• Title/Summary/Keyword: Biometric Data

Search Result 272, Processing Time 0.026 seconds

Mitochondrial sequence based characterization and morphometric assessment of Diara buffalo population

  • Singh, Karan Veer;Purohit, Hitesh;Singh, Ramesh Kumar
    • Animal Bioscience
    • /
    • v.35 no.7
    • /
    • pp.949-954
    • /
    • 2022
  • Objective: The present study is aimed at phenotypic characterization and mitochondrial d-loop analysis of indigenous "Diara" buffalo population, which are mostly confined to the villages on the South and North Gangetic marshy plains in the Bihar state of India. These buffaloes are well adapted and are best suited for ploughing and puddling the wet fields meant for paddy cultivation. Methods: Biometric data on 172 buffaloes were collected using a standard flexible tape measure. Animals are medium in size; the typical morphometric features are long head with a broad forehead and moderately long and erect ears. Genomic DNA was isolated from unrelated animals. The mtDNA d-loop 358-bp sequence data was generated and compared with 338 sequences belonging to riverine and swamp buffaloes. Results: Based on the mitochondrial d-loop analysis the Diara buffaloes were grouped along with the haplotypes reported for riverine buffalo. Sequence analysis revealed the presence of 7 mitochondrial D loop haplotypes with haplotype diversity of 0.9643. Five of the haplotypes were shared with established swamp breeds and with Buffalo population of Orissa in India. Conclusion: Morphometric analyses clearly shows distinguishing features like long and broad forehead which may be useful in identification. The germplasm of Diara buffalo is much adapted to the marshy banks of river Ganga and its tributaries. It constitutes a valuable genetic resource which needs to be conserved on priority basis.

Masked Face Recognition via a Combined SIFT and DLBP Features Trained in CNN Model

  • Aljarallah, Nahla Fahad;Uliyan, Diaa Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.319-331
    • /
    • 2022
  • The latest global COVID-19 pandemic has made the use of facial masks an important aspect of our lives. People are advised to cover their faces in public spaces to discourage illness from spreading. Using these face masks posed a significant concern about the exactness of the face identification method used to search and unlock telephones at the school/office. Many companies have already built the requisite data in-house to incorporate such a scheme, using face recognition as an authentication. Unfortunately, veiled faces hinder the detection and acknowledgment of these facial identity schemes and seek to invalidate the internal data collection. Biometric systems that use the face as authentication cause problems with detection or recognition (face or persons). In this research, a novel model has been developed to detect and recognize faces and persons for authentication using scale invariant features (SIFT) for the whole segmented face with an efficient local binary texture features (DLBP) in region of eyes in the masked face. The Fuzzy C means is utilized to segment the image. These mixed features are trained significantly in a convolution neural network (CNN) model. The main advantage of this model is that can detect and recognizing faces by assigning weights to the selected features aimed to grant or provoke permissions with high accuracy.

Edge Computing-Based Medical Information Platform for Automatic Authentication Using Patient Situations

  • Gyu-Sung Ham;Mingoo Kang;Suck-Tae Joung;Su-Chong Joo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.4
    • /
    • pp.1049-1065
    • /
    • 2023
  • Recently, with the development of IoT, AI, and mobile terminals, medical information platforms are expanding. The medical information platform can determine a patient's emergency situation, and medical staff can easily access patient information through a mobile terminal. However, in the existing platform, emergency situation decision is delayed, and faster and stronger authentication is required in emergency situations. Therefore, we propose an edge computing-based medical information platform for automatic authentication using patient situations. We design an edge computing-based medical information platform architecture capable of rapid transmission of biometric data of IoT and quick emergency situation decision, and implement the platform data flow in emergency situations. Relying on this platform, we propose the automatic authentication using patient situations. The automatic authentication protects patient information through patient-centered authentication by using the patient's situation as an authentication factor, and enables quick authentication by automatically proceeding with mobile terminal authentication after user authentication in emergencies without user intervention. We compared the proposed platform with existing platforms to show that it can make quick and stable emergency decisions. In addition, comparing the automatic authentication with existing authentication showed that it is fast and protects medical information centered on patient situations in emergency situations.

Using multi-sensor for Development of Multiple Occupants' Activities Classification Model Based on LSTM (다중센서를 활용한 LSTM 기반 재실자 행동 분류 모델 개발)

  • Jin Su Park;Chul Seung Yang;Kyung-Ho Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.6
    • /
    • pp.1065-1071
    • /
    • 2023
  • In this paper discuss with research developing an LSTM model for classifying the behavior of occupants within a residence. The multi-sensor consists of an IAQ (Indoor Air Quality) sensor that measures indoor air quality, a UWB radar that tracks occupancy detection and location, and a Piezo sensor to measure occupants' biometric information, and collects occupant behavior data such as going out, staying, cooking, cleaning, exercise, and sleep by constructed an experimental environment similar to the actual residential environment. After the data with removed outliers and missing, the LSTM model is used to calculate accuracy, sensitivity, specificity of the occupant behavior classification model, T1 score.

Implementation of Falling Accident Monitoring and Prediction System using Real-time Integrated Sensing Data

  • Bonghyun Kim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.11
    • /
    • pp.2987-3002
    • /
    • 2023
  • In 2015, the number of senior citizens aged 65 and over in Korea was 6,662,400, accounting for 13.1% of the total population. Along with these social phenomena, risk information related to the elderly is increasing every year. In particular, a fall accident caused by a fall can cause serious injury to an elderly person, so special attention is required. Therefore, in this paper, we implemented a system that monitors fall accidents and informs them in real time to minimize damage caused by falls. To this end, beacon-based indoor location positioning was performed and biometric information based on an integrated module was collected using various sensors. In other words, a multi-functional sensor integration module was designed based on Arduino to collect and monitor user's temperature, heart rate, and motion data in real time. Finally, through the analysis and prediction of measurement signals from the integrated module, damage from fall accidents can be reduced and rapid emergency treatment is possible. Through this, it is possible to reduce the damage caused by a fall accident, and rapid emergency treatment will be possible. In addition, it is expected to lead a new paradigm of safety systems through expansion and application to socially vulnerable groups.

Implementation of An Automatic Authentication System Based on Patient's Situations and Its Performance Evaluation (환자상황 기반의 자동인증시스템 구축 및 성능평가)

  • Ham, Gyu-Sung;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.21 no.4
    • /
    • pp.25-34
    • /
    • 2020
  • In the current medical information system, a system environment is constructed in which Biometric data generated by using IoT or medical equipment connected to a patient can be stored in a medical information server and monitored at the same time. Also, the patient's biometric data, medical information, and personal information after simple authentication using only the ID / PW via the mobile terminal of the medical staff are easily accessible. However, the method of accessing these medical information needs to be improved in the dimension of protecting patient's personal information, and provides a quick authentication system for first aid. In this paper, we implemented an automatic authentication system based on the patient's situation and evaluated its performance. Patient's situation was graded into normal and emergency situation, and the situation of the patient was determined in real time using incoming patient biometric data from the ward. If the patient's situation is an emergency, an emergency message including an emergency code is send to the mobile terminal of the medical staff, and they attempted automatic authentication to access the upper medical information of the patient. Automatic authentication is a combination of user authentication(ID/PW, emergency code) and mobile terminal authentication(medical staff's role, working hours, work location). After user authentication, mobile terminal authentication is proceeded automatically without additional intervention by medical staff. After completing all authentications, medical staffs get authorization according to the role of medical staffs and patient's situations, and can access to the patient's graded medical information and personal information through the mobile terminal. We protected the patient's medical information through limited medical information access by the medical staff according to the patient's situation, and provided an automatic authentication without additional intervention in an emergency situation. We performed performance evaluation to verify the performance of the implemented automatic authentication system.

Data Mixing Augmentation Method for Improving Fake Fingerprint Detection Rate (위조지문 판별률 향상을 위한 학습데이터 혼합 증강 방법)

  • Kim, Weonjin;Jin, Cheng-Bin;Liu, Jinsong;Kim, Hakil
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.305-314
    • /
    • 2017
  • Recently, user authentication through biometric traits such as fingerprint and iris raise more and more attention especially in mobile commerce and fin-tech fields. In particular, commercialized authentication methods using fingerprint recognition are widely utilized mainly because customers are more adopted and used to fingerprint recognition applications. In the meantime, the security issues caused by fingerprint falsification bring lots of attention. In this paper, we propose a new method to improve the performance of fake fingerprint detection using CNN(Convolutional Neural Network). It is common practice to increase the amount of learning data by using affine transformation or horizontal reflection to improve the detection rate in CNN characteristics that are influenced by learning data. However, in this paper we propose an effective data augmentation method based on the database difficulty level. The experimental results confirm the validity of proposed method.

Dementia Prediction Model based on Gradient Boosting (이기종 머신러닝 모델 기반 치매예측 모델)

  • Lee, Taein;Oh, Hayoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.12
    • /
    • pp.1729-1738
    • /
    • 2021
  • Machine learning has a close relationship with cognitive psychology and brain science and is developing together. This paper analyzes the OASIS-3 dataset using machine learning techniques and proposes a model for predicting dementia. Dimensional reduction through PCA (Principal Component Analysis) is performed on the data quantifying the volume of each area among OASIS-3 data, and only important elements (features) are extracted and then various machine learning including gradient boosting and stacking Apply the models and compare the performance of each. Unlike previous studies, the proposed technique has a great differentiation because it uses not only the brain biometric data, but also basic information data such as the participant's gender and medical information data of the participant. In addition, it was shown that the proposed technique through various performance evaluations is a model that can better predict dementia by finding features that are more related to dementia among various numerical data.

New Approach for Detecting Leakage of Internal Information; Using Emotional Recognition Technology

  • Lee, Ho-Jae;Park, Min-Woo;Eom, Jung-Ho;Chung, Tai-Myoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4662-4679
    • /
    • 2015
  • Currently, the leakage of internal information has emerged as one of the most significant security concerns in enterprise computing environments. Especially, damage due to internal information leakage by insiders is more serious than that by outsiders because insiders have considerable knowledge of the system's identification and password (ID&P/W), the security system, and the main location of sensitive data. Therefore, many security companies are developing internal data leakage prevention techniques such as data leakage protection (DLP), digital right management (DRM), and system access control, etc. However, these techniques cannot effectively block the leakage of internal information by insiders who have a legitimate access authorization. The security system does not easily detect cases which a legitimate insider changes, deletes, and leaks data stored on the server. Therefore, we focused on the insider as the detection target to address this security weakness. In other words, we switched the detection target from objects (internal information) to subjects (insiders). We concentrated on biometrics signals change when an insider conducts abnormal behavior. When insiders attempt to leak internal information, they appear to display abnormal emotional conditions due to tension, agitation, and anxiety, etc. These conditions can be detected by the changes of biometrics signals such as pulse, temperature, and skin conductivity, etc. We carried out experiments in two ways in order to verify the effectiveness of the emotional recognition technology based on biometrics signals. We analyzed the possibility of internal information leakage detection using an emotional recognition technology based on biometrics signals through experiments.

A Scheme for User Authentication using Pupil (눈동자를 이용한 사용자 인증기법)

  • Lee, Jae-Wook;Kang, Bo-Seon;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.14 no.9
    • /
    • pp.325-329
    • /
    • 2016
  • Facial authentication has the limelight because it has less resistance and it is hard to falsify among various biometric identification. The algorithm of facial authentication can bring about huge difference in accuracy and speed by the algorithm construction. Along with face-extracted data by tracing and extracting pupil, the thesis studied algorithm which extracts data to improve error rate and to accurately authenticate face. It detects face by cascade, selects as significant area, divides the facial area into 4 equal parts to save the coordinate of object. Also, to detect pupil from the eye, the binarization is conducted and it detects pupil by Hough conversion. The core coordinate of detected pupil is saved and calculated to conduct facial authentication through data matching. The thesis studied optimized facial authentication algorithm which accurately calculates facial data with pupil trace.