaad

Abstract:

Our study focuses on the study of a bacteria belonging to Pseudomonas solubilizing tricalcium phosphate. They were isolated from rhizosphere of a variety of broad bean grown in salt-affected soils (electrical conductivity between 4 and 8 mmhos/cm) of the irrigated perimeter of Mina in northwestern Algeria. Isolates which have advantageous results in the calcium phosphate solubilization index test were subjected to identification using API20 then used to re-inoculate the same soil in pots experimentation to assess the effects of inoculation on the growth of the broad bean (Vicia faba). Based on the results obtained from the in-vitro tests, two isolates P5 and P8 showed a significant effect on the solubilization of tricalcium phosphate with an index I estimated at 314% and 283% sequentially. According to the results of in-vivo tests, the inoculation of the soil with P5 and P8 were significantly and positively influencing the growth in biometric parameters of the broad bean. Inoculation with strain P5 has promoted the growth of the broad bean in stem height, stem fresh weight and stem dry weight of 108.59%, 115.28%, 104.33%, respectively. Inoculation with strain P8 has fostered the growth of the broad bean stem fresh weight of 112.47%. The effect of Pseudomonas on the development of Vicia faba is considered as an interesting process by which PGPR can increase biological production and crop protection.

Keywords: Pseudomonas, Vicia faba, promoting of plant growth, solubilization tricalcium phosphate

Procedia PDF Downloads 303
30 FEDBD Plasma, A Promising Approach for Skin Rejuvenation

Authors: P. Charipoor, M. Khani, H. Mahmoudi, E. Ghasemi, P. Akbartehrani, B. Shokri

Abstract:

Cold air plasma could have a variety of effects on cells and living organisms and also shows good results in medical and cosmetic cases. Herein, plasma floating electrode dielectric barrier discharge (FEDBD) plasma was designed for mouse skin rejuvenation purposes. It is safe and easy to use in clinics, laboratories, and homes. The effects of this device were investigated on mouse skin. Vitamin C ointment in combination with plasma was also used as a new method to improve FEDBD results. In this study, 20 Wistar rats were evaluated in four groups. The first group received high-dose plasma, the second group received moderate-dose plasma (with vitamin C cream), the third group received low-dose plasma (with vitamin C cream) for 6 minutes, and the fourth group received only vitamin C cream. This process was done 3 times a week for 4 weeks. Skin temperature was monitored to evaluate the thermal effect of plasma. The presence of reactive species was also demonstrated using optical spectroscopy. Mechanical assays were performed to evaluate the effect of plasma and vitamin C on the mechanical strength of the tissue, which showed a positive effect of plasma on the treated tissue compared to the control group. Using pathological and biometric skin tests, an increase in collagen levels, epidermal thickness, and an increase in fibroblasts was observed in rat skin, as well as increased skin elasticity. This study showed the positive effect of using the FEDBD plasma device on the effective parameters in skin rejuvenation.

Keywords: plasma, skin rejuvenation, collagen, epidermal thickness

Procedia PDF Downloads 223
29 Improving Fingerprinting-Based Localization System Using Generative Artificial Intelligence

Authors: Getaneh Berie Tarekegn

Abstract:

A precise localization system is crucial for many artificial intelligence Internet of Things (AI-IoT) applications in the era of smart cities. Their applications include traffic monitoring, emergency alarming, environmental monitoring, location-based advertising, intelligent transportation, and smart health care. The most common method for providing continuous positioning services in outdoor environments is by using a global navigation satellite system (GNSS). Due to nonline-of-sight, multipath, and weather conditions, GNSS systems do not perform well in dense urban, urban, and suburban areas.This paper proposes a generative AI-based positioning scheme for large-scale wireless settings using fingerprinting techniques. In this article, we presented a novel semi-supervised deep convolutional generative adversarial network (S-DCGAN)-based radio map construction method for real-time device localization. We also employed a reliable signal fingerprint feature extraction method with t-distributed stochastic neighbor embedding (t-SNE), which extracts dominant features while eliminating noise from hybrid WLAN and long-term evolution (LTE) fingerprints. The proposed scheme reduced the workload of site surveying required to build the fingerprint database by up to 78.5% and significantly improved positioning accuracy. The results show that the average positioning error of GAILoc is less than 39 cm, and more than 90% of the errors are less than 82 cm. That is, numerical results proved that, in comparison to traditional methods, the proposed SRCLoc method can significantly improve positioning performance and reduce radio map construction costs.

Keywords: location-aware services, feature extraction technique, generative adversarial network, long short-term memory, support vector machine

Procedia PDF Downloads 43
28 GAILoc: Improving Fingerprinting-Based Localization System Using Generative Artificial Intelligence

Authors: Getaneh Berie Tarekegn

Abstract:

A precise localization system is crucial for many artificial intelligence Internet of Things (AI-IoT) applications in the era of smart cities. Their applications include traffic monitoring, emergency alarming, environmental monitoring, location-based advertising, intelligent transportation, and smart health care. The most common method for providing continuous positioning services in outdoor environments is by using a global navigation satellite system (GNSS). Due to nonline-of-sight, multipath, and weather conditions, GNSS systems do not perform well in dense urban, urban, and suburban areas.This paper proposes a generative AI-based positioning scheme for large-scale wireless settings using fingerprinting techniques. In this article, we presented a novel semi-supervised deep convolutional generative adversarial network (S-DCGAN)-based radio map construction method for real-time device localization. We also employed a reliable signal fingerprint feature extraction method with t-distributed stochastic neighbor embedding (t-SNE), which extracts dominant features while eliminating noise from hybrid WLAN and long-term evolution (LTE) fingerprints. The proposed scheme reduced the workload of site surveying required to build the fingerprint database by up to 78.5% and significantly improved positioning accuracy. The results show that the average positioning error of GAILoc is less than 39 cm, and more than 90% of the errors are less than 82 cm. That is, numerical results proved that, in comparison to traditional methods, the proposed SRCLoc method can significantly improve positioning performance and reduce radio map construction costs.

Keywords: location-aware services, feature extraction technique, generative adversarial network, long short-term memory, support vector machine

Procedia PDF Downloads 39
27 Authentication and Traceability of Meat Products from South Indian Market by Species-Specific Polymerase Chain Reaction

Authors: J. U. Santhosh Kumar, V. Krishna, Sebin Sebastian, G. S. Seethapathy, G. Ravikanth, R. Uma Shaanker

Abstract:

Food is one of the basic needs of human beings. It requires the normal function of the body part and a healthy growth. Recently, food adulteration increases day by day to increase the quantity and make more benefit. Animal source foods can provide a variety of micronutrients that are difficult to obtain in adequate quantities from plant source foods alone. Particularly in the meat industry, products from animals are susceptible targets for fraudulent labeling due to the economic profit that results from selling cheaper meat as meat from more profitable and desirable species. This work presents an overview of the main PCR-based techniques applied to date to verify the authenticity of beef meat and meat products from beef species. We were analyzed 25 market beef samples in South India. We examined PCR methods based on the sequence of the cytochrome b gene for source species identification. We found all sample were sold as beef meat as Bos Taurus. However, interestingly Male meats are more valuable high price compare to female meat, due to this reason most of the markets samples are susceptible. We were used sex determination gene of cattle like TSPY(Y-encoded, testis-specific protein TSPY is a Y-specific gene). TSPY homologs exist in several mammalian species, including humans, horses, and cattle. This gene is Y coded testis protein genes, which only amplify the male. We used multiple PCR products form species-specific “fingerprints” on gel electrophoresis, which may be useful for meat authentication. Amplicons were obtained only by the Cattle -specific PCR. We found 13 market meat samples sold as female beef samples. These results suggest that the species-specific PCR methods established in this study would be useful for simple and easy detection of adulteration of meat products.

Keywords: authentication, meat products, species-specific, TSPY

Procedia PDF Downloads 347
26 3D Human Face Reconstruction in Unstable Conditions

Authors: Xiaoyuan Suo

Abstract:

3D object reconstruction is a broad research area within the computer vision field involving many stages and still open problems. One of the existing challenges in this field lies with micromotion, such as the facial expressions on the appearance of the human or animal face. Similar literatures in this field focuses on 3D reconstruction in stable conditions such as an existing image or photos taken in a rather static environment, while the purpose of this work is to discuss a flexible scan system using multiple cameras that can correctly reconstruct 3D stable and moving objects -- human face with expression in particular. Further, a mathematical model is proposed at the end of this literature to automate the 3D object reconstruction process. The reconstruction process takes several stages. Firstly, a set of simple 2D lines would be projected onto the object and hence a set of uneven curvy lines can be obtained, which represents the 3D numerical data of the surface. The lines and their shapes will help to identify object’s 3D construction in pixels. With the two-recorded angles and their distance from the camera, a simple mathematical calculation would give the resulting coordinate of each projected line in an absolute 3D space. This proposed research will benefit many practical areas, including but not limited to biometric identification, authentications, cybersecurity, preservation of cultural heritage, drama acting especially those with rapid and complex facial gestures, and many others. Specifically, this will (I) provide a brief survey of comparable techniques existing in this field. (II) discuss a set of specialized methodologies or algorithms for effective reconstruction of 3D objects. (III)implement, and testing the developed methodologies. (IV) verify findings with data collected from experiments. (V) conclude with lessons learned and final thoughts.

Keywords: 3D photogrammetry, 3D object reconstruction, facial expression recognition, facial recognition

Procedia PDF Downloads 124
25 Geochemical Study of the Bound Hydrocarbon in the Asphaltene of Biodegraded Oils of Cambay Basin

Authors: Sayani Chatterjee, Kusum Lata Pangtey, Sarita Singh, Harvir Singh

Abstract:

Biodegradation leads to a systematic alteration of the chemical and physical properties of crude oil showing sequential depletion of n-alkane, cycloalkanes, aromatic which increases its specific gravity, viscosity and the abundance of heteroatom-containing compounds. The biodegradation leads to a change in the molecular fingerprints and geochemical parameters of degraded oils, thus make source and maturity identification inconclusive or ambiguous. Asphaltene is equivalent to the most labile part of the respective kerogen and generally has high molecular weight. Its complex chemical structure with substantial microporous units makes it suitable to occlude the hydrocarbon expelled from the source. The occluded molecules are well preserved by the macromolecular structure and thus prevented from secondary alterations. They retain primary organic geochemical information over the geological time. The present study involves the extraction of this occluded hydrocarbon from the asphaltene cage through mild oxidative degradation using mild oxidative reagents like Hydrogen Peroxide (H₂O₂) and Acetic Acid (CH₃COOH) on purified asphaltene of the biodegraded oils of Mansa, Lanwa and Santhal fields in Cambay Basin. The study of these extracted occluded hydrocarbons was carried out for establishing oil to oil and oil to source correlation in the Mehsana block of Cambay Basin. The n-alkane and biomarker analysis through GC and GC-MS of these occluded hydrocarbons show similar biomarker imprint as the normal oil in the area and hence correlatable with them. The abundance of C29 steranes, presence of Oleanane, Gammacerane and 4-Methyl sterane depicts that the oils are derived from terrestrial organic matter deposited in the stratified saline water column in the marine environment with moderate maturity (VRc 0.6-0.8). The oil source correlation study suggests that the oils are derived from Jotana-Warosan Low area. The developed geochemical technique to extract the occluded hydrocarbon has effectively resolved the ambiguity that resulted from the inconclusive fingerprint of the biodegraded oil and the method can be also applied in other biodegraded oils as well.

Keywords: asphaltene, biomarkers, correlation, mild oxidation, occluded hydrocarbon

Procedia PDF Downloads 135
24 Loss Function Optimization for CNN-Based Fingerprint Anti-Spoofing

Authors: Yehjune Heo

Abstract:

As biometric systems become widely deployed, the security of identification systems can be easily attacked by various spoof materials. This paper contributes to finding a reliable and practical anti-spoofing method using Convolutional Neural Networks (CNNs) based on the types of loss functions and optimizers. The types of CNNs used in this paper include AlexNet, VGGNet, and ResNet. By using various loss functions including Cross-Entropy, Center Loss, Cosine Proximity, and Hinge Loss, and various loss optimizers which include Adam, SGD, RMSProp, Adadelta, Adagrad, and Nadam, we obtained significant performance changes. We realize that choosing the correct loss function for each model is crucial since different loss functions lead to different errors on the same evaluation. By using a subset of the Livdet 2017 database, we validate our approach to compare the generalization power. It is important to note that we use a subset of LiveDet and the database is the same across all training and testing for each model. This way, we can compare the performance, in terms of generalization, for the unseen data across all different models. The best CNN (AlexNet) with the appropriate loss function and optimizers result in more than 3% of performance gain over the other CNN models with the default loss function and optimizer. In addition to the highest generalization performance, this paper also contains the models with high accuracy associated with parameters and mean average error rates to find the model that consumes the least memory and computation time for training and testing. Although AlexNet has less complexity over other CNN models, it is proven to be very efficient. For practical anti-spoofing systems, the deployed version should use a small amount of memory and should run very fast with high anti-spoofing performance. For our deployed version on smartphones, additional processing steps, such as quantization and pruning algorithms, have been applied in our final model.

Keywords: anti-spoofing, CNN, fingerprint recognition, loss function, optimizer

Procedia PDF Downloads 108
23 The Comparison Study of Methanol and Water Extract of Chuanxiong Rhizoma: A Fingerprint Analysis

Authors: Li Chun Zhao, Zhi Chao Hu, Xi Qiang Liu, Man Lai Lee, Chak Shing Yeung, Man Fei Xu, Yuen Yee Kwan, Alan H. M. Ho, Nickie W. K. Chan, Bin Deng, Zhong Zhen Zhao, Min Xu

Abstract:

Background: Chuangxiong Rhizoma (Chuangxion, CX) is one of the most frequently used herbs in Chinese medicine because of its wide therapeutic effects such as vasorelaxation and anti-inflammation. Aim: The purposes of this study are (1) to perform non-targeted / targeted analyses of CX methanol extract and water extract, and compare the present data with previously LC-MS or GC-MS fingerprints; (2) to examine the difference between CX methanol extract and water extract for preliminarily evaluating whether current compound markers of methanol extract from crude CX materials could be suitable for quality control of CX water extract. Method: CX methanol extract was prepared according to the Hong Kong Chinese Materia Medica Standards. DG water extract was prepared by boiling with pure water for three times (one hour each). UHPLC-Q-TOF-MS/MS fingerprint analysis was performed by C18 column (1.7 µm, 2.1 × 100 mm) with Agilent 1290 Infinity system. Experimental data were analyzed by Agilent MassHunter Software. A database was established based on 13 published LC-MS and GC-MS CX fingerprint analyses. Total 18 targeted compounds in database were selected as markers to compare present data with previous data, and these markers also used to compare CX methanol extract and water extract. Result: (1) Non-targeted analysis indicated that there were 133 compounds identified in CX methanol extract, while 325 compounds in CX water extract that was more than double of CX methanol extract. (2) Targeted analysis further indicated that 9 in 18 targeted compounds were identified in CX methanol extract, while 12 in 18 targeted compounds in CX water extract that showed a lower lose-rate of water extract when compared with methanol extract. (3) By comparing CX methanol extract and water extract, Senkyunolide A (+1578%), Ferulic acid (+529%) and Senkyunolide H (+169%) were significantly higher in water extract when compared with methanol extract. (4) Other bioactive compounds such as Tetramethylpyrazine were only found in CX water extract. Conclusion: Many new compounds in both CX methanol and water extracts were found by using UHPLC Q-TOF MS/MS analysis when compared with previous published reports. A new standard reference including non-targeted compound profiling and targeted markers functioned especially for quality control of CX water extract (herbal decoction) should be established in future. (This project was supported by Hong Kong Baptist University (FRG2/14-15/109) & Natural Science Foundation of Guangdong Province (2014A030313414)).

Keywords: Chuanxiong rhizoma, fingerprint analysis, targeted analysis, quality control

Procedia PDF Downloads 467
22 The Scientific Phenomenon Revealed in the Holy Quran - an Update

Authors: Arjumand Warsy

Abstract:

The Holy Quran was revealed to Prophet Mohammad (May Peace and Blessings of Allah be upon Him) over fourteen hundred years ago, at a time when majority of the people in Arabia were illiterate and very few could read or write. Any knowledge about medicine, anatomy, biology, astronomy, physics, geology, geophysics or other sciences were almost non-existent. Many superstitious and groundless believes were prevalent and these believes were passed down through past generations. At that time, the Holy Quran was revealed and it presented several phenomenon that have been only currently unveiled, as scientists have worked endlessly to provide explanation for these physical and biological phenomenon applying scientific technologies. Many important discoveries were made during the 20th century and it is interesting to note that many of these discoveries were already present in the Holy Quran fourteen hundred years ago. The Scientific phenomenon, mentioned in the Holy Quran, cover many different fields in biological and physical sciences and have been the source of guidance for a number of scientists. A perfect description of the creation of the universe, the orbits in space, the development process, development of hearing process prior to sight, importance of the skin in sensing pain, uniqueness of fingerprints, role of males in selection of the sex of the baby, are just a few of the many facts present in the Quran that have astonished many scientists. The Quran in Chapter 20, verse 50 states: قَالَ رَبُّنَا الَّذِيۤ اَعْطٰى كُلَّ شَيْءٍ خَلْقَهٗ ثُمَّ هَدٰى ۰۰ (He said "Our Lord is He, Who has given a distinctive form to everything and then guided it aright”). Explaining this brief statement in the light of the modern day Molecular Genetics unveils the entire genetic basis of life and how guidance is stored in the genetic material (DNA) present in the nucleus. This thread like structure, made of only six molecules (sugar, phosphate, adenine, thymine, cytosine and guanine), is so brilliantly structured by the Creator that it holds all the information about each and every living thing, whether it is viruses, bacteria, fungi, plants, animals or humans or any other living being. This paper will present an update on some of the physical and biological phenomena’ presented in the Holy Quran, unveiled using advanced technologies during the last century and will discuss how the need to incorporate this information in the curricula.

Keywords: The Holy Quran, scientific facts, curriculum, Muslims

Procedia PDF Downloads 334
21 Species Selection for Phytoremediation of Barium Polluted Flooded Soils

Authors: Fabio R. Pires, Paulo R. C. C. Ribeiro, Douglas G. Viana, Robson Bonomo, Fernando B. Egreja Filho, Alberto Cargnelutti Filho, Luiz F. Martins, Leila B. S. Cruz, Mauro C. P. Nascimento

Abstract:

The use of barite (BaSO₄) as a weighting agent in drilling fluids for oil and gas activities makes barium a potential contaminant in the case of spills onto flooded soils, where barium sulfate solubility is increased due to low redox conditions. In order to select plants able to remove barium in such scenarios, seven plant species were evaluated on barium phytoextraction capacity: Brachiaria arrecta; Cyperus cf. papyrus; Eleocharis acutangula; Eleocharis interstincta; Nephrolepsis cf. rivularis; Paspalum conspersum and Typha domingensis. Plants were grown in pots with 13 kg of soil each, and exposed to six barium concentrations (established with BaCl₂): 0; 2.5; 5.0; 10.0; 30.0; 65.0 mg kg-1. To simulate flooding conditions, every pot was manteined with a thin irrigation water depth over soil surface (~1.0 cm). Treatments were carried out in triplicate, and pots were distributed randomly inside the greenhouse. Biometric and chemical analyses were performed throughout the experiment, including Ba²⁺ accumulation in shoots and roots. The highest amount of barium was observed in T. domingensis biomass, followed by C. cf. papyrus. However, the latter exported most of the barium to shoot, especially in higher BaCl₂ doses, while the former accumulated barium preferentially in roots. Thus, barium removal with C. cf. papyrus could be achieved by simply harvesting aerial biomass. The amount of barium in C. cf. papyrus was a consequence of high biomass production rather than barium concentration in plant tissues, whereas T. domingensis showed high barium concentration in plant tissues and high biomass production as well. These results make T. domingensis and C. cf. papyrus potential candidates to be applied in phytoremediation schemes to remove barium from flooded soils.

Keywords: barium sulfate, cyperus, drilling fluids, phytoextraction, Typha

Procedia PDF Downloads 234
20 Human Identification Using Local Roughness Patterns in Heartbeat Signal

Authors: Md. Khayrul Bashar, Md. Saiful Islam, Kimiko Yamashita, Yano Midori

Abstract:

Despite having some progress in human authentication, conventional biometrics (e.g., facial features, fingerprints, retinal scans, gait, voice patterns) are not robust against falsification because they are neither confidential nor secret to an individual. As a non-invasive tool, electrocardiogram (ECG) has recently shown a great potential in human recognition due to its unique rhythms characterizing the variability of human heart structures (chest geometry, sizes, and positions). Moreover, ECG has a real-time vitality characteristic that signifies the live signs, which ensure legitimate individual to be identified. However, the detection accuracy of the current ECG-based methods is not sufficient due to a high variability of the individual’s heartbeats at a different instance of time. These variations may occur due to muscle flexure, the change of mental or emotional states, and the change of sensor positions or long-term baseline shift during the recording of ECG signal. In this study, a new method is proposed for human identification, which is based on the extraction of the local roughness of ECG heartbeat signals. First ECG signal is preprocessed using a second order band-pass Butterworth filter having cut-off frequencies of 0.00025 and 0.04. A number of local binary patterns are then extracted by applying a moving neighborhood window along the ECG signal. At each instant of the ECG signal, the pattern is formed by comparing the ECG intensities at neighboring time points with the central intensity in the moving window. Then, binary weights are multiplied with the pattern to come up with the local roughness description of the signal. Finally, histograms are constructed that describe the heartbeat signals of individual subjects in the database. One advantage of the proposed feature is that it does not depend on the accuracy of detecting QRS complex, unlike the conventional methods. Supervised recognition methods are then designed using minimum distance to mean and Bayesian classifiers to identify authentic human subjects. An experiment with sixty (60) ECG signals from sixty adult subjects from National Metrology Institute of Germany (NMIG) - PTB database, showed that the proposed new method is promising compared to a conventional interval and amplitude feature-based method.

Keywords: human identification, ECG biometrics, local roughness patterns, supervised classification

Procedia PDF Downloads 378
19 Improving Security Features of Traditional Automated Teller Machines-Based Banking Services via Fingerprint Biometrics Scheme

Authors: Anthony I. Otuonye, Juliet N. Odii, Perpetual N. Ibe

Abstract:

The obvious challenges faced by most commercial bank customers while using the services of ATMs (Automated Teller Machines) across developing countries have triggered the need for an improved system with better security features. Current ATM systems are password-based, and research has proved the vulnerabilities of these systems to heinous attacks and manipulations. We have discovered by research that the security of current ATM-assisted banking services in most developing countries of the world is easily broken and maneuvered by fraudsters, majorly because it is quite difficult for these systems to identify an impostor with privileged access as against the authentic bank account owner. Again, PIN (Personal Identification Number) code passwords are easily guessed, just to mention a few of such obvious limitations of traditional ATM operations. In this research work also, we have developed a system of fingerprint biometrics with PIN code Authentication that seeks to improve the security features of traditional ATM installations as well as other Banking Services. The aim is to ensure better security at all ATM installations and raise the confidence of bank customers. It is hoped that our system will overcome most of the challenges of the current password-based ATM operation if properly applied. The researchers made use of the OOADM (Object-Oriented Analysis and Design Methodology), a software development methodology that assures proper system design using modern design diagrams. Implementation and coding were carried out using Visual Studio 2010 together with other software tools. Results obtained show a working system that provides two levels of security at the client’s side using a fingerprint biometric scheme combined with the existing 4-digit PIN code to guarantee the confidence of bank customers across developing countries.

Keywords: fingerprint biometrics, banking operations, verification, ATMs, PIN code

Procedia PDF Downloads 10