SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
Network and Complex Systems                                                                                www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.4, 2012


  Comparison of Different Neural Networks for Iris Recognition: A
                                                       Review
                                           Shivani Godara*, Dr. Rajeev Gupta
                               UCE, Rajasthan Technical University, Kota 324010, India
                           * E-mail of the corresponding author: shivanigodara48@gmail.com


Abstract
Biometrics is the science of verifying the identity of an individual through physiological measurements or behavioral
traits. Since biometric identifiers are associated permanently with the user they are more reliable than token or
knowledge based authentication methods. Among all the biometric modalities, iris has emerged as a popular choice
due to its variability, stability and security. In this paper, we are presenting the various iris recognition techniques and
its learning algorithm with neural network. Implementation of various techniques can be standardized on dedicated
architectures and learning algorithm. It has been observed that SOM has stronger adaptive capacity and robustness.
HSOM, which is based on hamming distance, has improved accuracy over LSOM. SANN model is more suitable in
measuring the shape similarity, while cascaded FFBPNN are more reliable and efficient method for iris recognition.
Key words: Biometrics, Iris recognition, Artificial Neural Networks.


1. Introduction
Iris Recognition is usually known as eye iris network pattern recognition technology. The technique uses human's iris
network features map information. This is used as a special and auto-recognizable identity card inputting the computer
using Computer Science Technology and Imaging Technique. A typical iris recognition system includes four
proceedings iris collection, pretreatment, feature extraction and pattern classification respectively. During last decade,
numerous attempts have been made to apply Artificial Neural Networks for iris recognition. The Self-adaptive neural
networks, SOM-NN & ICA [2], LSOM, HSOM ,Feed forward back propagation, Cascade forward back propagation,
feed-forward multi-layer perceptron artificial neural network[9], feed-forward multi-layer perceptron artificial neural
network with feature extraction through Hough transform[6] are some of the techniques used for feature extraction.


2. Self Organizing Maps (SOM)
The principal goal of the SOM algorithm is to transform high-dimensional input patterns into a one or two-dimensional
discrete map and to perform this transformation adaptively in a topological ordered fashion. In pattern recognition, the
Self-Organizing Map (SOM) also called as Kohonen network [1], [2] performs a high quality classification. Assigning
the similar input vectors to the same neuron or to neighbor neurons. Thus, this network transforms the relation of
similarity between input vectors into a relation of neighborhood of the neurons. The map uses the competition



                                                             8
Network and Complex Systems                                                                             www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.4, 2012

principle, by evaluating the distances between the input vector and the weight vectors corresponding to each neuron,
instead of using the classical Euclidean distance.




                                     Fig 1- Architecture of the SOM


3. Levensthein Self-Organizing Map (LSOM)
The LSOM is a SOM based on the Levensthein metrics. LSOM uses a symbolic representation for both the input and
also for the weight rows. Here the inputs and the weights of the LSOM are represented into a symbolic form where as
SOM uses numerical form. For the LSOM, eliminate the condition that the two representations used in the competition
phase to have the same length. Instead of evaluating the Euclidean distance between two real vectors, belonging to the
same space (for the case of conventional SOM), evaluate the weighted Levensthein distance between two rows of
symbols with different lengths, for the LSOM. The LSOM uses the competition principle (like SOM). One computes
the Levensthein distances between the input row of symbols and all the rows of weights corresponding to the network
neurons. The winner is the neuron that minimizes the above distances.
The training algorithm for LSOM is the following:
   i.    Initialize the weights of the LSOM.
   ii.   Apply one by one the words (expressions) belonging to the training set. For each of them, compute the winner
         neuron, by minimizing the Levenshein distance between the input word and all the weight rows
         corresponding to the LSOM neurons. Make identical the weight row of the winner neuron with that of the
         input word (corresponding row). Refine the weight rows of the neurons belonging to the neighborhood of the
         winner by performing the elementary operations of substitution, insertion and deletion. This is used in order to
         reduce their Levensthein distances to the input word but not to make them zero. The reduction of the
         Levensthein distance is a function of the neuron position regarding the winner. This reduction increases when
         the Euclidean distance (in the map co-ordinates) between the corresponding neuron and the winner neuron
         decreases.
  iii.   Compute the classification error as a sum of all the minimum Levenshein distances of the words (expressions)
         belonging to the training lot. Such a distance is the minimum of the distances between the corresponding
         input word and the weight rows of the LSOM neurons.
  iv.    Test the stop condition (if the classification error is-zero).


                                                             9
Network and Complex Systems                                                                             www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.4, 2012




                                  Fig 2: The circular architecture of the LSOM


4. Hamming Self-Organizing Map (HSOM)
SOM variant based on Hamming metric, called Hamming Self-Organizing Map (HSOM). It can be considered as a
particular case of the previous LSOM. Both the input vector elements and the weights of the HSOM are represented as
binary integers “0” or “1”. The HSOM is based on hamming distance. Assuming two binary vectors, A=( a1, a2, …,
an)t, B=( b1, b2, …, bn)t; where ai, bi є {0, 1}, the Hamming distance between A and B is DH (A, B) = Σ(ai –
bi). Consequently, the Hamming distance between the input vector X and the weight vector Wj of the jth neuron in the
competitive layer is calculated by the equation DH(X, Wj) = bit count{ xi XOR wji }. DH(X, Wj) = bit count {(xi ^ wji)
V (xi ^ wji). here, i = {1,…, n}, j= {1, …, M}; M = number of output neurons. The HSOM uses the competition
principle (like SOM). One computes the Hamming distances between the binary input vector and all the binary weight
vectors. The winner is the neuron that minimizes the above distances c = j argmin {DH(X, Wj)}. To update the binary
weight vectors of HSOM, firstly compute exclusive-OR (XOR) of each element of X and Wj. If XOR (xi, wji) = 1,
then wji is a candidate for inversion. The number of inverted bits (belonging to the weight vector Wj) is defined as a
learning rate; it gradually decreases as learning progresses.


5. Self Adaptive Neural Network (SANN)
SANN uses the combination of the information related to both the shape and magnitude of the data. This implements
new similarity matching criteria and error accumulation strategies for network growth. The SANN model is randomly
initialized with four neurons. Such an initial structure allows the network to grow in any direction solely depending on
the input data. Once the network has been initialized, each input sample xi is sequentially presented and each
presentation involves the following two basic operations:
   i.    Finding the winning neuron for each input sample; and
  ii.    Updating the weights associated with both the winning neuron and its topological neighbors. Determining a
         winning neuron for each input data sample is the fundamental process for SANN models. Euclidean
         distance-based approaches are perhaps the most widely used matching criterion in the development of SANN
         models. Initialization: let's start the network with four neurons on a 2D grid Initialize each neuron with
         random values.

                                                            10
Network and Complex Systems                                                                               www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.4, 2012

 iii.    Repeat growing for each learning cycle.
  iv.    Select a sample xi, from the input dataset and Compute the distance between the input sample, xi, and each
         neuron, wj.
   v.    Find the winning neuron using the minimum-distance criterion and then update the weights of the winning
         neuron and its neighbors.
  vi.    Increase the error value of the winner and find a neuron with the highest cumulative deviation and initiate the
         growth of new neurons.
 vii.    Until stopping criterion is satisfied. The learning process is normally stopped when computational bounds,
         such as the number of learning epochs exceed or when the quantization error of neurons in the network fall
         below a given threshold.
viii.    Repeat smoothing for each learning cycle, Present each input sample and determine the winning neuron.
  ix.    Update the weights of the winner and its immediate neighbors, until the error values of the neurons become
         very small or computational bounds are exceeded.




Fig 3: New neurons generation process for the proposed SANN model. (a) The topology before generation, (b) the
accumulation of errors during learning process, the neuron marked with a filled circle has the highest cumulative error
after a learning epoch, (c) neuron growth on all free neighboring positions. The neurons marked with shaded circle are
newly generated.


6. Feed & Cascade – Forward Back Propagation
Feed – Forward Back propagation neural network (FFBPNN) and Cascade Forward Back propagation neural network
(CFBPNN) shown in Figs. [4]. A FFBPNN and CFBPNN have three layers: an input layer, hidden layer and an output
layer. The neurons in the input layer only act as buffer for distributing the input signals to neuron in hidden layer. Each
neuron in hidden layer sums up its input signal after weighting them and computes it outputs. Training a network
consists of adjusting its weights using learning algorithms.




                                                            11
Network and Complex Systems                                                                            www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.4, 2012




7. Feed Forward Multilayer Perceptron Artificial Neural Network
A feed forward multilayer perceptron (MLP) artificial neural network is used to form the match decision. The error
back-propagation training algorithm used to adjust the internal neural network weights. Since a typical multilayer
perceptron neural network produces a class membership decision as an output, the maximally responding output node
represents the class membership of the input pattern. To achieve a more descriptive comparison to the previously
described distance metrics, it is desirable that the neural network produce a distance value as an output. For iris
template matching, this distance value would represent a similarity score between two iris templates. One of the output
nodes was removed, leaving one remaining output node which represents a similarity measurement. The sigmoid
function on the remaining output node was also removed. The purpose of the output sigmoid function was to force and
limit the output values to one or negative one. Removing the sigmoid function allowed the neural network to output

                                                          12
Network and Complex Systems                                                                               www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.4, 2012

numerical values that represent the degree to which it determined two iris templates match. This numerical value can
be considered a similarity score between two iris templates and will be called the neural network distance. As with the
other distance metrics, a smaller number from the neural network metric denotes a greater similarity between two
templates. Accuracy results, identical to those presented in this paper, could be achieved by simply training and
executing the unmodified neural network. A neural network with a large number of hidden nodes has the ability to
memorize input data points that are statistical outliers. Another issue is computational efficiency. A neural network
with a large number of hidden nodes can be computationally expensive to execute over a large database.




8. Feed Forward Neural Network (FFNN) using Hough Transform
In FFNN information flows in forward direction. Signal flows from the input nodes to output nodes through the hidden
nodes. For training of the network, training data is fed into the input layers to output layer though hidden layers which
are adjusted to fit the data points to the curve. This is known as forward back propagation algorithm. Input data
received by hidden layers which are multiplexed with appropriate weights and summed. It’s a hidden layer output
which is non linear transformation of the resulting sum. At the output layer same operation is performed finally output
values are compared with target value. The error between two is propagated back towards the hidden layer. This is the
backward pass of the back propagation algorithm. The procedure is repeated to get the desired accuracy. Hough
Transform being the most efficient techniques is used to identify positions of arbitrary shapes most commonly circles
and ellipses. The purpose of this technique is to find imperfect instances of objects in a parameter space within a certain
class of shapes by a voting procedure. This voting procedure is carried out in a parameter space, from which object
candidates are obtained as local maxima in a so-called accumulator space that is explicitly constructed by the algorithm
for computing the Hough transform. The local maxima obtained from the accumulator array are used in training of
back propagation neural network.


9. Conclusion
In this paper, we have discussed various up-to-date neural network architectures for iris recognition. These include
direct development of neural learning algorithms for iris recognition. Theoretically, all the existing iris recognition
algorithms can be possibly implemented by modified neural networks such as SOM with ICA, Levensthein
Self-organizing Map (LSOM), Hamming Self-Organizing Map (HSOM)[3], Feed forward back propagation neural
network, cascade forward back propagation and Self Adaptive neural network (SANN). One of the advantages of
doing so is that implementation of Redundancy of feature space. It is also used for iris classification and recognition.
Various techniques can be standardized on dedicated architectures and learning algorithm. Extensive evaluation and
assessment for a wide range of different techniques and algorithms can be conveniently carried out on generalized
neural networks. An Iris Recognition Algorithm Based on ICA and SOM Neural Network almost remove the
redundancy of feature space. It is also used for iris classification and recognition. ICA and SOM neural network has
stronger adaptive capacity and robustness but as the neural network has many inherent defect such as convergence
slow rate, easy to relapse into local minimum, large quantity of parametric and parameter determination need to be
from experience and so on, and original neural network need be trained again after addition sample into iris database,

                                                            13
Network and Complex Systems                                                                            www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.4, 2012

this method need to improve further. Due to this two variant [LSOM & HSOM] of SOM comes into picture.
Levensthein Self-organizing Map (LSOM) uses the weighted Levensthein distance between two rows of symbols with
different lengths while SOM variant, Hamming Self-Organizing Map (HSOM) uses the specific Hamming distance in
the competition phase. Trained SOM is not able to accurately represent the input space. So to overcome this limitation
SANN models are used, where each training sample is presented multiple times and the desired performance can only
be achieved after gradual adaptation of weights associated with each neuron that may influence the selection of
learning models. This may affect the performance of the model in large-scale applications. SANN model would be
more suitable when there is a need to include the magnitude information in measuring the shape similarity. Some other
networks like Feed forward back propagation neural network, cascade forward back propagation network (CFFBPN))
are also used for the iris recognition. In these algorithms, error signal is calculated between output layer and target
value, and this error signal will move-back to hidden layers to improve the performance. This evaluation and
comparison among them indicate that the cascaded FFBPNN are reliable and efficient method for iris recognition.
Various techniques can be standardized on dedicated architectures and learning algorithm. Extensive evaluation and
assessment for a wide range of different techniques and algorithms can be conveniently carried out on generalized
neural networks. An Iris Recognition Algorithm Based on ICA and SOM Neural Network almost remove the


References


M. Gopikrishnan, T.Santhanam (2011), ‘Effect of different neural network on the accuracy in iris patterns recognition’,
International Journal of Reviews in Computing, Vol. 7.
Bo Lu1, Jing-jing Wu, Yu Wang (2010), ‘An iris recognition algorithm based on ICA and SOM neural network’, CISP,
pp 2246-2448.
Victor-emil Neagoe (2007), ‘New self-organizing maps with non-conventional metrics and their applications for iris
recognition and automatic translation’, proce 11th WSEAS International Conference on computers, Greece, pp
145-151.
Huiru Zheng, Haiying Wang (2011), ‘Improving pattern discovery and visualisation with self-adaptive neural
networks through data transformations’, Springer.
Venkata Rama Prasad Vaddella, Kurupati Rama (2009-2010), ‘artificial neural networks for compression of digital
images: a review’, IJRIC& LLS, pp 75-82.
Shylaja S.S., K.N.Balasubramanya, Murthy, S. Nataranjan, Nisecheth, Muthuraj R.,Ajay S(2011), ‘Feed forward
neural network based eye localization and recognition using hough transform’, IJACSA Vol. 2,No. 3.
Mr.Amir M.Usman Wagdarikar, Mr.Patil B.G, Mrs. Dr. Shaila subbaraman(2010), ‘Performance Evalution of IRIS
Recognition Algorithms using Neural Network Classifier’, IEEE,pp 146-149.
Thomas Heseltine, Nick Pears, Jim Austin, Zezhi Chen (2003), ‘Face Recognition: A Comparison of
Appearance-Based Approaches’, Proc. VIIth Digital Image Computing: Techniques and Applications, Sun C., Talbot
H., Ourselin S. and Adriaansen T. (Eds.), Sydney, pp 50-69.
M. Gopikrishnan, T.Santhanam (2010-2011), ‘Improved biometric recognition and indetification of human iris
patterns using neural networks’, JATIT & LLS, Vol. 31.
                                                          14
This academic article was published by The International Institute for Science,
Technology and Education (IISTE). The IISTE is a pioneer in the Open Access
Publishing service based in the U.S. and Europe. The aim of the institute is
Accelerating Global Knowledge Sharing.

More information about the publisher can be found in the IISTE’s homepage:
http://www.iiste.org


The IISTE is currently hosting more than 30 peer-reviewed academic journals and
collaborating with academic institutions around the world. Prospective authors of
IISTE journals can find the submission instruction on the following page:
http://www.iiste.org/Journals/

The IISTE editorial team promises to the review and publish all the qualified
submissions in a fast manner. All the journals articles are available online to the
readers all over the world without financial, legal, or technical barriers other than
those inseparable from gaining access to the internet itself. Printed version of the
journals is also available upon request of readers and authors.

IISTE Knowledge Sharing Partners

EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar

Contenu connexe

Tendances

Neural Networks: Self-Organizing Maps (SOM)
Neural Networks:  Self-Organizing Maps (SOM)Neural Networks:  Self-Organizing Maps (SOM)
Neural Networks: Self-Organizing Maps (SOM)Mostafa G. M. Mostafa
 
Image Recognition With the Help of Auto-Associative Neural Network
Image Recognition With the Help of Auto-Associative Neural NetworkImage Recognition With the Help of Auto-Associative Neural Network
Image Recognition With the Help of Auto-Associative Neural NetworkCSCJournals
 
Objective Evaluation of a Deep Neural Network Approach for Single-Channel Spe...
Objective Evaluation of a Deep Neural Network Approach for Single-Channel Spe...Objective Evaluation of a Deep Neural Network Approach for Single-Channel Spe...
Objective Evaluation of a Deep Neural Network Approach for Single-Channel Spe...csandit
 
Application of artificial_neural_network
Application of artificial_neural_networkApplication of artificial_neural_network
Application of artificial_neural_networkgabo GAG
 
Colour Image Segmentation Using Soft Rough Fuzzy-C-Means and Multi Class SVM
Colour Image Segmentation Using Soft Rough Fuzzy-C-Means and Multi Class SVM Colour Image Segmentation Using Soft Rough Fuzzy-C-Means and Multi Class SVM
Colour Image Segmentation Using Soft Rough Fuzzy-C-Means and Multi Class SVM ijcisjournal
 
Introduction to Applied Machine Learning
Introduction to Applied Machine LearningIntroduction to Applied Machine Learning
Introduction to Applied Machine LearningSheilaJimenezMorejon
 
Adaptive Neuro-Fuzzy Inference System based Fractal Image Compression
Adaptive Neuro-Fuzzy Inference System based Fractal Image CompressionAdaptive Neuro-Fuzzy Inference System based Fractal Image Compression
Adaptive Neuro-Fuzzy Inference System based Fractal Image CompressionIDES Editor
 
Exploiting Dissimilarity Representations for Person Re-Identification
Exploiting Dissimilarity Representations for Person Re-IdentificationExploiting Dissimilarity Representations for Person Re-Identification
Exploiting Dissimilarity Representations for Person Re-IdentificationRiccardo Satta
 
Handwritten Digit Recognition
Handwritten Digit RecognitionHandwritten Digit Recognition
Handwritten Digit Recognitionijtsrd
 
Paper id 26201482
Paper id 26201482Paper id 26201482
Paper id 26201482IJRAT
 
Convolution Neural Networks
Convolution Neural NetworksConvolution Neural Networks
Convolution Neural NetworksAhmedMahany
 
Parallel wisard object tracker a rambased tracking system
Parallel wisard object tracker a rambased tracking systemParallel wisard object tracker a rambased tracking system
Parallel wisard object tracker a rambased tracking systemcseij
 
ADFUNN
ADFUNNADFUNN
ADFUNNadfunn
 
Kohonen self organizing maps
Kohonen self organizing mapsKohonen self organizing maps
Kohonen self organizing mapsraphaelkiminya
 
Handwritten digits recognition report
Handwritten digits recognition reportHandwritten digits recognition report
Handwritten digits recognition reportSwayamdipta Saha
 
nural network ER. Abhishek k. upadhyay
nural network ER. Abhishek  k. upadhyaynural network ER. Abhishek  k. upadhyay
nural network ER. Abhishek k. upadhyayabhishek upadhyay
 

Tendances (20)

Neural Networks: Self-Organizing Maps (SOM)
Neural Networks:  Self-Organizing Maps (SOM)Neural Networks:  Self-Organizing Maps (SOM)
Neural Networks: Self-Organizing Maps (SOM)
 
Image Recognition With the Help of Auto-Associative Neural Network
Image Recognition With the Help of Auto-Associative Neural NetworkImage Recognition With the Help of Auto-Associative Neural Network
Image Recognition With the Help of Auto-Associative Neural Network
 
Objective Evaluation of a Deep Neural Network Approach for Single-Channel Spe...
Objective Evaluation of a Deep Neural Network Approach for Single-Channel Spe...Objective Evaluation of a Deep Neural Network Approach for Single-Channel Spe...
Objective Evaluation of a Deep Neural Network Approach for Single-Channel Spe...
 
Application of artificial_neural_network
Application of artificial_neural_networkApplication of artificial_neural_network
Application of artificial_neural_network
 
Colour Image Segmentation Using Soft Rough Fuzzy-C-Means and Multi Class SVM
Colour Image Segmentation Using Soft Rough Fuzzy-C-Means and Multi Class SVM Colour Image Segmentation Using Soft Rough Fuzzy-C-Means and Multi Class SVM
Colour Image Segmentation Using Soft Rough Fuzzy-C-Means and Multi Class SVM
 
Introduction to Applied Machine Learning
Introduction to Applied Machine LearningIntroduction to Applied Machine Learning
Introduction to Applied Machine Learning
 
Adaptive Neuro-Fuzzy Inference System based Fractal Image Compression
Adaptive Neuro-Fuzzy Inference System based Fractal Image CompressionAdaptive Neuro-Fuzzy Inference System based Fractal Image Compression
Adaptive Neuro-Fuzzy Inference System based Fractal Image Compression
 
Exploiting Dissimilarity Representations for Person Re-Identification
Exploiting Dissimilarity Representations for Person Re-IdentificationExploiting Dissimilarity Representations for Person Re-Identification
Exploiting Dissimilarity Representations for Person Re-Identification
 
Handwritten Digit Recognition
Handwritten Digit RecognitionHandwritten Digit Recognition
Handwritten Digit Recognition
 
vol.4.1.2.july.13
vol.4.1.2.july.13vol.4.1.2.july.13
vol.4.1.2.july.13
 
50120140501009
5012014050100950120140501009
50120140501009
 
O18020393104
O18020393104O18020393104
O18020393104
 
Paper id 26201482
Paper id 26201482Paper id 26201482
Paper id 26201482
 
Convolution Neural Networks
Convolution Neural NetworksConvolution Neural Networks
Convolution Neural Networks
 
Parallel wisard object tracker a rambased tracking system
Parallel wisard object tracker a rambased tracking systemParallel wisard object tracker a rambased tracking system
Parallel wisard object tracker a rambased tracking system
 
ADFUNN
ADFUNNADFUNN
ADFUNN
 
Kohonen self organizing maps
Kohonen self organizing mapsKohonen self organizing maps
Kohonen self organizing maps
 
Intoduction to Neural Network
Intoduction to Neural NetworkIntoduction to Neural Network
Intoduction to Neural Network
 
Handwritten digits recognition report
Handwritten digits recognition reportHandwritten digits recognition report
Handwritten digits recognition report
 
nural network ER. Abhishek k. upadhyay
nural network ER. Abhishek  k. upadhyaynural network ER. Abhishek  k. upadhyay
nural network ER. Abhishek k. upadhyay
 

Similaire à Neural Networks for Iris Recognition

Wireless Sensor Network using Particle Swarm Optimization
Wireless Sensor Network using Particle Swarm OptimizationWireless Sensor Network using Particle Swarm Optimization
Wireless Sensor Network using Particle Swarm Optimizationidescitation
 
International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)ijcseit
 
AN IMPROVED MULTI-SOM ALGORITHM
AN IMPROVED MULTI-SOM ALGORITHMAN IMPROVED MULTI-SOM ALGORITHM
AN IMPROVED MULTI-SOM ALGORITHMIJNSA Journal
 
AN IMPROVED MULTI-SOM ALGORITHM
AN IMPROVED MULTI-SOM ALGORITHMAN IMPROVED MULTI-SOM ALGORITHM
AN IMPROVED MULTI-SOM ALGORITHMIJNSA Journal
 
Particle Swarm Optimization Based QoS Aware Routing for Wireless Sensor Networks
Particle Swarm Optimization Based QoS Aware Routing for Wireless Sensor NetworksParticle Swarm Optimization Based QoS Aware Routing for Wireless Sensor Networks
Particle Swarm Optimization Based QoS Aware Routing for Wireless Sensor Networksijsrd.com
 
Adaptive and online one class support vector machine-based outlier detection
Adaptive and online one class support vector machine-based outlier detectionAdaptive and online one class support vector machine-based outlier detection
Adaptive and online one class support vector machine-based outlier detectionNguyen Duong
 
Resource aware and reliable cluster based communication scheme for wireless b...
Resource aware and reliable cluster based communication scheme for wireless b...Resource aware and reliable cluster based communication scheme for wireless b...
Resource aware and reliable cluster based communication scheme for wireless b...IAEME Publication
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...IRJET Journal
 
An ann approach for network
An ann approach for networkAn ann approach for network
An ann approach for networkIJNSA Journal
 
20551-38919-2-PB.pdf
20551-38919-2-PB.pdf20551-38919-2-PB.pdf
20551-38919-2-PB.pdfIjictTeam
 
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...IJNSA Journal
 
Accurate indoor positioning system based on modify nearest point technique
Accurate indoor positioning system based on modify nearest point techniqueAccurate indoor positioning system based on modify nearest point technique
Accurate indoor positioning system based on modify nearest point techniqueIJECEIAES
 
Spatial correlation based clustering algorithm for random and uniform topolog...
Spatial correlation based clustering algorithm for random and uniform topolog...Spatial correlation based clustering algorithm for random and uniform topolog...
Spatial correlation based clustering algorithm for random and uniform topolog...eSAT Publishing House
 
NEURALNETWORKS_DM_SOWMYAJYOTHI.pdf
NEURALNETWORKS_DM_SOWMYAJYOTHI.pdfNEURALNETWORKS_DM_SOWMYAJYOTHI.pdf
NEURALNETWORKS_DM_SOWMYAJYOTHI.pdfSowmyaJyothi3
 
Word Recognition in Continuous Speech and Speaker Independent by Means of Rec...
Word Recognition in Continuous Speech and Speaker Independent by Means of Rec...Word Recognition in Continuous Speech and Speaker Independent by Means of Rec...
Word Recognition in Continuous Speech and Speaker Independent by Means of Rec...CSCJournals
 
Ameliorate the performance using soft computing approaches in wireless networks
Ameliorate the performance using soft computing approaches  in wireless networksAmeliorate the performance using soft computing approaches  in wireless networks
Ameliorate the performance using soft computing approaches in wireless networksIJECEIAES
 
NEURAL NETWORK FOR THE RELIABILITY ANALYSIS OF A SERIES - PARALLEL SYSTEM SUB...
NEURAL NETWORK FOR THE RELIABILITY ANALYSIS OF A SERIES - PARALLEL SYSTEM SUB...NEURAL NETWORK FOR THE RELIABILITY ANALYSIS OF A SERIES - PARALLEL SYSTEM SUB...
NEURAL NETWORK FOR THE RELIABILITY ANALYSIS OF A SERIES - PARALLEL SYSTEM SUB...IAEME Publication
 

Similaire à Neural Networks for Iris Recognition (20)

Wireless Sensor Network using Particle Swarm Optimization
Wireless Sensor Network using Particle Swarm OptimizationWireless Sensor Network using Particle Swarm Optimization
Wireless Sensor Network using Particle Swarm Optimization
 
Bz02516281633
Bz02516281633Bz02516281633
Bz02516281633
 
International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)
 
AN IMPROVED MULTI-SOM ALGORITHM
AN IMPROVED MULTI-SOM ALGORITHMAN IMPROVED MULTI-SOM ALGORITHM
AN IMPROVED MULTI-SOM ALGORITHM
 
AN IMPROVED MULTI-SOM ALGORITHM
AN IMPROVED MULTI-SOM ALGORITHMAN IMPROVED MULTI-SOM ALGORITHM
AN IMPROVED MULTI-SOM ALGORITHM
 
Particle Swarm Optimization Based QoS Aware Routing for Wireless Sensor Networks
Particle Swarm Optimization Based QoS Aware Routing for Wireless Sensor NetworksParticle Swarm Optimization Based QoS Aware Routing for Wireless Sensor Networks
Particle Swarm Optimization Based QoS Aware Routing for Wireless Sensor Networks
 
Adaptive and online one class support vector machine-based outlier detection
Adaptive and online one class support vector machine-based outlier detectionAdaptive and online one class support vector machine-based outlier detection
Adaptive and online one class support vector machine-based outlier detection
 
Resource aware and reliable cluster based communication scheme for wireless b...
Resource aware and reliable cluster based communication scheme for wireless b...Resource aware and reliable cluster based communication scheme for wireless b...
Resource aware and reliable cluster based communication scheme for wireless b...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
O026084087
O026084087O026084087
O026084087
 
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
 
An ann approach for network
An ann approach for networkAn ann approach for network
An ann approach for network
 
20551-38919-2-PB.pdf
20551-38919-2-PB.pdf20551-38919-2-PB.pdf
20551-38919-2-PB.pdf
 
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
 
Accurate indoor positioning system based on modify nearest point technique
Accurate indoor positioning system based on modify nearest point techniqueAccurate indoor positioning system based on modify nearest point technique
Accurate indoor positioning system based on modify nearest point technique
 
Spatial correlation based clustering algorithm for random and uniform topolog...
Spatial correlation based clustering algorithm for random and uniform topolog...Spatial correlation based clustering algorithm for random and uniform topolog...
Spatial correlation based clustering algorithm for random and uniform topolog...
 
NEURALNETWORKS_DM_SOWMYAJYOTHI.pdf
NEURALNETWORKS_DM_SOWMYAJYOTHI.pdfNEURALNETWORKS_DM_SOWMYAJYOTHI.pdf
NEURALNETWORKS_DM_SOWMYAJYOTHI.pdf
 
Word Recognition in Continuous Speech and Speaker Independent by Means of Rec...
Word Recognition in Continuous Speech and Speaker Independent by Means of Rec...Word Recognition in Continuous Speech and Speaker Independent by Means of Rec...
Word Recognition in Continuous Speech and Speaker Independent by Means of Rec...
 
Ameliorate the performance using soft computing approaches in wireless networks
Ameliorate the performance using soft computing approaches  in wireless networksAmeliorate the performance using soft computing approaches  in wireless networks
Ameliorate the performance using soft computing approaches in wireless networks
 
NEURAL NETWORK FOR THE RELIABILITY ANALYSIS OF A SERIES - PARALLEL SYSTEM SUB...
NEURAL NETWORK FOR THE RELIABILITY ANALYSIS OF A SERIES - PARALLEL SYSTEM SUB...NEURAL NETWORK FOR THE RELIABILITY ANALYSIS OF A SERIES - PARALLEL SYSTEM SUB...
NEURAL NETWORK FOR THE RELIABILITY ANALYSIS OF A SERIES - PARALLEL SYSTEM SUB...
 

Plus de Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

Plus de Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Dernier

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 

Dernier (20)

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 

Neural Networks for Iris Recognition

  • 1. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.4, 2012 Comparison of Different Neural Networks for Iris Recognition: A Review Shivani Godara*, Dr. Rajeev Gupta UCE, Rajasthan Technical University, Kota 324010, India * E-mail of the corresponding author: shivanigodara48@gmail.com Abstract Biometrics is the science of verifying the identity of an individual through physiological measurements or behavioral traits. Since biometric identifiers are associated permanently with the user they are more reliable than token or knowledge based authentication methods. Among all the biometric modalities, iris has emerged as a popular choice due to its variability, stability and security. In this paper, we are presenting the various iris recognition techniques and its learning algorithm with neural network. Implementation of various techniques can be standardized on dedicated architectures and learning algorithm. It has been observed that SOM has stronger adaptive capacity and robustness. HSOM, which is based on hamming distance, has improved accuracy over LSOM. SANN model is more suitable in measuring the shape similarity, while cascaded FFBPNN are more reliable and efficient method for iris recognition. Key words: Biometrics, Iris recognition, Artificial Neural Networks. 1. Introduction Iris Recognition is usually known as eye iris network pattern recognition technology. The technique uses human's iris network features map information. This is used as a special and auto-recognizable identity card inputting the computer using Computer Science Technology and Imaging Technique. A typical iris recognition system includes four proceedings iris collection, pretreatment, feature extraction and pattern classification respectively. During last decade, numerous attempts have been made to apply Artificial Neural Networks for iris recognition. The Self-adaptive neural networks, SOM-NN & ICA [2], LSOM, HSOM ,Feed forward back propagation, Cascade forward back propagation, feed-forward multi-layer perceptron artificial neural network[9], feed-forward multi-layer perceptron artificial neural network with feature extraction through Hough transform[6] are some of the techniques used for feature extraction. 2. Self Organizing Maps (SOM) The principal goal of the SOM algorithm is to transform high-dimensional input patterns into a one or two-dimensional discrete map and to perform this transformation adaptively in a topological ordered fashion. In pattern recognition, the Self-Organizing Map (SOM) also called as Kohonen network [1], [2] performs a high quality classification. Assigning the similar input vectors to the same neuron or to neighbor neurons. Thus, this network transforms the relation of similarity between input vectors into a relation of neighborhood of the neurons. The map uses the competition 8
  • 2. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.4, 2012 principle, by evaluating the distances between the input vector and the weight vectors corresponding to each neuron, instead of using the classical Euclidean distance. Fig 1- Architecture of the SOM 3. Levensthein Self-Organizing Map (LSOM) The LSOM is a SOM based on the Levensthein metrics. LSOM uses a symbolic representation for both the input and also for the weight rows. Here the inputs and the weights of the LSOM are represented into a symbolic form where as SOM uses numerical form. For the LSOM, eliminate the condition that the two representations used in the competition phase to have the same length. Instead of evaluating the Euclidean distance between two real vectors, belonging to the same space (for the case of conventional SOM), evaluate the weighted Levensthein distance between two rows of symbols with different lengths, for the LSOM. The LSOM uses the competition principle (like SOM). One computes the Levensthein distances between the input row of symbols and all the rows of weights corresponding to the network neurons. The winner is the neuron that minimizes the above distances. The training algorithm for LSOM is the following: i. Initialize the weights of the LSOM. ii. Apply one by one the words (expressions) belonging to the training set. For each of them, compute the winner neuron, by minimizing the Levenshein distance between the input word and all the weight rows corresponding to the LSOM neurons. Make identical the weight row of the winner neuron with that of the input word (corresponding row). Refine the weight rows of the neurons belonging to the neighborhood of the winner by performing the elementary operations of substitution, insertion and deletion. This is used in order to reduce their Levensthein distances to the input word but not to make them zero. The reduction of the Levensthein distance is a function of the neuron position regarding the winner. This reduction increases when the Euclidean distance (in the map co-ordinates) between the corresponding neuron and the winner neuron decreases. iii. Compute the classification error as a sum of all the minimum Levenshein distances of the words (expressions) belonging to the training lot. Such a distance is the minimum of the distances between the corresponding input word and the weight rows of the LSOM neurons. iv. Test the stop condition (if the classification error is-zero). 9
  • 3. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.4, 2012 Fig 2: The circular architecture of the LSOM 4. Hamming Self-Organizing Map (HSOM) SOM variant based on Hamming metric, called Hamming Self-Organizing Map (HSOM). It can be considered as a particular case of the previous LSOM. Both the input vector elements and the weights of the HSOM are represented as binary integers “0” or “1”. The HSOM is based on hamming distance. Assuming two binary vectors, A=( a1, a2, …, an)t, B=( b1, b2, …, bn)t; where ai, bi є {0, 1}, the Hamming distance between A and B is DH (A, B) = Σ(ai – bi). Consequently, the Hamming distance between the input vector X and the weight vector Wj of the jth neuron in the competitive layer is calculated by the equation DH(X, Wj) = bit count{ xi XOR wji }. DH(X, Wj) = bit count {(xi ^ wji) V (xi ^ wji). here, i = {1,…, n}, j= {1, …, M}; M = number of output neurons. The HSOM uses the competition principle (like SOM). One computes the Hamming distances between the binary input vector and all the binary weight vectors. The winner is the neuron that minimizes the above distances c = j argmin {DH(X, Wj)}. To update the binary weight vectors of HSOM, firstly compute exclusive-OR (XOR) of each element of X and Wj. If XOR (xi, wji) = 1, then wji is a candidate for inversion. The number of inverted bits (belonging to the weight vector Wj) is defined as a learning rate; it gradually decreases as learning progresses. 5. Self Adaptive Neural Network (SANN) SANN uses the combination of the information related to both the shape and magnitude of the data. This implements new similarity matching criteria and error accumulation strategies for network growth. The SANN model is randomly initialized with four neurons. Such an initial structure allows the network to grow in any direction solely depending on the input data. Once the network has been initialized, each input sample xi is sequentially presented and each presentation involves the following two basic operations: i. Finding the winning neuron for each input sample; and ii. Updating the weights associated with both the winning neuron and its topological neighbors. Determining a winning neuron for each input data sample is the fundamental process for SANN models. Euclidean distance-based approaches are perhaps the most widely used matching criterion in the development of SANN models. Initialization: let's start the network with four neurons on a 2D grid Initialize each neuron with random values. 10
  • 4. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.4, 2012 iii. Repeat growing for each learning cycle. iv. Select a sample xi, from the input dataset and Compute the distance between the input sample, xi, and each neuron, wj. v. Find the winning neuron using the minimum-distance criterion and then update the weights of the winning neuron and its neighbors. vi. Increase the error value of the winner and find a neuron with the highest cumulative deviation and initiate the growth of new neurons. vii. Until stopping criterion is satisfied. The learning process is normally stopped when computational bounds, such as the number of learning epochs exceed or when the quantization error of neurons in the network fall below a given threshold. viii. Repeat smoothing for each learning cycle, Present each input sample and determine the winning neuron. ix. Update the weights of the winner and its immediate neighbors, until the error values of the neurons become very small or computational bounds are exceeded. Fig 3: New neurons generation process for the proposed SANN model. (a) The topology before generation, (b) the accumulation of errors during learning process, the neuron marked with a filled circle has the highest cumulative error after a learning epoch, (c) neuron growth on all free neighboring positions. The neurons marked with shaded circle are newly generated. 6. Feed & Cascade – Forward Back Propagation Feed – Forward Back propagation neural network (FFBPNN) and Cascade Forward Back propagation neural network (CFBPNN) shown in Figs. [4]. A FFBPNN and CFBPNN have three layers: an input layer, hidden layer and an output layer. The neurons in the input layer only act as buffer for distributing the input signals to neuron in hidden layer. Each neuron in hidden layer sums up its input signal after weighting them and computes it outputs. Training a network consists of adjusting its weights using learning algorithms. 11
  • 5. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.4, 2012 7. Feed Forward Multilayer Perceptron Artificial Neural Network A feed forward multilayer perceptron (MLP) artificial neural network is used to form the match decision. The error back-propagation training algorithm used to adjust the internal neural network weights. Since a typical multilayer perceptron neural network produces a class membership decision as an output, the maximally responding output node represents the class membership of the input pattern. To achieve a more descriptive comparison to the previously described distance metrics, it is desirable that the neural network produce a distance value as an output. For iris template matching, this distance value would represent a similarity score between two iris templates. One of the output nodes was removed, leaving one remaining output node which represents a similarity measurement. The sigmoid function on the remaining output node was also removed. The purpose of the output sigmoid function was to force and limit the output values to one or negative one. Removing the sigmoid function allowed the neural network to output 12
  • 6. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.4, 2012 numerical values that represent the degree to which it determined two iris templates match. This numerical value can be considered a similarity score between two iris templates and will be called the neural network distance. As with the other distance metrics, a smaller number from the neural network metric denotes a greater similarity between two templates. Accuracy results, identical to those presented in this paper, could be achieved by simply training and executing the unmodified neural network. A neural network with a large number of hidden nodes has the ability to memorize input data points that are statistical outliers. Another issue is computational efficiency. A neural network with a large number of hidden nodes can be computationally expensive to execute over a large database. 8. Feed Forward Neural Network (FFNN) using Hough Transform In FFNN information flows in forward direction. Signal flows from the input nodes to output nodes through the hidden nodes. For training of the network, training data is fed into the input layers to output layer though hidden layers which are adjusted to fit the data points to the curve. This is known as forward back propagation algorithm. Input data received by hidden layers which are multiplexed with appropriate weights and summed. It’s a hidden layer output which is non linear transformation of the resulting sum. At the output layer same operation is performed finally output values are compared with target value. The error between two is propagated back towards the hidden layer. This is the backward pass of the back propagation algorithm. The procedure is repeated to get the desired accuracy. Hough Transform being the most efficient techniques is used to identify positions of arbitrary shapes most commonly circles and ellipses. The purpose of this technique is to find imperfect instances of objects in a parameter space within a certain class of shapes by a voting procedure. This voting procedure is carried out in a parameter space, from which object candidates are obtained as local maxima in a so-called accumulator space that is explicitly constructed by the algorithm for computing the Hough transform. The local maxima obtained from the accumulator array are used in training of back propagation neural network. 9. Conclusion In this paper, we have discussed various up-to-date neural network architectures for iris recognition. These include direct development of neural learning algorithms for iris recognition. Theoretically, all the existing iris recognition algorithms can be possibly implemented by modified neural networks such as SOM with ICA, Levensthein Self-organizing Map (LSOM), Hamming Self-Organizing Map (HSOM)[3], Feed forward back propagation neural network, cascade forward back propagation and Self Adaptive neural network (SANN). One of the advantages of doing so is that implementation of Redundancy of feature space. It is also used for iris classification and recognition. Various techniques can be standardized on dedicated architectures and learning algorithm. Extensive evaluation and assessment for a wide range of different techniques and algorithms can be conveniently carried out on generalized neural networks. An Iris Recognition Algorithm Based on ICA and SOM Neural Network almost remove the redundancy of feature space. It is also used for iris classification and recognition. ICA and SOM neural network has stronger adaptive capacity and robustness but as the neural network has many inherent defect such as convergence slow rate, easy to relapse into local minimum, large quantity of parametric and parameter determination need to be from experience and so on, and original neural network need be trained again after addition sample into iris database, 13
  • 7. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.4, 2012 this method need to improve further. Due to this two variant [LSOM & HSOM] of SOM comes into picture. Levensthein Self-organizing Map (LSOM) uses the weighted Levensthein distance between two rows of symbols with different lengths while SOM variant, Hamming Self-Organizing Map (HSOM) uses the specific Hamming distance in the competition phase. Trained SOM is not able to accurately represent the input space. So to overcome this limitation SANN models are used, where each training sample is presented multiple times and the desired performance can only be achieved after gradual adaptation of weights associated with each neuron that may influence the selection of learning models. This may affect the performance of the model in large-scale applications. SANN model would be more suitable when there is a need to include the magnitude information in measuring the shape similarity. Some other networks like Feed forward back propagation neural network, cascade forward back propagation network (CFFBPN)) are also used for the iris recognition. In these algorithms, error signal is calculated between output layer and target value, and this error signal will move-back to hidden layers to improve the performance. This evaluation and comparison among them indicate that the cascaded FFBPNN are reliable and efficient method for iris recognition. Various techniques can be standardized on dedicated architectures and learning algorithm. Extensive evaluation and assessment for a wide range of different techniques and algorithms can be conveniently carried out on generalized neural networks. An Iris Recognition Algorithm Based on ICA and SOM Neural Network almost remove the References M. Gopikrishnan, T.Santhanam (2011), ‘Effect of different neural network on the accuracy in iris patterns recognition’, International Journal of Reviews in Computing, Vol. 7. Bo Lu1, Jing-jing Wu, Yu Wang (2010), ‘An iris recognition algorithm based on ICA and SOM neural network’, CISP, pp 2246-2448. Victor-emil Neagoe (2007), ‘New self-organizing maps with non-conventional metrics and their applications for iris recognition and automatic translation’, proce 11th WSEAS International Conference on computers, Greece, pp 145-151. Huiru Zheng, Haiying Wang (2011), ‘Improving pattern discovery and visualisation with self-adaptive neural networks through data transformations’, Springer. Venkata Rama Prasad Vaddella, Kurupati Rama (2009-2010), ‘artificial neural networks for compression of digital images: a review’, IJRIC& LLS, pp 75-82. Shylaja S.S., K.N.Balasubramanya, Murthy, S. Nataranjan, Nisecheth, Muthuraj R.,Ajay S(2011), ‘Feed forward neural network based eye localization and recognition using hough transform’, IJACSA Vol. 2,No. 3. Mr.Amir M.Usman Wagdarikar, Mr.Patil B.G, Mrs. Dr. Shaila subbaraman(2010), ‘Performance Evalution of IRIS Recognition Algorithms using Neural Network Classifier’, IEEE,pp 146-149. Thomas Heseltine, Nick Pears, Jim Austin, Zezhi Chen (2003), ‘Face Recognition: A Comparison of Appearance-Based Approaches’, Proc. VIIth Digital Image Computing: Techniques and Applications, Sun C., Talbot H., Ourselin S. and Adriaansen T. (Eds.), Sydney, pp 50-69. M. Gopikrishnan, T.Santhanam (2010-2011), ‘Improved biometric recognition and indetification of human iris patterns using neural networks’, JATIT & LLS, Vol. 31. 14
  • 8. This academic article was published by The International Institute for Science, Technology and Education (IISTE). The IISTE is a pioneer in the Open Access Publishing service based in the U.S. and Europe. The aim of the institute is Accelerating Global Knowledge Sharing. More information about the publisher can be found in the IISTE’s homepage: http://www.iiste.org The IISTE is currently hosting more than 30 peer-reviewed academic journals and collaborating with academic institutions around the world. Prospective authors of IISTE journals can find the submission instruction on the following page: http://www.iiste.org/Journals/ The IISTE editorial team promises to the review and publish all the qualified submissions in a fast manner. All the journals articles are available online to the readers all over the world without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. Printed version of the journals is also available upon request of readers and authors. IISTE Knowledge Sharing Partners EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library , NewJour, Google Scholar