A NEURAL NETWORK APPLICATION FOR A COMPUTER ACCESS SECURITY SYSTEM: KEYSTROKE DYNAMICS VERSUS VOICE PATTERNS

Size: px
Start display at page:

Download "A NEURAL NETWORK APPLICATION FOR A COMPUTER ACCESS SECURITY SYSTEM: KEYSTROKE DYNAMICS VERSUS VOICE PATTERNS"

Transcription

1 A NEURAL NETWORK APPLICATION FOR A COMPUTER ACCESS SECURITY SYSTEM: KEYSTROKE DYNAMICS VERSUS VOICE PATTERNS A. SERMET ANAGUN Industrial Engineering Department, Osmangazi University, Eskisehir, Turkey ABSTRACT A neural network architecture is proposed to deal with a situation of multiple users where each user has his/her own password with different length. Two groups of experiments were conducted to find a better and a reliable way for a computer access security system. The neural networks are trained using time intervals between successive keystrokes during password entry through keyboard and voice patterns spoken via a microphone, respectively. The performance of the neural networks designed for each of the experiments is evaluated in terms of recognition accuracy. Two major issues, preventive security and detection of violations, which may be in question for a security system, are examined. INTRODUCTION A computer security system should not only be able to identify a person and let him/her access to the system if he/she has a correct security code or deny the access otherwise - preventive security, but also be capable of identifying the person whether he/she is indeed the right person - detection of violations (Anagun and Cin, 1998). To accomplish these goals, a software/ hardware based security system may be used. In either case, the security code may be found with a trial-error process or stolen from the authorized person by someone else. When this occurs, the attempt made by a person may not be prevented. Due to the drawbacks of the common approaches, a different method, which may prevent copying or duplicating the security code issued, should be developed to differentiate an authorized person from the others such that a valuable and/or more sensitive information for an organization should be secured. In the area of computer access security, recent studies have concentrated on user identification based on individual s typing pattern, considered as a special characteristic for each person, using classical pattern recognition techniques, fuzzy algorithm based pattern recognition systems, and neural networks with different architectures (Hussein et al, 1989; Bleha et al, 1990; Obaidat et al, 1991; Bleha and Obaidat, 1991; Obaidat and Macchairolo, 1993; Bleha and Obaidat, 1993). The systems proposed in the studies were evaluated using measurements of the time duration between successive keystrokes appeared while a password was being entered via a keyboard. Even though a higher recognition accuracy of 97.8% was obtained, the systems designed have only classified the people included in the research into two groups such as valid or invalid without ASME Intelligent Engineering Systems through Artificial Neural Networks Vol. 9, , 1999.

2 906 evaluating whether they are indeed authorized for accessing the system involved and changing some information. This situation may be considered as multiple users-one password so called preventive security. On the other hand, classifying people according to a known and a long password/phrase may not be applicable to a real computer based security system in which each participant has different level of authority/qualification. However, because of the developments in computer technology and the complexity of information systems the organizations might have, there may be different situations, which needed to be considered such as multiple usersmultiple passwords, a user-one password, and a user-multiple passwords. As discussed in Anagun and Cin (1996), each of these situations may be applied to the computer access security systems considering passwords with/without different lengths depending on his/her preferences or system s requirements, if applicable. In their study, a multi-layered neural network based computer access security system has been proposed for a situation of multiple users-multiple passwords with different lengths. The system designed regarding to the keystroke dynamics of the users has provided approximately 3% error and performed better than a statistical classifier based on Euclidean distance, 13.6%. In the study of Anagun and Cin (1998), a neural network based system has been designed and successfully applied to the cases of multiple users-one password and multiple users-multiple passwords with different lengths for preventive security and detection of violation purposes. In addition, two critical issues, password-dependent identification (the lengths of the passwords different) and password-independent identification (the lengths of the passwords equal) were investigated in terms of recognition accuracy. It has mentioned that the users were classified or attempts of an unauthorized person (intruder) were denied 98.7% of the time. Here, an intelligent computer access security system using a multi-layered feed-forward neural network was proposed for a situation of multiple usersmultiple passwords with different lengths. In order to find a reliable way for a computer based system, the participants were tried to differentiate from each other according to the time intervals and voice patterns obtained through data collection systems designed. DATA COLLECTION The time intervals between successive characters occurred, called keystroke dynamics, while entering a password using a keyboard, finger prints and properties of voice of a person may be considered as person-dependent or special characteristics. These characteristics may be somehow used in the form of a software-based system for user identification in or to differentiate users of a computer system to secure the information stored. In this study, two different ways for differentiating a valid user from the others were used to find a better way for a computer access security system in terms of reliability, Based on the selected special characteristics, two types of data - keystroke dynamics obtained during a password entry via a keyboard and voice patterns recorded as they were being spoken through a microphone - were collected from the same group.

3 907 In order to demonstrate applicability of the considered system, three faculty/staff members were randomly chosen from Industrial Engineering Department and the passwords with different lengths, ranging from 9 to 14 characters, are assigned to the participants according to their preferences. Afterwards, each participant is asked to enter all of the passwords, using a keyboard and a microphone, respectively, in a random order and four times a day of each week for the period of three months. After the entries completed, both keystroke dynamics and the voice patterns for each user are evaluated and additional entries are made until the necessary number of patterns has been reached statistically. The data for the same passwords belong to the same persons were obtained in different structures. Case 1: Time intervals between successive keystrokes The users, each of whom has different levels of computer skills, were asked to enter his/her own password and other passwords of the remaining participants, which were represented by during the password entry process, along with a user identification number in a random order based on a proposed data collection structure. When the password was type correctly, the time intervals between successive characters of the password were computed and automatically recorded in a file according to the user and password identification numbers. Such a file, for each entry, consists of the time intervals of the password typed, user identification number that represents who typed the password, and password identification number that represents which password typed as T 1 T 2 T 3..T n U 1 U 2 U 3 P 1 P 2 P 3, where, T i is the i th time interval for the P j th password typed by the U k th user, i = 1,2,...,n, P j is the j th password typed by the U k th user (0 or 1), j = 1,2,3, and U k is the k th user (0 or 1), k = 1,2,3. Case 2: Voice Patterns - LPCs Many different models have been postulated for quantitatively describing certain factors involved in the speech process. One of the most powerful models of speech behavior is the linear prediction model, which has been successfully applied to the related problems in recent years (Markel and Gray, 1982). In speech processing, a phrase is spoken into a microphone, recorded on audio tape as waveform, and then analyzed. The recorded speech waveform has a very complex structure and continually time-varying. The waveforms are analyzed based on frames (shifted windows with the speech sequence). As the frames dynamically move through time, considering speech is dynamic and information-bearing process, transient features of the signal may be captured (Deller, et. al., 1993). To do, linear-invariant models over short intervals of time for describing important speech events should be implemented. There are two well-known and widely used linear prediction models: the autocorrelation and the covariance methods. The autocorrelation method is always guaranteed to produce a stable linear prediction model (Markel and Gray, 1982). By solving a set of equations, this model produces linear prediction coefficients (LPCs). These coefficients, easily and efficiently obtained from

4 908 speech and through synthesis experiments, have been shown to retain a considerable degree of naturalness from the original speech. Thus, linear prediction models have been applied to speaker identification and verification (Rabiner and Schafer, 1978; Markel and Gray, 1982). During the password entry process of the Case 2, users were asked to speak the passwords clearly through a microphone and voice patterns of the passwords sampled at 8 bit and 11kHz were recorded and digitized. Recorded voice patterns were then transformed to LPCs using the autocorrelation method via Matlab to represent each voice pattern as frames or Hamming windows consisting of a certain number of data points and to reduce the dimension of each pattern. After transformation, the voice patterns were represented as X 1 X 2 X 3..X n U 1 U 2 U 3 P 1 P 2 P 3, where, X i is the i th linear prediction coefficient of an Hamming window corresponding to the P th th j password spoken by the U k user, i = 1,2,..,n, P j is the j th password spoken by the U th k user (0 or 1), j = 1,2,3, and U k is the k th user (0 or 1), k = 1,2,3. NEURAL NETWORK ARCHITECTURE It has been shown that a layered neural network provides more potential alternatives than traditional pattern recognition techniques (Burr, 1988; Anagun and Liou, 1993). The neural networks used in this study, one for each type of data, were made up of three layers with inter-layer connections. The number of neurons in the network architecture was varied depending on the experiments. The input layer was composed of 8-13 neurons, represented time intervals between successive keystrokes obtained from the passwords entered, and , represented LPCs obtained from the transformation process for the passwords spoken. For both experiments, the output layer was made up of 3-6 neurons for the desired output values of each pattern; for instance, represented that the first user entered/spoken the first password. The number of neurons in the hidden layer, which yields to extract features between the input and the corresponding output pattern, was varied depending on the experiments to improve the network performance in terms of generalization. The learning rate and momentum term were arbitrarily assigned to 0.15 and 0.4, respectively. EXPERIMENTAL RESULTS AND DISCUSSIONS The collected data from password entry process used for time intervals and transformed voice patterns were normalized before presenting them to the neural networks. Two groups of experiments were conducted to determine whether keystroke dynamics or voice patterns of the users would be effective for the system concerned. Since the lengths or structures of the waveforms of the passwords were different, regardless of the data type used, each input pattern of the shortest password was made equal to the dimension of the longest password by adding a necessary number of zeros to use a single neural network in terms of number of input neurons for each experiment conducted based on each Case. In the first group of experiments, the collected time intervals and transformed voice patterns were separately used to verify if the users may be

5 909 classified into appropriate groups assuming that each user was having his/her own password. For this, the data obtained from the users were fed to the neural networks consisting of 13 input for time intervals and 100 input for LPCs, respectively, and 3 output neurons considering that a certain number of users may have passwords which could be used by each of the users. This type of experiment was conducted for the purpose of preventive security. In the second group of experiments, each password was assigned to each user only based on his/her preferences. Then, the data consists of either time intervals or LPCs belong to a specific password selected by a user were separately introduced to the neural networks, each had same input but 6 output neurons, to initiate a multiple users-multiple passwords situation. This experiment was performed for both preventive security and detection of violation purposes. Since each user has his/her own password to access to a part of or complete system, this situation may be considered as password-dependent identification. Afterwards, the multi-layered neural networks were trained using the proper data prepared for each of the experiments. In testing phase, the patterns which were not included in the training set, were fed to the designed neural networks and the performance of the each neural network was evaluated according to the correct/wrong classifications (Type I error). Also, patterns obtained from an unauthorized person for the system involved and not included in training data were tested to verify whether the person may be considered as an authorized one by checking the similarity of the time intervals or LPCs with the ones produced by the participants (Type II error). In the first experiment, the time interval patterns were recognized with the accuracy of 97.4% in training and 94.5% in testing, and the LPCs with 82.6% and 76.4%, respectively. On the other hand, when the patterns of the unauthorized person were tested, the person was recognized as authorized one with the error level of 23.1% for the Case 1 and 31.6% for the Case 2, respectively, because of the similarities between time interval patterns and properties of the voice. For the Case 1, a recognition accuracy of 98.8% was obtained for training phase in the second experiment, and Type I and II errors were decreased down to 2.4% and 4.7%, respectively, in testing. The neural network has correctly classified participants with a value of 87.4% for the Case 2 in training, provided errors of 11.3% for Type I and 15.4% for Type II, respectively. The results concluded that when the user identification number and a password for that user were questioned simultaneously, a higher performance in computer access security system might be obtained. Based on the results, it has also observed that the users were easily and successfully identified and/or classified into proper groups when the sequence and placement of the characters appeared in the passwords are compatible in terms of vowel-consonant and distance between them, and the pronunciation of the passwords are appropriate in terms of linguistics. In order to improve reliability of the system concerned, a hybrid neural network architecture may be established based on a two-stage process; speaking the corresponding password through a microphone and identifying the user at

6 910 the first stage and entering the same password via keyboard and verifying the user whether he/she is the owner of the account at the second stage, respectively. CONCLUSIONS In order to differentiate users, prevent unauthorized person to access the system, and try to detect the violators, two groups of experiments were conducted using multi-layered neural networks having different architectures. The experimental results showed that the neural network trained using time intervals of the passwords along with identification numbers of the users provided better performance than the other trials. The neural network trained using voice pattern could not provide higher accuracy as expected. The voice pattern may be sampled at different parameters, for instance, 16 bit and 22 khz, to precisely capture the features of the signals. A two-stage procedure, which may be employed with a hybrid neural network, was pointed out to improve overall performance of such a system. Other issues, such as determining the optimal values of parameters of the neural network used to improve recognition accuracy, seeking better ways or alternatives to differentiate users more precisely, and integrating the neural network(s) with an expert system, if applicable, to be able to implement this approach effectively and rapidly in an on-line mode are still available for further investigation. REFERENCES Anagun, A.S. and Cin, I., 1998, "A Neural Network Based Computer Access Security System For Multiple Users," Computers Ind. Engng, Vol. 35, pp Anagun, A.S. and Cin, I., 1996, "An Alternative Way For Computer Access Security: Password Entry Patterns," Proc.18 th National Conf. Op. Res. Ind. Engng, Istanbul, Turkey, pp Anagun, A.S. and Liou, Y.H.A., 1993, "A Neural Network Application for Apnea Recognition: A Preliminary Study," ASME Intelligent Engng System through Artificial Neural Networks, Ed. Daglı, et al., Vol. 3, pp Bleha, S.A. and Obaidat, M.S., 1993, "Computer Users Verification Using The Perceptron Algorithm," IEEE Trans. Syst., Man, Cybern., Vol. 23, pp Bleha, S.A. and Obaidat, M.S., 1991, "Dimensionality Reduction and Feature Extraction Application in Identifying Computer Users," IEEE Trans. Syst., Man, Cybern., Vol. 21, pp Bleha, S.A., Slivinsky, C., and Hussein, B., 1990, "Computer-Access Security Systems Using Keystroke Dynamics," IEEE Trans. Pattern Anal. Machine Intell, Vol. 12, pp Burr, D.J., 1988, "Experiments on Neural Net Recognition of Spoken and Written Text," IEEE Trans. Acoust., Speech, Signal Processing, Vol. 36, pp Deller Jr., J.R., Proakis, J.G., and Hansen, J.H.L., 1993, Discrete-Time Processing of Speech Signals, Macmillian Publishing Co., New York. Hussein, B.R., McLaren, R., and Bleha, S.A., 1989, "An Application of Fuzzy Algorithms in a Computer Access Security System," Pattern Recog. Lett., Vol. 9, pp Markel, J.D. and Gray Jr., A.H., 1982, Linear Prediction of Speech, Springer-Verlag, New York. Obaidat, M.S. and Macchairolo, D.T., 1993, "An On-Line Neural Network System for Computer Access Security," IEEE Trans. Industrial Electronics, 40, Obaidat, M.S., Macchairolo, D.T., and Bleha, S.A., 1991, "An Intelligent Neural Network System for Identifying Computer Users," ASME Intelligent Engng Systems through Artificial Neural Networks, Ed. Dagli et al., pp Rabiner, L.R. and Schafer, R.W., 1978, Digital Processing of Speech Signals, Prentice-Hall, Englewood Cliffs.

Text-Independent Speaker Identification

Text-Independent Speaker Identification December 8, 1999 Text-Independent Speaker Identification Til T. Phan and Thomas Soong 1.0 Introduction 1.1 Motivation The problem of speaker identification is an area with many different applications.

More information

Reduced Dimensionality Space for Post Placement Quality Inspection of Components based on Neural Networks

Reduced Dimensionality Space for Post Placement Quality Inspection of Components based on Neural Networks Reduced Dimensionality Space for Post Placement Quality Inspection of Components based on Neural Networks Stefanos K. Goumas *, Michael E. Zervakis, George Rovithakis * Information Management Department

More information

USING IMAGES PATTERN RECOGNITION AND NEURAL NETWORKS FOR COATING QUALITY ASSESSMENT Image processing for quality assessment

USING IMAGES PATTERN RECOGNITION AND NEURAL NETWORKS FOR COATING QUALITY ASSESSMENT Image processing for quality assessment USING IMAGES PATTERN RECOGNITION AND NEURAL NETWORKS FOR COATING QUALITY ASSESSMENT Image processing for quality assessment L.-M. CHANG and Y.A. ABDELRAZIG School of Civil Engineering, Purdue University,

More information

LetterScroll: Text Entry Using a Wheel for Visually Impaired Users

LetterScroll: Text Entry Using a Wheel for Visually Impaired Users LetterScroll: Text Entry Using a Wheel for Visually Impaired Users Hussain Tinwala Dept. of Computer Science and Engineering, York University 4700 Keele Street Toronto, ON, CANADA M3J 1P3 hussain@cse.yorku.ca

More information

Aditi Upadhyay Research Scholar, Department of Electronics & Communication Engineering Jaipur National University, Jaipur, Rajasthan, India

Aditi Upadhyay Research Scholar, Department of Electronics & Communication Engineering Jaipur National University, Jaipur, Rajasthan, India Analysis of Different Classifier Using Feature Extraction in Speaker Identification and Verification under Adverse Acoustic Condition for Different Scenario Shrikant Upadhyay Assistant Professor, Department

More information

FACE RECOGNITION USING FUZZY NEURAL NETWORK

FACE RECOGNITION USING FUZZY NEURAL NETWORK FACE RECOGNITION USING FUZZY NEURAL NETWORK TADI.CHANDRASEKHAR Research Scholar, Dept. of ECE, GITAM University, Vishakapatnam, AndraPradesh Assoc. Prof., Dept. of. ECE, GIET Engineering College, Vishakapatnam,

More information

A fuzzy k-modes algorithm for clustering categorical data. Citation IEEE Transactions on Fuzzy Systems, 1999, v. 7 n. 4, p.

A fuzzy k-modes algorithm for clustering categorical data. Citation IEEE Transactions on Fuzzy Systems, 1999, v. 7 n. 4, p. Title A fuzzy k-modes algorithm for clustering categorical data Author(s) Huang, Z; Ng, MKP Citation IEEE Transactions on Fuzzy Systems, 1999, v. 7 n. 4, p. 446-452 Issued Date 1999 URL http://hdl.handle.net/10722/42992

More information

Speech User Interface for Information Retrieval

Speech User Interface for Information Retrieval Speech User Interface for Information Retrieval Urmila Shrawankar Dept. of Information Technology Govt. Polytechnic Institute, Nagpur Sadar, Nagpur 440001 (INDIA) urmilas@rediffmail.com Cell : +919422803996

More information

Linear Discriminant Analysis in Ottoman Alphabet Character Recognition

Linear Discriminant Analysis in Ottoman Alphabet Character Recognition Linear Discriminant Analysis in Ottoman Alphabet Character Recognition ZEYNEB KURT, H. IREM TURKMEN, M. ELIF KARSLIGIL Department of Computer Engineering, Yildiz Technical University, 34349 Besiktas /

More information

CHAPTER 4 FUZZY LOGIC, K-MEANS, FUZZY C-MEANS AND BAYESIAN METHODS

CHAPTER 4 FUZZY LOGIC, K-MEANS, FUZZY C-MEANS AND BAYESIAN METHODS CHAPTER 4 FUZZY LOGIC, K-MEANS, FUZZY C-MEANS AND BAYESIAN METHODS 4.1. INTRODUCTION This chapter includes implementation and testing of the student s academic performance evaluation to achieve the objective(s)

More information

MATLAB Toolbox for Audiovisual Speech Processing

MATLAB Toolbox for Audiovisual Speech Processing ISCA Archive http://www.isca-speech.org/archive Auditory-Visual Speech Processing 27 (AVSP27) Hilvarenbeek, The Netherlands August 31 - September 3, 27 MATLAB Toolbox for Audiovisual Speech Processing

More information

NOVEL HYBRID GENETIC ALGORITHM WITH HMM BASED IRIS RECOGNITION

NOVEL HYBRID GENETIC ALGORITHM WITH HMM BASED IRIS RECOGNITION NOVEL HYBRID GENETIC ALGORITHM WITH HMM BASED IRIS RECOGNITION * Prof. Dr. Ban Ahmed Mitras ** Ammar Saad Abdul-Jabbar * Dept. of Operation Research & Intelligent Techniques ** Dept. of Mathematics. College

More information

This leads to our algorithm which is outlined in Section III, along with a tabular summary of it's performance on several benchmarks. The last section

This leads to our algorithm which is outlined in Section III, along with a tabular summary of it's performance on several benchmarks. The last section An Algorithm for Incremental Construction of Feedforward Networks of Threshold Units with Real Valued Inputs Dhananjay S. Phatak Electrical Engineering Department State University of New York, Binghamton,

More information

Production of Video Images by Computer Controlled Cameras and Its Application to TV Conference System

Production of Video Images by Computer Controlled Cameras and Its Application to TV Conference System Proc. of IEEE Conference on Computer Vision and Pattern Recognition, vol.2, II-131 II-137, Dec. 2001. Production of Video Images by Computer Controlled Cameras and Its Application to TV Conference System

More information

Multiple Classifier Fusion using k-nearest Localized Templates

Multiple Classifier Fusion using k-nearest Localized Templates Multiple Classifier Fusion using k-nearest Localized Templates Jun-Ki Min and Sung-Bae Cho Department of Computer Science, Yonsei University Biometrics Engineering Research Center 134 Shinchon-dong, Sudaemoon-ku,

More information

Hybrid Biometric Person Authentication Using Face and Voice Features

Hybrid Biometric Person Authentication Using Face and Voice Features Paper presented in the Third International Conference, Audio- and Video-Based Biometric Person Authentication AVBPA 2001, Halmstad, Sweden, proceedings pages 348-353, June 2001. Hybrid Biometric Person

More information

Off-line signature verification: a comparison between human and machine performance

Off-line signature verification: a comparison between human and machine performance Off-line signature verification: a comparison between human and machine performance J. Coetzer B.M. Herbst J.A. du Preez Mathematical Sciences, jcoetzer@sun.ac.za Mathematical Sciences, herbst@dip.sun.ac.za

More information

A NEURAL NETWORK BASED TRAFFIC-FLOW PREDICTION MODEL. Bosnia Herzegovina. Denizli 20070, Turkey. Buyukcekmece, Istanbul, Turkey

A NEURAL NETWORK BASED TRAFFIC-FLOW PREDICTION MODEL. Bosnia Herzegovina. Denizli 20070, Turkey. Buyukcekmece, Istanbul, Turkey Mathematical and Computational Applications, Vol. 15, No. 2, pp. 269-278, 2010. Association for Scientific Research A NEURAL NETWORK BASED TRAFFIC-FLOW PREDICTION MODEL B. Gültekin Çetiner 1, Murat Sari

More information

9. Lecture Neural Networks

9. Lecture Neural Networks Soft Control (AT 3, RMA) 9. Lecture Neural Networks Application in Automation Engineering Outline of the lecture 1. Introduction to Soft Control: definition and limitations, basics of "smart" systems 2.

More information

Human Computer Interaction Using Speech Recognition Technology

Human Computer Interaction Using Speech Recognition Technology International Bulletin of Mathematical Research Volume 2, Issue 1, March 2015 Pages 231-235, ISSN: 2394-7802 Human Computer Interaction Using Recognition Technology Madhu Joshi 1 and Saurabh Ranjan Srivastava

More information

THE genetic algorithm (GA) is a powerful random search

THE genetic algorithm (GA) is a powerful random search 464 IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 51, NO. 2, APRIL 2004 On Interpretation of Graffiti Digits and Characters for ebooks: Neural-Fuzzy Network and Genetic Algorithm Approach K. F. Leung,

More information

A Novel Approach for Minimum Spanning Tree Based Clustering Algorithm

A Novel Approach for Minimum Spanning Tree Based Clustering Algorithm IJCSES International Journal of Computer Sciences and Engineering Systems, Vol. 5, No. 2, April 2011 CSES International 2011 ISSN 0973-4406 A Novel Approach for Minimum Spanning Tree Based Clustering Algorithm

More information

Efficient Image Compression of Medical Images Using the Wavelet Transform and Fuzzy c-means Clustering on Regions of Interest.

Efficient Image Compression of Medical Images Using the Wavelet Transform and Fuzzy c-means Clustering on Regions of Interest. Efficient Image Compression of Medical Images Using the Wavelet Transform and Fuzzy c-means Clustering on Regions of Interest. D.A. Karras, S.A. Karkanis and D. E. Maroulis University of Piraeus, Dept.

More information

Multi-Modal Human Verification Using Face and Speech

Multi-Modal Human Verification Using Face and Speech 22 Multi-Modal Human Verification Using Face and Speech Changhan Park 1 and Joonki Paik 2 1 Advanced Technology R&D Center, Samsung Thales Co., Ltd., 2 Graduate School of Advanced Imaging Science, Multimedia,

More information

Biometric verification of computer users with probabilistic and cascade forward neural networks

Biometric verification of computer users with probabilistic and cascade forward neural networks Biometric verification of computer users with probabilistic and cascade forward neural networks S. SHORROCK, A. YANNOPOULOS, S.S. DLAY, D.J. ATKINSON Department of Electrical & Electronic Engineering University

More information

Hybrid Speech Synthesis

Hybrid Speech Synthesis Hybrid Speech Synthesis Simon King Centre for Speech Technology Research University of Edinburgh 2 What are you going to learn? Another recap of unit selection let s properly understand the Acoustic Space

More information

EE 589 INTRODUCTION TO ARTIFICIAL NETWORK REPORT OF THE TERM PROJECT REAL TIME ODOR RECOGNATION SYSTEM FATMA ÖZYURT SANCAR

EE 589 INTRODUCTION TO ARTIFICIAL NETWORK REPORT OF THE TERM PROJECT REAL TIME ODOR RECOGNATION SYSTEM FATMA ÖZYURT SANCAR EE 589 INTRODUCTION TO ARTIFICIAL NETWORK REPORT OF THE TERM PROJECT REAL TIME ODOR RECOGNATION SYSTEM FATMA ÖZYURT SANCAR 1.Introductıon. 2.Multi Layer Perception.. 3.Fuzzy C-Means Clustering.. 4.Real

More information

Defect Depth Estimation Using Neuro-Fuzzy System in TNDE by Akbar Darabi and Xavier Maldague

Defect Depth Estimation Using Neuro-Fuzzy System in TNDE by Akbar Darabi and Xavier Maldague Defect Depth Estimation Using Neuro-Fuzzy System in TNDE by Akbar Darabi and Xavier Maldague Electrical Engineering Dept., Université Laval, Quebec City (Quebec) Canada G1K 7P4, E-mail: darab@gel.ulaval.ca

More information

Lucian Blaga University of Sibiu, Faculty of Engineering, 4 E. Cioran St, 55025, Sibiu, Romania 2

Lucian Blaga University of Sibiu, Faculty of Engineering, 4 E. Cioran St, 55025, Sibiu, Romania 2 Studies regarding the use of a neuro-fuzzy mathematical model in order to determine the technological parameters of the polyethylene pipes butt welding process Alina Gligor 1,*, Marcel-Letitiu Balan 2,

More information

Speech Recognizing Robotic Arm for Writing Process

Speech Recognizing Robotic Arm for Writing Process Speech Recognizing Robotic Arm for Writing Process 1 Dhanshri R. Pange, 2 Dr. Anil R. Karwankar 1 M. E. Electronics Student, 2 Professor, Department of Electronics and Telecommunication Govt. Engineering

More information

Haresh D. Chande #, Zankhana H. Shah *

Haresh D. Chande #, Zankhana H. Shah * Illumination Invariant Face Recognition System Haresh D. Chande #, Zankhana H. Shah * # Computer Engineering Department, Birla Vishvakarma Mahavidyalaya, Gujarat Technological University, India * Information

More information

Analysis of Modified Rule Extraction Algorithm and Internal Representation of Neural Network

Analysis of Modified Rule Extraction Algorithm and Internal Representation of Neural Network Covenant Journal of Informatics & Communication Technology Vol. 4 No. 2, Dec, 2016 An Open Access Journal, Available Online Analysis of Modified Rule Extraction Algorithm and Internal Representation of

More information

Voice. Voice. Patterson EagleSoft Overview Voice 629

Voice. Voice. Patterson EagleSoft Overview Voice 629 Voice Voice Using the Microsoft voice engine, Patterson EagleSoft's Voice module is now faster, easier and more efficient than ever. Please refer to your Voice Installation guide prior to installing the

More information

DOUBLE CHECKING: MULTIMODAL, INTEGRATIVE & CONTINUOUS VERIFICATION TECHNOLOGY OF SIGNATURE & FINGER PRINT IDENTIFICATION

DOUBLE CHECKING: MULTIMODAL, INTEGRATIVE & CONTINUOUS VERIFICATION TECHNOLOGY OF SIGNATURE & FINGER PRINT IDENTIFICATION DOUBLE CHECKING: MULTIMODAL, INTEGRATIVE & CONTINUOUS VERIFICATION TECHNOLOGY OF SIGNATURE & FINGER PRINT IDENTIFICATION 1 V.Rajesh, 2 V.Shyamsundar, 3 R.Naveenraj, 4 Mr.N.Karthik, 1,2,3 UG Scholars, Sri

More information

Non-rigid body Object Tracking using Fuzzy Neural System based on Multiple ROIs and Adaptive Motion Frame Method

Non-rigid body Object Tracking using Fuzzy Neural System based on Multiple ROIs and Adaptive Motion Frame Method Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Non-rigid body Object Tracking using Fuzzy Neural System based on Multiple ROIs

More information

A Performance Evaluation of HMM and DTW for Gesture Recognition

A Performance Evaluation of HMM and DTW for Gesture Recognition A Performance Evaluation of HMM and DTW for Gesture Recognition Josep Maria Carmona and Joan Climent Barcelona Tech (UPC), Spain Abstract. It is unclear whether Hidden Markov Models (HMMs) or Dynamic Time

More information

Developing a Data Driven System for Computational Neuroscience

Developing a Data Driven System for Computational Neuroscience Developing a Data Driven System for Computational Neuroscience Ross Snider and Yongming Zhu Montana State University, Bozeman MT 59717, USA Abstract. A data driven system implies the need to integrate

More information

Binary Decision Tree Using K-Means and Genetic Algorithm for Recognizing Defect Patterns of Cold Mill Strip

Binary Decision Tree Using K-Means and Genetic Algorithm for Recognizing Defect Patterns of Cold Mill Strip Binary Decision Tree Using K-Means and Genetic Algorithm for Recognizing Defect Patterns of Cold Mill Strip Kyoung Min Kim,4, Joong Jo Park, Myung Hyun Song 3, In Cheol Kim, and Ching Y. Suen Centre for

More information

FEATURE EXTRACTION USING FUZZY RULE BASED SYSTEM

FEATURE EXTRACTION USING FUZZY RULE BASED SYSTEM International Journal of Computer Science and Applications, Vol. 5, No. 3, pp 1-8 Technomathematics Research Foundation FEATURE EXTRACTION USING FUZZY RULE BASED SYSTEM NARENDRA S. CHAUDHARI and AVISHEK

More information

Image Processing Techniques Applied to Problems of Industrial Automation

Image Processing Techniques Applied to Problems of Industrial Automation Image Processing Techniques Applied to Problems of Industrial Automation Sérgio Oliveira Instituto Superior Técnico Abstract This work focuses on the development of applications of image processing for

More information

Flexible-Hybrid Sequential Floating Search in Statistical Feature Selection

Flexible-Hybrid Sequential Floating Search in Statistical Feature Selection Flexible-Hybrid Sequential Floating Search in Statistical Feature Selection Petr Somol 1,2, Jana Novovičová 1,2, and Pavel Pudil 2,1 1 Dept. of Pattern Recognition, Institute of Information Theory and

More information

An Algorithm For Training Multilayer Perceptron (MLP) For Image Reconstruction Using Neural Network Without Overfitting.

An Algorithm For Training Multilayer Perceptron (MLP) For Image Reconstruction Using Neural Network Without Overfitting. An Algorithm For Training Multilayer Perceptron (MLP) For Image Reconstruction Using Neural Network Without Overfitting. Mohammad Mahmudul Alam Mia, Shovasis Kumar Biswas, Monalisa Chowdhury Urmi, Abubakar

More information

Invariant Recognition of Hand-Drawn Pictograms Using HMMs with a Rotating Feature Extraction

Invariant Recognition of Hand-Drawn Pictograms Using HMMs with a Rotating Feature Extraction Invariant Recognition of Hand-Drawn Pictograms Using HMMs with a Rotating Feature Extraction Stefan Müller, Gerhard Rigoll, Andreas Kosmala and Denis Mazurenok Department of Computer Science, Faculty of

More information

Speaker Recognition Enhanced Voice Conference

Speaker Recognition Enhanced Voice Conference Advanced Internet Service Project Report Speaker Recognition Enhanced Voice Conference Yancheng Li, Liang Wei, Zhaoyuan Zhang I. Introduction With the development of the whole world, more and more people

More information

Keywords:- Fingerprint Identification, Hong s Enhancement, Euclidian Distance, Artificial Neural Network, Segmentation, Enhancement.

Keywords:- Fingerprint Identification, Hong s Enhancement, Euclidian Distance, Artificial Neural Network, Segmentation, Enhancement. Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Embedded Algorithm

More information

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal BIOMETRIC MECHANISM FOR ENHANCED SECURITY OF ONLINE TRANSACTION ON ANDROID SYSTEM 1 Anshita Agrawal CONTENTS Introduction Biometric Authentication Fingerprints Proposed System Conclusion References 2 INTRODUCTION

More information

Color Space Projection, Feature Fusion and Concurrent Neural Modules for Biometric Image Recognition

Color Space Projection, Feature Fusion and Concurrent Neural Modules for Biometric Image Recognition Proceedings of the 5th WSEAS Int. Conf. on COMPUTATIONAL INTELLIGENCE, MAN-MACHINE SYSTEMS AND CYBERNETICS, Venice, Italy, November 20-22, 2006 286 Color Space Projection, Fusion and Concurrent Neural

More information

Fast Orthogonal Neural Networks

Fast Orthogonal Neural Networks Fast Orthogonal Neural Networks Bart lomiej Stasiak and Mykhaylo Yatsymirskyy Institute of Computer Science, Technical University of Lódź ul. Wólczańska 5, 93-005 Lódź, Poland basta@ics.p.lodz.pl, jacym@ics.p.lodz.pl

More information

View Invariant Movement Recognition by using Adaptive Neural Fuzzy Inference System

View Invariant Movement Recognition by using Adaptive Neural Fuzzy Inference System View Invariant Movement Recognition by using Adaptive Neural Fuzzy Inference System V. Anitha #1, K.S.Ravichandran *2, B. Santhi #3 School of Computing, SASTRA University, Thanjavur-613402, India 1 anithavijay28@gmail.com

More information

A QR code identification technology in package auto-sorting system

A QR code identification technology in package auto-sorting system Modern Physics Letters B Vol. 31, Nos. 19 21 (2017) 1740035 (5 pages) c World Scientific Publishing Company DOI: 10.1142/S0217984917400358 A QR code identification technology in package auto-sorting system

More information

A Comparative Study of Conventional and Neural Network Classification of Multispectral Data

A Comparative Study of Conventional and Neural Network Classification of Multispectral Data A Comparative Study of Conventional and Neural Network Classification of Multispectral Data B.Solaiman & M.C.Mouchot Ecole Nationale Supérieure des Télécommunications de Bretagne B.P. 832, 29285 BREST

More information

Cursive Handwriting Recognition System Using Feature Extraction and Artificial Neural Network

Cursive Handwriting Recognition System Using Feature Extraction and Artificial Neural Network Cursive Handwriting Recognition System Using Feature Extraction and Artificial Neural Network Utkarsh Dwivedi 1, Pranjal Rajput 2, Manish Kumar Sharma 3 1UG Scholar, Dept. of CSE, GCET, Greater Noida,

More information

Rough Set Approach to Unsupervised Neural Network based Pattern Classifier

Rough Set Approach to Unsupervised Neural Network based Pattern Classifier Rough Set Approach to Unsupervised Neural based Pattern Classifier Ashwin Kothari, Member IAENG, Avinash Keskar, Shreesha Srinath, and Rakesh Chalsani Abstract Early Convergence, input feature space with

More information

Human Identification at a Distance Using Body Shape Information

Human Identification at a Distance Using Body Shape Information IOP Conference Series: Materials Science and Engineering OPEN ACCESS Human Identification at a Distance Using Body Shape Information To cite this article: N K A M Rashid et al 2013 IOP Conf Ser: Mater

More information

VHDL Modeling of an Artificial Neural Network for Classification of Power Quality Disturbance

VHDL Modeling of an Artificial Neural Network for Classification of Power Quality Disturbance VHDL Modeling of an Artificial Neural Network for Classification of Power Quality Disturbance FLORENCE CHOONG, F. MOHD-YASIN, M.S. SULAIMAN, M.I. REAZ Faculty of Engineering Multimedia University 63100

More information

Extraction and Representation of Features, Spring Lecture 4: Speech and Audio: Basics and Resources. Zheng-Hua Tan

Extraction and Representation of Features, Spring Lecture 4: Speech and Audio: Basics and Resources. Zheng-Hua Tan Extraction and Representation of Features, Spring 2011 Lecture 4: Speech and Audio: Basics and Resources Zheng-Hua Tan Multimedia Information and Signal Processing Department of Electronic Systems Aalborg

More information

Speech Recognition using a DSP

Speech Recognition using a DSP Lunds universitet Algorithms in Signal Processors ETIN80 Speech Recognition using a DSP Authors Johannes Koch, elt13jko Olle Ferling, tna12ofe Johan Persson, elt13jpe Johan Östholm, elt13jos Date 2017-03-05

More information

IJETST- Vol. 03 Issue 05 Pages May ISSN

IJETST- Vol. 03 Issue 05 Pages May ISSN International Journal of Emerging Trends in Science and Technology Implementation of MFCC Extraction Architecture and DTW Technique in Speech Recognition System R.M.Sneha 1, K.L.Hemalatha 2 1 PG Student,

More information

A Novel Template Matching Approach To Speaker-Independent Arabic Spoken Digit Recognition

A Novel Template Matching Approach To Speaker-Independent Arabic Spoken Digit Recognition Special Session: Intelligent Knowledge Management A Novel Template Matching Approach To Speaker-Independent Arabic Spoken Digit Recognition Jiping Sun 1, Jeremy Sun 1, Kacem Abida 2, and Fakhri Karray

More information

Efficient Object Extraction Using Fuzzy Cardinality Based Thresholding and Hopfield Network

Efficient Object Extraction Using Fuzzy Cardinality Based Thresholding and Hopfield Network Efficient Object Extraction Using Fuzzy Cardinality Based Thresholding and Hopfield Network S. Bhattacharyya U. Maulik S. Bandyopadhyay Dept. of Information Technology Dept. of Comp. Sc. and Tech. Machine

More information

Handwritten Signature Verification And Recognition Using ANN

Handwritten Signature Verification And Recognition Using ANN Handwritten Signature Verification And Recognition Using ANN Mohan Mandaogade Saurabh Vishal Mhaske ABSTRACT Automatic person identification is one of the major concerns in this era of automation. However,

More information

Audio-Visual Speech Activity Detection

Audio-Visual Speech Activity Detection Institut für Technische Informatik und Kommunikationsnetze Semester Thesis at the Department of Information Technology and Electrical Engineering Audio-Visual Speech Activity Detection Salome Mannale Advisors:

More information

Effect of Grouping in Vector Recognition System Based on SOM

Effect of Grouping in Vector Recognition System Based on SOM Effect of Grouping in Vector Recognition System Based on SOM Masayoshi Ohta Graduate School of Science and Engineering Kansai University Osaka, Japan Email: k287636@kansai-u.ac.jp Yuto Kurosaki Department

More information

IMPROVED FACE RECOGNITION USING ICP TECHNIQUES INCAMERA SURVEILLANCE SYSTEMS. Kirthiga, M.E-Communication system, PREC, Thanjavur

IMPROVED FACE RECOGNITION USING ICP TECHNIQUES INCAMERA SURVEILLANCE SYSTEMS. Kirthiga, M.E-Communication system, PREC, Thanjavur IMPROVED FACE RECOGNITION USING ICP TECHNIQUES INCAMERA SURVEILLANCE SYSTEMS Kirthiga, M.E-Communication system, PREC, Thanjavur R.Kannan,Assistant professor,prec Abstract: Face Recognition is important

More information

The Un-normalized Graph p-laplacian based Semi-supervised Learning Method and Speech Recognition Problem

The Un-normalized Graph p-laplacian based Semi-supervised Learning Method and Speech Recognition Problem Int. J. Advance Soft Compu. Appl, Vol. 9, No. 1, March 2017 ISSN 2074-8523 The Un-normalized Graph p-laplacian based Semi-supervised Learning Method and Speech Recognition Problem Loc Tran 1 and Linh Tran

More information

Handwritten Devanagari Character Recognition Model Using Neural Network

Handwritten Devanagari Character Recognition Model Using Neural Network Handwritten Devanagari Character Recognition Model Using Neural Network Gaurav Jaiswal M.Sc. (Computer Science) Department of Computer Science Banaras Hindu University, Varanasi. India gauravjais88@gmail.com

More information

Intelligent Hands Free Speech based SMS System on Android

Intelligent Hands Free Speech based SMS System on Android Intelligent Hands Free Speech based SMS System on Android Gulbakshee Dharmale 1, Dr. Vilas Thakare 3, Dr. Dipti D. Patil 2 1,3 Computer Science Dept., SGB Amravati University, Amravati, INDIA. 2 Computer

More information

NEURAL NETWORK-BASED SEGMENTATION OF TEXTURES USING GABOR FEATURES

NEURAL NETWORK-BASED SEGMENTATION OF TEXTURES USING GABOR FEATURES NEURAL NETWORK-BASED SEGMENTATION OF TEXTURES USING GABOR FEATURES A. G. Ramakrishnan, S. Kumar Raja, and H. V. Raghu Ram Dept. of Electrical Engg., Indian Institute of Science Bangalore - 560 012, India

More information

Voice & Speech Based Security System Using MATLAB

Voice & Speech Based Security System Using MATLAB Silvy Achankunju, Chiranjeevi Mondikathi 1 Voice & Speech Based Security System Using MATLAB 1. Silvy Achankunju 2. Chiranjeevi Mondikathi M Tech II year Assistant Professor-EC Dept. silvy.jan28@gmail.com

More information

Image Classification Using Wavelet Coefficients in Low-pass Bands

Image Classification Using Wavelet Coefficients in Low-pass Bands Proceedings of International Joint Conference on Neural Networks, Orlando, Florida, USA, August -7, 007 Image Classification Using Wavelet Coefficients in Low-pass Bands Weibao Zou, Member, IEEE, and Yan

More information

Hands-off Use of Computer towards Universal Access through Voice Control Human-Computer Interface

Hands-off Use of Computer towards Universal Access through Voice Control Human-Computer Interface Hands-off Use of Computer towards Universal Access through Voice Control Human-Computer Interface Dalila Landestoy, Melvin Ayala, Malek Adjouadi, and Walter Tischer Center for Advanced Technology and Education

More information

A novel firing rule for training Kohonen selforganising

A novel firing rule for training Kohonen selforganising A novel firing rule for training Kohonen selforganising maps D. T. Pham & A. B. Chan Manufacturing Engineering Centre, School of Engineering, University of Wales Cardiff, P.O. Box 688, Queen's Buildings,

More information

Computationally Efficient Serial Combination of Rotation-invariant and Rotation Compensating Iris Recognition Algorithms

Computationally Efficient Serial Combination of Rotation-invariant and Rotation Compensating Iris Recognition Algorithms Computationally Efficient Serial Combination of Rotation-invariant and Rotation Compensating Iris Recognition Algorithms Andreas Uhl Department of Computer Sciences University of Salzburg, Austria uhl@cosy.sbg.ac.at

More information

Cluster analysis of 3D seismic data for oil and gas exploration

Cluster analysis of 3D seismic data for oil and gas exploration Data Mining VII: Data, Text and Web Mining and their Business Applications 63 Cluster analysis of 3D seismic data for oil and gas exploration D. R. S. Moraes, R. P. Espíndola, A. G. Evsukoff & N. F. F.

More information

A Survey on Speech Recognition Using HCI

A Survey on Speech Recognition Using HCI A Survey on Speech Recognition Using HCI Done By- Rohith Pagadala Department Of Data Science Michigan Technological University CS5760 Topic Assignment 2 rpagadal@mtu.edu ABSTRACT In this paper, we will

More information

Device Activation based on Voice Recognition using Mel Frequency Cepstral Coefficients (MFCC s) Algorithm

Device Activation based on Voice Recognition using Mel Frequency Cepstral Coefficients (MFCC s) Algorithm Device Activation based on Voice Recognition using Mel Frequency Cepstral Coefficients (MFCC s) Algorithm Hassan Mohammed Obaid Al Marzuqi 1, Shaik Mazhar Hussain 2, Dr Anilloy Frank 3 1,2,3Middle East

More information

CROSS-CORRELATION NEURAL NETWORK: A NEW NEURAL NETWORK CLASSIFIER

CROSS-CORRELATION NEURAL NETWORK: A NEW NEURAL NETWORK CLASSIFIER CROSS-CORRELATION NEURAL NETWORK: A NEW NEURAL NETWORK CLASSIFIER ARIT THAMMANO* AND NARODOM KLOMIAM** Faculty of Information Technology King Mongkut s Institute of Technology Ladkrang, Bangkok, 10520

More information

Training Algorithms for Robust Face Recognition using a Template-matching Approach

Training Algorithms for Robust Face Recognition using a Template-matching Approach Training Algorithms for Robust Face Recognition using a Template-matching Approach Xiaoyan Mu, Mehmet Artiklar, Metin Artiklar, and Mohamad H. Hassoun Department of Electrical and Computer Engineering

More information

1. Introduction. 2. Motivation and Problem Definition. Volume 8 Issue 2, February Susmita Mohapatra

1. Introduction. 2. Motivation and Problem Definition. Volume 8 Issue 2, February Susmita Mohapatra Pattern Recall Analysis of the Hopfield Neural Network with a Genetic Algorithm Susmita Mohapatra Department of Computer Science, Utkal University, India Abstract: This paper is focused on the implementation

More information

Invarianceness for Character Recognition Using Geo-Discretization Features

Invarianceness for Character Recognition Using Geo-Discretization Features Computer and Information Science; Vol. 9, No. 2; 2016 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Science and Education Invarianceness for Character Recognition Using Geo-Discretization

More information

Learning Fuzzy Cognitive Maps by a Hybrid Method Using Nonlinear Hebbian Learning and Extended Great Deluge Algorithm

Learning Fuzzy Cognitive Maps by a Hybrid Method Using Nonlinear Hebbian Learning and Extended Great Deluge Algorithm Learning Fuzzy Cognitive Maps by a Hybrid Method Using Nonlinear Hebbian Learning and Extended Great Deluge Algorithm Zhaowei Ren School of Electronic and Computing Systems University of Cincinnati 600

More information

Implementation of Speech Based Stress Level Monitoring System

Implementation of Speech Based Stress Level Monitoring System 4 th International Conference on Computing, Communication and Sensor Network, CCSN2015 Implementation of Speech Based Stress Level Monitoring System V.Naveen Kumar 1,Dr.Y.Padma sai 2, K.Sonali Swaroop

More information

CHAPTER 8 COMPOUND CHARACTER RECOGNITION USING VARIOUS MODELS

CHAPTER 8 COMPOUND CHARACTER RECOGNITION USING VARIOUS MODELS CHAPTER 8 COMPOUND CHARACTER RECOGNITION USING VARIOUS MODELS 8.1 Introduction The recognition systems developed so far were for simple characters comprising of consonants and vowels. But there is one

More information

: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION

: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION 2006-287: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION Mario Garcia, Texas A&M University-Corpus Christi American Society for Engineering Education, 2006 Page 11.277.1 Biometric Authentication

More information

A Very Low Bit Rate Image Compressor Using Transformed Classified Vector Quantization

A Very Low Bit Rate Image Compressor Using Transformed Classified Vector Quantization Informatica 29 (2005) 335 341 335 A Very Low Bit Rate Image Compressor Using Transformed Classified Vector Quantization Hsien-Wen Tseng Department of Information Management Chaoyang University of Technology

More information

Character Recognition Using Convolutional Neural Networks

Character Recognition Using Convolutional Neural Networks Character Recognition Using Convolutional Neural Networks David Bouchain Seminar Statistical Learning Theory University of Ulm, Germany Institute for Neural Information Processing Winter 2006/2007 Abstract

More information

TEVI: Text Extraction for Video Indexing

TEVI: Text Extraction for Video Indexing TEVI: Text Extraction for Video Indexing Hichem KARRAY, Mohamed SALAH, Adel M. ALIMI REGIM: Research Group on Intelligent Machines, EIS, University of Sfax, Tunisia hichem.karray@ieee.org mohamed_salah@laposte.net

More information

Cryptographic Key Regeneration from Speech

Cryptographic Key Regeneration from Speech , July 3-5, 2013, London, U.K. Cryptographic Key Regeneration from Speech K. Inthavisas and N. Sungprasert Abstract We propose a mapping algorithm using multi-thresholds that are determined by incorporation

More information

SUPPORT VECTOR MACHINES FOR THAI PHONEME RECOGNITION

SUPPORT VECTOR MACHINES FOR THAI PHONEME RECOGNITION International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems Vol. 0, No. 0 (199) 000 000 c World Scientific Publishing Company SUPPORT VECTOR MACHINES FOR THAI PHONEME RECOGNITION NUTTAKORN

More information

User Signature Identification and Image Pixel Pattern Verification

User Signature Identification and Image Pixel Pattern Verification Global Journal of Pure and Applied Mathematics. ISSN 0973-1768 Volume 13, Number 7 (2017), pp. 3193-3202 Research India Publications http://www.ripublication.com User Signature Identification and Image

More information

Prior Knowledge Input Method In Device Modeling

Prior Knowledge Input Method In Device Modeling Turk J Elec Engin, VOL.13, NO.1 2005, c TÜBİTAK Prior Knowledge Input Method In Device Modeling Serdar HEKİMHAN, Serdar MENEKAY, N. Serap ŞENGÖR İstanbul Technical University, Faculty of Electrical & Electronics

More information

Traffic Signs Recognition using HP and HOG Descriptors Combined to MLP and SVM Classifiers

Traffic Signs Recognition using HP and HOG Descriptors Combined to MLP and SVM Classifiers Traffic Signs Recognition using HP and HOG Descriptors Combined to MLP and SVM Classifiers A. Salhi, B. Minaoui, M. Fakir, H. Chakib, H. Grimech Faculty of science and Technology Sultan Moulay Slimane

More information

Neural Network based textural labeling of images in multimedia applications

Neural Network based textural labeling of images in multimedia applications Neural Network based textural labeling of images in multimedia applications S.A. Karkanis +, G.D. Magoulas +, and D.A. Karras ++ + University of Athens, Dept. of Informatics, Typa Build., Panepistimiopolis,

More information

Locating 1-D Bar Codes in DCT-Domain

Locating 1-D Bar Codes in DCT-Domain Edith Cowan University Research Online ECU Publications Pre. 2011 2006 Locating 1-D Bar Codes in DCT-Domain Alexander Tropf Edith Cowan University Douglas Chai Edith Cowan University 10.1109/ICASSP.2006.1660449

More information

Multidirectional 2DPCA Based Face Recognition System

Multidirectional 2DPCA Based Face Recognition System Multidirectional 2DPCA Based Face Recognition System Shilpi Soni 1, Raj Kumar Sahu 2 1 M.E. Scholar, Department of E&Tc Engg, CSIT, Durg 2 Associate Professor, Department of E&Tc Engg, CSIT, Durg Email:

More information

MATLAB Apps for Teaching Digital Speech Processing

MATLAB Apps for Teaching Digital Speech Processing MATLAB Apps for Teaching Digital Speech Processing Lawrence Rabiner, Rutgers University Ronald Schafer, Stanford University GUI LITE 2.5 editor written by Maria d Souza and Dan Litvin MATLAB coding support

More information

CLASSIFICATION OF BOUNDARY AND REGION SHAPES USING HU-MOMENT INVARIANTS

CLASSIFICATION OF BOUNDARY AND REGION SHAPES USING HU-MOMENT INVARIANTS CLASSIFICATION OF BOUNDARY AND REGION SHAPES USING HU-MOMENT INVARIANTS B.Vanajakshi Department of Electronics & Communications Engg. Assoc.prof. Sri Viveka Institute of Technology Vijayawada, India E-mail:

More information

A Combined Method for On-Line Signature Verification

A Combined Method for On-Line Signature Verification BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 14, No 2 Sofia 2014 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2014-0022 A Combined Method for On-Line

More information

Transactions on Information and Communications Technologies vol 16, 1996 WIT Press, ISSN

Transactions on Information and Communications Technologies vol 16, 1996 WIT Press,  ISSN Comparative study of fuzzy logic and neural network methods in modeling of simulated steady-state data M. Järvensivu and V. Kanninen Laboratory of Process Control, Department of Chemical Engineering, Helsinki

More information

Hybrid PSO-SA algorithm for training a Neural Network for Classification

Hybrid PSO-SA algorithm for training a Neural Network for Classification Hybrid PSO-SA algorithm for training a Neural Network for Classification Sriram G. Sanjeevi 1, A. Naga Nikhila 2,Thaseem Khan 3 and G. Sumathi 4 1 Associate Professor, Dept. of CSE, National Institute

More information