By Topic

Biometrics and Kansei Engineering, 2009. ICBAKE 2009. International Conference on

Date 25-28 June 2009

Filter Results

Displaying Results 1 - 25 of 56
  • [Front cover]

    Publication Year: 2009 , Page(s): C1
    Request Permissions | PDF file iconPDF (412 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009 , Page(s): i
    Request Permissions | PDF file iconPDF (63 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009 , Page(s): iii
    Request Permissions | PDF file iconPDF (110 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009 , Page(s): iv
    Request Permissions | PDF file iconPDF (119 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009 , Page(s): v - viii
    Request Permissions | PDF file iconPDF (156 KB)  
    Freely Available from IEEE
  • Message from General Chairs

    Publication Year: 2009 , Page(s): ix
    Request Permissions | PDF file iconPDF (76 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Conference Officers

    Publication Year: 2009 , Page(s): x - xi
    Request Permissions | PDF file iconPDF (193 KB)  
    Freely Available from IEEE
  • International Scientific Committee

    Publication Year: 2009 , Page(s): xii
    Request Permissions | PDF file iconPDF (100 KB)  
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009 , Page(s): xiii
    Request Permissions | PDF file iconPDF (71 KB)  
    Freely Available from IEEE
  • Plenery abstracts

    Publication Year: 2009
    Request Permissions | Click to expandAbstract | PDF file iconPDF (223 KB)  

    Summary form only given, as follows. In this paper, we will discuss about the intelligent multi-agent based health information system. The multi-agent concept is varied from 2 or 3 agents to many agents. Therefore, to construct the appropriate concept which you want to implement is more important. In this paper, we will discuss about the concept of multi-agent, and discuss some application areas o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Outliers in Biometrical Data - Two Real Examples of Analysis

    Publication Year: 2009 , Page(s): 1 - 6
    Request Permissions | Click to expandAbstract | PDF file iconPDF (400 KB) |  | HTML iconHTML  

    The problem of finding and identifying outliers in multivariate measurement data is as old as the data analysis itself. The question: "what is an outlier" has many answers, is is especially difficult when considering high-dimensional data. In the paper a search for outliers in two real data sets is shown. It is stressed that identifying outliers should not be done on the basis of asymptotical cuto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent Multi-agent Based Health Information System

    Publication Year: 2009 , Page(s): 7 - 11
    Request Permissions | Click to expandAbstract | PDF file iconPDF (286 KB) |  | HTML iconHTML  

    In this paper, we will discuss about the intelligent multi-agent based health information system. The multi-agent concept is varied from 2 or 3 agents to many agents. Therefore, to construct the appropriate concept which you want to implement is more important. In this paper, we will discuss about the concept of multi-agent, and discuss some application areas of fuzzy logic based multi-agent, espe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-objective Evolutionary Approach for Biometric Fusion

    Publication Year: 2009 , Page(s): 12 - 17
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (418 KB) |  | HTML iconHTML  

    A noticeable amount of research has been focused on biometric fusion. A new area is looking at utilization of AdaBoost-type learning methods in biometric fusion domain. These methods rely on an idea that by selecting a variety of biometric classifiers the error rate can be reduced. This paper presents a new evolutionary algorithm based on the multi-objective genetic approach, which automatically p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applicability of F-value to Classification Problems with a Numerous Number of Explanatory Variables: Toward Classification Problems in Biometric and Kansei Engineering

    Publication Year: 2009 , Page(s): 18 - 21
    Request Permissions | Click to expandAbstract | PDF file iconPDF (499 KB) |  | HTML iconHTML  

    F-value is a statistics which estimates a significance of variables participating discriminant efficiency. It has been used in statistical discriminant analysis. However, it seems a few investigations on real problems which must cope with a numerous number of explanatory variables amount to tens of thousands. In such cases, it becomes important to extract useful variables for classification from a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Biometric Identification Using the Motion of Fingers

    Publication Year: 2009 , Page(s): 22 - 27
    Request Permissions | Click to expandAbstract | PDF file iconPDF (437 KB) |  | HTML iconHTML  

    We propose a new method of biometric identification using the bending motion of fingers that is one of the highest repeated motions of the body. Forefingers consist of hinge joints that enable them to move in one direction only. They also have a tendon that helps the first joint of the finger move in tandem with the second joint. It causes high repeatability. In the algorithm, curvature, one of th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Voice as a Key

    Publication Year: 2009 , Page(s): 28 - 33
    Request Permissions | Click to expandAbstract | PDF file iconPDF (4960 KB) |  | HTML iconHTML  

    Biometric methods numerous advantages are known very well for every computer security specialist and are in general highly valued. One of the most interesting methods used for biometric protection of computer system (and other objects) is speech parameters extraction, analysis and recognition. Problem under consideration is concentrated on methods showing, how to distinguish between voices of part... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Authorship Invarianceness for Writer Identification

    Publication Year: 2009 , Page(s): 34 - 39
    Request Permissions | Click to expandAbstract | PDF file iconPDF (368 KB) |  | HTML iconHTML  

    The uniqueness of shape and style of handwriting can be used for authorpsilas authentication. Acquiring individual features to obtain authorship invariance-ness concept have led to an important research in writer identification domain. This paper discusses the investigation of this concept by extracting individual features using geometric moment function. Experiment results have shown that handwri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Face-Based Access Control and Invigilation Tool for E-learning Systems

    Publication Year: 2009 , Page(s): 40 - 44
    Request Permissions | Click to expandAbstract | PDF file iconPDF (857 KB) |  | HTML iconHTML  

    Knowledge is a key factor to the personal success. Further, the certifications are the instant tools that are commonly available to assess the personal success. In an e-Learning environment, where the learning projects are delivered with the aim to provide a professional or an academic certification, it is integral that the Learning Management Systems provide security features that will ensure the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vowels in Speaker Verification

    Publication Year: 2009 , Page(s): 45 - 48
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (424 KB) |  | HTML iconHTML  

    In the paper the possibility of using a single vowel in peoplespsila identity verification process is described. The usage of sounds which period do not change over the whole duration time, allows applying Fourier series to its analysis. The amplitudes of consecutive harmonics as well as their frequencies are the basis of creating individual featurespsila vector. In order to record sounds of such ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Immune Approach to Recognition of Handwritten Words

    Publication Year: 2009 , Page(s): 49 - 54
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (342 KB) |  | HTML iconHTML  

    This paper presents an immune-based approach to recognition of handwritten words, or more generally, to binary classification. It is inspired by the negative selection mechanism attending the discrimination between self and nonself molecules in living organisms. Our approach incorporates two types of detectors: binary and real-valued. Relatively short binary detectors are used for primary detectio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Iris-Based Person Identification Using Gabor Wavelets and Moments

    Publication Year: 2009 , Page(s): 55 - 59
    Cited by:  Papers (5)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (331 KB) |  | HTML iconHTML  

    In this paper, we presented an iris recognition algorithm based on Gabor wavelets and invariant moments. The proposed system includes three modules: image preprocessing, feature extraction, and recognition modules. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Normalization Impact on SVD-Based Iris Recognition

    Publication Year: 2009 , Page(s): 60 - 64
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (4152 KB) |  | HTML iconHTML  

    In this paper, we compare the performance of singular value decomposition for the recognition of human irises based for both unmodified irises and their normalized versions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Biometric Passport: The Technical Requirements and Possibilities of Using

    Publication Year: 2009 , Page(s): 65 - 69
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (332 KB) |  | HTML iconHTML  

    This paper discusses the requirements, national regulations, and application requirements to introduction of a new biometric passport in the European Union (EU), especially in the Republic of Poland. The biometric passport is sometimes called e-passport. The biometric systems depend highly on the existing hardware biometrical technologies and its software components. Some important national soluti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User Authentication with Keystroke Dynamics Using Fixed Text

    Publication Year: 2009 , Page(s): 70 - 75
    Cited by:  Papers (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (471 KB) |  | HTML iconHTML  

    User authentication is an important problem for any restricted access computer system, especially with remote access. Constant spread of Internet makes efficient remote authentication a pressing issue while the distributed nature of interaction introduces additional difficulties. Authentication methods based on most biometrics techniques require dedicated hardware that is unhandy for remote applic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Driving Style Identification Method Based on Speed Graph Analysis

    Publication Year: 2009 , Page(s): 76 - 79
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (717 KB) |  | HTML iconHTML  

    In the paper presented results of analyzing driver's speed profile treated as a criterion of behavioral biometric. As an input data records registered on tachograph paper disk were used. Driving dynamic features such as speed and acceleration distribution in the specific time intervals were determined and compared. Shown that driving style analysis can be also used for person psycho-physiological ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.