WorldWideScience

Sample records for healing process biometrical

  1. Action of diode laser (830 nm) on cutaneous wound healing process: biometrical and histological study in rats

    International Nuclear Information System (INIS)

    Rezende, Sandra Bastos

    2001-01-01

    In this research, it was analyzed the acceleration of the healing process of cutaneous lesions in mice, using a diode laser emitting in 830 nm. The 64 selected animals in this study were randomically divided into four groups of 16 animals each (G1, G2, G3 and G4). Biometric and histological comparisons were accomplished in the following periods: 3, 7 and 14 days after the surgery and laser application. Three laser irradiation configurations were used: a punctual contact (G2) and two non-contact and uniform (G3 and G4). For group G2, the laser intensity was 428 mW/cm 2 , and for groups G3 and G4 it was 53 mW/cm 2 . The total doses were D = 3 J/cm 2 for groups G2 and G4, and D = 1,3 J/cm 2 for G3. The first group, G1, was considered control and thus not submitted to any treatment after the surgery. All irradiated lesions presented acceleration of the healing process with regard to the control group. However, our results clearly indicate that the smaller laser intensity (uniform irradiation) leaded to the best results. On the other hand, the smaller used dose also leaded to the more significant and expressive results. The combination of the intensity value of 53 mW/cm 2 and the dose of 1,3 J/cm 2 leaded to optimal results, regarding the Biometric and histological analysis, presenting faster lesion contraction, quicker neoformation of epithelial and conjunctive tissue (with more collagen fibers ). (author)

  2. Age factors in biometric processing

    CERN Document Server

    Fairhurst, Michael

    2013-01-01

    As biometrics-based identification and identity authentication become increasingly widespread in their deployment, it becomes correspondingly important to consider more carefully issues relating to reliability, usability and inclusion. One factor which is particularly important in this context is that of the relationship between the nature of the measurements extracted from a particular biometric modality and the age of the sample donor, and the effect which age has on physiological and behavioural characteristics invoked in a biometric transaction. In Age Factors in Biometric Processing an in

  3. Action of diode laser (830 nm) on cutaneous wound healing process: biometrical and histological study in rats; Acao do diodo laser emitindo em 830 nm, sobre o processo de cicatrizacao de lesoes cutaneas: estudo biometrico e histologico em ratos

    Energy Technology Data Exchange (ETDEWEB)

    Rezende, Sandra Bastos

    2001-07-01

    In this research, it was analyzed the acceleration of the healing process of cutaneous lesions in mice, using a diode laser emitting in 830 nm. The 64 selected animals in this study were randomically divided into four groups of 16 animals each (G1, G2, G3 and G4). Biometric and histological comparisons were accomplished in the following periods: 3, 7 and 14 days after the surgery and laser application. Three laser irradiation configurations were used: a punctual contact (G2) and two non-contact and uniform (G3 and G4). For group G2, the laser intensity was 428 mW/cm{sup 2} , and for groups G3 and G4 it was 53 mW/cm{sup 2}. The total doses were D = 3 J/cm{sup 2} for groups G2 and G4, and D = 1,3 J/cm{sup 2} for G3. The first group, G1, was considered control and thus not submitted to any treatment after the surgery. All irradiated lesions presented acceleration of the healing process with regard to the control group. However, our results clearly indicate that the smaller laser intensity (uniform irradiation) leaded to the best results. On the other hand, the smaller used dose also leaded to the more significant and expressive results. The combination of the intensity value of 53 mW/cm{sup 2} and the dose of 1,3 J/cm{sup 2} leaded to optimal results, regarding the Biometric and histological analysis, presenting faster lesion contraction, quicker neoformation of epithelial and conjunctive tissue (with more collagen fibers ). (author)

  4. Gingival healing after gingivectomy procedure and low intensity laser irradiation. A clinical and biometrical study in anima nobile

    International Nuclear Information System (INIS)

    Amorim, Jose Claudio Faria

    2001-01-01

    For the present study seven patients presenting periodontal disease were selected in a way that they required the performance of gingivectomy procedure in the region of premolars in both sides, being this in the upper or lower region. After the surgical procedure one side was submitted to low intensity laser radiation, wavelength 685 nm, power 50 mW and fluency of 4J/cm 2 , contact mode. The other side was used as a control, not receiving any laser irradiation. Healing process for both sides, was clinically and biometrically evaluated and compared using photographs for the periods: pre-operative, immediate post-operative, 3, 7,14,21, 28 and 35 days. The analysis was performed by 3 specialists in Periodontology considering aspects of healing. Results were submitted to statistical analysis. Biometrical evaluation showed improvement of healing for the period of 21 and 28 days in the lased group. Clinical evaluation showed better reparation mainly after the third day for the active group. Laser group was considered to present an improved healing when compared to the control group. (author)

  5. Signal and image processing for biometrics

    CERN Document Server

    Proença, Hugo; Du, Eliza

    2014-01-01

    This volume offers a guide to the state of the art in the fast evolving field of biometric recognition to newcomers and experienced practitioners. It is focused on the emerging strategies to perform biometric recognition under uncontrolled data acquisition conditions. The mainstream research work in this field is presented in an organized manner, so the reader can easily follow the trends that best suits her/his interests in this growing field. The book chapters cover the recent advances in less controlled / covert data acquisition frameworks, segmentation of poor quality biometric data, biometric data quality assessment, normalization of poor quality biometric data. contactless biometric recognition strategies, biometric recognition robustness, data resolution, illumination, distance, pose, motion, occlusions, multispectral biometric recognition, multimodal biometrics, fusion at different levels, high confidence automatic surveillance.

  6. Biometric Attendance and Big Data Analysis for Optimizing Work Processes.

    Science.gov (United States)

    Verma, Neetu; Xavier, Teenu; Agrawal, Deepak

    2016-01-01

    Although biometric attendance management is available, large healthcare organizations have difficulty in big data analysis for optimization of work processes. The aim of this project was to assess the implementation of a biometric attendance system and its utility following big data analysis. In this prospective study the implementation of biometric system was evaluated over 3 month period at our institution. Software integration with other existing systems for data analysis was also evaluated. Implementation of the biometric system could be successfully done over a two month period with enrollment of 10,000 employees into the system. However generating reports and taking action this large number of staff was a challenge. For this purpose software was made for capturing the duty roster of each employee and integrating it with the biometric system and adding an SMS gateway. This helped in automating the process of sending SMSs to each employee who had not signed in. Standalone biometric systems have limited functionality in large organizations unless it is meshed with employee duty roster.

  7. Biometric Secured Result Processing Software For Nigerian Tertiary Institutions

    Directory of Open Access Journals (Sweden)

    Oladipo Oluwasegun

    2015-08-01

    Full Text Available Abstract One of the challenges facing result processing in Nigerian tertiary institutions is the problem of insecurity. Untraceable changes are made to students result and this result to various disasters such as innocent people losing their jobs since their innocence cannot be proven. Biometric based systems operate on behavioral and physiological biometric data to identify a person and grant required access to a user. Physiological characteristics such as fingerprint remains unchanged throughout an individuals life time and thus it can serve as a viable means of identifying and authenticating users who are to access a system. In this study fingerprint biometric based result processing software is developed to ensure that users are well authenticated and are made to see only what they are pre-configured to see and work with. The fingerprint authentication system was developed using visual basic.net. Staff fingerprints were enrolled into the system to form a biometric template which the system validates against at every login attempt on the result processing software. The digital personal one touch ID sdk and other libraries were used in developing the authentication system. The result processing software also ensures that all write transactions to the database are confirmed and identified by forcing another biometric authentication at the point of making a write request to the web server and associated database. This ensures that the exact person initiating the transaction was the same user who logged in to the application. The users identified at login and various confirmation milestones set for write transactions are logged into a table for future reference and audit trail. Conclusively the developed system has helped to eradicate the problem of user impersonation by ensuring only authorized users are made to access the software and in-turn participate in result processing activities.

  8. Gingival healing after gingivectomy procedure and low intensity laser irradiation. A clinical and biometrical study in anima nobile; Reparacao gengival apos a tecnica de gengivectomia e aplicacao de laser em baixa intensidade. Avaliacao clinica e biometrica em humanos

    Energy Technology Data Exchange (ETDEWEB)

    Amorim, Jose Claudio Faria

    2001-07-01

    For the present study seven patients presenting periodontal disease were selected in a way that they required the performance of gingivectomy procedure in the region of premolars in both sides, being this in the upper or lower region. After the surgical procedure one side was submitted to low intensity laser radiation, wavelength 685 nm, power 50 mW and fluency of 4J/cm{sup 2}, contact mode. The other side was used as a control, not receiving any laser irradiation. Healing process for both sides, was clinically and biometrically evaluated and compared using photographs for the periods: pre-operative, immediate post-operative, 3, 7,14,21, 28 and 35 days. The analysis was performed by 3 specialists in Periodontology considering aspects of healing. Results were submitted to statistical analysis. Biometrical evaluation showed improvement of healing for the period of 21 and 28 days in the lased group. Clinical evaluation showed better reparation mainly after the third day for the active group. Laser group was considered to present an improved healing when compared to the control group. (author)

  9. Beyond Biometrics

    NARCIS (Netherlands)

    van den Broek, Egon

    Throughout the last 40 years, the essence of automated identification of users has remained the same. In this article, a new class of biometrics is proposed that is founded on processing biosignals, as opposed to images. After a brief introduction on biometrics, biosignals are discussed, including

  10. The Oshun Festival: An African Traditional Religious Healing Process.

    Science.gov (United States)

    Idowu, Adeyemi I.

    1992-01-01

    Examines the Oshun Festival, an African traditional religious festival, from a healing perspective. Highlights the value of religion in the African culture and discusses various myths. Explores the role of myths in and the place of beliefs in the healing process. Explains rituals and the healing environment, healers, and healing methods. Offers…

  11. [The Process of Healing Child Physical Abuse: Sprouting and Twining].

    Science.gov (United States)

    Chang, Hsin-Yi; Feng, Jui-Ying; Tseng, Ren-Mei

    2018-06-01

    Child physical abuse impacts the physical and psychological health of survivors. Healing child abuse is an essential process that helps survivors reorganize the meaning of the trauma and pursue a normal life. Considering the trauma of child physical abuse within the social context allows the experiences of individual survivors to be reflected in their process of healing. To explore the social interaction and construction process of healing experienced by survivors of child physical abuse. A qualitative research design using grounded theory was applied. Purposive and theoretical sampling was used to recruit survivors of childhood physical abuse who had experienced healing. Semi-structured, in-depth interviews were used and data were analyzed using open, axial, and selective coding. The process of healing child physical abuse in this study was a process of sprouting and twining. Three core categories emerged: thriving, relationships, and ethics. The healing process was analogous to a seed growing in poor soil, sprouting out from the ground, and striving to live by seeking support. The survivors constantly established interactive relationships with their selves and with others and struggled to keep family bonds grounded and growing within the frame of ethics. The healing process of sprouting and twining for child physical abuse survivors in Taiwan integrates thriving, relationships, and ethics. Professionals working with child-physical-abuse survivors must recognize conflicts in ethics. Strategies should be developed to assist survivors to cope with the impact of childhood trauma in order to facilitate the healing process.

  12. Facial biometrics of Yorubas of Nigeria using Akinlolu-Raji image-processing algorithm

    Directory of Open Access Journals (Sweden)

    Adelaja Abdulazeez Akinlolu

    2016-01-01

    Full Text Available Background: Forensic anthropology deals with the establishment of human identity using genetics, biometrics, and face recognition technology. This study aims to compute facial biometrics of Yorubas of Osun State of Nigeria using a novel Akinlolu-Raji image-processing algorithm. Materials and Methods: Three hundred Yorubas of Osun State (150 males and 150 females, aged 15–33 years were selected as subjects for the study with informed consents and when established as Yorubas by parents and grandparents. Height, body weight, and facial biometrics (evaluated on three-dimensional [3D] facial photographs were measured on all subjects. The novel Akinlolu-Raji image-processing algorithm for forensic face recognition was developed using the modified row method of computer programming. Facial width, total face height, short forehead height, long forehead height, upper face height, nasal bridge length, nose height, morphological face height, and lower face height computed from readings of the Akinlolu-Raji image-processing algorithm were analyzed using z-test (P ≤ 0.05 of 2010 Microsoft Excel statistical software. Results: Statistical analyzes of facial measurements showed nonsignificant higher mean values (P > 0.05 in Yoruba males compared to females. Yoruba males and females have the leptoprosopic face type based on classifications of face types from facial indices. Conclusions: Akinlolu-Raji image-processing algorithm can be employed for computing anthropometric, forensic, diagnostic, or any other measurements on 2D and 3D images, and data computed from its readings can be converted to actual or life sizes as obtained in 1D measurements. Furthermore, Yoruba males and females have the leptoprosopic face type.

  13. Vocal acoustic analysis as a biometric indicator of information processing: implications for neurological and psychiatric disorders.

    Science.gov (United States)

    Cohen, Alex S; Dinzeo, Thomas J; Donovan, Neila J; Brown, Caitlin E; Morrison, Sean C

    2015-03-30

    Vocal expression reflects an integral component of communication that varies considerably within individuals across contexts and is disrupted in a range of neurological and psychiatric disorders. There is reason to suspect that variability in vocal expression reflects, in part, the availability of "on-line" resources (e.g., working memory, attention). Thus, understanding vocal expression is a potentially important biometric index of information processing, not only across but within individuals over time. A first step in this line of research involves establishing a link between vocal expression and information processing systems in healthy adults. The present study employed a dual attention experimental task where participants provided natural speech while simultaneously engaged in a baseline, medium or high nonverbal processing-load task. Objective, automated, and computerized analysis was employed to measure vocal expression in 226 adults. Increased processing load resulted in longer pauses, fewer utterances, greater silence overall and less variability in frequency and intensity levels. These results provide compelling evidence of a link between information processing resources and vocal expression, and provide important information for the development of an automated, inexpensive and uninvasive biometric measure of information processing. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  14. On Soft Biometrics

    DEFF Research Database (Denmark)

    Nixon, Mark; Correia, Paulo; Nasrollahi, Kamal

    2015-01-01

    Innovation has formed much of the rich history in biometrics. The field of soft biometrics was originally aimed to augment the recognition process by fusion of metrics that were sufficient to discriminate populations rather than individuals. This was later refined to use measures that could be us...

  15. Multimodal Biometric System- Fusion Of Face And Fingerprint Biometrics At Match Score Fusion Level

    OpenAIRE

    Grace Wangari Mwaura; Prof. Waweru Mwangi; Dr. Calvins Otieno

    2017-01-01

    Biometrics has developed to be one of the most relevant technologies used in Information Technology IT security. Unimodal biometric systems have a variety of problems which decreases the performance and accuracy of these system. One way to overcome the limitations of the unimodal biometric systems is through fusion to form a multimodal biometric system. Generally biometric fusion is defined as the use of multiple types of biometric data or ways of processing the data to improve the performanc...

  16. Factors affecting the periapical healing process of endodontically treated teeth

    Directory of Open Access Journals (Sweden)

    Roberto Holland

    Full Text Available Abstract Tissue repair is an essential process that reestablishes tissue integrity and regular function. Nevertheless, different therapeutic factors and clinical conditions may interfere in this process of periapical healing. This review aims to discuss the important therapeutic factors associated with the clinical protocol used during root canal treatment and to highlight the systemic conditions associated with the periapical healing process of endodontically treated teeth. The antibacterial strategies indicated in the conventional treatment of an inflamed and infected pulp and the modulation of the host's immune response may assist in tissue repair, if wound healing has been hindered by infection. Systemic conditions, such as diabetes mellitus and hypertension, can also inhibit wound healing. The success of root canal treatment is affected by the correct choice of clinical protocol. These factors are dependent on the sanitization process (instrumentation, irrigant solution, irrigating strategies, and intracanal dressing, the apical limit of the root canal preparation and obturation, and the quality of the sealer. The challenges affecting the healing process of endodontically treated teeth include control of the inflammation of pulp or infectious processes and simultaneous neutralization of unpredictable provocations to the periapical tissue. Along with these factors, one must understand the local and general clinical conditions (systemic health of the patient that affect the outcome of root canal treatment prediction.

  17. Biometric estimation of chest wall thickness in female nonradiation workers of a monazite processing plant

    International Nuclear Information System (INIS)

    Radhakrishnan, Sujata; Maniyan, C.G.; Pillai, P.M.B.; Khan, A.H.

    2003-01-01

    Chest wall thickness (CWT) was estimated in fifty four female nonradiation workers of a monazite processing plant by biometric measurements. The CWT ranged from 4.12 cm to 6.94 cm giving an average of 5.19 ± 0.76 cm. CWT was found to have very good correlation with percent Body Fat and abdominal circumference but poor correlation with Body Mass Index, Body Build Index, Slenderness, age etc. CWT increases with age especially in the upper middle-aged group (> 35 years). A single measurement of abdominal circumference can be used to estimate CWT with 94 % accuracy. A factor of 0.0587 was derived to estimate CWT from abdominal circumference. The study also showed that about 11 % of the subjects were obese. The results obtained will be very useful for the accurate measurement of Low Energy Photons like 239 Pu and 241 Am deposited in the lung. (author)

  18. Optimization of an individual re-identification modeling process using biometric features

    Energy Technology Data Exchange (ETDEWEB)

    Heredia-Langner, Alejandro; Amidan, Brett G.; Matzner, Shari; Jarman, Kristin H.

    2014-09-24

    We present results from the optimization of a re-identification process using two sets of biometric data obtained from the Civilian American and European Surface Anthropometry Resource Project (CAESAR) database. The datasets contain real measurements of features for 2378 individuals in a standing (43 features) and seated (16 features) position. A genetic algorithm (GA) was used to search a large combinatorial space where different features are available between the probe (seated) and gallery (standing) datasets. Results show that optimized model predictions obtained using less than half of the 43 gallery features and data from roughly 16% of the individuals available produce better re-identification rates than two other approaches that use all the information available.

  19. The Decision of Information Safety Problems at Processing of the Biometric Personal Data

    Directory of Open Access Journals (Sweden)

    Y. G. Gorshkov

    2010-03-01

    Full Text Available The requirements imposed on transfer by the personal biometric information in systems and communication networks according to Federal Law № 152 “Personal data” are defined. Lacks of used decisions protection of such biometric data, as the test speech information, including parameters of a speech path, and also acoustic signals of tones and noise of heart of the person on an example of telemedicine systems construction with the using of a network telephone channels general using and wireless networks Wi-Fi are considered. Directions of works are formulated on safety of the personal biometric data transferred in telecommunication systems.

  20. Nasal biometrics and nasofacial proportion in Hausas and Yorubas using Akinlolu-Raji image-processing algorithm

    Directory of Open Access Journals (Sweden)

    Akinlolu Abdulazeez Adelaja

    2016-01-01

    Full Text Available Background: Nasal biometrics is vital to facial analyses. This study evaluated nasal biometrics in Hausas and Yorubas of Nigeria. Materials and Methods: Hausas (150 males and 150 females, aged 18-36 years and Yorubas (150 males and 150 females, aged 15-33 years were selected as subjects with informed consents and when established as Hausas or Yorubas by parents and grandparents. Height, body weight and cephalometric parameters (evaluated on three-dimensional facial photographs were measured on subjects. The novel Akinlolu-Raji image-processing algorithm was developed using modified row method of computer programming. Nasal root width, nose height, nose width, nasal bridge length, nasal tip protrusion, nasal index, facial width and nasofacial proportion computed from readings of Akinlolu-Raji image-processing algorithm were analyzed using Z-test (P ≤ 0.05 of 2010 Microsoft Excel statistical software. Results: Computed nasal biometrics showed statistically nonsignificant higher values (P > 0.05 in males of Hausas (100% and Yorubas (80% compared to their female counterparts. In addition, results showed nonsignificant higher values (P > 0.05 in 80% of nasal biometrics in Hausas compared to Yorubas in both sexes. Based on classifications of nose types from nasal index, Hausas have the platyrrhine nose type while Yorubas have the mesorrhine nose type. Nasofacial proportion was lower in Hausa males compared to females, but of same values in Yoruba males and females. In addition, nasofacial proportions were lower in Hausas compared to Yorubas in both sexes. Conclusions: Sexual dimorphism of nasal biometrics exists between sexes of Hausas and Yorubas. Furthermore, Hausas and Yorubas are of similar nasal sizes.

  1. Experimental examination of the healing process of telescopic esophageal anastomosis.

    Science.gov (United States)

    Szücs, G; Tóth, I; Barna, T; Bráth, E; Gyáni, K; Mikó, I

    2003-01-01

    The basis of telescopic anastomosis is old, only the practical details of it have changed and improved. The telescopic anastomosis technique is successfully applied in our practice for reconstruction of gastrectomy and esophageal resection. The reason for this study was that data about the healing process of telescopic anastomosis had not been found in the literature. We used four groups of mongrel dogs for our experiments: Group A (n = 3) received 20 mm-long invaginations with a survival time of 7 days; Group B (n = 3) received 10 mm-long invaginations with a survival time of 21 days; Group C (n = 3) received 20 mm-long invaginations with a survival time of 21 days; Group D (n = 3) received 30 mm-long invaginations with a survival time of 21 days. At the end of the above survival times we removed the anastomosing area, measured the bursting pressures and performed morphological and histological examinations. In each case we also performed an anastomosis exactly the same as a completely healed anastomosis and its pressure tolerance was measured (0 day). The pressure tolerance within the anastomosis rises gradually and independently of the length of the invaginated esophageal part. Anastomosis leakage did not occur. The invaginated esophageal part did not suffer any damage. The muscular wall of the intragastric part of the esophagus became covered by the mucosa of the stomach during the healing process and it joined with the esophageal mucosa at the edge of the free end of the esophagus.

  2. Two barriers to realizing the benefits of biometrics: a chain perspective on biometrics and identity fraud as biometrics' real challenge

    Science.gov (United States)

    Grijpink, Jan

    2004-06-01

    Along at least twelve dimensions biometric systems might vary. We need to exploit this variety to manoeuvre biometrics into place to be able to realise its social potential. Subsequently, two perspectives on biometrics are proposed revealing that biometrics will probably be ineffective in combating identity fraud, organised crime and terrorism: (1) the value chain perspective explains the first barrier: our strong preference for large scale biometric systems for general compulsory use. These biometric systems cause successful infringements to spread unnoticed. A biometric system will only function adequately if biometrics is indispensable for solving the dominant chain problem. Multi-chain use of biometrics takes it beyond the boundaries of good manageability. (2) the identity fraud perspective exposes the second barrier: our traditional approach to identity verification. We focus on identity documents, neglecting the person and the situation involved. Moreover, western legal cultures have made identity verification procedures known, transparent, uniform and predictable. Thus, we have developed a blind spot to identity fraud. Biometrics provides good potential to better checking persons, but will probably be used to enhance identity documents. Biometrics will only pay off if it confronts the identity fraudster with less predictable verification processes and more risks of his identity fraud being spotted. Standardised large scale applications of biometrics for general compulsory use without countervailing measures will probably produce the reverse. This contribution tentatively presents a few headlines for an overall biometrics strategy that could better resist identity fraud.

  3. PRFM enhance wound healing process in skin graft.

    Science.gov (United States)

    Reksodiputro, Mirta; Widodo, Dini; Bashiruddin, Jenny; Siregar, Nurjati; Malik, Safarina

    2014-12-01

    Facial plastic and reconstructive surgery often used skin graft on defects that cannot be covered primarily by a local flap. However, wound healing using skin graft is slow, most of the time the graft is contractured and the take of graft is not optimal. Platelet rich fibrin matrix (PRFM) is a new generation of concentrated platelets that produce natural fibrin and reported to speed up the healing process. Application of PRFM in the skin graft implants is expected to increase the survival of the graft. We used porcine as animal models to elucidate the effect of autologous PRFM on wound healing in full-thickness (FTSG) and split-thickness (STSG) skin grafts. Survival level of the skin graft was determined by using ImageJ software based on the formation of collagen type 1 and graft take. We observed that the use of PRFM in FTSG and STSG increased type 1 collagen formation. We also found that PRFM addition in STSG gave the best skin graft take. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.

  4. Operation technique and healing process of telescopic ileocolostomy in dogs.

    Science.gov (United States)

    Szucs, G; Tóth, I; Barna, T; Bráth, E; Gyáni, K; Mikó, Irén

    2003-01-01

    The healing process of telescopic anastomoses was found in an animal experiment with 12 mongrel dogs. After the division of vessels an ileal segment of different length was invaginated into the lumen of the colon using single-layer interrupted sutures. The following four groups were used: Group A (n = 3): end-to-side ileocolostomy, single-layer interrupted suture (invagination length: 0 mm), survival time: 21 days. Group B (n = 3): invagination length: 20 mm, survival time: 7 days. Group C (n = 3): invagination length: 10 mm, survival time: 21 days. Group D (n = 3): invagination length: 20 mm, survival time: 21 days. At the end of the above survival times the anastomosis area was removed. The bursting pressure was measured and morphological as well as histological examinations were performed. In each case the 0-day look-alikes of anastomoses were performed using the remnant bowels, and bursting pressure measurements were done on these models as well. Anastomosis leakage did not occur. The serosal layer of the intracolonic part of the ileum disappeared during the healing process. The free surface of the intracolonic ileal segment became covered by the sliding mucosa of the colon and the prolapsing mucosa of the ileum. The following could be concluded after the experiments: The inner pressure tolerance of a telescopic ileocolostomy promptly after preparation is better than in case of another single-layer anastomosis. This fact results in increased safety against leakage on the first postoperative days. The inner pressure tolerance of the telescopic ileocolostomy increases during the healing process and it does not depend on the length of the invaginated part (0 day-20 mm: 56 mmHg +/- 6, Group A: 252 +/- 39, Group B: 154 +/- 19, Group C: 249 +/- 20, Group D: 298 +/- 2). There is no difference in pressure tolerance between the telescopic and the end-to-side single-layer interrupted anastomoses after the healing process. The invaginated section within the lumen of the

  5. Healing gardens: design processes and realizations of beneficial environments

    Directory of Open Access Journals (Sweden)

    Clare Cooper Marcus

    2015-04-01

    Full Text Available Having defined the topic and its related management effects in the healthcare environment, this paper reports considerations of specific design processes, including evidence-based design, Integrated Healthcare Strategies, participatory practices and post occupancy evaluation. Landscape of Italian examples follows before a case study of three Californian healing gardens dedicated to cancer patients, linked to a survey of this category of users’ needs in such spaces. Conclusions report the reflection of practical implications deriving from studying North American examples, underlining the opportunity for audit and certification of therapeutic gardens, as well as the chance to export them outside health infrastructures for social needs.

  6. Biometrics Foundation Documents

    Science.gov (United States)

    2009-01-01

    adjudication ( legal ) process. Forensics usually requires days of processing (versus seconds for biometrics) and are held to much higher accuracy...Living Body,” Medicina Philosophica, 11:620-629, 1992. 2 K. Shimizu and K. Yamomoto,“Imaging of Physiological Functions By Laser Transillumination

  7. Explosives trace detection in the process of biometrical fingerprint identification for access control

    Science.gov (United States)

    Bertseva, Elena V.; Savin, Andrey V.

    2007-02-01

    A method for trace detection of explosives on the surface of biometric fingerprint scanner is proposed and its sensitivity explored. The method is based on attenuated total reflection mid-infrared spectroscopy. The detection limit is about several microgram and the detectivity increases with the wavelength used for scanning. The advantages of the proposed method include high selectivity and thus low false alarm level, applicability to low vapor pressure explosives and low cost.

  8. Biometric features and privacy : condemned, based upon your finger print

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Veldhuis, Raymond N.J.

    What information is available in biometric features besides that needed for the biometric recognition process? What if a biometric feature contains Personally Identifiable Information? Will the whole biometric system become a threat to privacy? This paper is an attempt to quantifiy the link between

  9. Can soft biometric traits assist user recognition?

    Science.gov (United States)

    Jain, Anil K.; Dass, Sarat C.; Nandakumar, Karthik

    2004-08-01

    Biometrics is rapidly gaining acceptance as the technology that can meet the ever increasing need for security in critical applications. Biometric systems automatically recognize individuals based on their physiological and behavioral characteristics. Hence, the fundamental requirement of any biometric recognition system is a human trait having several desirable properties like universality, distinctiveness, permanence, collectability, acceptability, and resistance to circumvention. However, a human characteristic that possesses all these properties has not yet been identified. As a result, none of the existing biometric systems provide perfect recognition and there is a scope for improving the performance of these systems. Although characteristics like gender, ethnicity, age, height, weight and eye color are not unique and reliable, they provide some information about the user. We refer to these characteristics as "soft" biometric traits and argue that these traits can complement the identity information provided by the primary biometric identifiers like fingerprint and face. This paper presents the motivation for utilizing soft biometric information and analyzes how the soft biometric traits can be automatically extracted and incorporated in the decision making process of the primary biometric system. Preliminary experiments were conducted on a fingerprint database of 160 users by synthetically generating soft biometric traits like gender, ethnicity, and height based on known statistics. The results show that the use of additional soft biometric user information significantly improves (approximately 6%) the recognition performance of the fingerprint biometric system.

  10. Otostegia persica extraction on healing process of burn wounds

    Directory of Open Access Journals (Sweden)

    Amin Ganjali

    2013-06-01

    Full Text Available PURPOSE: To investigate if the methanolic extract of the Otostegia persica can accelerating healing process of burn wound because of its anti-inflammatory and antioxidant effects. METHODS:Forty eight male Wistar rats were randomized into three study groups of 16 rats each. Burn wounds were created on dorsal part of shaved rats using a metal rod. In group I the burn wound was left without any treatment. Group was treated with topical silver sulfadiazine pomade. In group III, ointment containing the OP extract was administered. Skin biopsies were harvested from burn area on the 3rd, 5th, 14th and 21st days after burn and examined histologically. RESULTS: Re-epithelialization in the control group and in group II was lower than in group III. Re-epithelialization in groups II and III was significantly different from that in the control group. On the 5th day of the experiment, we assessed lower inflammation in the burn area compared to control group. This means that the inflammation was suppressed by methanolic extract of OP. From day 5 to 14; the fibroblast proliferation peaked and was associated with increased collagen accumulation. It was obvious that angiogenesis improved more in the groups II and III, which facilitated re-epithelialisation. CONCLUSION:Methanolic extract of Otostegia persica exhibited significant healing activity when topically applied on rats. OP is an effective treatment for saving the burn site.

  11. A bioactive molecule in a complex wound healing process: platelet-derived growth factor.

    Science.gov (United States)

    Kaltalioglu, Kaan; Coskun-Cevher, Sule

    2015-08-01

    Wound healing is considered to be particularly important after surgical procedures, and the most important wounds related to surgical procedures are incisional, excisional, and punch wounds. Research is ongoing to identify methods to heal non-closed wounds or to accelerate wound healing; however, wound healing is a complex process that includes many biological and physiological events, and it is affected by various local and systemic factors, including diabetes mellitus, infection, ischemia, and aging. Different cell types (such as platelets, macrophages, and neutrophils) release growth factors during the healing process, and platelet-derived growth factor is a particularly important mediator in most stages of wound healing. This review explores the relationship between platelet-derived growth factor and wound healing. © 2014 The International Society of Dermatology.

  12. Wound Healing and Care

    Science.gov (United States)

    ... Safe Videos for Educators Search English Español Wound Healing and Care KidsHealth / For Teens / Wound Healing and ... open to heal through natural scar formation. The Healing Process Before healing begins, the body gears up ...

  13. Bony change of apical lesion healing process using fractal analysis

    International Nuclear Information System (INIS)

    Lee, Ji Min; Park, Hyok; Jeong, Ho Gul; Kim, Kee Deog; Park, Chang Seo

    2005-01-01

    To investigate the change of bone healing process after endodontic treatment of the tooth with an apical lesion by fractal analysis. Radiographic images of 35 teeth from 33 patients taken on first diagnosis, 6 months, and 1 year after endodontic treatment were selected. Radiographic images were taken by JUPITER computerized Dental X-ray System. Fractal dimensions were calculated three times at each area by Scion Image PC program. Rectangular region of interest (30 x 30) were selected at apical lesion and normal apex of each image. The fractal dimension at apical lesion of first diagnosis (L 0 ) is 0.940 ± 0.361 and that of normal area (N 0 ) is 1.186 ± 0.727 (p 1 ) is 1.076 ± 0.069 and that of normal area (N 1 ) is 1.192 ± 0.055 (p 2 ) is 1.163 ± 0.074 and that of normal area (N 2 ) is 1.225 ± 0.079 (p<0.05). After endodontic treatment, the fractal dimensions at each apical lesions depending on time showed statistically significant difference. And there are statistically significant different between normal area and apical lesion on first diagnosis, 6 months after, 1 year after. But the differences were grow smaller as time flows. The evaluation of the prognosis after the endodontic treatment of the apical lesion was estimated by bone regeneration in apical region. Fractal analysis was attempted to overcome the limit of subjective reading, and as a result the change of the bone during the healing process was able to be detected objectively and quantitatively.

  14. Bony change of apical lesion healing process using fractal analysis

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Ji Min; Park, Hyok; Jeong, Ho Gul; Kim, Kee Deog; Park, Chang Seo [Yonsei University College of Medicine, Seoul (Korea, Republic of)

    2005-06-15

    To investigate the change of bone healing process after endodontic treatment of the tooth with an apical lesion by fractal analysis. Radiographic images of 35 teeth from 33 patients taken on first diagnosis, 6 months, and 1 year after endodontic treatment were selected. Radiographic images were taken by JUPITER computerized Dental X-ray System. Fractal dimensions were calculated three times at each area by Scion Image PC program. Rectangular region of interest (30 x 30) were selected at apical lesion and normal apex of each image. The fractal dimension at apical lesion of first diagnosis (L{sub 0}) is 0.940 {+-} 0.361 and that of normal area (N{sub 0}) is 1.186 {+-} 0.727 (p<0.05). Fractal dimension at apical lesion of 6 months after endodontic treatment (L{sub 1}) is 1.076 {+-} 0.069 and that of normal area (N{sub 1}) is 1.192 {+-} 0.055 (p<0.05). Fractal dimension at apical lesion of 1 year after endodontic treatment (L{sub 2}) is 1.163 {+-} 0.074 and that of normal area (N{sub 2}) is 1.225 {+-} 0.079 (p<0.05). After endodontic treatment, the fractal dimensions at each apical lesions depending on time showed statistically significant difference. And there are statistically significant different between normal area and apical lesion on first diagnosis, 6 months after, 1 year after. But the differences were grow smaller as time flows. The evaluation of the prognosis after the endodontic treatment of the apical lesion was estimated by bone regeneration in apical region. Fractal analysis was attempted to overcome the limit of subjective reading, and as a result the change of the bone during the healing process was able to be detected objectively and quantitatively.

  15. Potato tuber wounding induces responses associated with various healing processes

    Science.gov (United States)

    Wounding induces an avalanche of biological responses involved in the healing and protection of internal tuber tissues exposed by mechanical damage and seed cutting. Collectively, our studies have framed a portrait of the mechanisms and regulation of potato tuber wound-healing, but much more is req...

  16. Transfer Function Control for Biometric Monitoring System

    Science.gov (United States)

    Chmiel, Alan J. (Inventor); Humphreys, Bradley T. (Inventor); Grodinsky, Carlos M. (Inventor)

    2015-01-01

    A modular apparatus for acquiring biometric data may include circuitry operative to receive an input signal indicative of a biometric condition, the circuitry being configured to process the input signal according to a transfer function thereof and to provide a corresponding processed input signal. A controller is configured to provide at least one control signal to the circuitry to programmatically modify the transfer function of the modular system to facilitate acquisition of the biometric data.

  17. BIOMETRIC AUTHENTICATION SYSTEM USING RPI

    OpenAIRE

    Fatema A. Shaikh*; Prof.S.O.Rajankar

    2016-01-01

    A biometric authentication system acquires biometric sample such as fingerprint. The fingerprint signifies physiological features of an individual.This is a system which maintains the attendance records of students automatically. In this designing of an efficient module that comprises of a fingerprint sensor to manage the attendance records of students. This module enrolls the student’s as well as staff’s fingerprints. This enrolling is a onetime process and their fingerprints will be stored...

  18. NIST biometric evaluations and developments

    Science.gov (United States)

    Garris, Michael D.; Wilson, Charles L.

    2005-05-01

    This paper presents an R&D framework used by the National Institute of Standards and Technology (NIST) for biometric technology testing and evaluation. The focus of this paper is on fingerprint-based verification and identification. Since 9-11 the NIST Image Group has been mandated by Congress to run a program for biometric technology assessment and biometric systems certification. Four essential areas of activity are discussed: 1) developing test datasets, 2) conducting performance assessment; 3) technology development; and 4) standards participation. A description of activities and accomplishments are provided for each of these areas. In the process, methods of performance testing are described and results from specific biometric technology evaluations are presented. This framework is anticipated to have broad applicability to other technology and application domains.

  19. Mimicking Bone Healing Process to Self Repair Concrete Structure Novel Approach Using Porous Network Concrete

    NARCIS (Netherlands)

    Sangadji, S.; Schlangen, H.E.J.G.

    2013-01-01

    To repair concrete cracks in difficult or dangerous conditions such as underground structures or hazardous liquid containers, self healing mechanism is a promising alternative method. This research aims to imitate the bone self healing process by putting porous concrete internally in the concrete

  20. Augmented healing process in female mice with acute myocardial infarction.

    Science.gov (United States)

    Wang, Fangfei; Keimig, Thomas; He, Quan; Ding, Jennifer; Zhang, Zhenggang; Pourabdollah-Nejad, Siamak; Yang, Xiao-Ping

    2007-09-01

    It is well established that premenopausal women are protected from cardiovascular disease. This gender difference in favor of females is also demonstrated in animal studies. Our research group previously found that female mice had much lower incidence of cardiac rupture and mortality than did males during the acute phase of myocardial infarction (MI); however, the mechanisms responsible for such protection are not fully understood. The aim of this study was to determine whether the favorable cardiac effect observed in female mice with MI is due to an augmented healing process that includes less inflammation, reduced matrix degradation, and enhanced neovascularization. Twelve-week-old male and female C57BL/6J mice were subjected to MI by ligating the left anterior descending coronary artery and then euthanized at 1, 4, 7, or 14 days post-MI. Inflammatory cell infiltration and myofibroblast transformation, matrix metalloproteinase (MMP)-2 and MMP-9 activity, tissue inhibitor of metalloproteinase (TIMP)-I expression, and neovascularization were examined by immunohistochemistry, zymography, Western blot, and laser scanning confocal microscopy, respectively. Cardiac function was evaluated by echocardiography on day 14. We found that: (1) neutrophil infiltration during the early phase of MI (1-4 days) was much lower in females than in males and was associated with lower MMP-9 activity and higher TIMP-1 protein expression, indicating less-exaggerated inflammation and extracellular matrix degradation in females; (2) myofibroblast transformation, as indicated by expression of alpha-smooth muscle actin, was significantly greater in females than in males at day 7 of MI (Pvascular area in the infarct border) was markedly increased in females, and was associated with better preserved cardiac function and less left ventricular dilatation. Our data suggest that less-exaggerated early inflammation and augmented reparative fibrotic response, indicated by enhanced myofibroblast

  1. [Healing process of claw lesions in dairy cows in alpine mountain pastures].

    Science.gov (United States)

    Lischer, C J; Wehrle, M; Geyer, H; Lutz, B; Ossent, P

    2000-07-01

    The field study investigated severity, localisation and incidence of claw lesions of dairy cows and their healing process during a period of three months on selected mountain pastures in the central part of Switzerland. In 60 cows, which were at least 120 days in their lactation, the healing process was compared with the biochemical profiles. In 141 cows 197 claw lesions were recorded. Diagnosed were only sole ulcers (38%) and white line lesions (62%). In the first and second half of the summer term, the number of claw lesions was equal, although more severe lesions occurred mainly during the second half (89%). The lesions were treated surgically and the affected claw was elevated on a wood block or a plastic shoe. Average time for formation of a close layer of horn was 14 days. A delayed healing process was observed in dairy cows with an milk yield over 5500 kg per lactation, as well as in the second half of the summer term. Cows with a delayed healing process had significantly higher concentrations of free fatty acids and beta-hydroxybutyrate, and higher plasma enzyme activities for AST than cows with adequate healing process. This indicates that cows with a relatively high milk production touch upon the limits of their physical capacity under harder conditions on alpine pastures, which may affect also the healing process of claw lesions.

  2. Processing and performance of self-healing materials

    International Nuclear Information System (INIS)

    Tan, P S; Bhattacharyya, D; Zhang, M Q

    2009-01-01

    Two self-healing methods were implemented into composite materials with self-healing capabilities, using hollow glass fibres (HGF) and microencapsulated epoxy resin with mercaptan as the hardener. For the HGF approach, two perpendicular layers of HGF were put into an E-glass/epoxy composite, and were filled with coloured epoxy resin and hardener. The HGF samples had a novel ball indentation test method done on them. The samples were analysed using micro-CT scanning, confocal microscopy and penetrant dye. Micro-CT and confocal microscopy produced limited success, but their viability was established. Penetrant dye images showed resin obstructing flow of dye through damage regions, suggesting infiltration of resin into cracks. Three-point bend tests showed that overall performance could be affected by the flaws arising from embedding HGF in the material. For the microcapsule approach, samples were prepared for novel double-torsion tests used to generate large cracks. The samples were compared with pure resin samples by analysing them using photoelastic imaging and scanning electron microscope (SEM) on crack surfaces. Photoelastic imaging established the consolidation of cracks while SEM showed a wide spread of microcapsules with their distribution being affected by gravity. Further double-torsion testing showed that healing recovered approximately 24% of material strength.

  3. On the mathematical modeling of wound healing angiogenesis in skin as a reaction-transport process.

    Science.gov (United States)

    Flegg, Jennifer A; Menon, Shakti N; Maini, Philip K; McElwain, D L Sean

    2015-01-01

    Over the last 30 years, numerous research groups have attempted to provide mathematical descriptions of the skin wound healing process. The development of theoretical models of the interlinked processes that underlie the healing mechanism has yielded considerable insight into aspects of this critical phenomenon that remain difficult to investigate empirically. In particular, the mathematical modeling of angiogenesis, i.e., capillary sprout growth, has offered new paradigms for the understanding of this highly complex and crucial step in the healing pathway. With the recent advances in imaging and cell tracking, the time is now ripe for an appraisal of the utility and importance of mathematical modeling in wound healing angiogenesis research. The purpose of this review is to pedagogically elucidate the conceptual principles that have underpinned the development of mathematical descriptions of wound healing angiogenesis, specifically those that have utilized a continuum reaction-transport framework, and highlight the contribution that such models have made toward the advancement of research in this field. We aim to draw attention to the common assumptions made when developing models of this nature, thereby bringing into focus the advantages and limitations of this approach. A deeper integration of mathematical modeling techniques into the practice of wound healing angiogenesis research promises new perspectives for advancing our knowledge in this area. To this end we detail several open problems related to the understanding of wound healing angiogenesis, and outline how these issues could be addressed through closer cross-disciplinary collaboration.

  4. Robust and Secure Watermarking Using Sparse Information of Watermark for Biometric Data Protection

    Directory of Open Access Journals (Sweden)

    Rohit M Thanki

    2016-08-01

    Full Text Available Biometric based human authentication system is used for security purpose in many organizations in the present world. This biometric authentication system has several vulnerable points. Two of vulnerable points are protection of biometric templates at system database and protection of biometric templates at communication channel between two modules of biometric authentication systems. In this paper proposed a robust watermarking scheme using the sparse information of watermark biometric to secure vulnerable point like protection of biometric templates at the communication channel of biometric authentication systems. A compressive sensing theory procedure is used for generation of sparse information on watermark biometric data using detail wavelet coefficients. Then sparse information of watermark biometric data is embedded into DCT coefficients of host biometric data. This proposed scheme is robust to common signal processing and geometric attacks like JPEG compression, adding noise, filtering, and cropping, histogram equalization. This proposed scheme has more advantages and high quality measures compared to existing schemes in the literature.

  5. Biometric Template Security

    OpenAIRE

    Abhishek Nagar; Karthik Nandakumar; Anil K. Jain

    2008-01-01

    Biometric recognition offers a reliable solution to the problem of user authentication in identity management systems. With the widespread deployment of biometric systems in various applications, there are increasing concerns about the security and privacy of biometric technology. Public acceptance of biometrics technology will depend on the ability of system designers to demonstrate that these systems are robust, have low error rates, and are tamper proof. We present a high-level categorizat...

  6. Cancelable Biometrics - A Survey

    OpenAIRE

    Indira Chakravarthy; VVSSS. Balaram; B. Eswara Reddy

    2011-01-01

    In recent times Biometrics has emerged as a reliable, convenient and effective method of user authentication. However, with the increasing use of biometrics in several diverse applications, concerns about the privacy and security of biometric data contained in the database systems has increased. It is therefore imperative that Biometric systems instill confidence in the general public, by demonstrating that, these systems are robust, have low error rates and are tamper proof. In this context,...

  7. Insect Biometrics: Optoacoustic Signal Processing and Its Applications to Remote Monitoring of McPhail Type Traps.

    Science.gov (United States)

    Potamitis, Ilyas; Rigakis, Iraklis; Fysarakis, Konstantinos

    2015-01-01

    Monitoring traps are important components of integrated pest management applied against important fruit fly pests, including Bactrocera oleae (Gmelin) and Ceratitis capitata (Widemann), Diptera of the Tephritidae family, which effect a crop-loss/per year calculated in billions of euros worldwide. Pests can be controlled with ground pesticide sprays, the efficiency of which depends on knowing the time, location and extent of infestations as early as possible. Trap inspection is currently carried out manually, using the McPhail trap, and the mass spraying is decided based on a decision protocol. We introduce the term 'insect biometrics' in the context of entomology as a measure of a characteristic of the insect (in our case, the spectrum of its wingbeat) that allows us to identify its species and make devices to help face old enemies with modern means. We modify a McPhail type trap into becoming electronic by installing an array of photoreceptors coupled to an infrared emitter, guarding the entrance of the trap. The beating wings of insects flying in the trap intercept the light and the light fluctuation is turned to a recording. Custom-made electronics are developed that are placed as an external add-on kit, without altering the internal space of the trap. Counts from the trap are transmitted using a mobile communication network. This trap introduces a new automated remote-monitoring method different to audio and vision-based systems. We evaluate our trap in large number of insects in the laboratory by enclosing the electronic trap in insectary cages. Our experiments assess the potential of delivering reliable data that can be used to initialize reliably the spraying process at large scales but to also monitor the impact of the spraying process as it eliminates the time-lag between acquiring and delivering insect counts to a central agency.

  8. Bone graft healing in alveolar osteoplasty in patients with unilateral lip, alveolar process, and palate clefts.

    Science.gov (United States)

    Rychlik, Dariusz; Wójcicki, Piotr

    2012-01-01

    Secondary osteoplasty by means of autogenic spongy bone grafting is the most common procedure used in the reconstruction of the continuity of the maxillary alveolar process. The aim of the study was to analyze retrospectively the effect of certain factors on the course of the bone graft healing process in patients with unilateral complete clefts of the lip, alveolar process, and palate. The investigations involved 62 children aged 8 to 14 years (mean age, 11 years) with unilateral complete cleft of the lip, alveolar process, and palate operated on at the Clinic of Plastic Surgery in Polanica Zdrój from November 2007 to April 2009. All the procedures consisted in the reconstruction of the maxillary alveolar process by means of autogenic spongy bone grafting from the iliac bone. The analysis was performed on the basis of computed tomography scans presenting maxillary alveolar processes in the horizontal cross-sectional planes performed on the second or third postoperative day and after 6 months. They were used as the basis for the measurement of the volume and density (condensation) of the bone graft, the surface of its adhesion to the maxillary alveolar bone, and the volume and density of the healed bone. The following correlation coefficients were determined: between the adhesion surface of the bone to the alveolar bone and the volume of the healed bone, between the adhesion surface of the bone to the alveolar bone and the density of the healed bone, and between the density of the graft and the volume of the healed bone. Increasing the surface of the graft adhesion to the bone ridges of the alveolar cleft contributes to increased volume of the healed bone and slows down the increase in its density (on 6-month follow-up). Crushing of the bone graft increases its resorption and reduces volume of the healed bone.

  9. Biometrics and Identity Management

    DEFF Research Database (Denmark)

    management. BIOID 2008. The papers are categorized in four classes. These classes represent the 4 working groups of the COST Action 2101. For more information, see http://www.cost2101.org/.   Biometric data quality and multimodal biometric templates, Unsupervised interactive interfaces for multimodal...... security and border control scenarios it is now apparent that the widespread availability of biometrics in everyday life will also spin out an ever increasing number of (private) applications in other domains. Crucial to this vision is the management of the user's identity, which does not only imply...... biometrics, Biometric attacks and countermeasures, Standards and privacy issues for biometrics in identity documents and smart cards. BIOID 2008 is an initiative of the COST Action 2101 on Biometrics for Identity Documents and Smart Cards. It is supported by the EU Framework 7 Programme. Other sponsors...

  10. Modulation of ROS levels in fibroblasts by altering mitochondria regulates the process of wound healing.

    Science.gov (United States)

    Janda, Jaroslav; Nfonsam, Valentine; Calienes, Fernanda; Sligh, James E; Jandova, Jana

    2016-05-01

    Mitochondria are the major source of reactive oxygen species (ROS) in fibroblasts which are thought to be crucial regulators of wound healing with a potential to affect the expression of nuclear genes involved in this process. ROS generated by mitochondria are involved in all stages of tissue repair process but the regulation of ROS-generating system in fibroblasts still remains poorly understood. The purpose of this study was to better understand molecular mechanisms of how the regulation of ROS levels generated by mitochondria may influence the process of wound repair. Cybrid model system of mtDNA variations was used to study the functional consequences of altered ROS levels on wound healing responses in a uniform nuclear background of cultured ρ(0) fibroblasts. Mitochondrial ROS in cybrids were modulated by antioxidants that quench ROS to examine their ability to close the wound. Real-time PCR arrays were used to investigate whether ROS generated by specific mtDNA variants have the ability to alter expression of some key nuclear-encoded genes central to the wound healing response and oxidative stress. Our data suggest levels of mitochondrial ROS affect expression of some nuclear encoded genes central to wound healing response and oxidative stress and modulation of mitochondrial ROS by antioxidants positively affects in vitro process of wound closure. Thus, regulation of mitochondrial ROS-generating system in fibroblasts can be used as effective natural redox-based strategy to help treat non-healing wounds.

  11. Fourier domain asymmetric cryptosystem for privacy protected multimodal biometric security

    Science.gov (United States)

    Choudhury, Debesh

    2016-04-01

    We propose a Fourier domain asymmetric cryptosystem for multimodal biometric security. One modality of biometrics (such as face) is used as the plaintext, which is encrypted by another modality of biometrics (such as fingerprint). A private key is synthesized from the encrypted biometric signature by complex spatial Fourier processing. The encrypted biometric signature is further encrypted by other biometric modalities, and the corresponding private keys are synthesized. The resulting biometric signature is privacy protected since the encryption keys are provided by the human, and hence those are private keys. Moreover, the decryption keys are synthesized using those private encryption keys. The encrypted signatures are decrypted using the synthesized private keys and inverse complex spatial Fourier processing. Computer simulations demonstrate the feasibility of the technique proposed.

  12. The effect of chrysin-loaded nanofiber on wound healing process in male rat.

    Science.gov (United States)

    Mohammadi, Zoheyr; Sharif Zak, Mohsen; Majdi, Hasan; Seidi, Khaled; Barati, Meisam; Akbarzadeh, Abolfazl; Latifi, Ali Mohammad

    2017-12-01

    Wound healing is an inflammatory process. Chrysin, a natural flavonoid found in honey, has been recently investigated to have anti-inflammatory and antioxidant effects. In this work, the effects of chrysin-loaded nanofiber on the expressions of genes that are related to wound healing process such as P53, TIMPs, MMPs, iNOS, and IL-6 in an animal model study were evaluated. The electrospinning method was used for preparation the different concentrations of chrysin-loaded PCL-PEG nanofiber (5%, 10%, and 20% [w/w]) and characterized by FTIR and SEM. The wound healing effects of chrysin-loaded PCL-PEG nanofiber were in vivo investigated in rats, and the expressions of genes related to wound healing process were evaluated by real-time PCR. The study results showed chrysin-loaded PLC-PEG compared to chrysin ointment and control groups significantly increase IL-6, MMP-2, MMP-8, MMP-9, TIMP-1, and TIMP-2 (p healing. © 2017 John Wiley & Sons A/S.

  13. Effects of weight reduction surgery on the abdominal wall fascial wound healing process.

    Science.gov (United States)

    Krpata, David M; Criss, Cory N; Gao, Yue; Sadava, Emmanuel E; Anderson, James M; Novitsky, Yuri W; Rosen, Michael J

    2013-09-01

    Bariatric surgery patients enter into a catabolic state postoperatively, which can lead to an aberrant wound healing process. To improve the future treatment of morbidly obese patients, the aim of our study was to understand the link between bariatric surgery and alterations in the wound healing processes. A total of 18 morbidly obese Zucker rats were separated into three groups and underwent one of three surgical procedures: Roux-en-Y gastric bypass (RYGB; n = 6); sleeve gastrectomy (GS; n = 6); or midline laparotomy only (n = 6). The rats were weighed on postoperative day 0, 3, 7, and 14. On day 14, the abdominal wall was harvested and underwent histologic and biomechanical evaluation. A significant difference was found in the weight gain between the laparotomy control group (LC) and bariatric surgical groups at 7 and 14 d. By postoperative day 7, the GS and RYGB rats weighed significantly less than the LC group, losing, on average, 7% and 6% of their initial body weight, respectively, and the LC gained 4% of their weight (P gained 20% of their original weight, and the two bariatric groups both weighed significantly less (P bariatric surgery negatively affects wound healing both histologically and biomechanically compared with nonbariatric models. Although obesity remains a significant factor in the wound healing process, understanding the link between bariatric surgery and alterations in wound healing is imperative before advocating simultaneous repair of ventral hernias during concomitant bariatric surgery. Copyright © 2013 Elsevier Inc. All rights reserved.

  14. Dynamic Self-Healing Mechanism for Transactional Business Process

    Directory of Open Access Journals (Sweden)

    Yuhai Zhao

    2015-01-01

    Full Text Available It is clear that transactional behavior consistency is a prerequisite and basis for construction of a reliable services-based business application. However, in previous works, maintaining transactional consistency during exception handling was ignored. Maintaining transactional consistency requires functionality for rolling back some operations and revoking uploaded data. Replacing only the failed service will eventually lead to overall business application failure. In this study, we take fully into account the behavioral consistency of transactional services and propose two effective self-healing mechanisms for service-based applications. If a service enters into potential failure condition, a rescheduling mechanism is triggered to maintain consistent transactional behavior and to ensure reliable execution; if a service fails during execution, the compensation operation is triggered and the system will take action to ensure transactional behavior consistency. Meanwhile, cost-benefit analysis with compensation support is proposed to minimize the dynamic reselection cost. Finally, the experimental analysis shows that the proposed strategies can effectively guarantee the reliability of Web-based applications system.

  15. Biometric Template Security

    Directory of Open Access Journals (Sweden)

    Abhishek Nagar

    2008-03-01

    Full Text Available Biometric recognition offers a reliable solution to the problem of user authentication in identity management systems. With the widespread deployment of biometric systems in various applications, there are increasing concerns about the security and privacy of biometric technology. Public acceptance of biometrics technology will depend on the ability of system designers to demonstrate that these systems are robust, have low error rates, and are tamper proof. We present a high-level categorization of the various vulnerabilities of a biometric system and discuss countermeasures that have been proposed to address these vulnerabilities. In particular, we focus on biometric template security which is an important issue because, unlike passwords and tokens, compromised biometric templates cannot be revoked and reissued. Protecting the template is a challenging task due to intrauser variability in the acquired biometric traits. We present an overview of various biometric template protection schemes and discuss their advantages and limitations in terms of security, revocability, and impact on matching accuracy. A template protection scheme with provable security and acceptable recognition performance has thus far remained elusive. Development of such a scheme is crucial as biometric systems are beginning to proliferate into the core physical and information infrastructure of our society.

  16. Facile preparation of self-healing superhydrophobic CeO2 surface by electrochemical processes

    Science.gov (United States)

    Nakayama, Katsutoshi; Hiraga, Takuya; Zhu, Chunyu; Tsuji, Etsushi; Aoki, Yoshitaka; Habazaki, Hiroki

    2017-11-01

    Herein we report simple electrochemical processes to fabricate a self-healing superhydrophobic CeO2 coating on Type 304 stainless steel. The CeO2 surface anodically deposited on flat stainless steel surface is hydrophilic, although high temperature-sintered and sputter-deposited CeO2 surface was reported to be hydrophobic. The anodically deposited hydrophilic CeO2 surface is transformed to hydrophobic during air exposure. Specific accumulation of contaminant hydrocarbon on the CeO2 surface is responsible for the transformation to hydrophobic state. The deposition of CeO2 on hierarchically rough stainless steel surface produces superhydrophobic CeO2 surface, which also shows self-healing ability; the surface changes to superhydrophilic after oxygen plasma treatment but superhydrophobic state is recovered repeatedly by air exposure. This work provides a facile method for preparing a self-healing superhydrophobic surface using practical electrochemical processes.

  17. Biometric micromixer design

    Energy Technology Data Exchange (ETDEWEB)

    Wang, C.T.; Hu, Z.Y. [National I-Lan Univ., Taiwan (China). Dept. of Mechanical and Electromechanical Engineering; Shaw, C.K. [California Univ., Los Angeles, CA (United States). Dept. of Mechanical and Aerospace Engineering

    2008-07-01

    Fluid mixing in microchannels has many applications, and is particularly important in microfluidic systems for biochemistry and biomedical analysis, or for the production or organic compounds in microreactors. Micromixer development should take into consideration a simple system design with a high mixing efficiency and effective techniques for examining mixing efficiency. Mechanical stirring methods are not suitable for fluid mixing in microchannels because the flow inside microchannels is predominantly laminar and the Reynolds numbers are usually lower than 10. Improving the flexibility and performance of microfluidic systems by incorporating different processes such as fluid handling and fluid motion that cause rapid mixing on micro scale can be challenging. To achieve optimal mixing, an efficient micromixer usually involves complex 3-dimensional geometries which are used to enhance the fluid lamination, stretching and folding. In this study, a biometric concept imitated from distribution of human blood vessel was applied to passive micromixers to promote mixing efficiency. Microchannels of different widths were used to construct the biometric structure. The main advantages of the new design were a high mixing performance and lower pressure drop. Mixing performance was evaluated using a mixing index. The mixing efficiencies in the micromixer under different Reynolds numbers ranging from 1 to 10 were evaluated with a 370 {mu}m device. The main mixing mechanics in this type of passive micromixer was the convection effect. The 2D numerical results revealed that the mixing efficiency of the mixer was 0.876 at Reynolds ratio of 0.85. 9 refs., 3 tabs., 4 figs.

  18. Estimation of biometric parameters from cattle rump using free-hand scanning and a 3D data processing algorithm

    OpenAIRE

    Viana, Joao; Hinduja, Srichand; Da Silva Bartolo, Paulo Jorge

    2016-01-01

    The quantity and quality of phenotypic data recovered from farm animals became a bottleneck for breeding programmes, and new tools are required to overcome this problem. This study evaluated the use of a portable structured light scanner and a 3D modelling to recover biometric information of the rump region in cattle. Virtual 3D models were created based on coordinates extracted from the points-cloud obtained through reverse engineering. A MATLAB algorithm was implemented to identify referenc...

  19. Biometric citizenship and alienage

    DEFF Research Database (Denmark)

    Stenum, Helle

    . This paper asks if and how biometric techniques are the basis of a re-structuring of management of migration and mobility: Is the suggestion of biometric identifiers reflecting the withdrawal from the principle of rights applied to human beings as an abstract of the universal individual all being equal......, to the (re)introduction the concept of rights being engraved in your body, depended first and foremost on one’s birth, kinship and geography ? The paper will discuss biometric technology in a historical context and explore the apparent biometric divide between citizens and migrants, the latter positioned......Biometric identifiers (finger prints, face scans, iris scans etc.) have increasingly become a key element in technology of EU border and migration management. SIS II, EURODAC and VIS are centralized systems that contain fingerprints of different groups of non-EU citizen, and the biometric...

  20. Touchless fingerprint biometrics

    CERN Document Server

    Labati, Ruggero Donida; Scotti, Fabio

    2015-01-01

    Offering the first comprehensive analysis of touchless fingerprint-recognition technologies, Touchless Fingerprint Biometrics gives an overview of the state of the art and describes relevant industrial applications. It also presents new techniques to efficiently and effectively implement advanced solutions based on touchless fingerprinting.The most accurate current biometric technologies in touch-based fingerprint-recognition systems require a relatively high level of user cooperation to acquire samples of the concerned biometric trait. With the potential for reduced constraints, reduced hardw

  1. Hemodynamic study for the healing process of ruptured achilles tendon by dynamic MRI

    International Nuclear Information System (INIS)

    Mizuno, Toshiyuki; Hamanishi, Hiroji; Nishikawa, Tetsuo; Mizuno, Kosaku

    2000-01-01

    Dynamic MR imaging with a combination of fast MR imaging technique and intravenous bolus administration of Gd-DTPA is a useful method to evaluate the vascularity of the soft tissue. By using this technique, we evaluated the healing processes of ruptured Achilles tendon. Eighteen patients who underwent percutaneous suture of the ruptured Achilles tendon were examined monthly by dynamic MRI in their course of healing. We evaluated time intensity curve obtained from each data of dynamic MRI. Time intensity curve showed slow fill in-slow wash out pattern 4 weeks after operation. Eight weeks after operation, the time course of the fill in-wash out changed to be shorter. Rapid fill in-rapid wash out pattern was observed about 12 weeks after surgery. After that period, time intensity curve tended to change into non-fitting pattern. (normal pattern) Eight functional parameters were obtained from time-intensity curve. We analyzed which parameters are useful for evaluation of tendon healing. In addition, we studied the healing processes of rabbit Achilles tendon following surgical incision. Twelve rabbits underwent tenotomy of Achilles tendon. The tendons excised at 1, 2, 4, 6, 8, 10, 12 weeks after operation were examined using microangiography and a light microscope. Four weeks after tenotomy, many capillary vessels filled with Gd-DTPA were observed in the ruptured area. About 10 weeks after operation, the capillary vessels decreased and collageneous fibers were arranged along the long axis of the tendon. This term would be thought to correspond to the condition about 12-14 weeks after surgery in clinical cases. From this study, dynamic MRI is thought to be useful method to know the hemodynamic conditions of the healing tendons. Especially, four parameters-Mean Transit Time, Corrected Transit Time, Time to Peak, Inflection Width, -seemed to have absolute value and be useful for the quantitative evaluation of the healing processes in human Achilles tendon. (author)

  2. Hemodynamic study for the healing process of ruptured achilles tendon by dynamic MRI

    Energy Technology Data Exchange (ETDEWEB)

    Mizuno, Toshiyuki [Hyogo Rehabilitation Center (Japan); Hamanishi, Hiroji; Nishikawa, Tetsuo; Mizuno, Kosaku

    2000-12-01

    Dynamic MR imaging with a combination of fast MR imaging technique and intravenous bolus administration of Gd-DTPA is a useful method to evaluate the vascularity of the soft tissue. By using this technique, we evaluated the healing processes of ruptured Achilles tendon. Eighteen patients who underwent percutaneous suture of the ruptured Achilles tendon were examined monthly by dynamic MRI in their course of healing. We evaluated time intensity curve obtained from each data of dynamic MRI. Time intensity curve showed slow fill in-slow wash out pattern 4 weeks after operation. Eight weeks after operation, the time course of the fill in-wash out changed to be shorter. Rapid fill in-rapid wash out pattern was observed about 12 weeks after surgery. After that period, time intensity curve tended to change into non-fitting pattern. (normal pattern) Eight functional parameters were obtained from time-intensity curve. We analyzed which parameters are useful for evaluation of tendon healing. In addition, we studied the healing processes of rabbit Achilles tendon following surgical incision. Twelve rabbits underwent tenotomy of Achilles tendon. The tendons excised at 1, 2, 4, 6, 8, 10, 12 weeks after operation were examined using microangiography and a light microscope. Four weeks after tenotomy, many capillary vessels filled with Gd-DTPA were observed in the ruptured area. About 10 weeks after operation, the capillary vessels decreased and collageneous fibers were arranged along the long axis of the tendon. This term would be thought to correspond to the condition about 12-14 weeks after surgery in clinical cases. From this study, dynamic MRI is thought to be useful method to know the hemodynamic conditions of the healing tendons. Especially, four parameters-Mean Transit Time, Corrected Transit Time, Time to Peak, Inflection Width, -seemed to have absolute value and be useful for the quantitative evaluation of the healing processes in human Achilles tendon. (author)

  3. Biometric template revocation

    Science.gov (United States)

    Arndt, Craig M.

    2004-08-01

    Biometric are a powerful technology for identifying humans both locally and at a distance. In order to perform identification or verification biometric systems capture an image of some biometric of a user or subject. The image is then converted mathematical to representation of the person call a template. Since we know that every human in the world is different each human will have different biometric images (different fingerprints, or faces, etc.). This is what makes biometrics useful for identification. However unlike a credit card number or a password to can be given to a person and later revoked if it is compromised and biometric is with the person for life. The problem then is to develop biometric templates witch can be easily revoked and reissued which are also unique to the user and can be easily used for identification and verification. In this paper we develop and present a method to generate a set of templates which are fully unique to the individual and also revocable. By using bases set compression algorithms in an n-dimensional orthogonal space we can represent a give biometric image in an infinite number of equally valued and unique ways. The verification and biometric matching system would be presented with a given template and revocation code. The code will then representing where in the sequence of n-dimensional vectors to start the recognition.

  4. Radiographic monitoring of healing process of buccal bifurcation cysts after marsupialization: two cases

    International Nuclear Information System (INIS)

    Yoon, Suk Ja; Kang, Byung Cheol

    2004-01-01

    This report is to show healing process of two cases of buccal bifurcation cyst (BBC) developed from the mandibular deciduous second molars. Extracting the involved deciduous teeth led to marsupialization of the cysts and promoted eruption of the associated successors without orthodontic force. The cyst-associated premolars in the two cases erupted faster than the premolars on the contralateral noncyst side. The cysts were completely filled with normal bone. The monitoring radiographs showed bone healing, root formation, and path of eruption of the associated teeth after marsupialization of BBC.

  5. Radiographic monitoring of healing process of buccal bifurcation cysts after marsupialization: two cases

    Energy Technology Data Exchange (ETDEWEB)

    Yoon, Suk Ja; Kang, Byung Cheol [Chonnam National University College of Medicine, Kwangju (Korea, Republic of)

    2004-12-15

    This report is to show healing process of two cases of buccal bifurcation cyst (BBC) developed from the mandibular deciduous second molars. Extracting the involved deciduous teeth led to marsupialization of the cysts and promoted eruption of the associated successors without orthodontic force. The cyst-associated premolars in the two cases erupted faster than the premolars on the contralateral noncyst side. The cysts were completely filled with normal bone. The monitoring radiographs showed bone healing, root formation, and path of eruption of the associated teeth after marsupialization of BBC.

  6. Multimodal Biometric System- Fusion Of Face And Fingerprint Biometrics At Match Score Fusion Level

    Directory of Open Access Journals (Sweden)

    Grace Wangari Mwaura

    2017-04-01

    Full Text Available Biometrics has developed to be one of the most relevant technologies used in Information Technology IT security. Unimodal biometric systems have a variety of problems which decreases the performance and accuracy of these system. One way to overcome the limitations of the unimodal biometric systems is through fusion to form a multimodal biometric system. Generally biometric fusion is defined as the use of multiple types of biometric data or ways of processing the data to improve the performance of biometric systems. This paper proposes to develop a model for fusion of the face and fingerprint biometric at the match score fusion level. The face and fingerprint unimodal in the proposed model are built using scale invariant feature transform SIFT algorithm and the hamming distance to measure the distance between key points. To evaluate the performance of the multimodal system the FAR and FRR of the multimodal are compared along those of the individual unimodal systems. It has been established that the multimodal has a higher accuracy of 92.5 compared to the face unimodal system at 90 while the fingerprint unimodal system is at 82.5.

  7. Mindful Processing in Psychotherapy - Facilitating Natural Healing Process within Attuned Therapeutic Relationship

    Directory of Open Access Journals (Sweden)

    Gregor Žvelc

    2012-06-01

    Full Text Available Mindfulness is non-judgmental, accepting awareness of what is going on in the present moment. The author proposes that mindfulness promotes natural healing of the organism, where the change comes spontaneously by acceptance and awareness of internal experience. Such process the author describes as ‘mindful processing’, because with mindful awareness disturbing experiences can be processed and integrated. The author’s interest in how mindfulness can be systematically applied in psychotherapy led to the development of the ‘mindful processing’ method, which invites the client to become aware of the moment-to-moment subjective experience. The method is used within attuned therapeutic relationship and thetheoretical framework of Integrative Psychotherapy. Mindful Processing is not goal-oriented and doesn’t strive to achieve a positive outcome. Such an outcome is a natural by-product of accepting awareness of both pleasant and unpleasant inner experience (body sensations, affects and/or thoughts. The method is illustrated with a transcript of a session with commentary.

  8. Biomechanical models of damage and healing processes for voice health

    DEFF Research Database (Denmark)

    Granados Corsellas, Alba; Brunskog, Jonas; Jacobsen, Finn

    2013-01-01

    the vocal-fold plane are available. This data is used to improve existing continuum biomechanical models of the vocal-folds by analyzing the injury processes. The project is expected to result in methods that objectively demonstrate the impact of high voice-load on voice. A detailed description...

  9. Biometrics and privacy

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.

    2001-01-01

    Biometrics offers many alternatives for protecting our privacy and preventing us from falling victim to crime. Biometrics can even serve as a solid basis for safe anonymous and semi-anonymous legal transactions. In this article Jan Grijpink clarifies which concepts and practical applications this

  10. Iris and periocular biometrics

    CERN Document Server

    Rathgeb, Christian

    2017-01-01

    This book provides an overview of scientific fundamentals and principles of iris and periocular biometric recognition. It covers: an introduction to iris and periocular recognition; a selective overview of issues and challenges; soft biometric classification; security aspects; privacy protection and forensics; and future trends.

  11. Assessment of crushed salt consolidation and fracture healing processes in a nuclear waste repository in salt

    International Nuclear Information System (INIS)

    1984-11-01

    For a nuclear waste repository in salt, two aspects of salt behavior are expected to contribute to favorable conditions for waste isolation. First, consolidation of crushed salt backfill due to creep closure of the underground openings may result in a backfill barrier with low permeability. Second, fractures created in the salt by excavation may heal under the influence of stress and temperature following sealing. This report reviews the status of knowledge regarding crushed salt consolidation and fracture healing, provides analyses which predict the rates at which the processes will occur under repository conditions, and develops requirements for future study. Analyses of the rate at which crushed salt will consolidate are found to be uncertain because of unexplained wide variation in the creep properties of crushed salt obtained from laboratory testing, and because of uncertainties in predictions of long term closure rates of openings in salt. This uncertainty could be resolved to a large degree by additional laboratory testing of crushed salt. Similarly, additional testing of fracture healing processes is required to confirm that healing will be effective under repository conditions. Extensive references, 27 figures, 5 tables

  12. Cross Disciplinary Biometric Systems

    CERN Document Server

    Liu, Chengjun

    2012-01-01

    Cross disciplinary biometric systems help boost the performance of the conventional systems. Not only is the recognition accuracy significantly improved, but also the robustness of the systems is greatly enhanced in the challenging environments, such as varying illumination conditions. By leveraging the cross disciplinary technologies, face recognition systems, fingerprint recognition systems, iris recognition systems, as well as image search systems all benefit in terms of recognition performance.  Take face recognition for an example, which is not only the most natural way human beings recognize the identity of each other, but also the least privacy-intrusive means because people show their face publicly every day. Face recognition systems display superb performance when they capitalize on the innovative ideas across color science, mathematics, and computer science (e.g., pattern recognition, machine learning, and image processing). The novel ideas lead to the development of new color models and effective ...

  13. Autopoietic Theory as a Framework for Biometrics

    Directory of Open Access Journals (Sweden)

    Markus Schatten

    2009-01-01

    Full Text Available Autopoietic theory which represents a framework for describing complex non-linear and especially living systems is described in a context of biometric characteristics. It is argued that any living system by performing an internal process of reproducing its structural components yields physical biometric characteristics. Likewise any living system when structurally coupling to another (eventually allopoietic system yields a behavioral or psychological characteristic of the living system. It is shown that any system that can be considered as autopoietic can potentially be measured, authenticated and/or identified using adequate biometric methods, and thus biometrics is applicable to any autopoietic system: living beings, groups of living beings, social systems, organizations as well as information systems. In the end implications of such a conceptualization are discussed as well as possible applications.

  14. Crop Biometric Maps: The Key to Prediction

    Directory of Open Access Journals (Sweden)

    Francisco Rovira-Más

    2013-09-01

    Full Text Available The sustainability of agricultural production in the twenty-first century, both in industrialized and developing countries, benefits from the integration of farm management with information technology such that individual plants, rows, or subfields may be endowed with a singular “identity.” This approach approximates the nature of agricultural processes to the engineering of industrial processes. In order to cope with the vast variability of nature and the uncertainties of agricultural production, the concept of crop biometrics is defined as the scientific analysis of agricultural observations confined to spaces of reduced dimensions and known position with the purpose of building prediction models. This article develops the idea of crop biometrics by setting its principles, discussing the selection and quantization of biometric traits, and analyzing the mathematical relationships among measured and predicted traits. Crop biometric maps were applied to the case of a wine-production vineyard, in which vegetation amount, relative altitude in the field, soil compaction, berry size, grape yield, juice pH, and grape sugar content were selected as biometric traits. The enological potential of grapes was assessed with a quality-index map defined as a combination of titratable acidity, sugar content, and must pH. Prediction models for yield and quality were developed for high and low resolution maps, showing the great potential of crop biometric maps as a strategic tool for vineyard growers as well as for crop managers in general, due to the wide versatility of the methodology proposed.

  15. Crop biometric maps: the key to prediction.

    Science.gov (United States)

    Rovira-Más, Francisco; Sáiz-Rubio, Verónica

    2013-09-23

    The sustainability of agricultural production in the twenty-first century, both in industrialized and developing countries, benefits from the integration of farm management with information technology such that individual plants, rows, or subfields may be endowed with a singular "identity." This approach approximates the nature of agricultural processes to the engineering of industrial processes. In order to cope with the vast variability of nature and the uncertainties of agricultural production, the concept of crop biometrics is defined as the scientific analysis of agricultural observations confined to spaces of reduced dimensions and known position with the purpose of building prediction models. This article develops the idea of crop biometrics by setting its principles, discussing the selection and quantization of biometric traits, and analyzing the mathematical relationships among measured and predicted traits. Crop biometric maps were applied to the case of a wine-production vineyard, in which vegetation amount, relative altitude in the field, soil compaction, berry size, grape yield, juice pH, and grape sugar content were selected as biometric traits. The enological potential of grapes was assessed with a quality-index map defined as a combination of titratable acidity, sugar content, and must pH. Prediction models for yield and quality were developed for high and low resolution maps, showing the great potential of crop biometric maps as a strategic tool for vineyard growers as well as for crop managers in general, due to the wide versatility of the methodology proposed.

  16. Healing wounds - radiation processing technology for hydrogel dressing

    International Nuclear Information System (INIS)

    Varshney, Lalit

    2009-01-01

    Uses of hydrogels are known and have several applications in medical field. Drug delivery devices, contact lenses, wound dressing, artificial cartilage's or membranes, vascular prosthesis, gel coated catheters etc., are some of the examples. Due to direct relevance to human health, scientists have been continuously exploring these systems. Generally, hydro (water) gels contain 30-90% of water entrapped in a three dimensional network structure of a hydrophilic polymer. The large water content makes them highly bio-compatible and therefore preferred for use as biomaterials. Some of the hydrophilic polymers used in these applications include poly (vinyl pyrrolidone), poly (ethylene oxide), poly (vinyl alcohol) and poly (acrylic acid ). Depending upon the nature of application, the size of these hydrogel can vary from nanometers (nanogels, injectable hydrogels) to centimeters to meters (wound dressing, fire blankets, drug delivery devices and implants). BARC hydrogel dressings have been so far used for treating burns, leprosy ulcers, animal bites, diabetic foot ulcers, herpes, fresh scars, bullet injuries, boils, pimples, sun burns, abrasion, surgical wounds of breast cancer, as bolus for radiation therapy in cancer etc. The use of gels have shown excellent result in diabetic ulcers which definitely provides an alternate to expensive biotech products and relief to expanding population of diabetics in India. Its application and some of the examples are shown in the paper. Other hydrogel based products which are under development in the authors laboratory are radiation processed silver nano-particle hydrogels to treat infected wounds and fire blankets for whole body coverage for protection from fire for defense personnel and fire service people

  17. Experimental study on the healing process following laser welding of the cornea.

    Science.gov (United States)

    Rossi, Francesca; Pini, Roberto; Menabuoni, Luca; Mencucci, Rita; Menchini, Ugo; Ambrosini, Stefano; Vannelli, Gabriella

    2005-01-01

    An experimental study evaluating the application of laser welding of the cornea and the subsequent healing process is presented. The welding of corneal wounds is achieved after staining the cut walls with a solution of the chromophore indocyanine green, and irradiating them with a diode laser (810 nm) operating at low power (60 to 90 mW). The result is a localized heating of the cut, inducing controlled welding of the stromal collagen. In order to optimize this technique and to study the healing process, experimental tests, simulating cataract surgery and penetrating keratoplasty, were performed on rabbits: conventional and laser-induced suturing of corneal wounds were thus compared. A follow-up study 7 to 90 days after surgery was carried out by means of objective and histological examinations, in order to optimize the welding technique and to investigate the subsequent healing process. The analyses of the laser-welded corneas evidenced a faster and more effective restoration of the architecture of the stroma. No thermal damage of the welded stroma was detected, nor were there foreign body reactions or other inflammatory processes. Copyright 2005 Society of Photo-Optical Instrumentation Engineers.

  18. BIOMETRIC CRYPTOGRAPHY AND NETWORK AUTHENTICATION

    Directory of Open Access Journals (Sweden)

    Tonimir Kišasondi

    2007-06-01

    Full Text Available In this paper we will present some schemes for strengthening network authentification over insecure channels with biometric concepts or how to securely transfer or use biometric characteristics as cryptographic keys. We will show why some current authentification schemes are insufficient and we will present our concepts of biometric hashes and authentification that rely on unimodal and multimodal biometrics. Our concept can be applied on any biometric authentification scheme and is universal for all systems.

  19. Biometric systems - possibilities and dangers

    OpenAIRE

    Petržilka, Jakub

    2013-01-01

    This bachelor thesis is focused on biometric methods, particularly on fingerprint recognition. First part of thesis places biometric into other methods of people's identification. Identification by token and by knowledge. It also describes the beginning and evolution of biometric. The theoretical part also closely clarify working with data and different view on the biometric systems. The following part of the thesis defines the basic principles of using biometric systems, counting FAR and FRR...

  20. Modular Biometric Monitoring System

    Science.gov (United States)

    Chmiel, Alan J. (Inventor); Humphreys, Bradley T. (Inventor)

    2017-01-01

    A modular system for acquiring biometric data includes a plurality of data acquisition modules configured to sample biometric data from at least one respective input channel at a data acquisition rate. A representation of the sampled biometric data is stored in memory of each of the plurality of data acquisition modules. A central control system is in communication with each of the plurality of data acquisition modules through a bus. The central control system is configured to control communication of data, via the bus, with each of the plurality of data acquisition modules.

  1. Simplified Multimodal Biometric Identification

    Directory of Open Access Journals (Sweden)

    Abhijit Shete

    2014-03-01

    Full Text Available Multibiometric systems are expected to be more reliable than unimodal biometric systems for personal identification due to the presence of multiple, fairly independent pieces of evidence e.g. Unique Identification Project "Aadhaar" of Government of India. In this paper, we present a novel wavelet based technique to perform fusion at the feature level and score level by considering two biometric modalities, face and fingerprint. The results indicate that the proposed technique can lead to substantial improvement in multimodal matching performance. The proposed technique is simple because of no preprocessing of raw biometric traits as well as no feature and score normalization.

  2. Spectral OCT with speckle contrast reduction for evaluation of the healing process after PRK and transepithelial PRK.

    Science.gov (United States)

    Kaluzny, Bartlomiej J; Szkulmowski, Maciej; Bukowska, Danuta M; Wojtkowski, Maciej

    2014-04-01

    We evaluate Spectral OCT (SOCT) with a speckle contrast reduction technique using resonant scanner for assessment of corneal surface changes after excimer laser photorefractive keratectomy (PRK) and we compare healing process between conventional PRK and transepithelial PRK. The measurements were performed before and after the surgery. Obtained results show that SOCT with a resonant scanner speckle contrast reduction is capable of providing information regarding the healing process after PRK. The main difference between the healing processes of PRK and TransPRK, assessed by SOCT, was the time to cover the stroma with epithelium, which was shorter in the TransPRK group.

  3. [Investigation of the healing process of invaginated anastomoses in animal experiments].

    Science.gov (United States)

    Szücs, Géza; Barna, Tibor; Tóth, Imre; Bráth, Endre; Gyáni, Károly; Incze, Dénes; Mikó, Irén

    2003-04-01

    The telescopic anastomosis technique is not frequently used method, but its history could have been followed in the surgical literature since the beginning of the XXth century. Authors can use this technique successfully in their clinical practice performing esophago-gastrostomies, esophago-jejunostomies and ileo-colostomies. They would like to show the healing process of these kind of anastomoses in experimental work, using animal subjects, as data regarding this aspect is not found in the literature. The healing process of esophago-gastrostomies, and ileo-colostomies performed on dogs have been examined. 1. The invaginated esophageal or ileal segment (up to 30 mm length of submerged part) has not suffered from ischaemic damage. 2. The invaginated esophageal or ileal segment has been covered by the mucosa of the stomach or colon. 3. The physical strength of the anastomosis has arised gradually based this on the measured bursting pressure values. 4. The quality of the healing process has not depended on the length of the invaginated esophageal or ileal segment (up to 30 mm length of submerged part).

  4. Oxytocin promotes bone formation during the alveolar healing process in old acyclic female rats.

    Science.gov (United States)

    Colli, Vilma Clemi; Okamoto, Roberta; Spritzer, Poli Mara; Dornelles, Rita Cássia Menegati

    2012-09-01

    OT was reported to be a direct regulator of bone mass in young rodents, and this anabolic effect on bone is a peripheral action of OT. The goal of this study was to investigate the peripheral action of oxytocin (OT) in the alveolar healing process in old female rats. Females Wistar rats (24-month-old) in permanent diestrus phase, received two ip (12h apart) injections of saline (NaCl 0.15M - control group) or OT (45μg/rat - treated group). Seven days later, the right maxillary incisor was extracted and analyses were performed up to 28 days of the alveolar healing process (35 days after saline or OT administration). Calcium and phosphorus plasma concentrations did not differ between the groups. The plasma biochemical bone formations markers, alkaline phosphatase (ALP) and osteocalcin were significantly higher in the treated group. Histomorphometric analyses confirmed bone formation as the treated group presented the highest mean value of post-extraction bone formation. Tartrate-resistant acid phosphatase (TRAP) was significantly reduced in the treated group indicating an anti-resorptive effect of OT. Immunohistochemistry reactions performed in order to identify the presence of osteocalcin and TRAP in the bone cells of the dental socket confirmed these outcomes. OT was found to promote bone formation and to inhibit bone resorption in old acyclic female rats during the alveolar healing process. Published by Elsevier Ltd.

  5. Morphological studies on the healing process of tooth extraction wounds in whole body irradiated rats

    International Nuclear Information System (INIS)

    Hosokawa, Yoichiro

    1991-01-01

    The present studies were performed to investigate the healing process of the tooth extraction wound in whole body irradiated rats and to clarify the effect of irradiation on bone metabolism. One hundred and seven Wistar rats of about 100 g body weight were used and divided into 3 groups. Whole body irradiated rats were given single exposure with a dose of 8 Gy. The region of the left upper molars of local irradiated rats as controls, was exposed to 8 Gy. On the 7th day after irradiation, the left upper first molar of each rat was extracted. The rats were sacrificed at intervals of 1 to 14 days after extraction. Non-irradiated rats were sacrificed at the same intervals after extraction. The maxillary bone including the extraction wound was evaluated, histologically, histometrically and ultrastructurally. From the histological and histometrical findings, the difference of the healing process between non-irradiated rats and locally irradiated rats is not significant. In whole body irradiated rats, the healing process especially in the socket was disturbed. The osteoblastic new bone formation following production of granulation tissue was interfered with. Ultrastructurally, the cytoplasmic organellae were poorly developed in the osteoblast and osteoid formation was reduced in the socket. But periosteal new bone formation was the same as that of the locally irradiated rats. In whole body irradiated rats, the osteoclasts in the interradicular alveolar bone were decreased and have smaller nuclei, compared with non-irradiated and locally irradiated rats. Histometrically, the amount of bone loss was decreased in whole body irradiated rats. Ultrastructurally, the cyoplasmic organellae and ruffled border were poorly developed in the osteoclasts of whole body irradiated rats. The findings suggested that irradiation induced cytological changes not only in osteoblasts but in osteoclasts and these changes resulted in the delayed healing of extraction wound. (author) 106 refs

  6. Morphological studies on the healing process of tooth extraction wounds in whole body irradiated rats

    Energy Technology Data Exchange (ETDEWEB)

    Hosokawa, Yoichiro (Hokkaido Univ., Sapporo (Japan). School of Dentistry)

    1991-06-01

    The present studies were performed to investigate the healing process of the tooth extraction wound in whole body irradiated rats and to clarify the effect of irradiation on bone metabolism. One hundred and seven Wistar rats of about 100 g body weight were used and divided into 3 groups. Whole body irradiated rats were given single exposure with a dose of 8 Gy. The region of the left upper molars of local irradiated rats as controls, was exposed to 8 Gy. On the 7th day after irradiation, the left upper first molar of each rat was extracted. The rats were sacrificed at intervals of 1 to 14 days after extraction. Non-irradiated rats were sacrificed at the same intervals after extraction. The maxillary bone including the extraction wound was evaluated, histologically, histometrically and ultrastructurally. From the histological and histometrical findings, the difference of the healing process between non-irradiated rats and locally irradiated rats is not significant. In whole body irradiated rats, the healing process especially in the socket was disturbed. The osteoblastic new bone formation following production of granulation tissue was interfered with. Ultrastructurally, the cytoplasmic organellae were poorly developed in the osteoblast and osteoid formation was reduced in the socket. But periosteal new bone formation was the same as that of the locally irradiated rats. In whole body irradiated rats, the osteoclasts in the interradicular alveolar bone were decreased and have smaller nuclei, compared with non-irradiated and locally irradiated rats. Histometrically, the amount of bone loss was decreased in whole body irradiated rats. Ultrastructurally, the cyoplasmic organellae and ruffled border were poorly developed in the osteoclasts of whole body irradiated rats. The findings suggested that irradiation induced cytological changes not only in osteoblasts but in osteoclasts and these changes resulted in the delayed healing of extraction wound. (author) 106 refs.

  7. Enhancing the healing processes of chemical burns with He-Ne radiation

    International Nuclear Information System (INIS)

    Kakai, S.F.K.; Albarwari, S.E.; Alsenawi, T.A.

    1988-02-01

    The process by which He-Ne laser radiation (λ = 632.8 nm) enhances the healing of cutaneous wounds, made by concentrated nitric acid on mice has been studied. The dose used was of the order of 2.7 Joule per day, till the day of complete wound closure. The wounds were irradiated at three points on its periphery so that to form a semitriangular pattern this method was adopted, because chemical burns involve the killing of both the epidermis and dermis. The influence of the laser on the healing was estimated quantitatively and statistically, with a significance of p<0.001 over the control (the unirradiated). (author). 8 refs, 2 figs, 2 tabs

  8. DTIC Review: Biometric Security

    National Research Council Canada - National Science Library

    2007-01-01

    ...: Biometrics, the study of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits, is a critical tool used in law enforcement, computer security and homeland defense...

  9. Issues in Biometric Security

    African Journals Online (AJOL)

    Ogechukwu Iloanusi

    Human recognition is required for certain ... automated systems is that some can be stolen, passwords and PIN ... WORKS. A biometric system can be viewed as a simple diagram in figure 1. ... Feature extraction is done with the help of some.

  10. Biometrics Technology Review 2002

    National Research Council Canada - National Science Library

    Blackburn, T

    2003-01-01

    .... The report characterizes the main categories of biometric techniques, with a focus on face recognition, which is the least intrusive but most effective means of applying filters at access points to the country...

  11. Symbolic healing of early psychosis: psychoeducation and sociocultural processes of recovery.

    Science.gov (United States)

    Larsen, John Aggergaard

    2007-09-01

    This article analyzes sociocultural processes of recovery in a Danish mental health service providing two years of integrated biopsychosocial treatment following first-episode psychosis. The study is based on ethnographic research in the service and person-centered involvement with 15 clients. The analysis applies Dow's [1986 American Anthropologist 88:56-69] model of universal components of symbolic healing to elucidate sociocultural aspects of therapeutic efficacy that are alternatively disregarded as placebo or nonspecific effects. It is demonstrated how staff engaged with clients to deliver "psychoeducation" that provided scientific and biomedical theories about mental illness, constituting a shared "mythic world" that was accepted as an experiential truth and used to explain clients' illness experiences. The analysis highlights the need to supplement attention in Dow's model to the healing procedure with consideration of variability in the healing process. Depending on individual responses to the intervention, the staff's professional backgrounds and staff-client relationships different recovery models were applied. One suggested "episodic psychosis" and full recovery, and the other suggested "chronic schizophrenia" and the necessity of comprehensive life adjustments to the mental illness. The recovery models influenced clients' perspectives on illness and self as they engaged in identity work, negotiating future plans and individual life projects by including also alternative systems of explanation from the wider cultural repertoire.

  12. Alveolar bone healing process in spontaneously hypertensive rats (SHR). A radiographic densitometry study.

    Science.gov (United States)

    Manrique, Natalia; Pereira, Cassiano Costa Silva; Garcia, Lourdes Maria Gonzáles; Micaroni, Samuel; Carvalho, Antonio Augusto Ferreira de; Perri, Sílvia Helena Venturoli; Okamoto, Roberta; Sumida, Doris Hissako; Antoniali, Cristina

    2012-01-01

    Hypertension is one of the most important public health problems worldwide. If undiagnosed or untreated, this pathology represents a systemic risk factor and offers unfavorable conditions for dental treatments, especially those requiring bone healing. The purpose of this study was to demonstrate, by analysis of bone mineral density (BMD), that the alveolar bone healing process is altered in spontaneously hypertensive rats (SHRs). Wistar rats and SHRs were submitted to extraction of the upper right incisor and were euthanized 7, 14, 21, 28 and 42 days after surgery. Right maxillae were collected, radiographed and analyzed using Digora software. BMD was expressed as minimum (min), middle (med) and maximum (max) in the medium (MT) and apical (AT) thirds of the dental alveolus. The results were compared across days and groups. Wistar showed difference in med and max BMD in the MT between 7 and 28 and also between 14 and 28 days. The AT exhibited significant difference in med and min BMD between 7 and 28 days, as well as difference in min BMD between 28 and 42 days. SHRs showed lower med BMD in the MT at 28 days when compared to 21 and 42 days. Differences were observed across groups in med and min BMD at day 28 in the MT and AT; and in max BMD at 14, 21 and 42 days in the MT. These results suggest that the alveolar bone healing process is delayed in SHRs comparing with Wistar rats.

  13. Impact of Helicobacter pylori on the healing process of the gastric barrier

    Science.gov (United States)

    Mnich, Eliza; Kowalewicz-Kulbat, Magdalena; Sicińska, Paulina; Hinc, Krzysztof; Obuchowski, Michał; Gajewski, Adrian; Moran, Anthony P; Chmiela, Magdalena

    2016-01-01

    AIM To determine the impact of selected well defined Helicobacter pylori (H. pylori) antigens on gastric barrier cell turnover. METHODS In this study, using two cellular models of gastric epithelial cells and fibroblasts, we have focused on exploring the effects of well defined H. pylori soluble components such as glycine acid extract antigenic complex (GE), subunit A of urease (UreA), cytotoxin associated gene A protein (CagA) and lipopolysaccharide (LPS) on cell turnover by comparing the wound healing capacity of the cells in terms of their proliferative and metabolic activity as well as cell cycle distribution. Toxic effects of H. pylori components have been assessed in an association with damage to cell nuclei and inhibition of signal transducer and activator of transcription 3 (STAT3) phosphorylation. RESULTS We showed that H. pylori GE, CagA and UreA promoted regeneration of epithelial cells and fibroblasts, which is necessary for effective tissue healing. However, in vivo increased proliferative activity of these cells may constitute an increased risk of gastric neoplasia. In contrast, H. pylori LPS showed a dose-dependent influence on the process of wound healing. At a low concentration (1 ng/mL) H. pylori LPS accelerated of healing epithelial cells, which was linked to significantly enhanced cell proliferation and MTT reduction as well as lack of alterations in cell cycle and downregulation of epidermal growth factor (EGF) production as well as cell nuclei destruction. By comparison, H. pylori LPS at a high concentration (25 ng/mL) inhibited the process of wound repair, which was related to diminished proliferative activity of the cells, cell cycle arrest, destruction of cell nuclei and downregulation of the EGF/STAT3 signalling pathway. CONCLUSION In vivo H. pylori LPS driven effects might lead to the maintenance of chronic inflammatory response and pathological disorders on the level of the gastric mucosal barrier. PMID:27672275

  14. Pseudomonas aeruginosa infection alters the macrophage phenotype switching process during wound healing in diabetic mice.

    Science.gov (United States)

    Chen, Sinuo; Li, Renren; Cheng, Chun; Xu, Jing-Ying; Jin, Caixia; Gao, Furong; Wang, Juan; Zhang, Jieping; Zhang, Jingfa; Wang, Hong; Lu, Lixia; Xu, Guo-Tong; Tian, Haibin

    2018-03-07

    Macrophages play critical roles in wound healing process. They switch from "classically activated" (M1) phenotype in the early inflammatory phase to "alternatively activated" (M2) phenotype in the later healing phase. However, the dynamic process of macrophage phenotype switching in diabetic wounds burdened with bacteria is unclear. In this report, Pseudomonas aeruginosa, frequently detected in diabetic foot ulcers, was inoculated into cutaneous wounds of db/db diabetic mice to mimic bacterium-infected diabetic wound healing. We observed that P. aeruginosa infection impaired diabetic wound healing and quickly promoted the expression of pro-inflammatory genes (M1 macrophage markers) tumor necrosis factor-α (tnf-α), interleukin-1β (il-1β) and il-6 in wounds. The expression of markers of M2 macrophages, including il-10, arginase-1, and ym1 were also upregulated. In addition, similar gene expression patterns were observed in macrophages isolated directly from wounds. Immunostaining showed that P. aeruginosa infection increased both the ratios of M1 and M2 macrophages in wounds compared with that in control groups, which was further confirmed by in vitro culturing macrophages with P. aeruginosa and skin fibroblast conditioned medium. However, the ratios of the expression levels of pro-inflammatory genes to anti-inflammatory gene il-10 was increased markedly in P. aeruginosa infected wounds and macrophages compared with that in control groups, and P. aeruginosa prolonged the presence of M1 macrophages in the wounds. These data demonstrated that P. aeruginosa in diabetic wounds activates a mixed M1/M2 macrophage phenotype with an excessive activation of M1 phenotype or relatively inadequate activation of M2 phenotype. © 2018 International Federation for Cell Biology.

  15. Evaluation of Biometric Systems

    OpenAIRE

    El-Abed , Mohamad; Charrier , Christophe

    2012-01-01

    International audience; Biometrics is considered as a promising solution among traditional methods based on "what we own" (such as a key) or "what we know" (such as a password). It is based on "what we are" and "how we behave". Few people know that biometrics have been used for ages for identification or signature purposes. In 1928 for example, fingerprints were used for women clerical employees of Los Angeles police department as depicted in Figure 1. Fingerprints were also already used as a...

  16. Effect of Diabetes Condition on Topical Treatment of Binahong Leaf Fraction in Wound Healing Process

    Directory of Open Access Journals (Sweden)

    Kintoko Kintoko

    2017-08-01

    binahong leaf fractions. FADB 10% has significant differences potention in wound healing process in diabetic rats macroscopically that accelerates wound contraction compared with negative and positive control groups (p<0,05.

  17. Biometric identification using local iterated function

    Science.gov (United States)

    Al-Saidi, N. M. G.; Said, M. R. M.

    2014-06-01

    Biometric identification protocol has been received an increasing interest recently. It is a process that determines person identity by making use of their biometric features. A new biometric identification method is presented in this paper based on partial self-similarity that used to identify features within fingerprint images. This approach is already used in Fractal Image Compression (FIC) due to their ability to represent the images by a limited number of affine transformations, and its variation of scale, translation or rotation. These features give the recognition process high impact and good performance. To process data in a fingerprint image, it first converted into digital format using Optical Fingerprint Reader (OFR). The verification process is done by comparing these data with the server data. The system analysis shows that the proposed method is efficient in terms of memory and time complexity.

  18. Spectral OCT with speckle contrast reduction for evaluation of the healing process after PRK and transepithelial PRK

    OpenAIRE

    Kaluzny, Bartlomiej J.; Szkulmowski, Maciej; Bukowska, Danuta M.; Wojtkowski, Maciej

    2014-01-01

    We evaluate Spectral OCT (SOCT) with a speckle contrast reduction technique using resonant scanner for assessment of corneal surface changes after excimer laser photorefractive keratectomy (PRK) and we compare healing process between conventional PRK and transepithelial PRK. The measurements were performed before and after the surgery. Obtained results show that SOCT with a resonant scanner speckle contrast reduction is capable of providing information regarding the healing process after PRK....

  19. Biometric Technologies and Verification Systems

    CERN Document Server

    Vacca, John R

    2007-01-01

    Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavior

  20. Biometrics Theory, Methods, and Applications

    CERN Document Server

    Boulgouris, N V; Micheli-Tzanakou, Evangelia

    2009-01-01

    An in-depth examination of the cutting edge of biometrics. This book fills a gap in the literature by detailing the recent advances and emerging theories, methods, and applications of biometric systems in a variety of infrastructures. Edited by a panel of experts, it provides comprehensive coverage of:. Multilinear discriminant analysis for biometric signal recognition;. Biometric identity authentication techniques based on neural networks;. Multimodal biometrics and design of classifiers for biometric fusion;. Feature selection and facial aging modeling for face recognition;. Geometrical and

  1. Effectiveness of Enteral Nutritional Therapy in the Healing Process of Pressure Ulcers: A Systematic Review

    Directory of Open Access Journals (Sweden)

    Gisely Blanc

    2015-02-01

    Full Text Available OBJECTIVE To evaluate the effectiveness of enteral nutritional therapy (ENT in the healing process of pressure ulcers (PU in adults and the elderly. METHOD A systematic review whose studies were identified through the databases of Cochrane, MEDLINE/PubMed, SciELO, LILACS, EMBASE, CINAHL, Web of Science, and manual searches. It included randomized clinical trials (RCTs without delimiting the period or language of publication, which addressed adults and elderly patients with pressure ulcers in a comparative treatment of enteral nutritional therapy and placebo or between enteral nutritional therapy with different compositions and dosages. RESULTS We included ten studies that considered different interventions. It resulted in more pressure ulcers healed in the groups that received the intervention. The included studies were heterogeneous with regard to patients, the type of intervention, the sample and the follow-up period, all of which made meta-analysis impossible. CONCLUSION Although the enteral nutritional therapy demonstrates a promotion of pressure ulcer healing, sufficient evidence to confirm the hypothesis was not found.

  2. Effect of discarded keratin-based biocomposite hydrogels on the wound healing process in vivo

    Energy Technology Data Exchange (ETDEWEB)

    Park, Mira [Department of Organic Materials & Fiber Engineering, Chonbuk National University, Jeonju 561–756 (Korea, Republic of); Shin, Hye Kyoung [Department of Chemistry, Inha University, 100 Inharo, Incheon 402–751 (Korea, Republic of); Kim, Byoung-Suhk [Department of BIN fusion technology, Chonbuk National University, Jeonju 561–756 (Korea, Republic of); Kim, Myung Jin; Kim, In-Shik [Department of Veterinary Anatomy, College of Veterinary Medicine and Bio-safety Research institute, Chonbuk National University, Jeonju 561–756 (Korea, Republic of); Park, Byung-Yong, E-mail: parkb@jbnu.ac.kr [Department of Veterinary Anatomy, College of Veterinary Medicine and Bio-safety Research institute, Chonbuk National University, Jeonju 561–756 (Korea, Republic of); Kim, Hak-Yong, E-mail: khy@jbnu.ac.kr [Department of BIN fusion technology, Chonbuk National University, Jeonju 561–756 (Korea, Republic of)

    2015-10-01

    Biocompatible keratin-based hydrogels prepared by electron beam irradiation (EBI) were examined in wound healing. As the EBI dose increased to 60 kGy, the tensile strength of the hydrogels increased, while the percentage of elongation of the hydrogels decreased. After 7 days, the dehydrated wool-based hydrogels show the highest mechanical properties (the % elongation of 1341 and the tensile strength of 6030 g/cm{sup 2} at an EBI dose of 30 kGy). Excision wound models were used to evaluate the effects of human hair-based hydrogels and wool-based hydrogels on various phases of healing. On post-wounding days 7 and 14, wounds treated with either human hair-based or wool-based hydrogels were greatly reduced in size compared to wounds that received other treatments, although the hydrocolloid wound dressing-treated wound also showed a pronounced reduction in size compared to an open wound as measured by a histological assay. On the 14th postoperative day, the cellular appearances were similar in the hydrocolloid wound dressing and wool-based hydrogel-treated wounds, and collagen fibers were substituted with fibroblasts and mixed with fibroblasts in the dermis. Furthermore, the wound treated with a human hair-based hydrogel showed almost complete epithelial regeneration, with the maturation of immature connective tissue and hair follicles and formation of a sebaceous gland. - Highlights: • Biocompatible keratin-based hydrogels were examined for wound healing process. • Human hair-based hydrogel is superior to wool-based hydrogel in wound healing. • Discarded keratin-based hydrogels are expected more eco-friendly therapeutic agents.

  3. Overtime evaluation of the vascular HEALing process after everolimus-eluting stent implantation by optical coherence tomography. The HEAL-EES study

    Energy Technology Data Exchange (ETDEWEB)

    Otsuki, Shuji; Brugaletta, Salvatore, E-mail: sabrugal@clinic.ub.es; Sabaté, Manel; Shiratori, Yoshitaka; Gomez-Monterrosas, Omar; Scalone, Giancarla; Romero-Villafañe, Sebastian; Hernández-Enríquez, Marco; Freixa, Xavier; Martín-Yuste, Victoria; Masotti, Mónica

    2016-06-15

    Purpose: Second-generation drug-eluting stent (DES) have shown a better safety and efficacy as compared to first generation DES due to an improved vascular healing process. This process has not been so far evaluated in vivo in an overtime fashion by optical coherent tomography (OCT). We sought to evaluate the vascular healing process after everolimus-eluting stent (EES) implantation at 6, 9 and 12 months, by OCT. Methods: Consecutive 36 patients undergoing percutaneous coronary intervention with EES were randomized 1:1:1 to receive OCT imaging at 6 (group A), 9 (group B) or 12-month follow-up (group C). One patient from group C was excluded because of target lesion revascularization at 1-month, whereas 5 patients withdraw the informed consent. Finally, 30 patients were analyzed. Results: Neointimal thickness was not different between 3 groups (group A: 99.50 [94.06–127.79] μm, group B: 107.26 [83.48–133.59] μm, group C: 127.67 [102.51–138.49] μm; p = 0.736). Although the percentage of “uncovered struts” was significantly higher in group A as compared to the other groups (8.0% vs. 4.4% vs. 2.9%, respectively; p = 0.180), the ratio of uncovered to total struts per section < 30% was similar between 3 groups (0.3% vs. 0.3% vs. 0%, respectively; p = 1.000). Conclusion: Healing process following EES implantation seems almost completed at 6-month follow-up. These data, which need to be confirmed in a larger study, may support the decision to shorten dual antiplatelet therapy. - Highlights: • Healing process following everolimus-eluting stent implantation is complete at 6-month • There are no difference in RUTTS > 30% between 6, 9 and 12 months analyses. • This finding may support to shorten dual antiplatelet therapy in this context.

  4. Biometrical analysis in radiobiological works of N.V. Luchnik

    International Nuclear Information System (INIS)

    Glotov, N.V.

    1996-01-01

    The contribution of the famous Russian geneticist and biophysics N.V. Luchnik into biometrical analysis of radiobiological data is discussed. His works on radiation mortality of mice (2) and the process of post-radiation repair of chromosome aberrations (10) are thoroughly observed. The conclusion of necessity to develop biometrical analysis as separate part of biometry is made

  5. Measuring Biometric Sample Quality in terms of Biometric Feature Information in Iris Images

    Directory of Open Access Journals (Sweden)

    R. Youmaran

    2012-01-01

    Full Text Available This paper develops an approach to measure the information content in a biometric feature representation of iris images. In this context, the biometric feature information is calculated using the relative entropy between the intraclass and interclass feature distributions. The collected data is regularized using a Gaussian model of the feature covariances in order to practically measure the biometric information with limited data samples. An example of this method is shown for iris templates processed using Principal-Component Analysis- (PCA- and Independent-Component Analysis- (ICA- based feature decomposition schemes. From this, the biometric feature information is calculated to be approximately 278 bits for PCA and 288 bits for ICA iris features using Masek's iris recognition scheme. This value approximately matches previous estimates of iris information content.

  6. Biometrics: libraries have begun to see the value of biometrics

    OpenAIRE

    Panneerselvam, Selvi, M. G.

    2007-01-01

    It explains the Biometric Technologies which are becoming the foundation of an extensive array of highly secure identification and personal verification solution. Biometric devices with special reference to finger print recognition is dealt in detail. The benefits of Biometrics in Libraries, its employees and members are highlighted.

  7. Embedded System for Biometric Identification

    OpenAIRE

    Rosli, Ahmad Nasir Che

    2010-01-01

    This chapter describes the design and implementation of an Embedded System for Biometric Identification from hardware and software perspectives. The first part of the chapter describes the idea of biometric identification. This includes the definition of

  8. Intramembranous bone healing process subsequent to tooth extraction in mice: micro-computed tomography, histomorphometric and molecular characterization.

    Science.gov (United States)

    Vieira, Andreia Espindola; Repeke, Carlos Eduardo; Ferreira Junior, Samuel de Barros; Colavite, Priscila Maria; Biguetti, Claudia Cristina; Oliveira, Rodrigo Cardoso; Assis, Gerson Francisco; Taga, Rumio; Trombone, Ana Paula Favaro; Garlet, Gustavo Pompermaier

    2015-01-01

    Bone tissue has a significant potential for healing, which involves a significant the interplay between bone and immune cells. While fracture healing represents a useful model to investigate endochondral bone healing, intramembranous bone healing models are yet to be developed and characterized. In this study, a micro-computed tomography, histomorphometric and molecular (RealTimePCRarray) characterization of post tooth-extraction alveolar bone healing was performed on C57Bl/6 WT mice. After the initial clot dominance (0 h), the development of a provisional immature granulation tissue is evident (7 d), characterized by marked cell proliferation, angiogenesis and inflammatory cells infiltration; associated with peaks of growth factors (BMP-2-4-7,TGFβ1,VEGFa), cytokines (TNFα, IL-10), chemokines & receptors (CXCL12, CCL25, CCR5, CXCR4), matrix (Col1a1-2, ITGA4, VTN, MMP1a) and MSCs (CD105, CD106, OCT4, NANOG, CD34, CD146) markers expression. Granulation tissue is sequentially replaced by more mature connective tissue (14 d), characterized by inflammatory infiltrate reduction along the increased bone formation, marked expression of matrix remodeling enzymes (MMP-2-9), bone formation/maturation (RUNX2, ALP, DMP1, PHEX, SOST) markers, and chemokines & receptors associated with healing (CCL2, CCL17, CCR2). No evidences of cartilage cells or tissue were observed, strengthening the intramembranous nature of bone healing. Bone microarchitecture analysis supports the evolving healing, with total tissue and bone volumes as trabecular number and thickness showing a progressive increase over time. The extraction socket healing process is considered complete (21 d) when the dental socket is filled by trabeculae bone with well-defined medullary canals; it being the expression of mature bone markers prevalent at this period. Our data confirms the intramembranous bone healing nature of the model used, revealing parallels between the gene expression profile and the

  9. Intramembranous bone healing process subsequent to tooth extraction in mice: micro-computed tomography, histomorphometric and molecular characterization.

    Directory of Open Access Journals (Sweden)

    Andreia Espindola Vieira

    Full Text Available Bone tissue has a significant potential for healing, which involves a significant the interplay between bone and immune cells. While fracture healing represents a useful model to investigate endochondral bone healing, intramembranous bone healing models are yet to be developed and characterized. In this study, a micro-computed tomography, histomorphometric and molecular (RealTimePCRarray characterization of post tooth-extraction alveolar bone healing was performed on C57Bl/6 WT mice. After the initial clot dominance (0 h, the development of a provisional immature granulation tissue is evident (7 d, characterized by marked cell proliferation, angiogenesis and inflammatory cells infiltration; associated with peaks of growth factors (BMP-2-4-7,TGFβ1,VEGFa, cytokines (TNFα, IL-10, chemokines & receptors (CXCL12, CCL25, CCR5, CXCR4, matrix (Col1a1-2, ITGA4, VTN, MMP1a and MSCs (CD105, CD106, OCT4, NANOG, CD34, CD146 markers expression. Granulation tissue is sequentially replaced by more mature connective tissue (14 d, characterized by inflammatory infiltrate reduction along the increased bone formation, marked expression of matrix remodeling enzymes (MMP-2-9, bone formation/maturation (RUNX2, ALP, DMP1, PHEX, SOST markers, and chemokines & receptors associated with healing (CCL2, CCL17, CCR2. No evidences of cartilage cells or tissue were observed, strengthening the intramembranous nature of bone healing. Bone microarchitecture analysis supports the evolving healing, with total tissue and bone volumes as trabecular number and thickness showing a progressive increase over time. The extraction socket healing process is considered complete (21 d when the dental socket is filled by trabeculae bone with well-defined medullary canals; it being the expression of mature bone markers prevalent at this period. Our data confirms the intramembranous bone healing nature of the model used, revealing parallels between the gene expression profile and the

  10. X radiation effects on the wound healing process after tooth extraction. Histological study in rats

    International Nuclear Information System (INIS)

    Miguel, R.M.; Santos Pinto, R. dos; Okamoto, T.; Santos Pinto, M.C. dos

    1988-01-01

    The X radiation effects on the wound healing process after teeth extractions are studied histologically. Albino rats are employed. After their right upper incisors were extracted, they were divided into groups of 20 animals each. With exception of the group I (control), 24 hours after teeth extractions the groups II, III and IV received X radiation, respectively, in the dosage of 75,125 and 175 R. The rats were sacrificed in group of 4, at 3, 6, 9,15 and 21 postoperative days and a histological study is done. (M.A.C.) [pt

  11. [Biomechanical analysis on healing process of sagittal fracture of the mandibular condyle after rigid fixation].

    Science.gov (United States)

    Jing, Jie; Qu, Ai-li; Ding, Xiao-mei; Hei, Yu-na

    2015-04-01

    To analyze the biomechanical healing process on rigid fixation of sagittal fracture of the mandibular condyle (SFMC), and to provide guidelines for surgical treatment. Three-dimensional finite element model (3D-FEAM) of mandible and condyle was established. The right condyle was simulated as SFMC with 0.1 mm space across the condyle length ways. The 3D-FEAM of rigid fixation was established. The biomechanical factors such as stress distribution of condylar surface, displacement around fracture, stress on the plate and stress shielding were calculated during 0, 4, 8 and 12-week after rigid fixation. The maximum equivalent stress of normal condyle was located at the area of middle 1/3 of condylar neck. The maximum equivalent stress at 0-week after fixation was 23 times than that on normal condyle. They were located at the condylar stump and the plate near inferior punctual areas of fracture line. There were little stress on the other areas. The maximum equivalent stress at 4, 8 and 12-week was approximately 6 times than that on normal condyle. They were located at the areas same as the area at 0-week. There were little stress on the other areas at the condyle. The maximum total displacement and maximum total corner were increased 0.57-0.75 mm and 0.01-0.09° respectively during healing process. The maximum equivalent stress at 0-week on the condylar trump was 5-6 times compared with that at 4, 8, and 12-week. The maximum equivalent stress, maximum total displacement and maximum total corner on the fractured fragment were not changed significantly during healing process. The maximum equivalent stress at 0-week on the plate was 7-9 times compared with that at 4, 8, 12-week. The stress of the condyle and stress shielding of the plate may be the reasons of absorbing and rebuilding on the condyle in healing process of SFMC. The biomechanical parameters increase obviously at 4-week after fixation. Elastic intermaxillary traction is necessary to decrease total displacement

  12. Morphological studies on the healing process of extraction wound in irradiated rats

    International Nuclear Information System (INIS)

    Iizuka, Tadashi

    1984-01-01

    The present studies were performed to investigate the healing process of the extraction wound in irradiated rats and to clarify the effect of irradiation on bone formation and resorption. 282 Wistar rats of about 100g body weight were used. The region of the left upper molars of experimental rats was exposed to 1000 rad or 2000 rad of 60 Co. On the 7th day after irradiation, the left upper first molar of each rat was extracted. The rats were sacrificed at intervals of from 1 day to 28 days after extraction. Control rats were sacrificed at same intervals after extraction. The maxillary bone including the extraction wound was examined histologically, histometrically, histochemically and ultrastructurally. In irradiated rats, the healing process of extraction wound was disturbed. The osteoblastic new bone formation following production of granulation tissue and periosteal new bone formation was interfered. Histochemical examination revealed that the osteoblasts of irradiated rats reduced enzymatic activity compared with control rats. Ultrastructurally, the cytoplasmic organellae were poorly developed in the osteoblasts of irradiated rats and osteoid formation was reduced. In irradiated rats, the osteoclasts in the interradicular alveolar bone were more numerous and increased more rapidly as compared with control rats, whereas, histometrically, there was no significant difference in the amount of bone loss between control and irradiated rats. Histochemically, there was no distinct difference in the enzymatic activity in osteoclasts between control and irradiated rats. Ultrastructurally, the cytoplasmic organellae and ruffled border were poorly developed in the osteoclasts of irradiated rats. The findings suggest that irradiation induced cytological changes in not only oseoblasts but also osteoclasts and these changes resulted in the delayed healing of extraction wound. (author)

  13. Corneal topography measurements for biometric applications

    Science.gov (United States)

    Lewis, Nathan D.

    The term biometrics is used to describe the process of analyzing biological and behavioral traits that are unique to an individual in order to confirm or determine his or her identity. Many biometric modalities are currently being researched and implemented including, fingerprints, hand and facial geometry, iris recognition, vein structure recognition, gait, voice recognition, etc... This project explores the possibility of using corneal topography measurements as a trait for biometric identification. Two new corneal topographers were developed for this study. The first was designed to function as an operator-free device that will allow a user to approach the device and have his or her corneal topography measured. Human subject topography data were collected with this device and compared to measurements made with the commercially available Keratron Piccolo topographer (Optikon, Rome, Italy). A third topographer that departs from the standard Placido disk technology allows for arbitrary pattern illumination through the use of LCD monitors. This topographer was built and tested to be used in future research studies. Topography data was collected from 59 subjects and modeled using Zernike polynomials, which provide for a simple method of compressing topography data and comparing one topographical measurement with a database for biometric identification. The data were analyzed to determine the biometric error rates associated with corneal topography measurements. Reasonably accurate results, between three to eight percent simultaneous false match and false non-match rates, were achieved.

  14. Anatomy of Biometric Passports

    Directory of Open Access Journals (Sweden)

    Dominik Malčík

    2012-01-01

    Full Text Available Travelling is becoming available for more and more people. Millions of people are on a way every day. That is why a better control over global human transfer and a more reliable identity check is desired. A recent trend in a field of personal identification documents is to use RFID (Radio Frequency Identification technology and biometrics, especially (but not only in passports. This paper provides an insight into the electronic passports (also called e-passport or ePassport implementation chosen in the Czech Republic. Such a summary is needed for further studies of biometric passports implementation security and biometric passports analysis. A separate description of the Czech solution is a prerequisite for a planned analysis, because of the uniqueness of each implementation. (Each country can choose the implementation details within a range specified by the ICAO (International Civil Aviation Organisation; moreover, specific security mechanisms are optional and can be omitted.

  15. Anatomy of Biometric Passports

    Science.gov (United States)

    Malčík, Dominik; Drahanský, Martin

    2012-01-01

    Travelling is becoming available for more and more people. Millions of people are on a way every day. That is why a better control over global human transfer and a more reliable identity check is desired. A recent trend in a field of personal identification documents is to use RFID (Radio Frequency Identification) technology and biometrics, especially (but not only) in passports. This paper provides an insight into the electronic passports (also called e-passport or ePassport) implementation chosen in the Czech Republic. Such a summary is needed for further studies of biometric passports implementation security and biometric passports analysis. A separate description of the Czech solution is a prerequisite for a planned analysis, because of the uniqueness of each implementation. (Each country can choose the implementation details within a range specified by the ICAO (International Civil Aviation Organisation); moreover, specific security mechanisms are optional and can be omitted). PMID:22969272

  16. Anatomy of biometric passports.

    Science.gov (United States)

    Malčík, Dominik; Drahanský, Martin

    2012-01-01

    Travelling is becoming available for more and more people. Millions of people are on a way every day. That is why a better control over global human transfer and a more reliable identity check is desired. A recent trend in a field of personal identification documents is to use RFID (Radio Frequency Identification) technology and biometrics, especially (but not only) in passports. This paper provides an insight into the electronic passports (also called e-passport or ePassport) implementation chosen in the Czech Republic. Such a summary is needed for further studies of biometric passports implementation security and biometric passports analysis. A separate description of the Czech solution is a prerequisite for a planned analysis, because of the uniqueness of each implementation. (Each country can choose the implementation details within a range specified by the ICAO (International Civil Aviation Organisation); moreover, specific security mechanisms are optional and can be omitted).

  17. Modular biometric system

    Science.gov (United States)

    Hsu, Charles; Viazanko, Michael; O'Looney, Jimmy; Szu, Harold

    2009-04-01

    Modularity Biometric System (MBS) is an approach to support AiTR of the cooperated and/or non-cooperated standoff biometric in an area persistent surveillance. Advanced active and passive EOIR and RF sensor suite is not considered here. Neither will we consider the ROC, PD vs. FAR, versus the standoff POT in this paper. Our goal is to catch the "most wanted (MW)" two dozens, separately furthermore ad hoc woman MW class from man MW class, given their archrivals sparse front face data basis, by means of various new instantaneous input called probing faces. We present an advanced algorithm: mini-Max classifier, a sparse sample realization of Cramer-Rao Fisher bound of the Maximum Likelihood classifier that minimize the dispersions among the same woman classes and maximize the separation among different man-woman classes, based on the simple feature space of MIT Petland eigen-faces. The original aspect consists of a modular structured design approach at the system-level with multi-level architectures, multiple computing paradigms, and adaptable/evolvable techniques to allow for achieving a scalable structure in terms of biometric algorithms, identification quality, sensors, database complexity, database integration, and component heterogenity. MBS consist of a number of biometric technologies including fingerprints, vein maps, voice and face recognitions with innovative DSP algorithm, and their hardware implementations such as using Field Programmable Gate arrays (FPGAs). Biometric technologies and the composed modularity biometric system are significant for governmental agencies, enterprises, banks and all other organizations to protect people or control access to critical resources.

  18. Body, biometrics and identity.

    Science.gov (United States)

    Mordini, Emilio; Massari, Sonia

    2008-11-01

    According to a popular aphorism, biometrics are turning the human body into a passport or a password. As usual, aphorisms say more than they intend. Taking the dictum seriously, we would be two: ourself and our body. Who are we, if we are not our body? And what is our body without us? The endless history of identification systems teaches that identification is not a trivial fact but always involves a web of economic interests, political relations, symbolic networks, narratives and meanings. Certainly there are reasons for the ethical and political concerns surrounding biometrics but these reasons are probably quite different from those usually alleged.

  19. Animal biometrics: quantifying and detecting phenotypic appearance.

    Science.gov (United States)

    Kühl, Hjalmar S; Burghardt, Tilo

    2013-07-01

    Animal biometrics is an emerging field that develops quantified approaches for representing and detecting the phenotypic appearance of species, individuals, behaviors, and morphological traits. It operates at the intersection between pattern recognition, ecology, and information sciences, producing computerized systems for phenotypic measurement and interpretation. Animal biometrics can benefit a wide range of disciplines, including biogeography, population ecology, and behavioral research. Currently, real-world applications are gaining momentum, augmenting the quantity and quality of ecological data collection and processing. However, to advance animal biometrics will require integration of methodologies among the scientific disciplines involved. Such efforts will be worthwhile because the great potential of this approach rests with the formal abstraction of phenomics, to create tractable interfaces between different organizational levels of life. Copyright © 2013 Elsevier Ltd. All rights reserved.

  20. Mathematical and information maintenance of biometric systems

    Science.gov (United States)

    Boriev, Z.; Sokolov, S.; Nyrkov, A.; Nekrasova, A.

    2016-04-01

    This article describes the different mathematical methods for processing biometric data. A brief overview of methods for personality recognition by means of a signature is conducted. Mathematical solutions of a dynamic authentication method are considered. Recommendations on use of certain mathematical methods, depending on specific tasks, are provided. Based on the conducted analysis of software and the choice made in favor of the wavelet analysis, a brief basis for its use in the course of software development for biometric personal identification is given for the purpose of its practical application.

  1. Nano-copper-bearing stainless steel promotes fracture healing by accelerating the callus evolution process

    Directory of Open Access Journals (Sweden)

    Wang L

    2017-11-01

    superior for 317L-Cu SS. Histological staining displayed large amounts of fibrous tissues at 3 weeks, and cartilage and new bone at 6 weeks. Further, histomorphometric analysis indicated that the callus possessed higher osteogenic efficiency at 6 weeks, and a high Cu2+ content and increased Runx2 expression were observed in the callus for 317L-Cu SS. Besides, the mechanical strength of the fracture site was much better than that of the control group. Overall, we conclude that 317L-Cu SS possesses the ability to increase Cu2+ content and promote osteogenesis in the callus, which could accelerate the callus evolution process and bone formation to provide faster and better fracture healing. Keywords: nano-sized copper, lysyl oxidase, osteogenesis, fracture healing, callus evolution 

  2. Study of healing process and prognosis of medial femoral neck fracture evaluated by bone scintigraphy

    Energy Technology Data Exchange (ETDEWEB)

    Suzuki, K [Yokohama City Univ. (Japan). Faculty of Medicine

    1981-02-01

    As to healing process and prognosis of femoral neck fracture, radionuclide bone scintigraphy using sup(99m)Tc phosphorus compound was performed and the following results were obtained. 1. In cases of osteosynthesis, scintigraphical study showed a certain serial pattern until fracture was uneventfully healed. 2. On the other hand, in cases with non-union or late segmental collapse of the head, scintigraphy revealed defect at superolateral or central area in the head. This finding could be already noted prior to roentgenographical evaluation. 3. In the study of radionuclide uptake count on the femoral head of resected specimen, the higher value was observed in the area along medial fracture edge to medial margin of the head. Histological study showed feature of increased new bone formation at the area of higher radionuclide uptake. Vascular supply through the bone marrow of the neck and superior retinacular artery was thought to play an important role for the new bone formation. 4. From the aforementioned results, sup(99m)Tc phosphorus compound scintigraphy was considered as one of the quite useful methods for early diagnosis of complications after femoral neck fracture.

  3. Biometric Borders and Counterterrorism

    Science.gov (United States)

    2010-12-01

    licenses, credit cards, online retailers , and even military installations all rely on various methods to identify and authenticate individuals in... Malaysia ..................................................................................92 2. 2004—Pakistan and Belgium...first state to establish a national biometric screening program was Malaysia in 1998 with several others that followed suit in 2004–2006, many of which

  4. Proteolytic processing of connective tissue growth factor in normal ocular tissues and during corneal wound healing.

    Science.gov (United States)

    Robinson, Paulette M; Smith, Tyler S; Patel, Dilan; Dave, Meera; Lewin, Alfred S; Pi, Liya; Scott, Edward W; Tuli, Sonal S; Schultz, Gregory S

    2012-12-13

    Connective tissue growth factor (CTGF) is a fibrogenic cytokine that is up-regulated by TGF-β and mediates most key fibrotic actions of TGF-β, including stimulation of synthesis of extracellular matrix and differentiation of fibroblasts into myofibroblasts. This study addresses the role of proteolytic processing of CTGF in human corneal fibroblasts (HCF) stimulated with TGF-β, normal ocular tissues and wounded corneas. Proteolytic processing of CTGF in HCF cultures, normal animal eyes, and excimer laser wounded rat corneas were examined by Western blot. The identity of a 21-kDa band was determined by tandem mass spectrometry, and possible alternative splice variants of CTGF were assessed by 5' Rapid Amplification of cDNA Ends (RACE). HCF stimulated by TGF-β contained full length 38-kDa CTGF and fragments of 25, 21, 18, and 13 kDa, while conditioned medium contained full length 38- and a 21-kDa fragment of CTGF that contained the middle "hinge" region of CTGF. Fragmentation of recombinant CTGF incubated in HCF extracts was blocked by the aspartate protease inhibitor, pepstatin. Normal mouse, rat, and rabbit whole eyes and rabbit ocular tissues contained abundant amounts of C-terminal 25- and 21-kDa fragments and trace amounts of 38-kDa CTGF, although no alternative transcripts were detected. All forms of CTGF (38, 25, and 21 kDa) were detected during healing of excimer ablated rat corneas, peaking on day 11. Proteolytic processing of 38-kDa CTGF occurs during corneal wound healing, which may have important implications in regulation of corneal scar formation.

  5. Sodium hyaluronate accelerates the healing process in tooth sockets of rats.

    Science.gov (United States)

    Mendes, Renato M; Silva, Gerluza A B; Lima, Miguel F; Calliari, Marcelo V; Almeida, Alvair P; Alves, José B; Ferreira, Anderson J

    2008-12-01

    In this study we evaluated the effects of sodium hyaluronate (HY) in the healing process of tooth sockets of rats. Immediately after the extraction of the upper first molars of male Holtzman rats, right sockets were treated with 1% HY gel (approximately 0.1 ml), while left sockets were used as control (blood clot). The animals were sacrificed at 2, 7, and 21 days after tooth extraction and upper maxillaries processed for histological and morphometric analysis of the apical and medium thirds of the sockets. Carbopol, an inert gel, was used to evaluate the mechanical effect of gel injection into sockets. Expression of bone morphogenetic protein-2 (BMP-2) and osteopontin (OPN) was determined by immunohistochemistry at 1, 2, 3, 4, 5, and 7 days after tooth extraction. Histological analysis showed that HY treatment induced earlier trabecular bone deposition resulting in a bone matrix more organized at 7 and 21 days after tooth extraction. Also, HY elicited significant increase in the amount of bone trabeculaes at 7 and 21 days after tooth extraction (percentage of trabecular bone area at 7 days: 13.21+/-4.66% vs. 2.58+/-1.36% in the apical third of control sockets) and in the vessels counting at 7 days. Conversely, the number of cell nuclei was decreased in HY-treated sockets. Additionally, expression of BMP-2 and OPN was enhanced in HY-treated sockets compared with control sockets. These findings suggest that HY accelerates the healing process in tooth sockets of rats stimulating the expression of osteogenic proteins.

  6. Quantitative assessment of wound-healing process as a response to laser-induced micro-injuries

    Science.gov (United States)

    Liu, Yang; Bargo, Paulo; Kollias, Nikiforos

    2009-02-01

    Currently, most investigations of wound healing rely on invasive biopsy followed by histology and immunohistochemistry staining. There is a great need to develop non-invasive techniques for in vivo diagnostic, clinical and scientific evaluation. Here, we performed a comprehensive investigation on the dynamic wound healing process as a response to laser-induced microinjuries using non-invasive imaging techniques such as reflectance laser-scanning confocal microscopy and video microscopy. Eight healthy subjects ranging from Fitzpatrick skin type II-VI with age from 27 to 57 years were recruited. The volar forearm of each subject was treated with a laser device that generates an array of microbeams with an infrared wavelength. The microscopic changes of epidermal cells and collagen during the wound healing process were assessed non-invasively using confocal microscopy. We also developed a quantitative method to evaluate the dynamic wound healing process at the microscopic level in three areas of interest: (1) treated micro-wounding zone, (2) surrounding collateral damage zone and (3) normal area. The depth-dependent intensity profile derived from reflectance confocal microscope images clearly distinguishes the three areas of interest and quantitatively measures the cellular structure-associated changes. A progressive change in depth-dependent intensity profiles in subjects with different ages parallels the clinical observation of wound healing rate. The quantitative analysis developed in this study may find broad applications in assessing the skin response to treatment at a microscopic level.

  7. Differential expression of system L amino acid transporters during wound healing process in the skin of young and old rats.

    Science.gov (United States)

    Jeong, Moon-Jin; Kim, Chun Sung; Park, Joo-Cheol; Kim, Heung-Joong; Ko, Yeong Mu; Park, Kyung Jin; Jeong, Soon-Jeong; Endou, Hitoshi; Kanai, Yoshikatsu; Lim, Do-Seon; Kim, Do Kyung

    2008-03-01

    In order to elucidate the role of the system L-type amino acid transporters (LATs) in the wound healing process of aged and young subjects, we investigated the expression of LAT1, LAT2 and their subunit 4F2hc in the skin healing process after artificial wounds of dorsal skin in the young and old rats. The 1 cm full-thickness incisional wounds were made through the skin and panniculus carnosus muscle. The wounds were harvested at days 1, 3, 5 and 7 post-wounding, the experimental controls were harvested the skin of rat without wounds and the various analyses were performed. In young rats, gradually and noticeable wound healing was detected, however, in old rats, wound healing was found to be greatly delayed. In young rats, the expression of LAT1 was increased rapidly on the day 1 after wound induction, on the other hand, in old rats, the expression of LAT1 after wound induction was not different from the control group. In young rats, the expression of LAT2 after the induction of wound was not different from the control group, however in old rats, the expression of LAT2 on the day 1 of wound induction was rapidly elevated. These results suggest that the LAT1 and LAT2 increase in the wound healing process after cell injury in young and old rats, respectively.

  8. Healing process of incisor teeth of diabetic rats replanted after storage in milk.

    Science.gov (United States)

    Ricieri, Camila Benez; Sonoda, Celso Koogi; Aranega, Alessandra Marcondes; Panzarini, Sônia Regina; Poi, Wilson Roberto; Sundefeld, Maria Lúcia Marçal Mazza; Okamoto, Tetuo

    2009-06-01

    Several local factors that influence the healing process of replanted teeth have been investigated. However, it remains unclear how systemic alterations, such as diabetes mellitus, affect the prognosis of these cases. The purpose of this study was to evaluate the healing process of incisors of non-controlled diabetic rats replanted after storage in bovine long shelf-life (UHT) whole milk. Thirty-two rats were randomly assigned to receive an endovenous injection of either citrate buffer solution (group I - control; n = 16) or streptozotocin dissolved in citrate buffer solution to induce diabetes (group II; n = 16). After confirmation of the diabetic status by analysis of the glycemic levels, the maxillary right incisor of each animal was extracted and immersed in milk for 60 min. The root canals of teeth were then instrumented, and were filled with a calcium hydroxide-based dressing and replanted into their sockets. All animals received systemic antibiotic and were killed by anesthetic overdose 10 and 60 days after replantation. The specimens containing the replanted teeth were removed, fixed, decalcified, and embedded in paraffin. Semi-serial 6-microm-thick sections were obtained and stained with hematoxylin and eosin for histologic and histometric analyses. The results showed that the connective tissue adjacent to the root surface was less organized in the diabetic animals than in the control animals in both periods; the root dentin was less severely affected by root resorption in the diabetic rats; there were no significant differences between the control and diabetic groups regarding the occurrence of replacement resorption and inflammatory resorption.

  9. Secure method for biometric-based recognition with integrated cryptographic functions.

    Science.gov (United States)

    Chiou, Shin-Yan

    2013-01-01

    Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied.

  10. Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions

    Directory of Open Access Journals (Sweden)

    Shin-Yan Chiou

    2013-01-01

    Full Text Available Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied.

  11. On Biometrics With Eye Movements.

    Science.gov (United States)

    Zhang, Youming; Juhola, Martti

    2017-09-01

    Eye movements are a relatively novel data source for biometric identification. When video cameras applied to eye tracking become smaller and more efficient, this data source could offer interesting opportunities for the development of eye movement biometrics. In this paper, we study primarily biometric identification as seen as a classification task of multiple classes, and secondarily biometric verification considered as binary classification. Our research is based on the saccadic eye movement signal measurements from 109 young subjects. In order to test the data measured, we use a procedure of biometric identification according to the one-versus-one (subject) principle. In a development from our previous research, which also involved biometric verification based on saccadic eye movements, we now apply another eye movement tracker device with a higher sampling frequency of 250 Hz. The results obtained are good, with correct identification rates at 80-90% at their best.

  12. Bartus Iris biometrics

    Energy Technology Data Exchange (ETDEWEB)

    Johnston, R.; Grace, W.

    1996-07-01

    This is the final report of a one-year, Laboratory-Directed Research and Development (LDRD) project at the Los Alamos National Laboratory (LANL). We won a 1994 R&D 100 Award for inventing the Bartas Iris Verification System. The system has been delivered to a sponsor and is no longer available to us. This technology can verify the identity of a person for purposes of access control, national security, law enforcement, forensics, counter-terrorism, and medical, financial, or scholastic records. The technique is non-invasive, psychologically acceptable, works in real-time, and obtains more biometric data than any other biometric except DNA analysis. This project sought to develop a new, second-generation prototype instrument.

  13. Towards non-repudiable authentication through biometrics and smart cards

    CSIR Research Space (South Africa)

    Msiza, I

    2012-10-01

    Full Text Available ? biometrics and smart cards Part B: Biometrics ? CSIR 2012 Slide 7 Biometric Authentication ? CSIR 2012 Slide 8 ? A science that uses a person?s behavioral and/or physiological traits to establish their identify, or verify their claimed identity.../or characteristics of some thing ? This thing can be anything, however in the context of this discussion, this thing could be a person, a network device, or even an identity authentication device itself ? This act or process of verifying these attributes could...

  14. Developing a multimodal biometric authentication system using soft computing methods.

    Science.gov (United States)

    Malcangi, Mario

    2015-01-01

    Robust personal authentication is becoming ever more important in computer-based applications. Among a variety of methods, biometric offers several advantages, mainly in embedded system applications. Hard and soft multi-biometric, combined with hard and soft computing methods, can be applied to improve the personal authentication process and to generalize the applicability. This chapter describes the embedded implementation of a multi-biometric (voiceprint and fingerprint) multimodal identification system based on hard computing methods (DSP) for feature extraction and matching, an artificial neural network (ANN) for soft feature pattern matching, and a fuzzy logic engine (FLE) for data fusion and decision.

  15. The biometric-based module of smart grid system

    Science.gov (United States)

    Engel, E.; Kovalev, I. V.; Ermoshkina, A.

    2015-10-01

    Within Smart Grid concept the flexible biometric-based module base on Principal Component Analysis (PCA) and selective Neural Network is developed. The formation of the selective Neural Network the biometric-based module uses the method which includes three main stages: preliminary processing of the image, face localization and face recognition. Experiments on the Yale face database show that (i) selective Neural Network exhibits promising classification capability for face detection, recognition problems; and (ii) the proposed biometric-based module achieves near real-time face detection, recognition speed and the competitive performance, as compared to some existing subspaces-based methods.

  16. Environmental Testing Methodology in Biometrics

    OpenAIRE

    Fernández Saavedra, Belén; Sánchez Reíllo, Raúl; Alonso Moreno, Raúl; Miguel Hurtado, Óscar

    2010-01-01

    8 pages document + 5-slide presentation.-- Contributed to: 1st International Biometric Performance Conference (IBPC 2010, NIST, Gaithersburg, MD, US, Mar 1-5, 2010). Recently, biometrics is used in many security systems and these systems can be located in different environments. As many experts claim and previous works have demonstrated, environmental conditions influence biometric performance. Nevertheless, there is not a specific methodology for testing this influence at the moment...

  17. Biometrics Go Mainstream

    Science.gov (United States)

    Gale, Doug

    2006-01-01

    Authentication is based on something one knows (e.g., a password), something one has (e.g., a driver's license), or something one is (e.g., a fingerprint). The last of these refers to the use of biometrics for authentication. With the blink of an eye, the touch of a finger, or the uttering of a pass-phrase, colleges and schools can now get deadly…

  18. Early healing of the alveolar process after tooth extraction: an experimental study in the beagle dog.

    Science.gov (United States)

    Discepoli, Nicola; Vignoletti, Fabio; Laino, Luigi; de Sanctis, Massimo; Muñoz, Fernando; Sanz, Mariano

    2013-06-01

    To describe the early healing events in the alveolar socket during the first 8 weeks of spontaneous healing after tooth extraction. 16 adult beagle dogs were selected and five healing periods were analysed (4 h, 1 week, 2 weeks, 4 weeks, 8 weeks). Mandibular premolars were extracted and each socket corresponding to the mesial root was left to heal undisturbed. In each healing period, three animals were euthanatized, each providing four study sites. Healing was assessed by descriptive histology and by histometric analysis using as landmarks: the vertical distance between buccal and lingual crest (B'L') and the width of buccal and lingual walls at three different levels. Differences between means for each variable for each healing period were compared (ANOVA; p healing period to a final value of 0.18 (0.08) mm. The lingual width (Lw) remains almost unchanged while the buccal width (Bw) at 1 (Bw1) and 2 (Bw2) mm was reduced in about 40% of its initial value. Minor vertical bone reduction in both the buccal and lingual socket walls were observed. A marked horizontal reduction of the buccal bone wall was observed mostly in its coronal aspect. © 2013 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  19. Healing agent in cement-based materials and structures, and process for its preparation

    NARCIS (Netherlands)

    Jonkers, H.M.

    2009-01-01

    The present invention relates to healing agent in cement-based materials and structures, wherein said healing agent comprises organic compounds and/or bacteria-loaded porous particles, which porous particles comprise expanded clay- or sintered fly ash. Furthermore, said porous particles are intact

  20. Analysis and comparison of biometric methods

    OpenAIRE

    Zatloukal, Filip

    2011-01-01

    The thesis deals with biometrics and biometric systems and the possibility to use these systems in the enterprise. Aim of this study is an analysis and description of selected types of biometric identification methods and their advantages and shortcomings. The work is divided into two parts. The first part is theoretical, describes the basic concepts of biometrics, biometric identification criteria, currently used identification systems, the ways of biometric systems use, performance measurem...

  1. Applying intelligent statistical methods on biometric systems

    OpenAIRE

    Betschart, Willie

    2005-01-01

    This master’s thesis work was performed at Optimum Biometric Labs, OBL, located in Karlskrona, Sweden. Optimum Biometric Labs perform independent scenario evaluations to companies who develop biometric devices. The company has a product Optimum preConTM which is surveillance and diagnosis tool for biometric systems. This thesis work’s objective was to develop a conceptual model and implement it as an additional layer above the biometric layer with intelligence about the biometric users. The l...

  2. Biochemical process of ureolysis-based microbial CaCO3 precipitation and its application in self-healing concrete.

    Science.gov (United States)

    Xu, Jing; Wang, Xianzhi; Wang, Binbin

    2018-04-01

    Urea hydrolysis has already been considered as the most effective pathway for microbially induced CaCO 3 precipitation (MICP). The present work first studied the combination of several key factors including initial pH, temperature, and dosage of urea, which contribute to the biochemical process of MICP. Under an amiable condition of pH and temperature, the dosage of urea has a significant impact on the rate of urea degradation and CaCO 3 precipitation. A bacteria-based self-healing system was developed by loading healing agents on ceramsite carriers. The self-healing efficiency was evaluated by visual inspection on crack closure, compressive strength regain, and capillary water absorption. A preferable healing effectiveness was obtained when the bacteria and organic nutrients were co-immobilized in carriers. Image analysis showed that cracks up to 273 μm could be healed with a crack closure ratio of 86% in 28 days. The compressive strength regain increased 24% and the water absorption coefficient decreased 27% compared to the reference. The findings indicated a promising application of ureolysis-based MICP in restoring the mechanical properties and enhancing the durability of concrete.

  3. Extracting forensic evidence from biometric devices

    Science.gov (United States)

    Geradts, Zeno J.; Ruifrok, Arnout C.

    2003-08-01

    Over the past few years, both large multinationals and governments have begun to contribute to even larger projects on biometric devices. Terrorist attacks in America and in other countries have highlighted the need for better identification systems for people as well as improved systems for controlling access to buildings. Another reason for investment in Research and Development in Biometric Devices, is the massive growth in internet-based systems -- whether for e-commerce, e-government or internal processes within organizations. The interface between the system and the user is routinely abused, as people have to remember many complex passwords and handle tokens of various types. In this paper an overview is given of the information that is important to know before an examination of such is systems can be done in a forensic proper way. In forensic evidence with biometric devices the forensic examiner should consider the possibilities of tampering with the biometric systems or the possibilities of unauthorized access before drawing conclusions.

  4. Biometrics: Multi-Service Tactics, Techniques, and Procedures for Tactical Employment of Biometrics in Support of Operations

    Science.gov (United States)

    2016-05-01

    Biometrics in Support of Operations Biometrics -at-Sea: Business Rules for South Florida United States...Intelligence Activities Biometrics -Enabled Intelligence USCG Biometrics -at-Sea: Business Rules for...Defense Biometrics United States Intelligence Activities Active Army,

  5. The effectiveness of platelet-rich plasma on the skin wound healing process: A comparative experimental study in sheep

    Directory of Open Access Journals (Sweden)

    Daikh Badis

    2018-06-01

    Full Text Available Aim: The therapeutic evaluation of the biological effect of platelet-rich plasma (PRP used as a surgical adjunct to maintain the inflammatory process and to potentiate tissue healing, make the subject of recent research in regenerative medicine. This study was designed to evaluate the healing activity of PRP by its topical application on the skin experimentally injured in a sheep model. Materials and Methods: The study was conducted on 9 adult and clinically healthy males sheep. PRP was obtained by a protocol of double centrifugation of whole blood from each animal. After sterile skin preparation, full-thickness excisional wounds (20 mm x 20 mm were created on the back of each animal. The animals were randomly divided into three equal groups of three sheep for each. In Group I, the wounds were treated with PRP, in Group II; wounds were treated with Asiaticoside; in Group III, wounds were treated with saline solution. The different treatments were administered topically every 3 days. Morphometric measurements of the contraction surface of the wounds and histopathological biopsies were carried out at the 3rd, 7th, 14th, 21st, and 28th days of healing. Results: The results of the morphometric data obtained revealed that it was significant differences recorded at the 7th and 14th day of healing in favor for animals of Group I. Semi-quantitative histopathological evaluation showed that PRP reduces inflammation during 3 first days post-surgical and promotes epithelialization in 3 weeks of healing. Conclusion: We concluded that topical administration of PRP obtained by double centrifugation protocol could potentially improve the skin healing process in sheep.

  6. Enrollment Time as a Requirement for Biometric Hand Recognition Systems

    OpenAIRE

    Carvalho, João; Sá, Vítor; Tenreiro de Magalhães, Sérgio; Santos, Henrique

    2015-01-01

    Biometric systems are increasingly being used as a means for authentication to provide system security in modern technologies. The performance of a biometric system depends on the accuracy, the processing speed, the template size, and the time necessary for enrollment. While much research has focused on the first three factors, enrollment time has not received as much attention. In this work, we present the findings of our research focused upon studying user’s behavior when enrolling in...

  7. Biometrics — Developments and Potential

    NARCIS (Netherlands)

    Meuwly, Didier; Veldhuis, Raymond N.J.

    2014-01-01

    This article describes the use of biometric technology in forensic science, for the development of new methods and tools, improving the current forensic biometric applications, and allowing for the creation of new ones. The article begins with a definition and a summary of the development of this

  8. Logistic Map for Cancellable Biometrics

    Science.gov (United States)

    Supriya, V. G., Dr; Manjunatha, Ramachandra, Dr

    2017-08-01

    This paper presents design and implementation of secured biometric template protection system by transforming the biometric template using binary chaotic signals and 3 different key streams to obtain another form of template and demonstrating its efficiency by the results and investigating on its security through analysis including, key space analysis, information entropy and key sensitivity analysis.

  9. Biometric Communication Research for Television.

    Science.gov (United States)

    Malik, M. F.

    Biometric communication research is defined as research dealing with the information impact of a film or television show, photographic picture, painting, exhibition, display, or any literary or functional texts or verbal stimuli on human beings, both as individuals and in groups (mass audiences). Biometric communication research consists of a…

  10. Effect of eccentric exercise on the healing process of injured patellar tendon in rats

    OpenAIRE

    Nakamura, Kenichi; Kitaoka, Katsuhiko; Tomita, Katsuro

    2008-01-01

    Background. Earlier studies have reported positive results from eccentric training in patients with tendon disorders. The reasons for the beneficial clinical effects of eccentric training are not known. Vascularization followed by regression of the vasculature enhances the healing response of injured tendons. Eccentric exercise induces a more beneficial healing response than concentric exercise. Methods. Sixty rats with patellar tendon injuries were divided into three groups: nonexercise cont...

  11. Soft biometrics in conjunction with optics based biohashing

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2011-02-01

    Biometric systems are gaining importance because of increased reliability for authentication and identification. A biometric recognition technique has been proposed earlier, in which biohashing code has been generated by using a joint transform correlator. The main drawback of the base biohashing method is the low performance of the technique when an "impostor" steals the pseudo-random numbers of the genuine and tries to authenticate as genuine. In the proposed technique, soft biometrics of the same person has been used to improve the discrimination between the genuine and the impostor populations. The soft biometrics are those characteristics that provide some information about the individual, but lack the distinctiveness and permanence to sufficiently differentiate between any two individuals. In the enrolment process, biohash code of the target face images has been integrated with the different soft biometrics of the same person. The obtained code has been stored for verification. In the verification process, biohash code of the face image to be verified is again diffused with the soft biometric of the person. The obtained code is matched with the stored code of the target. The receiving operating characteristic (ROC) curve and the equal error rate (EER) have been used to evaluate the performance of the technique. A detailed study has been carried out to find out the optimum values of the weighting factor for the diffusion process.

  12. Combining Cryptography with EEG Biometrics.

    Science.gov (United States)

    Damaševičius, Robertas; Maskeliūnas, Rytis; Kazanavičius, Egidijus; Woźniak, Marcin

    2018-01-01

    Cryptographic frameworks depend on key sharing for ensuring security of data. While the keys in cryptographic frameworks must be correctly reproducible and not unequivocally connected to the identity of a user, in biometric frameworks this is different. Joining cryptography techniques with biometrics can solve these issues. We present a biometric authentication method based on the discrete logarithm problem and Bose-Chaudhuri-Hocquenghem (BCH) codes, perform its security analysis, and demonstrate its security characteristics. We evaluate a biometric cryptosystem using our own dataset of electroencephalography (EEG) data collected from 42 subjects. The experimental results show that the described biometric user authentication system is effective, achieving an Equal Error Rate (ERR) of 0.024.

  13. A bimodal biometric identification system

    Science.gov (United States)

    Laghari, Mohammad S.; Khuwaja, Gulzar A.

    2013-03-01

    Biometrics consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. Physicals are related to the shape of the body. Behavioral are related to the behavior of a person. However, biometric authentication systems suffer from imprecision and difficulty in person recognition due to a number of reasons and no single biometrics is expected to effectively satisfy the requirements of all verification and/or identification applications. Bimodal biometric systems are expected to be more reliable due to the presence of two pieces of evidence and also be able to meet the severe performance requirements imposed by various applications. This paper presents a neural network based bimodal biometric identification system by using human face and handwritten signature features.

  14. Spirulina chitosan gel induction on healing process of Cavia cobaya post extraction socket

    Directory of Open Access Journals (Sweden)

    Rostiny Rostiny

    2014-03-01

    Full Text Available Background: Prominent residual ridge is necessary to gain retention and stabilility for succesful prosthodontic treatment such as removable, fixed or implant. Spirulina is a natural substance that can help tissue healing and chitosan also a natural substance that reported to have the ability to help bone remodelling. The combination gel of spirulina and chitosan could be considered as an alternative material to maintain residual ridge height after tooth extraction. Purpose: The aim of study was to examine the effect of combination gel of Spirulina and chitosan on healing process of Cavia cobaya post tooth extraction socket by counting the amount of osteoclast, osteoblast and colagen as an indicator. Methods: Twenty eight cavia cobaya were divided into 4 groups. Insisive mandible extraction was done and the sockets were filled with 3% CMCNa for control groups, 3% spirulina chitosan 200 mg for group 1, 6% spirulina chitosan 200 mg for group 2, 12% spirulina chitosan 200 mg for group 3. After 30 days, histopathology examination was done by using microscope to count the amount of osteoclast, osteoblast and collagen. Results: Data was analyzed by using Anova and Tukey HSD. For osteoclast, there was no significant different between every groups, while for osteoblast and collagen there was significant different between groups. The results showed that induction of combination gel spirulina chitosan was able to accumulate collagen fiber and resulting faster wound healing. Conclusion: Combination 12% gel spirulina chitosan 200 mg could be used as an alternative material for better bone remodeling after tooth extraction.Latar belakang: Residual ridge yang prominen sangat dibutuhkan untuk mendapatkan retensi dan stabilitas untuk menunjang keberhasilan perawatan di bidang prostodonsia seperti pada kasus removable, fixed atau implant. Tindakan pencabutan gigi dapat merusak jaringan periodontal, sementum dan tulang alveolar yang mengakibatkan resorbsi ridge

  15. Topical 5% potassium permanganate solution accelerates the healing process in chronic diabetic foot ulcers.

    Science.gov (United States)

    Delgado-Enciso, Iván; Madrigal-Perez, Violeta M; Lara-Esqueda, Agustin; Diaz-Sanchez, Martha G; Guzman-Esquivel, Jose; Rosas-Vizcaino, Luis E; Virgen-Jimenez, Oscar O; Kleiman-Trujillo, Juleny; Lagarda-Canales, Maria R; Ceja-Espiritu, Gabriel; Rangel-Salgado, Viridiana; Lopez-Lemus, Uriel A; Delgado-Enciso, Josuel; Lara-Basulto, Agustin D; Soriano Hernández, Alejandro D

    2018-02-01

    Potassium permanganate has been reported to be an effective treatment for certain types of wounds. The aim of the present study was to evaluate the use of potassium permanganate in the treatment of diabetic foot ulcers. A single-blind, randomized, controlled clinical trial was conducted on patients with type 2 diabetes mellitus that presented with a foot ulcer persisting for >3 months. The control group (n=10) was treated with the current standard treatment, which comprises of measures for reducing pressure in the ulcerated area, daily cleansing of the ulcer with potable water and antiseptic wash solution, and the application of a disinfectant solution on the entire surface area of the ulcer; while the intervention group (n=15) received the standard treatment plus 5% topical potassium permanganate solution applied once a day for 21 days. In the intervention group, 1 patient did not tolerate the treatment and was eliminated from the study on the first day. The remaining patients tolerated the interventions well. At the end of the treatment period, ulcers in the control group had decreased by 38% whereas those in the intervention group decreased by 73% (Ppermanganate is well tolerated and significantly accelerates the healing process of diabetic foot ulcers.

  16. Assessment of vacuum-assisted closure therapy on the wound healing process in cardiac surgery.

    Science.gov (United States)

    Pericleous, Agamemnon; Dimitrakakis, Georgios; Photiades, Renos; von Oppell, Ulrich O

    2016-12-01

    Postoperative deep sternal wound infection (DSWI) is a serious complication in cardiac surgery (1-5% of patients) with high mortality and morbidity rates. Vacuum-assisted closure (VAC) therapy has shown promising results in terms of wound healing process, postoperative hospital length of stay and lower in-hospital costs. The aim of our retrospective study is to report the outcome of patients with DSWI treated with VAC therapy and to assess the effect of contributory risk factors. Data of 52 patients who have been treated with VAC therapy in a single institution (study period: September 2003-March 2012) were collected electronically through PAtient Tracking System PATS and statistically analysed using SPSS version 20. Of the 52 patients (35 M: 17 F), 88·5% (n = 46) were solely treated with VAC therapy and 11·5% (n = 6) had additional plastic surgical intervention. Follow-up was complete (mean 33·8 months) with an overall mortality rate of 26·9% (n = 14) of whom 50% (n = 7) died in hospital. No death was related to VAC complications. Patient outcomes were affected by pre-operative, intra-operative and postoperative risk factors. Logistic EUROscore, postoperative hospital length of stay, advanced age, chronic obstructive pulmonary disease (COPD) and long-term corticosteroid treatment appear to be significant contributing factors in the long-term survival of patients treated with VAC therapy. © 2015 Medicalhelplines.com Inc and John Wiley & Sons Ltd.

  17. Tissue Factor and Tissue Factor Pathway Inhibitor in the Wound-Healing Process After Neurosurgery.

    Science.gov (United States)

    Ślusarz, Robert; Głowacka, Mariola; Biercewicz, Monika; Barczykowska, Ewa; Haor, Beata; Rość, Danuta; Gadomska, Grażyna

    2016-03-01

    The aim of the study was to assess the concentrations of tissue factor (TF) and tissue factor pathway inhibitor (TFPI) in the blood of patients with a postoperative wound after neurosurgery. Participants included 20 adult patients who underwent neurosurgery because of degenerative spine changes. The concentration of TF and TFPI in the patients' blood serum was measured 3 times: before surgery, during the first 24 hr after surgery, and between the 5th and 7th days after surgery. The control group comprised 20 healthy volunteers similar to the patient group with respect to gender and age. A statistically significant difference was observed between TF concentration at all three measurement time points in the research group and TF concentration in the control group (p = .018, p = .010, p = .001). A statistically significant difference was found between TFPI concentration at the second time point in the research group and TFPI concentration in the control group (p = .041). No statistically significant within-subject difference was found between TF concentrations before and after surgery. A statistically significant within-subject difference was found between TFPI concentrations within 24 hr after surgery and 5-7 days after surgery (p = .004). High perioperative concentrations of TF indicate not only the presence of thrombophilia but also the importance of TF in the wound-healing process. Perioperative changes in TFPI concentrations are related to its compensatory influence on hemostasis in thrombophilic conditions. © The Author(s) 2015.

  18. Evolutionary Algorithms Application Analysis in Biometric Systems

    OpenAIRE

    N. Goranin; A. Cenys

    2010-01-01

    Wide usage of biometric information for person identity verification purposes, terrorist acts prevention measures and authenticationprocess simplification in computer systems has raised significant attention to reliability and efficiency of biometricsystems. Modern biometric systems still face many reliability and efficiency related issues such as reference databasesearch speed, errors while recognizing of biometric information or automating biometric feature extraction. Current scientificinv...

  19. Factors Affecting Wound Healing

    OpenAIRE

    Guo, S.; DiPietro, L.A.

    2010-01-01

    Wound healing, as a normal biological process in the human body, is achieved through four precisely and highly programmed phases: hemostasis, inflammation, proliferation, and remodeling. For a wound to heal successfully, all four phases must occur in the proper sequence and time frame. Many factors can interfere with one or more phases of this process, thus causing improper or impaired wound healing. This article reviews the recent literature on the most significant factors that affect cutane...

  20. Biometrics: Accessibility challenge or opportunity?

    Science.gov (United States)

    Blanco-Gonzalo, Ramon; Lunerti, Chiara; Sanchez-Reillo, Raul; Guest, Richard Michael

    2018-01-01

    Biometric recognition is currently implemented in several authentication contexts, most recently in mobile devices where it is expected to complement or even replace traditional authentication modalities such as PIN (Personal Identification Number) or passwords. The assumed convenience characteristics of biometrics are transparency, reliability and ease-of-use, however, the question of whether biometric recognition is as intuitive and straightforward to use is open to debate. Can biometric systems make some tasks easier for people with accessibility concerns? To investigate this question, an accessibility evaluation of a mobile app was conducted where test subjects withdraw money from a fictitious ATM (Automated Teller Machine) scenario. The biometric authentication mechanisms used include face, voice, and fingerprint. Furthermore, we employed traditional modalities of PIN and pattern in order to check if biometric recognition is indeed a real improvement. The trial test subjects within this work were people with real-life accessibility concerns. A group of people without accessibility concerns also participated, providing a baseline performance. Experimental results are presented concerning performance, HCI (Human-Computer Interaction) and accessibility, grouped according to category of accessibility concern. Our results reveal links between individual modalities and user category establishing guidelines for future accessible biometric products.

  1. Biometrics: Accessibility challenge or opportunity?

    Science.gov (United States)

    Lunerti, Chiara; Sanchez-Reillo, Raul; Guest, Richard Michael

    2018-01-01

    Biometric recognition is currently implemented in several authentication contexts, most recently in mobile devices where it is expected to complement or even replace traditional authentication modalities such as PIN (Personal Identification Number) or passwords. The assumed convenience characteristics of biometrics are transparency, reliability and ease-of-use, however, the question of whether biometric recognition is as intuitive and straightforward to use is open to debate. Can biometric systems make some tasks easier for people with accessibility concerns? To investigate this question, an accessibility evaluation of a mobile app was conducted where test subjects withdraw money from a fictitious ATM (Automated Teller Machine) scenario. The biometric authentication mechanisms used include face, voice, and fingerprint. Furthermore, we employed traditional modalities of PIN and pattern in order to check if biometric recognition is indeed a real improvement. The trial test subjects within this work were people with real-life accessibility concerns. A group of people without accessibility concerns also participated, providing a baseline performance. Experimental results are presented concerning performance, HCI (Human-Computer Interaction) and accessibility, grouped according to category of accessibility concern. Our results reveal links between individual modalities and user category establishing guidelines for future accessible biometric products. PMID:29565989

  2. Biometrics: Accessibility challenge or opportunity?

    Directory of Open Access Journals (Sweden)

    Ramon Blanco-Gonzalo

    Full Text Available Biometric recognition is currently implemented in several authentication contexts, most recently in mobile devices where it is expected to complement or even replace traditional authentication modalities such as PIN (Personal Identification Number or passwords. The assumed convenience characteristics of biometrics are transparency, reliability and ease-of-use, however, the question of whether biometric recognition is as intuitive and straightforward to use is open to debate. Can biometric systems make some tasks easier for people with accessibility concerns? To investigate this question, an accessibility evaluation of a mobile app was conducted where test subjects withdraw money from a fictitious ATM (Automated Teller Machine scenario. The biometric authentication mechanisms used include face, voice, and fingerprint. Furthermore, we employed traditional modalities of PIN and pattern in order to check if biometric recognition is indeed a real improvement. The trial test subjects within this work were people with real-life accessibility concerns. A group of people without accessibility concerns also participated, providing a baseline performance. Experimental results are presented concerning performance, HCI (Human-Computer Interaction and accessibility, grouped according to category of accessibility concern. Our results reveal links between individual modalities and user category establishing guidelines for future accessible biometric products.

  3. Comparative and Analysis of Biometric Systems

    OpenAIRE

    Manivannan,; Padma

    2011-01-01

    Biometric as the science of recognizing an individual based on his or her physical or behavioral traits, it is beginning to gain acceptance as a legitimate method for determining an individual identity.Biometric have now been deployed in various commercial, civilian, and national security applications. Biometric described overview of various biometric techniques and the need to be addressed form making biometric technology an effective tool for providing information security.

  4. Study on a Biometric Authentication Model based on ECG using a Fuzzy Neural Network

    Science.gov (United States)

    Kim, Ho J.; Lim, Joon S.

    2018-03-01

    Traditional authentication methods use numbers or graphic passwords and thus involve the risk of loss or theft. Various studies are underway regarding biometric authentication because it uses the unique biometric data of a human being. Biometric authentication technology using ECG from biometric data involves signals that record electrical stimuli from the heart. It is difficult to manipulate and is advantageous in that it enables unrestrained measurements from sensors that are attached to the skin. This study is on biometric authentication methods using the neural network with weighted fuzzy membership functions (NEWFM). In the biometric authentication process, normalization and the ensemble average is applied during preprocessing, characteristics are extracted using Haar-wavelets, and a registration process called “training” is performed in the fuzzy neural network. In the experiment, biometric authentication was performed on 73 subjects in the Physionet Database. 10-40 ECG waveforms were tested for use in the registration process, and 15 ECG waveforms were deemed the appropriate number for registering ECG waveforms. 1 ECG waveforms were used during the authentication stage to conduct the biometric authentication test. Upon testing the proposed biometric authentication method based on 73 subjects from the Physionet Database, the TAR was 98.32% and FAR was 5.84%.

  5. Effects of Alchemilla mollis and Alchemilla persica on the wound healing process

    Directory of Open Access Journals (Sweden)

    Burçin Ergene Öz

    2016-09-01

    Full Text Available Alchemilla mollis, is used in traditional medicine for the treatment of wounds and excessive menstruation. Aqueous methanol extracts of A. mollis and A. persica were evaluated for wound healing acivity by using linear incision and circular excision wound models along with hydroxyproline estimation and histopathological analysis. Anti-inflammatory effect was determined according to Whittle method. The extracts prepared from the aerial parts of A. mollis and A. persica exerted significant wound healing activity with the tensile strength values of 39.3% and 33.3%, respectively, and with the contraction values of 51.4% and 43.5%, respectively. Hydroxyproline estimation and histopathological analysis also confirmed the results. The extracts of A. mollis and A. persica showed significant anti-inflammatory activity with the values of 30.6% and 26.6% respectively. These results showed that A. mollis and A. persica possess significant wound healing and anti-inflammatory activities.

  6. Experimental study on healing process of rat mandibular bone fracture examined by radiological procedures

    International Nuclear Information System (INIS)

    Iuchi, Yukio; Furumoto, Keiichi

    1994-01-01

    The healing process of rat mandibular fractures was stereoscopically observed daily, using plain roentgenography in the lateral-oblique and tooth axis directions and bone scintigraphy using 99m-Tc-methylene diphosphoric acid (Tc-99m-MDP). The findings were compared with microradiograms of regional polished specimens. X-ray findings included the following. Up to 3 days after bone fracture, the fracture mesiodistally showed distinct radiolucency, with sharp and irregular fracture stump. Radiopacity of the fracture site gradually increased 7 days or later, and bone trabecular formation by callus and stump bridging started to occur at 14 days. Findings similar to those in the control group were observed 49 days or later. The inside was difficult to differentiate, irrespective of the observation time. Bone scans in the mesiodistal and buccolingual planes revealed tracer uptake in the areas of mandibular and soft tissue damage one day after bone fracture. Tracer uptake began to be seen in the fracture site 3 days later, and became marked at 14 days. Then Tc-99m DMP began to be localized and returned to the findings similar to those at 49 days. Bone scanning tended to show wider areas earlier than roentgenography. Microradiographic mesiodistal examination revealed distinct radiopacy of the fracture line for 3 days after bone fracture. Seven days later, bone resorption cavity occurred in the cortical bone around the fracture stump, along with neogenesis of callus. Neogenesis and calcification began to occur gradually, and 14 days later, the fracture osteoremodeling of the internal bone trabeculae was observed. Bone trabecular formation within the bone, however, occurred later. (N.K.)

  7. Sensor-fusion-based biometric identity verification

    International Nuclear Information System (INIS)

    Carlson, J.J.; Bouchard, A.M.; Osbourn, G.C.; Martinez, R.F.; Bartholomew, J.W.; Jordan, J.B.; Flachs, G.M.; Bao, Z.; Zhu, L.

    1998-02-01

    Future generation automated human biometric identification and verification will require multiple features/sensors together with internal and external information sources to achieve high performance, accuracy, and reliability in uncontrolled environments. The primary objective of the proposed research is to develop a theoretical and practical basis for identifying and verifying people using standoff biometric features that can be obtained with minimal inconvenience during the verification process. The basic problem involves selecting sensors and discovering features that provide sufficient information to reliably verify a person's identity under the uncertainties caused by measurement errors and tactics of uncooperative subjects. A system was developed for discovering hand, face, ear, and voice features and fusing them to verify the identity of people. The system obtains its robustness and reliability by fusing many coarse and easily measured features into a near minimal probability of error decision algorithm

  8. Effect of eccentric exercise on the healing process of injured patellar tendon in rats.

    Science.gov (United States)

    Nakamura, Kenichi; Kitaoka, Katsuhiko; Tomita, Katsuro

    2008-07-01

    Earlier studies have reported positive results from eccentric training in patients with tendon disorders. The reasons for the beneficial clinical effects of eccentric training are not known. Vascularization followed by regression of the vasculature enhances the healing response of injured tendons. Eccentric exercise induces a more beneficial healing response than concentric exercise. Sixty rats with patellar tendon injuries were divided into three groups: nonexercise controls (group N; n = 20); concentric exercise group (group C; n = 20); eccentric exercise group (group E; n = 20). Each rat was taught to run uphill or downhill for 14 days. Patellar tendons were removed 1, 4, 7, 10, and 14 days following injury. Vascular endothelial growth factor (VEGF), angiopoietin-1, and angiopoietin-2 were measured by reverse transcription polymerase chain reaction. In group C, VEGF mRNA was increased 1 and 4 days following injury but was decreased on days 7, 10, and 14. In group E, VEGF mRNA was elevated only on day 1. In group N, VEGF mRNA remained at a low level throughout all 14 days. The angiopoietin-2/angiopoietin-1 ratio was higher for group C than for group E. In the presence of VEGF, angiopoietin-1 promotes vessel stability, whereas angiopoietin-2 has the opposite effect. Eccentric exercise contributes to stabilized angiogenesis during the early phase of tendon injury. Conversely, concentric exercise, which induces destabilized angiogenesis, leads to a delayed healing response. Initiation of eccentric exercise immediately after tendon injury may help improve healing by reducing vascularity.

  9. Schinus terebinthifolius Raddi (Anacardiaceae) in the healing process of gastrorraphy in rats.

    Science.gov (United States)

    dos Santos, Orlando José; Barros-Filho, Allan Kardec Duailibe; Malafaia, Osvaldo; Ribas-Filho, Jurandir Marcondes; Santos, Rayan Haquim Pinheiro; Santos, Rennan Abud Pinheiro

    2012-01-01

    Gastrorraphy, isolated or associated with the use of biological adhesives, was throughout the history of surgery the usual way to promote healing in gastric lesions and the use of herbal medicine has been increasingly more employed. To evaluate the wound healing in the stomach of rats with the use of the hydroalcoholic extract of Schinus terebinthifolius Raddi (aroeira). Sixty rats, adult males, were divided into two groups: aroeira group and control group. Each one was subdivided into four subgroups of 15 animals (test groups). Each subdivided subgroup was also subdivided into three subgroups of five rats (deaths periods of 7, 14 and 21 days). All animals underwent the same surgical procedure (injury and stomach suture); animals in the aroeira group received daily dose of 100 mg/kg of hydroalcoholic extract via gavage while the control group received isotonic saline solution. Parameters evaluated were: macroscopic and microscopic changes, test for resistance to insufflation of atmospheric air and test for tensile strength. All animals had good healing of the abdominal wall and gastrorraphies without infection and dehiscence. Both groups had adhesions to the gastrorraphies surfaces with neighboring organs. The resistance test by insufflation of atmospheric air and tensile strength showed higher average of pressure on the 7th day and breaking strength in the time periods for the aroeira group. The intensity of chronic inflammation revealed statistically significant differences in the variables fibroblast proliferation and collagen. The use of hydroalcoholic extract of Schinus terebinthifolius Raddi accelerated the stomach healing in rats.

  10. Biometrics Research and Engineering Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — As the Department of Defense moves forward in its pursuit of integrating biometrics technology into facility access control, the Global War on Terrorism and weapon...

  11. Biometrics for home networks security

    KAUST Repository

    Ansari, Imran Shafique

    2009-01-01

    Hacking crimes committed to the home networks are increasing. Advanced network protection is not always possible for the home networks. In this paper we will study the ability of using biometric systems for authentication in home networks. ©2009 IEEE.

  12. Transforming Security Screening With Biometrics

    National Research Council Canada - National Science Library

    Hearnsberger, Brian J

    2003-01-01

    ... and identity theft to dramatically improve physical security. Today, biometric technology could be implemented to transform physical security by enhancing screening procedures currently in use at U.S...

  13. Biometrics for home networks security

    KAUST Repository

    Ansari, Imran Shafique; Ahmad, Qutbuddin S.

    2009-01-01

    Hacking crimes committed to the home networks are increasing. Advanced network protection is not always possible for the home networks. In this paper we will study the ability of using biometric systems for authentication in home networks. ©2009

  14. Radiologic study of the healing process of the extracted socket of beagle dogs using cone beam CT

    Energy Technology Data Exchange (ETDEWEB)

    Cho, Bong Won; Lee, Won; Lee, Byung Do [Department of Oral and Maxillofacial Radiology, School of Dentistry, Wonkwang University, Iksan (Korea, Republic of); Kim, De Sok [Department of Electrical Engineering, Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of)

    2009-03-15

    To longitudinally observe the healing process of extracted socket and the alterations of the residual ridge in healthy adult dogs using cone beam CT (CBCT). The mandibular premolars of two beagle dogs were removed and the extraction sites were covered with the gingival tissue. CBCTs (3D X-ray CT scanner, Alphard vega, Asahi Co.) were taken at baseline and at 1 week interval for 12 weeks. Radiographic density of extracted wounds was measured on normalized images with a custom-made image analysis program. The amount of alveolar crestal resorption after the teeth extraction was measured with a reformatted three-dimensional image using CBCT. Bony healing pattern of extracted wound of each group was also longitudinally observed and analyzed. Dimensional changes occurred during the first 6 weeks following the extraction of dogs' mandibular premolars. The reduction of the height of residual ridge was more pronounced at the buccal than at the lingual aspect of the extraction socket. Radiographic density of extracted wounds increased by week 4, but the change in density stabilized after week 6. New bone formation was observed at the floor and the peripheral side of extracted socket from week 1. The entrance of extracted socket was sealed by a hard-tissue bridge at week 5. The healing process of extracted wound involved a series of events including new bone formation and residual ridge resorption.

  15. The effects of transcutaneous low-level laser therapy on the skin healing process: an experimental model.

    Science.gov (United States)

    Ramos, Felipe Scholz; Maifrino, Laura Beatriz Mesiano; Alves, Sarah; da Costa Aguiar Alves, Beatriz; Perez, Matheus Moreira; Feder, David; Azzalis, Ligia Ajaime; Junqueira, Virginia Berlanga Campos; Fonseca, Fernando Luiz Affonso

    2018-01-06

    We aim to evaluate the action of transcutaneous laser in the initial wound healing process. The use of low-level laser therapy (LLLT) has proven to be effective on inflammatory modulation and wound healing. The trial was performed on five groups of rats, through a dorsal incision. All groups received treatment on auricular artery. Groups 1 and 3 were treated with transcutaneous LLLT over a period of 15 min. Groups 2 and 4 received one and two inactive laser applications (placebo), respectively. Group 5 was the control one. Blood samples were collected 2 h after the last application of LLLT so that cytokine levels could be measured by ELISA. Tissue fragments were harvested for morphometric, histomorphometric, and RT-qPCR analyses. The morphometric analysis revealed a greater decrease in the wounded area in G1 when compared with G2, whereas in G3, the improvement in the area was greater when compared with G4. Finally, the histomorphometric analysis showed that G1 was the group closer to G5 in terms of collagen fiber count. G2 and G4 had higher amounts of collagen fibers than G5 while G3 had a lower quantity. The use of the transcutaneous LLLT in the current study influenced the wound healing process.

  16. Radiologic study of the healing process of the extracted socket of beagle dogs using cone beam CT

    International Nuclear Information System (INIS)

    Cho, Bong Won; Lee, Won; Lee, Byung Do; Kim, De Sok

    2009-01-01

    To longitudinally observe the healing process of extracted socket and the alterations of the residual ridge in healthy adult dogs using cone beam CT (CBCT). The mandibular premolars of two beagle dogs were removed and the extraction sites were covered with the gingival tissue. CBCTs (3D X-ray CT scanner, Alphard vega, Asahi Co.) were taken at baseline and at 1 week interval for 12 weeks. Radiographic density of extracted wounds was measured on normalized images with a custom-made image analysis program. The amount of alveolar crestal resorption after the teeth extraction was measured with a reformatted three-dimensional image using CBCT. Bony healing pattern of extracted wound of each group was also longitudinally observed and analyzed. Dimensional changes occurred during the first 6 weeks following the extraction of dogs' mandibular premolars. The reduction of the height of residual ridge was more pronounced at the buccal than at the lingual aspect of the extraction socket. Radiographic density of extracted wounds increased by week 4, but the change in density stabilized after week 6. New bone formation was observed at the floor and the peripheral side of extracted socket from week 1. The entrance of extracted socket was sealed by a hard-tissue bridge at week 5. The healing process of extracted wound involved a series of events including new bone formation and residual ridge resorption.

  17. An experimental study of the effect of Co-60 irradiation on the healing process of extraction wounds in white rats

    Energy Technology Data Exchange (ETDEWEB)

    You, Young Jun; Ahn, Hyung Kyu [Dept. of Dental Radiology, Graduate School, Seoul National University, Seoul (Korea, Republic of)

    1982-11-15

    Because of the development of rampant caries, osteomyelitis and osteoradionecrosis that occur after radiation therapy of oral cancers, extraction of teeth at or near the malignant lesion has been done in the past. Few, however, have studied the radiation effect on the healing of extraction wounds. The study is concerned with the effect of Co-60 irradiation on the healing process of extraction wounds in rats. Fifty six, male, Sprague-Dawley rats are used. The right first molar of the mandible is extracted from all animals. They are divided into three experimental groups of 14 each and a control group of 14. There experimental groups are irradiated respectively with 200 rad, 400 rad and 600 rad and a pair of rats in each group are killed on days 1, 3, 5, 7, 14, 21 and 28 after irradiation. Two animals from the control group are killed on the day when the experimental rats are killed. The irradiated hemimandibles are fixed in 10% neutral formalin, decalcified in 5% trichloroacetic acid, embedded in paraffin and sectioned. The sections are stained in hematoxylin and eosin, van Gison, Masson's trichrome or silver nitrate. Results show that in general radiation effects on healing extraction wounds are dose dependent; i.e., the higher is the dose, the greater is the histologic changes observed: 1. Irradiation tends to retard blood clot organization and epithelial regeneration. 2. An increase in the number of giant cells and osteoclasts is noted after irradiation. 3. Formation of regenerating connective tissues around and within the extraction site is compromised, and a clear reduction of primitive mesenchymal type connective cells is noted. 4. The healing process begins along the lateral aspect of the extraction socket in the control, while irregular histologic appearances of the trabecular pattern is present in the experimental rats.

  18. A SCHEME FOR TEMPLATE SECURITY AT FEATURE FUSION LEVEL IN MULTIMODAL BIOMETRIC SYSTEM

    Directory of Open Access Journals (Sweden)

    Arvind Selwal

    2016-09-01

    Full Text Available Biometric is the science of human recognition based upon using their biological, chemical or behavioural traits. These systems are used in many real life applications simply from biometric based attendance system to providing security at very sophisticated level. A biometric system deals with raw data captured using a sensor and feature template extracted from raw image. One of the challenges being faced by designers of these systems is to secure template data extracted from the biometric modalities of the user and protect the raw images. To minimize spoof attacks on biometric systems by unauthorised users one of the solutions is to use multi-biometric systems. Multi-modal biometric system works by using fusion technique to merge feature templates generated from different modalities of the human. In this work a new scheme is proposed to secure template during feature fusion level. Scheme is based on union operation of fuzzy relations of templates of modalities during fusion process of multimodal biometric systems. This approach serves dual purpose of feature fusion as well as transformation of templates into a single secured non invertible template. The proposed technique is cancelable and experimentally tested on a bimodal biometric system comprising of fingerprint and hand geometry. Developed scheme removes the problem of an attacker learning the original minutia position in fingerprint and various measurements of hand geometry. Given scheme provides improved performance of the system with reduction in false accept rate and improvement in genuine accept rate.

  19. eBiometrics: an enhanced multi-biometrics authentication technique for real-time remote applications on mobile devices

    Science.gov (United States)

    Kuseler, Torben; Lami, Ihsan; Jassim, Sabah; Sellahewa, Harin

    2010-04-01

    The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as Image capture, Location applications, and Biometric authentication such as Fingerprint verification and Face & Handwritten signature recognition. Such ubiquitous devices are essential tools in today's global economic activities enabling anywhere-anytime financial and business transactions. Cryptographic functions and biometric-based authentication can enhance the security and confidentiality of mobile transactions. Using Biometric template security techniques in real-time biometric-based authentication are key factors for successful identity verification solutions, but are venerable to determined attacks by both fraudulent software and hardware. The EU-funded SecurePhone project has designed and implemented a multimodal biometric user authentication system on a prototype mobile communication device. However, various implementations of this project have resulted in long verification times or reduced accuracy and/or security. This paper proposes to use built-in-self-test techniques to ensure no tampering has taken place on the verification process prior to performing the actual biometric authentication. These techniques utilises the user personal identification number as a seed to generate a unique signature. This signature is then used to test the integrity of the verification process. Also, this study proposes the use of a combination of biometric modalities to provide application specific authentication in a secure environment, thus achieving optimum security level with effective processing time. I.e. to ensure that the necessary authentication steps and algorithms running on the mobile device application processor can not be undermined or modified by an imposter to get unauthorized access to the secure system.

  20. Evolutionary Algorithms Application Analysis in Biometric Systems

    Directory of Open Access Journals (Sweden)

    N. Goranin

    2010-01-01

    Full Text Available Wide usage of biometric information for person identity verification purposes, terrorist acts prevention measures and authenticationprocess simplification in computer systems has raised significant attention to reliability and efficiency of biometricsystems. Modern biometric systems still face many reliability and efficiency related issues such as reference databasesearch speed, errors while recognizing of biometric information or automating biometric feature extraction. Current scientificinvestigations show that application of evolutionary algorithms may significantly improve biometric systems. In thisarticle we provide a comprehensive review of main scientific research done in sphere of evolutionary algorithm applicationfor biometric system parameter improvement.

  1. Quantitative wound healing studies using a portable, low cost, handheld near-infrared optical scanner: preliminary sensitivity and specificity analysis

    Science.gov (United States)

    Lei, Jiali; Rodriguez, Suset; Jayachandran, Maanasa; Solis, Elizabeth; Gonzalez, Stephanie; Perez-Clavijo, Francesco; Wigley, Stephen; Godavarty, Anuradha

    2016-03-01

    Lower extremity ulcers are devastating complications that are still un-recognized. To date, clinicians employ visual inspection of the wound site during its standard 4-week of healing process via monitoring of surface granulation. A novel ultra-portable near-infrared optical scanner (NIROS) has been developed at the Optical Imaging Laboratory that can perform non-contact 2D area imaging of the wound site. From preliminary studies it was observed that the nonhealing wounds had a greater absorption contrast with respect to the normal site, unlike in the healing wounds. Currently, non-contact near-infrared (NIR) imaging studies were carried out on 22 lower extremity wounds at two podiatric clinics, and the sensitivity and specificity of the scanner evaluated. A quantitative optical biometric was developed that differentiates healing from non-healing wounds, based on the threshold values obtained during ROC analysis. In addition, optical images of the wound obtained from weekly imaging studies are also assessed to determine the ability of the device to predict wound healing consistently on a periodic basis. This can potentially impact early intervention in the treatment of lower extremity ulcers when an objective and quantitative wound healing approach is developed. Lastly, the incorporation of MATLAB graphical user interface (GUI) to automate the process of image acquisition, image processing and image analysis realizes the potential of NIROS to perform non-contact and real-time imaging on lower extremity wounds.

  2. Bilirubin modulated cytokines, growth factors and angiogenesis to improve cutaneous wound healing process in diabetic rats.

    Science.gov (United States)

    Ram, Mahendra; Singh, Vishakha; Kumawat, Sanjay; Kant, Vinay; Tandan, Surendra Kumar; Kumar, Dinesh

    2016-01-01

    Bilirubin has shown cutaneous wound healing potential in some preliminary studies. Here we hypothesize that bilirubin facilitates wound healing in diabetic rats by modulating important healing factors/candidates and antioxidant parameters in a time-dependent manner. Diabetes was induced in male Wistar rats by streptozotocin. In all diabetic rats wounds were created under pentobarbitone anesthesia. All the rats were divided into two groups, of which one (control) was treated with ointment base and other with bilirubin ointment (0.3%). Wound closer measurement and tissue collection were done on days 3, 7, 14 and 19 post-wounding. The relative expressions of hypoxia inducible factor-1 alpha (HIF-1α), vascular endothelial growth factor (VEGF), stromal cell-derived factor-1 alpha (SDF-1α), transforming growth factor- beta1 (TGF-β1()), tumor necrosis factor-α (TNF-α) and interlukin-10 (IL-10) mRNA and proteins and the mRNA of interlukin-1 beta (IL-1β) and matrix metalloprteinase-9 (MMP-9) were determined in the wound tissues. CD-31 staining and collagen content were evaluated by immunohistochemistry and picrosirius red staining, respectively. Histopathological changes were assessed by H&E staining. The per cent wound closer was significantly higher from day 7 onwards in bilirubin-treated rats. HIF-1α, VEGF, SDF-1α, TGF-β1, IL-10 mRNA and protein levels were significantly higher on days 3, 7 and 14 in bilirubin-treated rats. The mRNA expression and protein level of TNF-α and the mRNA of IL-1β and MMP-9 were progressively and markedly reduced in bilirubin-treated rats. The collagen deposition and formation of blood vessels were greater in bilirubin-treated rats. Bilirubin markedly facilitated cutaneous wound healing in diabetic rats by modulating growth factors, cytokines, neovasculogenesis and collagen contents to the wound site. Topical application of bilirubin ointment might be of great use in cutaneous wound healing in diabetic patients. Copyright © 2015

  3. Gaze as a biometric

    Science.gov (United States)

    Yoon, Hong-Jun; Carmichael, Tandy R.; Tourassi, Georgia

    2014-03-01

    Two people may analyze a visual scene in two completely different ways. Our study sought to determine whether human gaze may be used to establish the identity of an individual. To accomplish this objective we investigated the gaze pattern of twelve individuals viewing still images with different spatial relationships. Specifically, we created 5 visual "dotpattern" tests to be shown on a standard computer monitor. These tests challenged the viewer's capacity to distinguish proximity, alignment, and perceptual organization. Each test included 50 images of varying difficulty (total of 250 images). Eye-tracking data were collected from each individual while taking the tests. The eye-tracking data were converted into gaze velocities and analyzed with Hidden Markov Models to develop personalized gaze profiles. Using leave-one-out cross-validation, we observed that these personalized profiles could differentiate among the 12 users with classification accuracy ranging between 53% and 76%, depending on the test. This was statistically significantly better than random guessing (i.e., 8.3% or 1 out of 12). Classification accuracy was higher for the tests where the users' average gaze velocity per case was lower. The study findings support the feasibility of using gaze as a biometric or personalized biomarker. These findings could have implications in Radiology training and the development of personalized e-learning environments.

  4. Gaze as a biometric

    Energy Technology Data Exchange (ETDEWEB)

    Yoon, Hong-Jun [ORNL; Carmichael, Tandy [Tennessee Technological University; Tourassi, Georgia [ORNL

    2014-01-01

    Two people may analyze a visual scene in two completely different ways. Our study sought to determine whether human gaze may be used to establish the identity of an individual. To accomplish this objective we investigated the gaze pattern of twelve individuals viewing different still images with different spatial relationships. Specifically, we created 5 visual dot-pattern tests to be shown on a standard computer monitor. These tests challenged the viewer s capacity to distinguish proximity, alignment, and perceptual organization. Each test included 50 images of varying difficulty (total of 250 images). Eye-tracking data were collected from each individual while taking the tests. The eye-tracking data were converted into gaze velocities and analyzed with Hidden Markov Models to develop personalized gaze profiles. Using leave-one-out cross-validation, we observed that these personalized profiles could differentiate among the 12 users with classification accuracy ranging between 53% and 76%, depending on the test. This was statistically significantly better than random guessing (i.e., 8.3% or 1 out of 12). Classification accuracy was higher for the tests where the users average gaze velocity per case was lower. The study findings support the feasibility of using gaze as a biometric or personalized biomarker. These findings could have implications in Radiology training and the development of personalized e-learning environments.

  5. Voice Biometrics for Information Assurance Applications

    National Research Council Canada - National Science Library

    Kang, George

    2002-01-01

    .... The ultimate goal of voice biometrics is to enable the use of voice as a password. Voice biometrics are "man-in-the-loop" systems in which system performance is significantly dependent on human performance...

  6. Biometric National Identification Number Generation for Secure ...

    African Journals Online (AJOL)

    Biometric National Identification Number Generation for Secure Network Authentication Based Fingerprint. ... Username, Password, Remember me, or Register ... In this paper an authentication based finger print biometric system is proposed ...

  7. Biometric Authorization and Registration Systems and Methods

    National Research Council Canada - National Science Library

    Caulfield, H

    2002-01-01

    Biometric authorization and registration systems and methods are disclosed. In one embodiment, the system preferably comprises a firearm that includes a biometric authorization system, a plurality of training computers, and a server...

  8. A framework for biometric playtesting of games

    OpenAIRE

    Janssen, Dirk; Calvi, Licia; Gualeni, Stefano; Foundation of Digital Games Conference

    2013-01-01

    The described framework is meant to assist game developers in using biometric (psychophysiological) methods while playtesting. Biometric methods can give developers a valuable additional window on the playtester's experience.

  9. Biometrics for electronic health records.

    Science.gov (United States)

    Flores Zuniga, Alejandro Enrique; Win, Khin Than; Susilo, Willy

    2010-10-01

    Securing electronic health records, in scenarios in which the provision of care services is share among multiple actors, could become a complex and costly activity. Correct identification of patients and physician, protection of privacy and confidentiality, assignment of access permissions for healthcare providers and resolutions of conflicts rise as main points of concern in the development of interconnected health information networks. Biometric technologies have been proposed as a possible technological solution for these issues due to its ability to provide a mechanism for unique verification of an individual identity. This paper presents an analysis of the benefit as well as disadvantages offered by biometric technology. A comparison between this technology and more traditional identification methods is used to determine the key benefits and flaws of the use biometric in health information systems. The comparison as been made considering the viability of the technologies for medical environments, global security needs, the contemplation of a share care environment and the costs involved in the implementation and maintenance of such technologies. This paper also discusses alternative uses for biometrics technologies in health care environments. The outcome of this analysis lays in the fact that even when biometric technologies offer several advantages over traditional method of identification, they are still in the early stages of providing a suitable solution for a health care environment.

  10. Magnetic resonance imaging in the repair of ruptured Achilles tendons. Morphological difference in healing process between conservative and surgical treatment

    International Nuclear Information System (INIS)

    Nakano, Tetsuo; Tsuruta, Takao; Abe, Yasuyuki; Tani, Akifumi; Koga, Toshimitsu; Shimizu, Yasuhiro

    1996-01-01

    We observed the healing process of ruptured Achilles tendons in a series using magnetic resonance imaging. In six cases, tendons were repaired percutaneously with limited skin incisions. Seven cases were treated conservatively using unique functional braces. MR imaging revealed two different modes of conjoining. In the conservatively treated group, tendons inclined to conjoin in a dumbbell shape. In the surgically treated group, they inclined to conjoin in a spindle shape. The diameters of the ruptured part are wider in the spindle shape compared to the dumbbell shape at all stages. These findings suggest that surgical treatment is favorable for acquiring earlier strength. (author)

  11. The use of biometrics in IT

    OpenAIRE

    Bílý, Petr

    2009-01-01

    Biometrics is increasingly applied in IT (biometric methods today generally use computer technology), mostly used to authenticate users. The aim of this thesis is to describe and compare two selected biometric methods. These methods are fingerprints and scanning of human face. The contribution of this work is to provide information on biometric identification methods, their advantages and disadvantages, and deployment options. If an organization decides to strengthen their security systems wi...

  12. Securing Biometric Images using Reversible Watermarking

    OpenAIRE

    Thampi, Sabu M.; Jacob, Ann Jisma

    2011-01-01

    Biometric security is a fast growing area. Protecting biometric data is very important since it can be misused by attackers. In order to increase security of biometric data there are different methods in which watermarking is widely accepted. A more acceptable, new important development in this area is reversible watermarking in which the original image can be completely restored and the watermark can be retrieved. But reversible watermarking in biometrics is an understudied area. Reversible ...

  13. Performance Evaluation Of Behavioral Biometric Systems

    OpenAIRE

    Cherifi , Fouad; Hemery , Baptiste; Giot , Romain; Pasquet , Marc; Rosenberger , Christophe

    2009-01-01

    We present in this chapter an overview of techniques for the performance evaluation of behavioral biometric systems. The BioAPI standard that defines the architecture of a biometric system is presented in the first part of the chapter... The general methodology for the evaluation of biometric systems is given including statistical metrics, definition of benchmark databases and subjective evaluation. These considerations rely with the ISO/IEC19795-1 standard describing the biometric performanc...

  14. Compressed ECG biometric: a fast, secured and efficient method for identification of CVD patient.

    Science.gov (United States)

    Sufi, Fahim; Khalil, Ibrahim; Mahmood, Abdun

    2011-12-01

    Adoption of compression technology is often required for wireless cardiovascular monitoring, due to the enormous size of Electrocardiography (ECG) signal and limited bandwidth of Internet. However, compressed ECG must be decompressed before performing human identification using present research on ECG based biometric techniques. This additional step of decompression creates a significant processing delay for identification task. This becomes an obvious burden on a system, if this needs to be done for a trillion of compressed ECG per hour by the hospital. Even though the hospital might be able to come up with an expensive infrastructure to tame the exuberant processing, for small intermediate nodes in a multihop network identification preceded by decompression is confronting. In this paper, we report a technique by which a person can be identified directly from his / her compressed ECG. This technique completely obviates the step of decompression and therefore upholds biometric identification less intimidating for the smaller nodes in a multihop network. The biometric template created by this new technique is lower in size compared to the existing ECG based biometrics as well as other forms of biometrics like face, finger, retina etc. (up to 8302 times lower than face template and 9 times lower than existing ECG based biometric template). Lower size of the template substantially reduces the one-to-many matching time for biometric recognition, resulting in a faster biometric authentication mechanism.

  15. Free water content and monitoring of healing processes of skin burns studied by microwave dielectric spectroscopy in vivo

    International Nuclear Information System (INIS)

    Hayashi, Yoshihito; Miura, Nobuhiro; Shinyashiki, Naoki; Yagihara, Shin

    2005-01-01

    We have investigated the dielectric properties of human skin in vivo at frequencies up to 10 GHz using a time-domain reflectometry method with open-ended coaxial probes. Since γ-dispersion results from the reorientation of free water molecules, the free water content of skin is quantitatively determined by dielectric measurements. The free water content of finger skin increased by about 10% after soaking in 37 0 C water for 30 min, and it systematically decreased again through the drying process, as expected. Thus this analytical method has been applied to the study of skin burns. The free water content of burned human cheek skin due to hydrofluoric acid was significantly lower than that of normal skin, and the burned skin recovered through the healing process. In the case of a human hand skin burn due to heat, although the free water content was almost the same as that of normal skin at the beginning, it decreased during the healing process for the first 10 days, then began to increase. Although the number of test subjects was one for each experiment, it was shown that free water content is a good indicator for evaluating skin health and can be well monitored by dielectric spectroscopy

  16. 3D biometrics systems and applications

    CERN Document Server

    Zhang, David

    2013-01-01

    Includes discussions on popular 3D imaging technologies, combines them with biometric applications, and then presents real 3D biometric systems Introduces many efficient 3D feature extraction, matching, and fusion algorithms Techniques presented have been supported by experimental results using various 3D biometric classifications

  17. Biometric Score Calibration for Forensic Face Recognition

    NARCIS (Netherlands)

    Ali, Tauseef

    2014-01-01

    When two biometric specimens are compared using an automatic biometric recognition system, a similarity metric called “score‿ can be computed. In forensics, one of the biometric specimens is from an unknown source, for example, from a CCTV footage or a fingermark found at a crime scene and the other

  18. Factors Affecting Wound Healing

    Science.gov (United States)

    Guo, S.; DiPietro, L.A.

    2010-01-01

    Wound healing, as a normal biological process in the human body, is achieved through four precisely and highly programmed phases: hemostasis, inflammation, proliferation, and remodeling. For a wound to heal successfully, all four phases must occur in the proper sequence and time frame. Many factors can interfere with one or more phases of this process, thus causing improper or impaired wound healing. This article reviews the recent literature on the most significant factors that affect cutaneous wound healing and the potential cellular and/or molecular mechanisms involved. The factors discussed include oxygenation, infection, age and sex hormones, stress, diabetes, obesity, medications, alcoholism, smoking, and nutrition. A better understanding of the influence of these factors on repair may lead to therapeutics that improve wound healing and resolve impaired wounds. PMID:20139336

  19. Exploring the role of curcumin containing ethanolic extract obtained from Curcuma longa (rhizomes) against retardation of wound healing process by aspirin.

    Science.gov (United States)

    Pawar, Rajesh Singh; Toppo, Fedelic Ashish; Mandloi, Avinash Singh; Shaikh, Shabnam

    2015-01-01

    The aim of the study was to assess the curcumin containing ethanolic extract (EtOH) obtained from Curcuma longa (Cl) against retardation of wound healing by aspirin. Wound healing process was retarded by administering the dose of 150 mg/kg body weight of aspirin orally for 9 days to observe the effect of EtOH obtained from Cl using excision and incision wound model in rats. The various parameters such as % wound contraction, epithelialization period, hydroxyproline, tensile strength were observed at variant time intervals and histopathological study was also performed. Curcumin containing 5% and 10% ethanolic extract ointment have shown significant (P < 0.01) wound healing activity against an aspirin (administered 150 mg/kg body weight orally for 9 days) retarded wound healing process. Topical application of ointment showed significant (P < 0.01) difference as compared to the control group. Histopathological studies also showed healing of the epidermis, increased collagen, fibroblasts and blood vessels. Ethanolic extract of Cl ointment (EtOHCl) containing 10% curcumin displayed remarkable healing process against wound retardation by aspirin.

  20. Multispectral biometrics systems and applications

    CERN Document Server

    Zhang, David; Gong, Yazhuo

    2016-01-01

    Describing several new biometric technologies, such as high-resolution fingerprint, finger-knuckle-print, multi-spectral backhand, 3D fingerprint, tongueprint, 3D ear, and multi-spectral iris recognition technologies, this book analyzes a number of efficient feature extraction, matching and fusion algorithms and how potential systems have been developed. Focusing on how to develop new biometric technologies based on the requirements of applications, and how to design efficient algorithms to deliver better performance, the work is based on the author’s research with experimental results under different challenging conditions described in the text. The book offers a valuable resource for researchers, professionals and postgraduate students working in the fields of computer vision, pattern recognition, biometrics, and security applications, amongst others.

  1. Audiovisual Speech Synchrony Measure: Application to Biometrics

    Directory of Open Access Journals (Sweden)

    Gérard Chollet

    2007-01-01

    Full Text Available Speech is a means of communication which is intrinsically bimodal: the audio signal originates from the dynamics of the articulators. This paper reviews recent works in the field of audiovisual speech, and more specifically techniques developed to measure the level of correspondence between audio and visual speech. It overviews the most common audio and visual speech front-end processing, transformations performed on audio, visual, or joint audiovisual feature spaces, and the actual measure of correspondence between audio and visual speech. Finally, the use of synchrony measure for biometric identity verification based on talking faces is experimented on the BANCA database.

  2. Application of Three - dimensional Wound Analyzer in the Small Wound Area Measurement during the Process of Wound Healing.

    Science.gov (United States)

    Sheng, Jiajun; Li, Haihang; Jin, Jian; Liu, Tong; Ma, Bing; Liu, Gongcheng; Zhu, Shihui

    2018-02-20

    The objective of this study was to determinate the reliability of 3-dimensional wound analyzer (3-DWMD) in the wound area measurement for animal small area in the process of wound healing. Seven Sprague-Dawley rats were used to establish the skin defect model. And the wound area and time consumption were measured on days 0, 5, 10, 15 using 3-DWMD, investigators, and planimetry method. The measurement results using 3-DWMD and investigators were analyzed comparative with that using planimetry method separately. A total 46 wounds, including 32 irregular wounds and regular 14 wounds, were measured. No matter calculating the irregular wounds or the regular wounds, there was no significant difference between 3-DWMD group and planimetry group in measuring wound area (P > 0.05). However, a statistically significant difference was found in time-consuming for measuring wound area between 3-DWMD group and planimetry group (P area, and its measurement results were consistent with planimetry method. Therefore, such measuring equipment has clinical reference value for measuring precision area of the wound in the process of wound healing.

  3. A suicidal recovery theory to guide individuals on their healing and recovering process following a suicide attempt.

    Science.gov (United States)

    Sun, Fan-Ko; Long, Ann

    2013-09-01

    To develop a theory to guide the recovery process of a recent suicide attempt. Suicide is one of the 10 leading causes of death in many countries. Many nations have set targets to reduce the high incidence of suicide by aiming to prevent people from taking their own lives and also providing care to promote the healing of those who attempt suicide. A qualitative grounded theory approach was used. Data were collected in 2011-2012 in a Taiwanese hospital until data saturation occurred. Twenty participants were interviewed, comprising patients who recovered from suicide attempts (N = 14) and their caregivers (N = 6). Data were analysed using open, axial, and selective coding and using the constant comparison technique. A substantive theory was formulated to guide the recovery process of people who have recently attempted suicide. The core category that emerged from the data collected was 'Striving to accept the value of self-in-existence'. Other key categories linked to and embraced in this core category were: becoming flexible and open-minded, re-building a positive sense of self, and endeavouring to live a peaceful and contented life. Nurses could use this theory as a theoretical framework to guide people who are recovering from a suicide attempt by affording them the opportunity to grow and heal, and facilitating the re-building a positive sense of self, acknowledging the uncertainties of life, and inspiring hope. © 2013 Blackwell Publishing Ltd.

  4. A method of ECG template extraction for biometrics applications.

    Science.gov (United States)

    Zhou, Xiang; Lu, Yang; Chen, Meng; Bao, Shu-Di; Miao, Fen

    2014-01-01

    ECG has attracted widespread attention as one of the most important non-invasive physiological signals in healthcare-system related biometrics for its characteristics like ease-of-monitoring, individual uniqueness as well as important clinical value. This study proposes a method of dynamic threshold setting to extract the most stable ECG waveform as the template for the consequent ECG identification process. With the proposed method, the accuracy of ECG biometrics using the dynamic time wraping for difference measures has been significantly improved. Analysis results with the self-built electrocardiogram database show that the deployment of the proposed method was able to reduce the half total error rate of the ECG biometric system from 3.35% to 1.45%. Its average running time on the platform of android mobile terminal was around 0.06 seconds, and thus demonstrates acceptable real-time performance.

  5. Multiple-stage pure phase encoding with biometric information

    Science.gov (United States)

    Chen, Wen

    2018-01-01

    In recent years, many optical systems have been developed for securing information, and optical encryption/encoding has attracted more and more attention due to the marked advantages, such as parallel processing and multiple-dimensional characteristics. In this paper, an optical security method is presented based on pure phase encoding with biometric information. Biometric information (such as fingerprint) is employed as security keys rather than plaintext used in conventional optical security systems, and multiple-stage phase-encoding-based optical systems are designed for generating several phase-only masks with biometric information. Subsequently, the extracted phase-only masks are further used in an optical setup for encoding an input image (i.e., plaintext). Numerical simulations are conducted to illustrate the validity, and the results demonstrate that high flexibility and high security can be achieved.

  6. Modeling and prototyping of biometric systems using dataflow programming

    Science.gov (United States)

    Minakova, N.; Petrov, I.

    2018-01-01

    The development of biometric systems is one of the labor-intensive processes. Therefore, the creation and analysis of approaches and techniques is an urgent task at present. This article presents a technique of modeling and prototyping biometric systems based on dataflow programming. The technique includes three main stages: the development of functional blocks, the creation of a dataflow graph and the generation of a prototype. A specially developed software modeling environment that implements this technique is described. As an example of the use of this technique, an example of the implementation of the iris localization subsystem is demonstrated. A variant of modification of dataflow programming is suggested to solve the problem related to the undefined order of block activation. The main advantage of the presented technique is the ability to visually display and design the model of the biometric system, the rapid creation of a working prototype and the reuse of the previously developed functional blocks.

  7. Biostimulation effect of low-level laser on healing process after third molar surgery, based on biochemical markers in saliva

    Science.gov (United States)

    Kroulikova, Veronika; Dostálová, Tatjana; Podzimek, Stepan

    2015-02-01

    Third molar extractions in general anesthesia have become a standard procedure in dentistry. There is an effort to shorten healing time and decrease the number of complications as well as increase comfort after the treatment. Low-level lasers are known for their analgesic, anti-inflammatory, and stimulatory effect. The aim of the study is to evaluate the effect of low-level laser after surgery in general anesthesia reducing the patient's discomfort, i.e. mainly pain, and also, to monitor the biostimulation process. Our study included 79 patients treated at the Department of Maxilofacial Surgery, diagnosed with third molar retention. Diode low-level laser radiation (wavelength 830 nm, output power 270 mW, probe aperture of 6.4 mm2) with dose ~ 3 mJ was applied. The control group was treated by using placebo - red light. The exposure time was 11 seconds immediately after the suture; the treatment was repeated every day for the following 3 days. To evaluate the effect of laser biostimulation, the objective markers for immunological determination of healing - sIgA and lysozyme in non-stimulated saliva of patients - were used. The sIgA decreases after laser application from 546.91 mg/l to 304. 91mg/l and in the control group from 602.25mg/l to 425.62 mg/l. The results were statistically significant. The level of lysozyme decreases from 54.27 mg/l to 2.45mg/l after laser biostimulation, from 304.371mg/l to 11.08mg/l after placebo effect. The study has confirmed a low-level laser healing effect not directly related to pain.

  8. Secure authentication system that generates seed from biometric information.

    Science.gov (United States)

    Kim, Yeojin; Ahn, Jung-Ho; Byun, Hyeran

    2005-02-10

    As biometric recognition techniques are gradually improved, the stability of biometric authentication systems are enhanced. Although bioinformation has properties that make it resistant to fraud, biometric authentication systems are not immune to hacking. We show a secure biometric authentication system (1) to guarantee the integrity of biometric information by mixing data by use of a biometric key and (2) to raise recognition rates by use of bimodal biometrics.

  9. Biometric Features in Person Recognition Systems

    Directory of Open Access Journals (Sweden)

    Edgaras Ivanovas

    2011-03-01

    Full Text Available Lately a lot of research effort is devoted for recognition of a human being using his biometric characteristics. Biometric recognition systems are used in various applications, e. g., identification for state border crossing or firearm, which allows only enrolled persons to use it. In this paper biometric characteristics and their properties are reviewed. Development of high accuracy system requires distinctive and permanent characteristics, whereas development of user friendly system requires collectable and acceptable characteristics. It is showed that properties of biometric characteristics do not influence research effort significantly. Properties of biometric characteristic features and their influence are discussed.Article in Lithuanian

  10. Enhanced ATM Security using Biometric Authentication and Wavelet Based AES

    Directory of Open Access Journals (Sweden)

    Sreedharan Ajish

    2016-01-01

    Full Text Available The traditional ATM terminal customer recognition systems rely only on bank cards, passwords and such identity verification methods are not perfect and functions are too single. Biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. This paper presents a highly secured ATM banking system using biometric authentication and wavelet based Advanced Encryption Standard (AES algorithm. Two levels of security are provided in this proposed design. Firstly we consider the security level at the client side by providing biometric authentication scheme along with a password of 4-digit long. Biometric authentication is achieved by considering the fingerprint image of the client. Secondly we ensure a secured communication link between the client machine to the bank server using an optimized energy efficient and wavelet based AES processor. The fingerprint image is the data for encryption process and 4-digit long password is the symmetric key for the encryption process. The performance of ATM machine depends on ultra-high-speed encryption, very low power consumption, and algorithmic integrity. To get a low power consuming and ultra-high speed encryption at the ATM machine, an optimized and wavelet based AES algorithm is proposed. In this system biometric and cryptography techniques are used together for personal identity authentication to improve the security level. The design of the wavelet based AES processor is simulated and the design of the energy efficient AES processor is simulated in Quartus-II software. Simulation results ensure its proper functionality. A comparison among other research works proves its superiority.

  11. Biometric security based on ECG

    NARCIS (Netherlands)

    Ma, L.; Groot, de J.A.; Linnartz, J.P.M.G.

    2011-01-01

    Recently the electrocardiogram (ECG) has been proposed as a novel biometric. This paper aims to construct a reliable ECG verification system, in terms of privacy protection. To this end, an improved expression to estimate the capacity in the autocorrelation (AC) of the ECG is derived, which not only

  12. NCI: DCTD: Biometric Research Program

    Science.gov (United States)

    The Biometric Research Program (BRP) is the statistical and biomathematical component of the Division of Cancer Treatment, Diagnosis and Centers (DCTDC). Its members provide statistical leadership for the national and international research programs of the division in developmental therapeutics, developmental diagnostics, diagnostic imaging and clinical trials.

  13. Hand Grasping Synergies As Biometrics.

    Science.gov (United States)

    Patel, Vrajeshri; Thukral, Poojita; Burns, Martin K; Florescu, Ionut; Chandramouli, Rajarathnam; Vinjamuri, Ramana

    2017-01-01

    Recently, the need for more secure identity verification systems has driven researchers to explore other sources of biometrics. This includes iris patterns, palm print, hand geometry, facial recognition, and movement patterns (hand motion, gait, and eye movements). Identity verification systems may benefit from the complexity of human movement that integrates multiple levels of control (neural, muscular, and kinematic). Using principal component analysis, we extracted spatiotemporal hand synergies (movement synergies) from an object grasping dataset to explore their use as a potential biometric. These movement synergies are in the form of joint angular velocity profiles of 10 joints. We explored the effect of joint type, digit, number of objects, and grasp type. In its best configuration, movement synergies achieved an equal error rate of 8.19%. While movement synergies can be integrated into an identity verification system with motion capture ability, we also explored a camera-ready version of hand synergies-postural synergies. In this proof of concept system, postural synergies performed well, but only when specific postures were chosen. Based on these results, hand synergies show promise as a potential biometric that can be combined with other hand-based biometrics for improved security.

  14. NCI: DCTD: Biometric Research Branch

    Science.gov (United States)

    The Biometric Research Branch (BRB) is the statistical and biomathematical component of the Division of Cancer Treatment, Diagnosis and Centers (DCTDC). Its members provide statistical leadership for the national and international research programs of the division in developmental therapeutics, developmental diagnostics, diagnostic imaging and clinical trials.

  15. Hand Grasping Synergies As Biometrics

    Directory of Open Access Journals (Sweden)

    Ramana Vinjamuri

    2017-05-01

    Full Text Available Recently, the need for more secure identity verification systems has driven researchers to explore other sources of biometrics. This includes iris patterns, palm print, hand geometry, facial recognition, and movement patterns (hand motion, gait, and eye movements. Identity verification systems may benefit from the complexity of human movement that integrates multiple levels of control (neural, muscular, and kinematic. Using principal component analysis, we extracted spatiotemporal hand synergies (movement synergies from an object grasping dataset to explore their use as a potential biometric. These movement synergies are in the form of joint angular velocity profiles of 10 joints. We explored the effect of joint type, digit, number of objects, and grasp type. In its best configuration, movement synergies achieved an equal error rate of 8.19%. While movement synergies can be integrated into an identity verification system with motion capture ability, we also explored a camera-ready version of hand synergies—postural synergies. In this proof of concept system, postural synergies performed well, but only when specific postures were chosen. Based on these results, hand synergies show promise as a potential biometric that can be combined with other hand-based biometrics for improved security.

  16. No age discrimination for biometrics

    CSIR Research Space (South Africa)

    Lessing, MM

    2008-07-01

    Full Text Available . The research considers biometric advancements in the areas of travel and immigration, healthcare, law enforcement and banking. For the purpose of this study, adults are considered the individuals and groups in a working environment. Many of these applications...

  17. A novel biometric authentication approach using ECG and EMG signals.

    Science.gov (United States)

    Belgacem, Noureddine; Fournier, Régis; Nait-Ali, Amine; Bereksi-Reguig, Fethi

    2015-05-01

    Security biometrics is a secure alternative to traditional methods of identity verification of individuals, such as authentication systems based on user name and password. Recently, it has been found that the electrocardiogram (ECG) signal formed by five successive waves (P, Q, R, S and T) is unique to each individual. In fact, better than any other biometrics' measures, it delivers proof of subject's being alive as extra information which other biometrics cannot deliver. The main purpose of this work is to present a low-cost method for online acquisition and processing of ECG signals for person authentication and to study the possibility of providing additional information and retrieve personal data from an electrocardiogram signal to yield a reliable decision. This study explores the effectiveness of a novel biometric system resulting from the fusion of information and knowledge provided by ECG and EMG (Electromyogram) physiological recordings. It is shown that biometrics based on these ECG/EMG signals offers a novel way to robustly authenticate subjects. Five ECG databases (MIT-BIH, ST-T, NSR, PTB and ECG-ID) and several ECG signals collected in-house from volunteers were exploited. A palm-based ECG biometric system was developed where the signals are collected from the palm of the subject through a minimally intrusive one-lead ECG set-up. A total of 3750 ECG beats were used in this work. Feature extraction was performed on ECG signals using Fourier descriptors (spectral coefficients). Optimum-Path Forest classifier was used to calculate the degree of similarity between individuals. The obtained results from the proposed approach look promising for individuals' authentication.

  18. Handbook of biometric anti-spoofing trusted biometrics under spoofing attacks

    CERN Document Server

    Marcel, Sébastien; Li, Stan Z

    2014-01-01

    As the plethora of approaches to biometrics and their deployment continues to grow, so too does the need to combat the techniques used to subvert the aim of such biometric systems. Presenting the first definitive study of the subject, this Handbook of Biometric Anti-Spoofing reviews the state of the art in covert attacks against biometric systems, and in deriving countermeasures to these attacks. Across a range of common biometrics, including face, iris, fingerprint, speaker and gait, the book describes spoofing methods and examines the vulnerabilities of biometric systems to these attacks.

  19. Device for biometric verification of maternity

    Directory of Open Access Journals (Sweden)

    Lalović Komlen

    2015-01-01

    Full Text Available Biometry is the scientific discipline and technology that measures and analyzes physiological or behavioral characteristics of people and is widely deployed in modern society security systems. Device for biometric identification of maternity is a dual fingerprint scanner that acquires fingerprint templates of the mother and the child at the very moment of birth, generates unique ID reference, and further guarantees mother-child relationship with that reference. Technical issue that is solved with this work and the proposed device is scanning, processing, and storing encrypted biometric templates with a goal to provide a 100% guarantee maternity for each new born child. Scanning the fingerprints of both mother and the child simultaneously, at moment of birth, and pairing them with unique ID reference removes potential fears occurring from hospital negligence to malicious activities, while the data encryption raises the whole process to the highest level of security and confidentiality. The main contribution of the device that removes the fear that almost every mother has in this period as it provides an answer to the question: “Is this my baby?” with a 100% guarantee “It’s certainly yours!”

  20. An efficient visualization method for analyzing biometric data

    Science.gov (United States)

    Rahmes, Mark; McGonagle, Mike; Yates, J. Harlan; Henning, Ronda; Hackett, Jay

    2013-05-01

    We introduce a novel application for biometric data analysis. This technology can be used as part of a unique and systematic approach designed to augment existing processing chains. Our system provides image quality control and analysis capabilities. We show how analysis and efficient visualization are used as part of an automated process. The goal of this system is to provide a unified platform for the analysis of biometric images that reduce manual effort and increase the likelihood of a match being brought to an examiner's attention from either a manual or lights-out application. We discuss the functionality of FeatureSCOPE™ which provides an efficient tool for feature analysis and quality control of biometric extracted features. Biometric databases must be checked for accuracy for a large volume of data attributes. Our solution accelerates review of features by a factor of up to 100 times. Review of qualitative results and cost reduction is shown by using efficient parallel visual review for quality control. Our process automatically sorts and filters features for examination, and packs these into a condensed view. An analyst can then rapidly page through screens of features and flag and annotate outliers as necessary.

  1. Healing process following application of set or fresh mineral trioxide aggregate as a root-end filling material.

    Science.gov (United States)

    Habibi, Mehdi; Ghoddusi, Jamileh; Habibi, Ataollah; Mohtasham, Nooshin

    2011-01-01

    An unsuccessful attempt to reach the apical area or to place the retrograde material is a major difficulty in periradicular surgery. The aim of this study was to compare the histological evaluation of the healing process following an orthograde versus a retrograde application of mineral trioxide aggregate (MTA) as a root-end filling material during apical surgery on cats' teeth in order to find out whether orthograde placement of MTA before surgery can be used instead of retrograde placement during surgery. In this experimental study, 24 canine teeth in 12 mature and healthy cats were filled with either MTA or gutta-percha in an orthograde manner. Two weeks later, the teeth with MTA were surgically exposed and resected to the set-MTA within the canals. The teeth previously filled by gutta-percha were also surgically exposed, and retrograde cavities were prepared at the root ends and filled with fresh-MTA. After 8 weeks, the animals were euthanized by vital perfusion. Six-micron histological slices were prepared from samples, stained by Hematoxylin & Eosin, and histologically studied by means of a light microscope. The collected data was analyzed by the Chi-square and the T-test. One of the samples in the fresh-MTA group was omitted during processing because of inappropriate sectioning. In the set-MTA group, 5 out of 12 showed chronic abscess, while in the fresh-MTA group, 2 out of 11 were discovered to have chronic abscess; however, no significant difference was observed (P>.05). Hard tissue healing (cementum, bone, cementum + bone formation) in the set-MTA and fresh-MTA groups were 7 out of 12 and 9 out of 11, respectively. While healing seemed more likely to occur in the fresh-MTA group, the difference was statistically insignificant (P>.05). The magnitude of bone, cementum, or bone and cementum formation showed slight differences between the two groups; however, the figures failed to show any marked differences (P>.05). Orthograde placement of MTA could be used

  2. Examination of the skin barrier repair/wound healing process using a living skin equivalent model and matrix-assisted laser desorption-ionization-mass spectrometry imaging.

    Science.gov (United States)

    Lewis, E E L; Barrett, M R T; Freeman-Parry, L; Bojar, R A; Clench, M R

    2018-04-01

    Examination of the skin barrier repair/wound healing process using a living skin equivalent (LSE) model and matrix-assisted laser desorption/ionization-mass spectrometry imaging (MALDI-MSI) to identify lipids directly involved as potential biomarkers. These biomarkers may be used to determine whether an in vivo wound is going to heal for example if infected. An in vitro LSE model was wounded with a scalpel blade and assessed at day 4 post-wounding by histology and MALDI-MSI. Samples were sectioned at wound site and were either formalin-fixed paraffin-embedded (FFPE) for histology or snapped frozen (FF) for MSI analysis. The combination of using an in vitro wounded skin model with MSI allowed the identification of lipids involved in the skin barrier repair/wound healing process. The technique was able to highlight lipids directly in the wound site and distinguish differences in lipid distribution between the epidermis and wound site. This novel method of coupling an in vitro LSE with MSI allowed in-depth molecular analysis of the skin barrier repair/wound healing process. The technique allowed the identification of lipids directly involved in the skin barrier repair/wound healing process, indicating these biomarkers may be potentially be used within the clinic. These biomarkers will help to determine, which stage of the skin barrier repair/wound healing process the wound is in to provide the best treatment. © 2018 Society of Cosmetic Scientists and the Société Française de Cosmétologie.

  3. Protection of personal information in South Africa: a framework for biometric data collection security

    CSIR Research Space (South Africa)

    Mzila, Phiwa

    2016-11-01

    Full Text Available personal information. Like many other countries, South Africa, in 2013 officially approved and enacted the Protection of Personal Information Act, which gives guidelines that should be followed when processing personal information. The Act regards biometric...

  4. Holistic Medicine IV: Principles of Existential Holistic Group Therapy and the Holistic Process of Healing in a Group Setting

    Directory of Open Access Journals (Sweden)

    Soren Ventegodt

    2003-01-01

    Full Text Available In existential holistic group therapy, the whole person heals in accordance with the holistic process theory and the life mission theory. Existential group psychotherapy addresses the emotional aspect of the human mind related to death, freedom, isolation, and meaninglessness, while existential holistic group therapy addresses the state of the person�s wholeness. This includes the body, the person�s philosophy of life, and often also love, purpose of life, and the spiritual dimension, to the same extent as it addresses the emotional psyche and sexuality, and it is thus much broader than traditional psychotherapy.Where existential psychotherapy is rather depressing concerning the fundamental human condition, existential holistic therapy conceives life to be basically good. The fundamentals in existential holistic therapy are that everybody has the potential for healing themselves to become loving, joyful, sexually attractive, strong, and gifted, which is a message that most patients welcome. While the patient is suffering and fighting to get through life, the most important job for the holistic therapist is to keep a positive perspective of life. In accordance with these fundamentals, many participants in holistic group therapy will have positive emotional experiences, often of an unknown intensity, and these experiences appear to transform their lives within only a few days or weeks of therapy.An important idea of the course is Bohm�s concept of �holo-movement� in the group, resulting from intense coherence between the group members. When the group comes together, the individual will be linked to the totality and the great movement forward towards love, consciousness, and happiness will happen collectively � if it happens at all. This gives the individual the feeling that everything that happens is right, important, and valuable for all the participants at the same time. Native Americans and other premodern people refer to this

  5. Holistic medicine IV: principles of existential holistic group therapy and the holistic process of healing in a group setting.

    Science.gov (United States)

    Ventegodt, Søren; Andersen, Niels Jørgen; Merrick, Joav

    2003-12-23

    In existential holistic group therapy, the whole person heals in accordance with the holistic process theory and the life mission theory. Existential group psychotherapy addresses the emotional aspect of the human mind related to death, freedom, isolation, and meaninglessness, while existential holistic group therapy addresses the state of the person"s wholeness. This includes the body, the person's philosophy of life, and often also love, purpose of life, and the spiritual dimension, to the same extent as it addresses the emotional psyche and sexuality, and it is thus much broader than traditional psychotherapy. Where existential psychotherapy is rather depressing concerning the fundamental human condition, existential holistic therapy conceives life to be basically good. The fundamentals in existential holistic therapy are that everybody has the potential for healing themselves to become loving, joyful, sexually attractive, strong, and gifted, which is a message that most patients welcome. While the patient is suffering and fighting to get through life, the most important job for the holistic therapist is to keep a positive perspective of life. In accordance with these fundamentals, many participants in holistic group therapy will have positive emotional experiences, often of an unknown intensity, and these experiences appear to transform their lives within only a few days or weeks of therapy. An important idea of the course is Bohm's concept of "holo-movement" in the group, resulting from intense coherence between the group members. When the group comes together, the individual will be linked to the totality and the great movement forward towards love, consciousness, and happiness will happen collectively--if it happens at all. This gives the individual the feeling that everything that happens is right, important, and valuable for all the participants at the same time. Native Americans and other premodern people refer to this experience as "the spiritual design

  6. A concatenated coding scheme for biometric template protection

    NARCIS (Netherlands)

    Shao, X.; Xu, H.; Veldhuis, Raymond N.J.; Slump, Cornelis H.

    2012-01-01

    Cryptography may mitigate the privacy problem in biometric recognition systems. However, cryptography technologies lack error-tolerance and biometric samples cannot be reproduced exactly, rising the robustness problem. The biometric template protection system needs a good feature extraction

  7. Hand-Based Biometric Analysis

    Science.gov (United States)

    Bebis, George (Inventor); Amayeh, Gholamreza (Inventor)

    2015-01-01

    Hand-based biometric analysis systems and techniques are described which provide robust hand-based identification and verification. An image of a hand is obtained, which is then segmented into a palm region and separate finger regions. Acquisition of the image is performed without requiring particular orientation or placement restrictions. Segmentation is performed without the use of reference points on the images. Each segment is analyzed by calculating a set of Zernike moment descriptors for the segment. The feature parameters thus obtained are then fused and compared to stored sets of descriptors in enrollment templates to arrive at an identity decision. By using Zernike moments, and through additional manipulation, the biometric analysis is invariant to rotation, scale, or translation or an in put image. Additionally, the analysis utilizes re-use of commonly-seen terms in Zernike calculations to achieve additional efficiencies over traditional Zernike moment calculation.

  8. Recognition Errors Control in Biometric Identification Cryptosystems

    Directory of Open Access Journals (Sweden)

    Vladimir Ivanovich Vasilyev

    2015-06-01

    Full Text Available The method of biometric cryptosystem designed on the basis of fuzzy extractor, in which main disadvantages of biometric and cryptographic systems are absent, is considered. The main idea of this work is a control of identity recognition errors with use of fuzzy extractor which operates with Reed – Solomon correcting code. The fingerprint features vector is considered as a biometric user identifier.

  9. SURVEY OF BIOMETRIC SYSTEMS USING IRIS RECOGNITION

    OpenAIRE

    S.PON SANGEETHA; DR.M.KARNAN

    2014-01-01

    The security plays an important role in any type of organization in today’s life. Iris recognition is one of the leading automatic biometric systems in the area of security which is used to identify the individual person. Biometric systems include fingerprints, facial features, voice recognition, hand geometry, handwriting, the eye retina and the most secured one presented in this paper, the iris recognition. Biometric systems has become very famous in security systems because it is not possi...

  10. Towards a General Definition of Biometric Systems

    OpenAIRE

    Mirko Cubrilo; Miroslav Baca; Markus Schatten

    2009-01-01

    A foundation for closing the gap between biometrics in the narrower and the broader perspective is presented trough a conceptualization of biometric systems in both perspectives. A clear distinction between verification, identification and classification systems is made as well as shown that there are additional classes of biometric systems. In the end a Unified Modeling Language model is developed showing the connections between the two perspectives.

  11. BIOMETRIC AUTHENTICATION USING NONPARAMETRIC METHODS

    OpenAIRE

    S V Sheela; K R Radhika

    2010-01-01

    The physiological and behavioral trait is employed to develop biometric authentication systems. The proposed work deals with the authentication of iris and signature based on minimum variance criteria. The iris patterns are preprocessed based on area of the connected components. The segmented image used for authentication consists of the region with large variations in the gray level values. The image region is split into quadtree components. The components with minimum variance are determine...

  12. Mobile biometric device (MBD) technology :

    Energy Technology Data Exchange (ETDEWEB)

    Aldridge, Chris D.

    2013-06-01

    Mobile biometric devices (MBDs) capable of both enrolling individuals in databases and performing identification checks of subjects in the field are seen as an important capability for military, law enforcement, and homeland security operations. The technology is advancing rapidly. The Department of Homeland Security Science and Technology Directorate through an Interagency Agreement with Sandia sponsored a series of pilot projects to obtain information for the first responder law enforcement community on further identification of requirements for mobile biometric device technology. Working with 62 different jurisdictions, including components of the Department of Homeland Security, Sandia delivered a series of reports on user operation of state-of-the-art mobile biometric devices. These reports included feedback information on MBD usage in both operational and exercise scenarios. The findings and conclusions of the project address both the limitations and possibilities of MBD technology to improve operations. Evidence of these possibilities can be found in the adoption of this technology by many agencies today and the cooperation of several law enforcement agencies in both participating in the pilot efforts and sharing of information about their own experiences in efforts undertaken separately.

  13. Healing: through the lens of intentionality.

    Science.gov (United States)

    Zahourek, Rothlyn P

    2012-01-01

    Understanding and studying healing is one of our challenges as health care providers. This study is a presentation of a secondary analysis of data collected to study intentionality in the context of healing. Six healers and 6 healees, five of each who participate as dyads, described their experiences and their concepts of healing. The theory, Intentionality: the Matrix for Healing (IMH), is presented along with a more expanded definition of healing as an awareness of shift and a transformative process.

  14. Strategies for Exploiting Independent Cloud Implementations of Biometric Experts in Multibiometric Scenarios

    Directory of Open Access Journals (Sweden)

    P. Peer

    2014-01-01

    Full Text Available Cloud computing represents one of the fastest growing areas of technology and offers a new computing model for various applications and services. This model is particularly interesting for the area of biometric recognition, where scalability, processing power, and storage requirements are becoming a bigger and bigger issue with each new generation of recognition technology. Next to the availability of computing resources, another important aspect of cloud computing with respect to biometrics is accessibility. Since biometric cloud services are easily accessible, it is possible to combine different existing implementations and design new multibiometric services that next to almost unlimited resources also offer superior recognition performance and, consequently, ensure improved security to its client applications. Unfortunately, the literature on the best strategies of how to combine existing implementations of cloud-based biometric experts into a multibiometric service is virtually nonexistent. In this paper, we try to close this gap and evaluate different strategies for combining existing biometric experts into a multibiometric cloud service. We analyze the (fusion strategies from different perspectives such as performance gains, training complexity, or resource consumption and present results and findings important to software developers and other researchers working in the areas of biometrics and cloud computing. The analysis is conducted based on two biometric cloud services, which are also presented in the paper.

  15. Emerging Biometric Modalities: Challenges and Opportunities

    Science.gov (United States)

    Gafurov, Davrondzhon

    Recent advances in sensor technology and wide spread use of various electronics (computers, PDA, mobile phones etc.) provide new opportunities for capturing and analyses of novel physiological and behavioural traits of human beings for biometric authentication. This paper presents an overview of several such types of human characteristics that have been proposed as alternatives to traditional types of biometrics. We refer to these characteristics as emerging biometrics. We survey various types of emerging modalities and techniques, and discuss their pros and cons. Emerging biometrics faces several limitations and challenges which include subject population coverage (focusing mostly on adults); unavailability of benchmark databases; little research with respect to vulnerability/robustness against attacks; and some privacy concerns they may arise. In addition, recognition performance of emerging modalities are generally less accurate compared to the traditional biometrics. Despite all of these emerging biometrics posses their own benefits and advantages compared to traditional biometrics which makes them still attractive for research. First of all, emerging biometrics can always serve as a complementary source for identity information; they can be suitable in applications where traditional biometrics are difficult or impossible to adapt such as continuous or periodic re-verification of the user's identity etc.

  16. Encryption Technology based on Human Biometrics

    Directory of Open Access Journals (Sweden)

    Wei Yang

    2017-08-01

    Full Text Available The research progress of encryption technologies based on human biometrics is reviewed in this paper.The technologies that utilize human biometrics to make information encryption and identity authentication,and the technologies which combine biometrics encryption with optical encryption methods are introduced in detail.The advantages and disadvantages of these encryption systems are discussed,and the obstacles in practical applications are pointed out.Finally,the prospect of the new encryption technologies that are based on human biometrics are predicted.

  17. A lightweight approach for biometric template protection

    Science.gov (United States)

    Al-Assam, Hisham; Sellahewa, Harin; Jassim, Sabah

    2009-05-01

    Privacy and security are vital concerns for practical biometric systems. The concept of cancelable or revocable biometrics has been proposed as a solution for biometric template security. Revocable biometric means that biometric templates are no longer fixed over time and could be revoked in the same way as lost or stolen credit cards are. In this paper, we describe a novel and an efficient approach to biometric template protection that meets the revocability property. This scheme can be incorporated into any biometric verification scheme while maintaining, if not improving, the accuracy of the original biometric system. However, we shall demonstrate the result of applying such transforms on face biometric templates and compare the efficiency of our approach with that of the well-known random projection techniques. We shall also present the results of experimental work on recognition accuracy before and after applying the proposed transform on feature vectors that are generated by wavelet transforms. These results are based on experiments conducted on a number of well-known face image databases, e.g. Yale and ORL databases.

  18. Identification and authentication. Common biometric methods review

    OpenAIRE

    Lysak, A.

    2012-01-01

    Major biometric methods used for identification and authentication purposes in modern computing systems are considered in the article. Basic classification, application areas and key differences are given.

  19. A biometric authentication model using hand gesture images.

    Science.gov (United States)

    Fong, Simon; Zhuang, Yan; Fister, Iztok; Fister, Iztok

    2013-10-30

    A novel hand biometric authentication method based on measurements of the user's stationary hand gesture of hand sign language is proposed. The measurement of hand gestures could be sequentially acquired by a low-cost video camera. There could possibly be another level of contextual information, associated with these hand signs to be used in biometric authentication. As an analogue, instead of typing a password 'iloveu' in text which is relatively vulnerable over a communication network, a signer can encode a biometric password using a sequence of hand signs, 'i' , 'l' , 'o' , 'v' , 'e' , and 'u'. Subsequently the features from the hand gesture images are extracted which are integrally fuzzy in nature, to be recognized by a classification model for telling if this signer is who he claimed himself to be, by examining over his hand shape and the postures in doing those signs. It is believed that everybody has certain slight but unique behavioral characteristics in sign language, so are the different hand shape compositions. Simple and efficient image processing algorithms are used in hand sign recognition, including intensity profiling, color histogram and dimensionality analysis, coupled with several popular machine learning algorithms. Computer simulation is conducted for investigating the efficacy of this novel biometric authentication model which shows up to 93.75% recognition accuracy.

  20. Biometric Collection, Transmission and Storage Standards. Version 1.1

    National Research Council Canada - National Science Library

    2006-01-01

    This document provides a comprehensive technical reference that lists published biometric standards and describes their applicability to the biometric functions described in the Capstone Concept of Operations (CONOPS...

  1. Tongue prints in biometric authentication: A pilot study.

    Science.gov (United States)

    Jeddy, Nadeem; Radhika, T; Nithya, S

    2017-01-01

    Biometric authentication is an important process for the identification and verification of individuals for security purposes. There are many biometric systems that are currently in use and also being researched. Tongue print is a new biometric authentication tool that is unique and cannot be easily forged because no two tongue prints are similar. The present study aims to evaluate the common morphological features of the tongue and its variations in males and females. The usefulness of alginate impression and dental cast in obtaining the lingual impression was also evaluated. The study sample included twenty participants. The participants were subjected to visual examination following which digital photographs of the dorsal surface of the tongue were taken. Alginate impressions of the tongue were made, and casts were prepared using dental stone. The photographs and the casts were analyzed by two observers separately for the surface morphology including shape, presence or absence of fissures and its pattern of distribution. Three reference points were considered to determine the shape of the tongue. The most common morphological feature on the dorsum of the tongue was the presence of central fissures. Multiple vertical fissures were observed in males whereas single vertical fissure was a common finding in females. The fissures were predominantly shallow in males and deep in females. The tongue was predominantly U shaped in males and females. V-shaped tongue was observed in 25% of females. Tongue prints are useful in biometric authentication. The methodology used in the study is simple, easy and can be adopted by dentists on a regular basis. However, large-scale studies are required to validate the results and also identify other features of the tongue that can be used in forensics and biometric authentication process.

  2. Healing agent for self-healing cementious material

    NARCIS (Netherlands)

    Jonkers, H.M.

    2011-01-01

    The invention provides a process for the production of a cementious material. The process comprises mixing cement starting materials and a particulate healing agent to provide the cementious material. The healing agent comprises coated particles, wherein the coated particles comprise bacterial

  3. Nature's Electric Potential: A Systematic Review of the Role of Bioelectricity in Wound Healing and Regenerative Processes in Animals, Humans, and Plants.

    Science.gov (United States)

    Tyler, Sheena E B

    2017-01-01

    Natural endogenous voltage gradients not only predict and correlate with growth and development but also drive wound healing and regeneration processes. This review summarizes the existing literature for the nature, sources, and transmission of information-bearing bioelectric signals involved in controlling wound healing and regeneration in animals, humans, and plants. It emerges that some bioelectric characteristics occur ubiquitously in a range of animal and plant species. However, the limits of similarities are probed to give a realistic assessment of future areas to be explored. Major gaps remain in our knowledge of the mechanistic basis for these processes, on which regenerative therapies ultimately depend. In relation to this, it is concluded that the mapping of voltage patterns and the processes generating them is a promising future research focus, to probe three aspects: the role of wound/regeneration currents in relation to morphology; the role of endogenous flux changes in driving wound healing and regeneration; and the mapping of patterns in organisms of extreme longevity, in contrast with the aberrant voltage patterns underlying impaired healing, to inform interventions aimed at restoring them.

  4. Ultrasonographic observation of the healing process in the gap after a Ponseti-type Achilles tenotomy for idiopathic congenital clubfoot at two-year follow-up.

    Science.gov (United States)

    Niki, Hisateru; Nakajima, Hiroshi; Hirano, Takaaki; Okada, Hirokazu; Beppu, Moroe

    2013-01-01

    Ponseti management usually requires Achilles tenotomy during the final stage of serial casting. However, we lack a good understanding of the sequential tendon healing process after tenotomy in the Ponseti bracing protocol. The purpose of this study was to clarify the ultrasonographic process of tendon healing in the gap for up to two years after Ponseti-type Achilles tenotomy in patients with clubfeet. We conducted an ultrasonographic study to clarify the sequential changes in gap healing for up to two years after tenotomy. The subjects were 23 patients with 33 clubfeet. Achilles tenotomy was performed at mean 10.4 (8-16) weeks after birth. Dynamic and static ultrasonography was performed before tenotomy and at 1, 2, 3, 4, 6, 8, and 12 weeks as well as at 4, 6, 12, 18, and 24 months after tenotomy. Continuity and gliding were noted within four weeks. The united portion continued to thicken for up to three months after tenotomy. Starting from the fourth month, the healed portion began to lose its thickness, and this process continued into the sixth month. At one year, the thickness of the tendon did not differ much from that of the tendon on the opposing foot. In cases where patients had clubfoot on both feet and underwent simultaneous tenotomies, measurement of the tendons could not be accurately compared. At two years after tenotomy, slight irregularity of the internal structure persisted when compared with the unaffected foot. In addition, clinical and X-ray findings were evaluated simultaneously, and no recurrence was confirmed. To our knowledge, our results are the first to describe the process of gap healing in the tendon after tenotomy up to and beyond two years, as recommended in the Ponseti bracing protocol. Level of evidence IV.

  5. Strategies for exploiting independent cloud implementations of biometric experts in multibiometric scenarios

    OpenAIRE

    Peer, Peter; Emeršič, Žiga; Bule, Jernej; Žganec Gros, Jerneja; Štruc, Vitomir

    2015-01-01

    Cloud computing represents one of the fastest growing areas of technology and offers a new computing model for various applications and services. This model is particularly interesting for the area of biometric recognition, where scalability, processing power and storage requirements are becoming a bigger and bigger issue with each new generation of recognition technology. Next to the availability of computing resources, another important aspect of cloud computing with respect to biometrics i...

  6. Biometrics can help protect and safeguard.

    Science.gov (United States)

    Oakes, Shaun

    2017-06-01

    Shaun Oakes, managing director at ievo, a north-east England-based manufacturer of biometric fingerprint readers, argues that growing use of biometrics technology can improve security and afford better protection to premises, valuable items, and people, across an ever-busier NHS.

  7. Dual watermarking technique with multiple biometric watermarks

    Indian Academy of Sciences (India)

    affect the visual quality of the original art. On the contrary, removable visible watermarking .... Significant motivation for using biometric features such as face, voice and signature as a watermark is that face and ... These are the major reasons which motivated us to propose multimodal biometric watermarking. When the ...

  8. Controlling Leakage of Biometric Information using Dithering

    NARCIS (Netherlands)

    Buhan, I.R.; Doumen, J.M.; Hartel, Pieter H.; Buhan, I.R.; Doumen, J.M.; Hartel, P.H.

    Fuzzy extractors allow cryptographic keys to be generated from noisy, non-uniform biometric data. Fuzzy extractors can be used to authenticate a user to a server without storing her biometric data directly. However, in the Information Theoretic sense fuzzy extractors will leak information about the

  9. Semiparametric Copula Models for Biometric Score Level

    NARCIS (Netherlands)

    Caselli, M.

    2016-01-01

    In biometric recognition systems, biometric samples (images of faces, finger- prints, voices, gaits, etc.) of people are compared and classifiers (matchers) indicate the level of similarity between any pair of samples by a score. If two samples of the same person are compared, a genuine score is

  10. Behavioural Biometrics for Application in Biomedicine

    Czech Academy of Sciences Publication Activity Database

    Schlenker, Anna; Šárek, M.

    2013-01-01

    Roč. 1, č. 1 (2013), s. 56-56 ISSN 1805-8698. [EFMI 2013 Special Topic Conference. 17.04.2013-19.04.2013, Prague] Institutional support: RVO:67985807 Keywords : biometrics * behavioural biometrics * keystroke dynamics * mouse dynamics Subject RIV: IN - Informatics, Computer Science

  11. The effect of the glycolipoprotein extract (G-90) from earthworm Eisenia foetida on the wound healing process in alloxan-induced diabetic rats.

    Science.gov (United States)

    Goodarzi, Golnaz; Qujeq, Durdi; Elmi, Maryam M; Feizi, Farideh; Fathai, Sadegh

    2016-06-01

    Diabetes is now regarded as a major public health problem. The number of patients is estimated to increase to over 439 million cases by 2030. One of the major health clinical problems in patients with diabetes patients is impaired wound healing. Diabetic foot ulcer is a major complication of diabetes mellitus in 12 to 25% of patients, which increases the risk of damage in the limbs or amputation. The earthworm Eisenia foetida glycolipoprotein (as known G-90) is a blend of macromolecules with some biological properties including mitogenicity, anticoagulation, fibrinolysis, bacteriostatic and antioxidatiaon. Given the biological properties of G-90, this study was conducted to investigate the effect of extract obtained from the homogenate of Eisenia foetida (G-90) on the wound healing process in alloxan-induced diabetic rats. The results of the present study revealed that treatment by using G-90 can speed up the wound healing process, which is exactly similar to the effect of D-panthenol treatment in rats. These findings also demonstrated that G-90 treatment decreases the risk of infection in the wound site compared with D-panthenol treatment. In addition, histological analysis indicated that a better extracellular matrix formation with increased fibroblast proliferation, neovascularization, collagen synthesis and early epithelial layer formation was observed in G-90 treated group. Therefore, the G-90 could be considered as a new wound healing agent introducing promising therapeutic approaches in both human and veterinary medicine. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  12. Handwriting: Feature Correlation Analysis for Biometric Hashes

    Science.gov (United States)

    Vielhauer, Claus; Steinmetz, Ralf

    2004-12-01

    In the application domain of electronic commerce, biometric authentication can provide one possible solution for the key management problem. Besides server-based approaches, methods of deriving digital keys directly from biometric measures appear to be advantageous. In this paper, we analyze one of our recently published specific algorithms of this category based on behavioral biometrics of handwriting, the biometric hash. Our interest is to investigate to which degree each of the underlying feature parameters contributes to the overall intrapersonal stability and interpersonal value space. We will briefly discuss related work in feature evaluation and introduce a new methodology based on three components: the intrapersonal scatter (deviation), the interpersonal entropy, and the correlation between both measures. Evaluation of the technique is presented based on two data sets of different size. The method presented will allow determination of effects of parameterization of the biometric system, estimation of value space boundaries, and comparison with other feature selection approaches.

  13. Mobile networks for biometric data analysis

    CERN Document Server

    Madrid, Natividad; Seepold, Ralf; Orcioni, Simone

    2016-01-01

    This book showcases new and innovative approaches to biometric data capture and analysis, focusing especially on those that are characterized by non-intrusiveness, reliable prediction algorithms, and high user acceptance. It comprises the peer-reviewed papers from the international workshop on the subject that was held in Ancona, Italy, in October 2014 and featured sessions on ICT for health care, biometric data in automotive and home applications, embedded systems for biometric data analysis, biometric data analysis: EMG and ECG, and ICT for gait analysis. The background to the book is the challenge posed by the prevention and treatment of common, widespread chronic diseases in modern, aging societies. Capture of biometric data is a cornerstone for any analysis and treatment strategy. The latest advances in sensor technology allow accurate data measurement in a non-intrusive way, and in many cases it is necessary to provide online monitoring and real-time data capturing to support a patient’s prevention pl...

  14. Handwriting: Feature Correlation Analysis for Biometric Hashes

    Directory of Open Access Journals (Sweden)

    Ralf Steinmetz

    2004-04-01

    Full Text Available In the application domain of electronic commerce, biometric authentication can provide one possible solution for the key management problem. Besides server-based approaches, methods of deriving digital keys directly from biometric measures appear to be advantageous. In this paper, we analyze one of our recently published specific algorithms of this category based on behavioral biometrics of handwriting, the biometric hash. Our interest is to investigate to which degree each of the underlying feature parameters contributes to the overall intrapersonal stability and interpersonal value space. We will briefly discuss related work in feature evaluation and introduce a new methodology based on three components: the intrapersonal scatter (deviation, the interpersonal entropy, and the correlation between both measures. Evaluation of the technique is presented based on two data sets of different size. The method presented will allow determination of effects of parameterization of the biometric system, estimation of value space boundaries, and comparison with other feature selection approaches.

  15. Biometric and intelligent decision making support

    CERN Document Server

    Kaklauskas, Arturas

    2015-01-01

    This book presents different methods for analyzing the body language (movement, position, use of personal space, silences, pauses and tone, the eyes, pupil dilation or constriction, smiles, body temperature and the like) for better understanding people’s needs and actions, including biometric data gathering and reading. Different studies described in this book indicate that sufficiently much data, information and knowledge can be gained by utilizing biometric technologies. This is the first, wide-ranging book that is devoted completely to the area of intelligent decision support systems, biometrics technologies and their integrations. This book is designated for scholars, practitioners and doctoral and master’s degree students in various areas and those who are interested in the latest biometric and intelligent decision making support problems and means for their resolutions, biometric and intelligent decision making support systems and the theory and practice of their integration and the opportunities fo...

  16. Recommendation on the Use of Biometric Technology

    DEFF Research Database (Denmark)

    Juul, Niels Christian

    2013-01-01

    Biometric technology is based on the use of information linked to individuals. Hence, privacy and security in biometric applications becomes a concern and the need to assess such applications thoroughly becomes equally important. Guidelines for application of biometric technology must ensure...... a positive impact on both security and privacy. Based on two cases of biometric application, which have been assessed by the Danish Data Protecting Agency, this chapter present a set of recommendations to legislators, regulators, corporations and individuals on the appropriate use of biometric technologies...... put forward by the Danish Board of Technology. The recommendations are discussed and compared to the similar proposal put forward by the European Article 29 Data Protection Working Party....

  17. 2009 Biometrics Conference

    Science.gov (United States)

    2009-01-28

    gov/fpkia/crosscert htm. . . – Verisign – Wells Fargo CSPs on Other Bridges at eAuth-4 (Certipath only today) htt // ti th / ki t htp : www.cer pa .com...Center (TEDAC) provided latent fingerprints recovered from an Improvised Explosive Device (IED) to BFC BFC manually processed latent prints...to original fingerprint. If no match manual review; may not test , . Other action may be taken. Copyright© 2009, Graduate Management Admission

  18. Human body as a set of biometric features identified by means of optoelectronics

    Science.gov (United States)

    Podbielska, Halina; Bauer, Joanna

    2005-09-01

    Human body posses many unique, singular features that are impossible to copy or forge. Nowadays, to establish and to ensure the public security requires specially designed devices and systems. Biometrics is a field of science and technology, exploiting human body characteristics for people recognition. It identifies the most characteristic and unique ones in order to design and construct systems capable to recognize people. In this paper some overview is given, presenting the achievements in biometrics. The verification and identification process is explained, along with the way of evaluation of biometric recognition systems. The most frequently human biometrics used in practice are shortly presented, including fingerprints, facial imaging (including thermal characteristic), hand geometry and iris patterns.

  19. Machine learning techniques for gait biometric recognition using the ground reaction force

    CERN Document Server

    Mason, James Eric; Woungang, Isaac

    2016-01-01

    This book focuses on how machine learning techniques can be used to analyze and make use of one particular category of behavioral biometrics known as the gait biometric. A comprehensive Ground Reaction Force (GRF)-based Gait Biometrics Recognition framework is proposed and validated by experiments. In addition, an in-depth analysis of existing recognition techniques that are best suited for performing footstep GRF-based person recognition is also proposed, as well as a comparison of feature extractors, normalizers, and classifiers configurations that were never directly compared with one another in any previous GRF recognition research. Finally, a detailed theoretical overview of many existing machine learning techniques is presented, leading to a proposal of two novel data processing techniques developed specifically for the purpose of gait biometric recognition using GRF. This book · introduces novel machine-learning-based temporal normalization techniques · bridges research gaps concerning the effect of ...

  20. Biometric morphing: a novel technique for the analysis of morphologic outcomes after facial surgery.

    Science.gov (United States)

    Pahuta, Markian A; Mainprize, James G; Rohlf, F James; Antonyshyn, Oleh M

    2009-01-01

    The results of facial surgery are intuitively judged in terms of the visible changes in facial features or proportions. However, describing these morphologic outcomes objectively remains a challenge. Biometric morphing addresses this issue by merging statistical shape analysis and image processing. This study describes the implementation of biometric morphing in describing the average morphologic result of facial surgery. The biometric morphing protocol was applied to pre- and postoperative images of the following: (1) 40 dorsal hump reduction rhinoplasties and (2) 20 unilateral enophthalmos repairs. Pre- and postoperative average images (average morphs) were generated. The average morphs provided an objective rendering of nasal and periorbital morphology, which summarized the average features and extent of deformity in a population of patients. Subtle alterations in morphology after surgery, which would otherwise be difficult to identify or demonstrate, were clearly illustrated. Biometric morphing is an effective instrument for describing average facial morphology in a population of patients.

  1. Bridging the gap: from biometrics to forensics.

    Science.gov (United States)

    Jain, Anil K; Ross, Arun

    2015-08-05

    Biometric recognition, or simply biometrics, refers to automated recognition of individuals based on their behavioural and biological characteristics. The success of fingerprints in forensic science and law enforcement applications, coupled with growing concerns related to border control, financial fraud and cyber security, has generated a huge interest in using fingerprints, as well as other biological traits, for automated person recognition. It is, therefore, not surprising to see biometrics permeating various segments of our society. Applications include smartphone security, mobile payment, border crossing, national civil registry and access to restricted facilities. Despite these successful deployments in various fields, there are several existing challenges and new opportunities for person recognition using biometrics. In particular, when biometric data is acquired in an unconstrained environment or if the subject is uncooperative, the quality of the ensuing biometric data may not be amenable for automated person recognition. This is particularly true in crime-scene investigations, where the biological evidence gleaned from a scene may be of poor quality. In this article, we first discuss how biometrics evolved from forensic science and how its focus is shifting back to its origin in order to address some challenging problems. Next, we enumerate the similarities and differences between biometrics and forensics. We then present some applications where the principles of biometrics are being successfully leveraged into forensics in order to solve critical problems in the law enforcement domain. Finally, we discuss new collaborative opportunities for researchers in biometrics and forensics, in order to address hitherto unsolved problems that can benefit society at large. © 2015 The Author(s) Published by the Royal Society. All rights reserved.

  2. Self-healing of polymer modified concrete

    Directory of Open Access Journals (Sweden)

    Abd_Elmoaty M. Abd_Elmoaty

    2011-06-01

    Full Text Available Self healing phenomenon of concrete has been observed in traditional, fibrous, self compacting concrete. This phenomenon occurred mainly due to the presence of unhydrated cement particles in the presence of water. Mechanism of polymer in concrete depends on creating a layer and net of polymer around cement particles which enhances the properties of polymer modified concrete. This mechanism may affect the self healing of this type of concrete. This work aims to study the presence of the self healing phenomenon in polymer modified concrete and the related parameters. An experimental investigation on self healing of polymer modified concrete was undertaken. In this research work, effect of polymer type, polymer dose, cement content, cement type, w/cm ratio and age of damage were studied. The healing process extended up to 60 days. Ultrasonic pulse velocity measurements were used to evaluate the healing process. Results indicated that, the self healing phenomenon existed in polymer modified concrete as in traditional concrete. The increase of polymer dose increases the healing degree at the same healing time. This increase depends on polymer type. Also, the decrease of w/cm ratio reduces the self healing degree while the use of Type V Portland cement improves the self healing process compared with Type I Portland cement. Cement content has an insignificant effect on healing process for both concrete with and without polymer. In addition, the increase of damage age decreases the efficiency of self healing process.

  3. Privacy-leakage codes for biometric authentication systems

    NARCIS (Netherlands)

    Ignatenko, T.; Willems, F.M.J.

    2014-01-01

    In biometric privacy-preserving authentication systems that are based on key-binding, two terminals observe two correlated biometric sequences. The first terminal selects a secret key, which is independent of the biometric data, binds this secret key to the observed biometric sequence and

  4. The impact of plasma rich in growth factors on clinical and biological factors involved in healing processes after third molar extraction.

    Science.gov (United States)

    Mozzati, Marco; Martinasso, Germana; Pol, Renato; Polastri, Carolina; Cristiano, Antonio; Muzio, Giuliana; Canuto, Rosa

    2010-12-01

    Extraction of an impacted mandibular third molar is a common surgical procedure, although it still leads to several postoperative symptoms and complications. The study assessed the efficacy of autologous plasma rich in growth factors (PRGF) in the healing process by checking the difference of tissue cytokines and other healing factors produced by the mucosa after extraction between sites treated with PRGF and control sites and, at the same time, by evaluating the clinical efficacy of PRGF in terms of reduced pain and facial swelling. This study was a split-mouth study, in which the patient becomes his/her own control, to eliminate any individual response differences toward PRGF treatment. The parameters regarding inflammation and subsequent wound healing were all significantly higher at PRGF sites than at control sites. The increase at PRGF sites of the two proinflammatory cytokines evaluated, interleukin (IL)-1β and IL-6, was accompanied by the increase of two anti-inflammatory cytokines, IL-10 and transforming growth factor-β. Furthermore, IL-1β and IL-6 induce fibroblast and keratinocyte proliferation, important events in wound healing. Postoperative pain and the swelling, measured at all experimental times, were reduced in the presence of PRGF. © 2010 Wiley Periodicals, Inc. J Biomed Mater Res Part A, 2010.

  5. A novel approach to transformed biometrics using successive projections

    Science.gov (United States)

    Gopi, E. S.

    2010-02-01

    Unlike user created password, number of biometrics is limited for creating account in different organizations. Transformed biometrics attempts to solve the problem by transforming the biometric into another form, which is unique to the particular organization. This makes the availability of different transformed biometrics in different organizations transformed from the same biometrics and helps in foolproof transactions. In this article a novel approach to transformed biometrics using successive projection technique is suggested .In the proposed technique, the user can register up to 5*4n-1 organizations if the length of the biometric password is 'n'.

  6. Novel continuous authentication using biometrics

    Science.gov (United States)

    Dubey, Prakash; Patidar, Rinku; Mishra, Vikas; Norman, Jasmine; Mangayarkarasi, R.

    2017-11-01

    We explore whether a classifier can consistent1y verify c1ients and interact with the computer using camera and behavior of users. In this paper we propose a new way of authentication of user which wi1l capture many images of user in random time and ana1ysis of its touch biometric behavior. In this system experiment the touch conduct of a c1ient/user between an en1istment stage is stored in the database and it is checked its mean time behavior during equa1 partition of time. This touch behavior wi1l ab1e to accept or reject the user. This wi1l modify the use of biometric more accurate to use. In this system the work p1an going to perform is the user wi1l ask single time to a1low to take it picture before 1ogin. Then it wi1l take images of user without permission of user automatica1ly and store in the database. This images and existing image of user wi1l be compare and reject or accept wi1l depend on its comparison. The user touch behavior wi1l keep storing with number of touch make in equa1 amount of time of the user. This touch behavior and image wi1l fina1ly perform authentication of the user automatically.

  7. Cattle identification based in biometric features of the muzzle

    OpenAIRE

    Monteiro, Marta; Cadavez, Vasco; Monteiro, Fernando C.

    2015-01-01

    Cattle identification has been a serious problem for breeding association. Muzzle pattern or nose print has the same characteristic with the human fingerprint which is the most popular biometric marker. The identification accuracy and the processing time are two key challenges of any cattle identification methodology. This paper presents a robust and fast cattle identification scheme from muzzle images using Speed-up Robust Features matching. The matching refinement technique based on the mat...

  8. EXPERIMENTAL ANALYSIS OF THE HEALING PROCESS IN THE AREA OF TIBIAL BONE FRACTURE

    Directory of Open Access Journals (Sweden)

    I. F. Аkhtyamov

    2016-01-01

    Full Text Available Purpose. To quantify the density of the cortical bone of the tibia in the area of reparative regeneration and the state of the vascular bed (hemodynamics of the operated limb under intramedullary osteosynthesis using pins coated with titanium and hafnium nitrides. Materials and methods. In the experiment, changes in the bone density and the characteristics of the local blood supply were studied on 40 outbred rabbits which underwent intramedullary osteosynthesis by the use of pins with a nanocoating based on superhard compounds which consist of titanium and hafnium nitrides and pins without a coating. Using color Doppler mode helped to evaluate the condition of the vascular bed proximally to the fracture site. Results. It is noted that the use of pins with the described coating above did not violate the osteoregeneration staging. The density of the cortical bone in the test group exceeded that of the comparison group by an average of 30%. Bone remodeling processes in the test group completed at an earlier date, as determined by the higher rates of its density. In the study of the vascular bed of the operated limb, it was found that on the 10th day of the experiment, an increase in the maximal velocity of the blood flow was recorded (TAMAX. In animals of the test group this index approached preoperative values on the 30th day, while in animals of the comparison group this index approached the initial values only by the 60th day. Conclusion. The use of implants coated with titanium and hafnium nitrides which are characterized by high strength, thermal and chemical stability is accompanied by the formation of a cortical bone in the area of osteotomy with higher density characteristics. The changes which are typical of the vasodilatation in the area of injury in the early postoperative period can be regarded as a positive factor in the formation of primary bone union. In the group where implants coated with titanium and hafnium nitrides were used

  9. [Influence of Schinus terebinthifolius Raddi (aroeira) and Carapa guianensis Aublet (andiroba) in the healing process of gastrorraphies].

    Science.gov (United States)

    Santos, Orlando José Dos; Malafaia, Osvaldo; Ribas-Filho, Jurandir Marcondes; Czeczko, Nicolau Gregori; Santos, Rayan Haquim Pinheiro; Santos, Rennan Abud Pinheiro

    2013-06-01

    The gastrorraphy isolated or associated with the use of biological adhesives formed throughout the history of surgery the usual way to promote healing in gastric lesions; however, the use of herbal medicine has been increasingly employed to help the wound healing. To evaluate the wound healing caused in the stomach of rats using extract of Schinus terebinthifolius Raddi and Carapa guianensis Aublet oil. Ninety rats, adult males were divided into three groups: aroeira, andiroba and control group, which were subdivided into three subgroups of five animals according to the time of the deaths (seven, 14 and 21 days). All underwent the same surgical procedure (injury and suture the stomach) differing only to the animals in groups aroeira and andiroba that received a daily dose of 100 mg / kg of hydroalcoholic extract and oil, by gavage, while the control group received normal saline. The parameters evaluated were the macroscopic and microscopic test of resistance to air insufflation and test the traction force. All animals showed good healing of gastric and abdominal wall without infection and dehiscence. Both groups presented neighboring organs adhesions on the gastric surface. The endurance test for air insufflation showed higher average pressure within seven days and the test revealed greater traction force of rupture between seven and 14 days in groups aroeira and andiroba. The intensity of chronic inflammation revealed statistically significant differences in angiogenesis and fibroblast proliferation. The use of extract of Schinus terebinthifolius Raddi and Carapa guianensis Aublet oil favored the gastric wound healing in rats.

  10. Soft Biometrics; Human Identification Using Comparative Descriptions.

    Science.gov (United States)

    Reid, Daniel A; Nixon, Mark S; Stevenage, Sarah V

    2014-06-01

    Soft biometrics are a new form of biometric identification which use physical or behavioral traits that can be naturally described by humans. Unlike other biometric approaches, this allows identification based solely on verbal descriptions, bridging the semantic gap between biometrics and human description. To permit soft biometric identification the description must be accurate, yet conventional human descriptions comprising of absolute labels and estimations are often unreliable. A novel method of obtaining human descriptions will be introduced which utilizes comparative categorical labels to describe differences between subjects. This innovative approach has been shown to address many problems associated with absolute categorical labels-most critically, the descriptions contain more objective information and have increased discriminatory capabilities. Relative measurements of the subjects' traits can be inferred from comparative human descriptions using the Elo rating system. The resulting soft biometric signatures have been demonstrated to be robust and allow accurate recognition of subjects. Relative measurements can also be obtained from other forms of human representation. This is demonstrated using a support vector machine to determine relative measurements from gait biometric signatures-allowing retrieval of subjects from video footage by using human comparisons, bridging the semantic gap.

  11. Using Biometric Characteristics to Increase ITS Security

    Directory of Open Access Journals (Sweden)

    Miroslav Bača

    2007-11-01

    Full Text Available Terrorist attacks in New York City and Washington, Districtof Columbia on the morning of September 11, 2001 havechanged our lives. The secwity problem became very importantregarding all spheres of human activities. Tracking persons(employees, customers etc. in ITS (Intelligent Transport Systemis a huge problem. Biometrics offers a very good solutionfor this problem and is today maybe one of the most promisingtechniques for person's secure verification and authentication;biometric system also features some advantages when comparedto other security systems. When using a biometric systemone has to be careful because the functionality of a biometricapplication can be dramatically aggravated if inappropriatebiometric features are selected. Classification of biometric featureson contact and contactless, or distinction between"strong" and "soft" biometric features gives a framework for usingbiometric features, but it does not ensure that biometric featŁtres are implemented at a satisfactory level. The usage ofmultimodal or unimodal biometric system can significantly increasethe system security but it also opens plenty of questionslike privacy etc. This paper describes the implementation ofbiometric features which can be used in ITS, and delineates anew model of usage.

  12. How wounds heal

    Science.gov (United States)

    ... How puncture wounds heal; How burns heal; How pressure sores heal; How lacerations heal ... bleed. For example, burns, some puncture wounds, and pressure sores do not bleed. Once the scab forms, your ...

  13. Fusion of Multimodal Biometrics using Feature and Score Level Fusion

    OpenAIRE

    Mohana Prakash, S.; Betty, P.; Sivanarulselvan, K.

    2016-01-01

    Biometrics is used to uniquely identify a person‘s individual based on physical and behavioural characteristics. Unimodal biometric system contains various problems such as degree of freedom, spoof attacks, non-universality, noisy data and error rates. Multimodal biometrics is introduced to overcome the limitations in Unimodal biometrics. The presented methodology extracts the features of four biometric traits such as fingerprint, palm, iris and retina. Then extracted features are fused in th...

  14. Comparative analysis of the quality of biometric methods

    OpenAIRE

    Filipčík, Jan

    2010-01-01

    The main objective is to describe and analyze the types of biometric identification and selected biometric methods and identify their strengths and weaknesses compared to the current document type of identification and verification of persons and compared to other biometric methods and then focus on the relationships and support of biometric methods in terms of IS / ICT services. The work will consist of 5 types of biometric methods namely dactyloscopy, hand geometry scanning, facial scanning...

  15. Complementarity of flux- and biometric-based data to constrain parameters in a terrestrial carbon model

    Directory of Open Access Journals (Sweden)

    Zhenggang Du

    2015-03-01

    Full Text Available To improve models for accurate projections, data assimilation, an emerging statistical approach to combine models with data, have recently been developed to probe initial conditions, parameters, data content, response functions and model uncertainties. Quantifying how many information contents are contained in different data streams is essential to predict future states of ecosystems and the climate. This study uses a data assimilation approach to examine the information contents contained in flux- and biometric-based data to constrain parameters in a terrestrial carbon (C model, which includes canopy photosynthesis and vegetation–soil C transfer submodels. Three assimilation experiments were constructed with either net ecosystem exchange (NEE data only or biometric data only [including foliage and woody biomass, litterfall, soil organic C (SOC and soil respiration], or both NEE and biometric data to constrain model parameters by a probabilistic inversion application. The results showed that NEE data mainly constrained parameters associated with gross primary production (GPP and ecosystem respiration (RE but were almost invalid for C transfer coefficients, while biometric data were more effective in constraining C transfer coefficients than other parameters. NEE and biometric data constrained about 26% (6 and 30% (7 of a total of 23 parameters, respectively, but their combined application constrained about 61% (14 of all parameters. The complementarity of NEE and biometric data was obvious in constraining most of parameters. The poor constraint by only NEE or biometric data was probably attributable to either the lack of long-term C dynamic data or errors from measurements. Overall, our results suggest that flux- and biometric-based data, containing different processes in ecosystem C dynamics, have different capacities to constrain parameters related to photosynthesis and C transfer coefficients, respectively. Multiple data sources could also

  16. The effects of golden sea cucumber extract (Stichopus hermanii on the number of lymphocytes during the healing process of traumatic ulcer on wistar rat’s oral mucous

    Directory of Open Access Journals (Sweden)

    Ira Arundina

    2015-06-01

    Full Text Available Background: Indonesia is a country with the world’s biggest potential and producer of sea cucumbers. Golden sea cucumber contains glicosaminoglycans, such as heparan sulphate and chondroitin sulphate, which could have a positive implication on wound healing process. This acceleration of wound healing process could be observed through the increasing of lymphocytes on ulcus traumaticus. Purpose: This study aims to analyze the effects of golden sea cucumber extract on the number of lymphocytes during the healing process of traumatic ulcer on Wistar rat’s oral mucous. Method: Golden sea cucumber extrat was made with freeze-dried method, and then gel was prepared using PEG 400 and PEG 4000 solvent. Twenty male rats with mucosal ulcus made were divided into a control group and three treatment groups with 20%, 40% and 80% golden sea cucumber extracts. All samples were euthanized on day 4 and then a preparation for histopathological examination was made to examine the number of lymphocytes. Result: The biggest number of lymphocytes was found in the treatment group with 40% golden sea cucumber extract, while the lowest one was found in the control group. The results of one way Anova test then showed a significant difference between the control group and the treatment groups. And, the results of Tukey HSD showed a significant difference between the control group and the treatment group with 40% golden sea cucumber extract. Conclusion: It can be concluded that 40% golden sea cucumber (Stichopus hermanii extract can increase the number of lymphocytes during the healing process of traumatic ulcer on Wistar rat’s oral mucous.

  17. Data Acquisition for Modular Biometric Monitoring System

    Science.gov (United States)

    Chmiel, Alan J. (Inventor); Humphreys, Bradley T. (Inventor); Grodsinsky, Carlos M. (Inventor)

    2014-01-01

    A modular system for acquiring biometric data includes a plurality of data acquisition modules configured to sample biometric data from at least one respective input channel at a data acquisition rate. A representation of the sampled biometric data is stored in memory of each of the plurality of data acquisition modules. A central control system is in communication with each of the plurality of data acquisition modules through a bus. The central control system is configured to collect data asynchronously, via the bus, from the memory of the plurality of data acquisition modules according to a relative fullness of the memory of the plurality of data acquisition modules.

  18. Biometric Systems Private by Design: Reasoning about privacy properties of biometric system architectures

    OpenAIRE

    Bringer, Julien; Chabanne, Herve; Metayer, Daniel Le; Lescuyer, Roch

    2017-01-01

    This work aims to show the applicability, and how, of privacy by design approach to biometric systems and the benefit of using formal methods to this end. Starting from a general framework that has been introduced at STM in 2014, that enables to define privacy architectures and to formally reason about their properties, we explain how it can be adapted to biometrics. The choice of particular techniques and the role of the components (central server, secure module, biometric terminal, smart ca...

  19. Optimization of process factors for self-healing vanadium-based conversion coating on AZ31 magnesium alloy

    Science.gov (United States)

    Li, Kun; Liu, Junyao; Lei, Ting; Xiao, Tao

    2015-10-01

    A self-healing vanadium-based conversion coating was prepared on AZ31 magnesium alloy. The optimum operating conditions including vanadia solution concentration, pH and treating temperature for obtaining the best corrosion protective vanadia coatings and improved localized corrosion resistance to the magnesium substrate were determined by an orthogonal experiment design. Surface morphology and composition of the resultant conversion coatings were investigated by scanning electron microscope (SEM) and X-ray photoelectron spectroscopy (XPS). The self-healing behavior of the coating was investigated by cross-cut immersion test and electrochemical impedance spectroscopy (EIS) measurements in 3.5% NaCl solution.

  20. Biometric identity management for standard mobile medical networks.

    Science.gov (United States)

    Egner, Alexandru; Soceanu, Alexandru; Moldoveanu, Florica

    2012-01-01

    The explosion of healthcare costs over the last decade has prompted the ICT industry to respond with solutions for reducing costs while improving healthcare quality. The ISO/IEEE 11073 family of standards recently released is the first step towards interoperability of mobile medical devices used in patient environments. The standards do not, however, tackle security problems, such as identity management, or the secure exchange of medical data. This paper proposes an enhancement of the ISO/IEEE 11073-20601 protocol with an identity management system based on biometry. The paper describes a novel biometric-based authentication process, together with the biometric key generation algorithm. The proposed extension of the ISO/IEEE 11073-20601 is also presented.

  1. A biometric identification system based on eigenpalm and eigenfinger features.

    Science.gov (United States)

    Ribaric, Slobodan; Fratric, Ivan

    2005-11-01

    This paper presents a multimodal biometric identification system based on the features of the human hand. We describe a new biometric approach to personal identification using eigenfinger and eigenpalm features, with fusion applied at the matching-score level. The identification process can be divided into the following phases: capturing the image; preprocessing; extracting and normalizing the palm and strip-like finger subimages; extracting the eigenpalm and eigenfinger features based on the K-L transform; matching and fusion; and, finally, a decision based on the (k, l)-NN classifier and thresholding. The system was tested on a database of 237 people (1,820 hand images). The experimental results showed the effectiveness of the system in terms of the recognition rate (100 percent), the equal error rate (EER = 0.58 percent), and the total error rate (TER = 0.72 percent).

  2. Modeling of Biometric Identification System Using the Colored Petri Nets

    Science.gov (United States)

    Petrosyan, G. R.; Ter-Vardanyan, L. A.; Gaboutchian, A. V.

    2015-05-01

    In this paper we present a model of biometric identification system transformed into Petri Nets. Petri Nets, as a graphical and mathematical tool, provide a uniform environment for modelling, formal analysis, and design of discrete event systems. The main objective of this paper is to introduce the fundamental concepts of Petri Nets to the researchers and practitioners, both from identification systems, who are involved in the work in the areas of modelling and analysis of biometric identification types of systems, as well as those who may potentially be involved in these areas. In addition, the paper introduces high-level Petri Nets, as Colored Petri Nets (CPN). In this paper the model of Colored Petri Net describes the identification process much simpler.

  3. Frontiers in Healing Racism.

    Science.gov (United States)

    Rutstein, Nathan

    2000-01-01

    Author reflects on forty years of experience writing about the civil rights movement. The Institute for Healing Racism, a grassroots movement for participants of diverse backgrounds to study racism and to help discover the oneness of humankind, grew out of the author's concerns. The principles and processes of the Institute are described.…

  4. Hypothesis: The Psychedelic Ayahuasca Heals Traumatic Memories via a Sigma 1 Receptor-Mediated Epigenetic-Mnemonic Process

    Directory of Open Access Journals (Sweden)

    Antonio Inserra

    2018-04-01

    plasticity and modulates epigenetic processes, such effects might be involved in the reported healing of traumatic memories in PTSD patients. If this theory proves to be true, Ayahuasca could come to represent the only standing pharmacological treatment which targets traumatic memories in PTSD. Lastly, since SIGMAR1 activation triggers both epigenetic and immunomodulatory programmes, the mechanism here presented could help understanding and treating other conditions in which the cellular memory is dysregulated, such as cancer, diabetes, autoimmune and neurodegenerative pathologies and substance addiction.

  5. Hypothesis: The Psychedelic Ayahuasca Heals Traumatic Memories via a Sigma 1 Receptor-Mediated Epigenetic-Mnemonic Process.

    Science.gov (United States)

    Inserra, Antonio

    2018-01-01

    epigenetic processes, such effects might be involved in the reported healing of traumatic memories in PTSD patients. If this theory proves to be true, Ayahuasca could come to represent the only standing pharmacological treatment which targets traumatic memories in PTSD. Lastly, since SIGMAR1 activation triggers both epigenetic and immunomodulatory programmes, the mechanism here presented could help understanding and treating other conditions in which the cellular memory is dysregulated, such as cancer, diabetes, autoimmune and neurodegenerative pathologies and substance addiction.

  6. Histomorphometric analysis and immunolocalization of RANKL and OPG during the alveolar healing process in female ovariectomized rats treated with oestrogen or raloxifene.

    Science.gov (United States)

    Luvizuto, Eloá Rodrigues; Queiroz, Thallita Pereira; Dias, Sheila Mônica Damásio; Okamoto, Tetuo; Dornelles, Rita Cássia Menegati; Garcia, Idelmo Rangel; Okamoto, Roberta

    2010-01-01

    To investigate the effects of bone-resorption inhibitors (oestrogen and raloxifene) on the RANKL/OPG balance during the chronology of the alveolar healing process in ovariectomized (OVX) rats by means of immunocolocalization and histomorphometric analysis. One hundred sixty female Wistar rats at 70 days of age were either OVX or sham-operated and divided into four groups: sham, OVX/Oil, OVX with E(2) replacement (17beta-estradiol, 400 microg/month), OVX with RLX treatment (1mg/kg bw/day). The 60-day treatment started 8 days after ovariectomy. The incisors were extracted to allow analysis of 7, 14, 21, 28 and 42 days of wound healing. After obtaining the histological samples, slides were stained with hematoxylin and eosin or subjected to immunocolocalization reaction for RANKL and OPG. Results were quantitatively evaluated. Histomorphometric analysis showed that the sham group presented the highest and OVX/Oil group the lowest mean bone formation value in the post-extraction period. The immunocolocalization analysis showed a larger increase in bone turnover at 7 postoperative days in OVX/Oil and sham groups and decreasing bone turnover in the other periods. The OVX/Oil group showed a large decrease in bone turnover at 14 postoperative days, a period demonstrated by mild cellular activity. OVX/E(2) and sham groups showed a decreased bone turnover at 28 postoperative days while OVX/RLX group showed a decreased bone turnover at 21 postoperative days. On the 42nd postoperative day, sham and OVX/RLX groups showed an established alveolar bone healing process. Ovariectomy delays the alveolar healing process and interferes with bone turnover through the balance between RANKL and OPG. Oestrogen replacement or raloxifene treatment did not totally recover the oestrogen-deficient state. However raloxifene treatment showed more satisfactory results than oestrogen replacement. Copyright 2009 Elsevier Ltd. All rights reserved.

  7. The biometric antecedents to happiness.

    Directory of Open Access Journals (Sweden)

    Petri Böckerman

    Full Text Available It has been suggested that biological markers are associated with human happiness. We contribute to the empirical literature by examining the independent association between various aspects of biometric wellbeing measured in childhood and happiness in adulthood. Using Young Finns Study data (n = 1905 and nationally representative linked data we examine whether eight biomarkers measured in childhood (1980 are associated with happiness in adulthood (2001. Using linked data we account for a very rich set of confounders including age, sex, body size, family background, nutritional intake, physical activity, income, education and labour market experiences. We find that there is a negative relationship between triglycerides and subjective well-being but it is both gender- and age-specific and the relationship does not prevail using the later measurements (1983/1986 on triglycerides. In summary, we conclude that none of the eight biomarkers measured in childhood predict happiness robustly in adulthood.

  8. The biometric antecedents to happiness.

    Science.gov (United States)

    Böckerman, Petri; Bryson, Alex; Viinikainen, Jutta; Hakulinen, Christian; Hintsanen, Mirka; Pehkonen, Jaakko; Viikari, Jorma; Raitakari, Olli

    2017-01-01

    It has been suggested that biological markers are associated with human happiness. We contribute to the empirical literature by examining the independent association between various aspects of biometric wellbeing measured in childhood and happiness in adulthood. Using Young Finns Study data (n = 1905) and nationally representative linked data we examine whether eight biomarkers measured in childhood (1980) are associated with happiness in adulthood (2001). Using linked data we account for a very rich set of confounders including age, sex, body size, family background, nutritional intake, physical activity, income, education and labour market experiences. We find that there is a negative relationship between triglycerides and subjective well-being but it is both gender- and age-specific and the relationship does not prevail using the later measurements (1983/1986) on triglycerides. In summary, we conclude that none of the eight biomarkers measured in childhood predict happiness robustly in adulthood.

  9. A Vein Map Biometric System

    Directory of Open Access Journals (Sweden)

    Felix Fuentes

    2013-08-01

    Full Text Available There is increasing demand world-wide, from government agencies and the private sector for cutting-edge biometric security technology that is difficult to breach but userfriendly at the same time. Some of the older tools, such as fingerprint, retina and iris scanning, and facial recognition software have all been found to have flaws and often viewed negatively because of many cultural and hygienic issues associated with them. Comparatively, mapping veins as a human barcode, a new technology, has many advantages over older technologies. Specifically, reproducing a three-dimensional model of a human vein system is impossible to replicate. Vein map technology is distinctive because of its state-of-the-art sensors are only able to recognize vein patterns if hemoglobin is actively flowing through the person

  10. Performance of biometric quality measures.

    Science.gov (United States)

    Grother, Patrick; Tabassi, Elham

    2007-04-01

    We document methods for the quantitative evaluation of systems that produce a scalar summary of a biometric sample's quality. We are motivated by a need to test claims that quality measures are predictive of matching performance. We regard a quality measurement algorithm as a black box that converts an input sample to an output scalar. We evaluate it by quantifying the association between those values and observed matching results. We advance detection error trade-off and error versus reject characteristics as metrics for the comparative evaluation of sample quality measurement algorithms. We proceed this with a definition of sample quality, a description of the operational use of quality measures. We emphasize the performance goal by including a procedure for annotating the samples of a reference corpus with quality values derived from empirical recognition scores.

  11. The use of autologous platelet-leukocyte gels to enhance the healing process in surgery, a review

    NARCIS (Netherlands)

    Everts, P. A.; Overdevest, E. P.; Jakimowicz, J. J.; Oosterbos, C. J.; Schonberger, J. P.; Knape, J. T.; van Zundert, A.

    2007-01-01

    Background: The therapeutic use of autologously prepared, platelet-leukocyte-enriched gel (PLG) is a relatively new technology for the stimulation and acceleration of soft tissue and bone healing. The effectiveness of this procedure lies in the delivery of a wide range of platelet growth factors

  12. Update on the US Government's Biometric Consortium

    National Research Council Canada - National Science Library

    Campbell, Joseph

    1997-01-01

    .... The goals of the consortium remain largely the same under this new leadership. The current emphasis is on the formal approval of our charter and on the establishment of a national biometric test and evaluation laboratory.

  13. Voice Biometrics for Information Assurance Applications

    National Research Council Canada - National Science Library

    Kang, George

    2002-01-01

    In 2002, the President of the United States established an organization within the DOD to develop and promulgate biometrics technologies to achieve security in information, information systems, weapons, and facilities...

  14. Biometric recognition via fixation density maps

    Science.gov (United States)

    Rigas, Ioannis; Komogortsev, Oleg V.

    2014-05-01

    This work introduces and evaluates a novel eye movement-driven biometric approach that employs eye fixation density maps for person identification. The proposed feature offers a dynamic representation of the biometric identity, storing rich information regarding the behavioral and physical eye movement characteristics of the individuals. The innate ability of fixation density maps to capture the spatial layout of the eye movements in conjunction with their probabilistic nature makes them a particularly suitable option as an eye movement biometrical trait in cases when free-viewing stimuli is presented. In order to demonstrate the effectiveness of the proposed approach, the method is evaluated on three different datasets containing a wide gamut of stimuli types, such as static images, video and text segments. The obtained results indicate a minimum EER (Equal Error Rate) of 18.3 %, revealing the perspectives on the utilization of fixation density maps as an enhancing biometrical cue during identification scenarios in dynamic visual environments.

  15. Biometrics IRB best practices and data protection

    Science.gov (United States)

    Boehnen, Christopher; Bolme, David; Flynn, Patrick

    2015-05-01

    The collection of data from human subjects for biometrics research in the United States requires the development of a data collection protocol that is reviewed by a Human Subjects Institutional Review Board (IRB). The IRB reviews the protocol for risks and approves it if it meets the criteria for approval specified in the relevant Federal regulations (45 CFR 46). Many other countries operate similar mechanisms for the protection of human subjects. IRBs review protocols for safety, confidentiality, and for minimization of risk associated with identity disclosure. Since biometric measurements are potentially identifying, IRB scrutiny of biometrics data collection protocols can be expected to be thorough. This paper discusses the intricacies of IRB best practices within the worldwide biometrics community. This is important because research decisions involving human subjects are made at a local level and do not set a precedent for decisions made by another IRB board. In many cases, what one board approves is not approved by another board, resulting in significant inconsistencies that prove detrimental to both researchers and human subjects. Furthermore, the level of biometrics expertise may be low on IRBs, which can contribute to the unevenness of reviews. This publication will suggest possible best practices for designing and seeking IRB approval for human subjects research involving biometrics measurements. The views expressed are the opinions of the authors.

  16. A STUDY ON BIOMETRIC TEMPLATE SECURITY

    Directory of Open Access Journals (Sweden)

    N. Radha

    2010-07-01

    Full Text Available The increasing popularity of biometrics and cryptography is driven by the widespread stipulation on information security. Abundant efforts have been made in developing successful methods in these areas in order to accomplish an enhanced level of information security. There are two dominant issues in information security enhancement. One is to defend the user ownership and control the access to information by authenticating an individual’s identity. The other is to make sure the privacy and integrity of information and to secure communication. Cryptography is the science of writing in secret code. Secret-key cryptography and public-key cryptography are the two most important cryptographic architectures. The security of a cryptographic system is reliant on the secrecy of the cryptographic key. Biometric authentication or simply biometrics refers to establishing automatic personal recognition based on the physical and behavioral characteristics of an individual (e.g. face, voice, fingerprint, gait, hand geometry, iris, gene, etc.. Biometrics offers superior security and easier than traditional identity authentication systems (based on passwords and cryptographic keys.Since biometrics characteristics are naturally related with a particular individual, making them insusceptible to being stolen, forgotten, lost or attached. This paper presents a survey on various techniques proposed earlier in developing an authentication system for ensuring individual’s information security by combining biometric characteristics of that particular individual and the cryptographic techniques. In addition, it provides some fundamental idea for future research that may help in eliminating the problems associated with the present authentication systems.

  17. Transfer learning for bimodal biometrics recognition

    Science.gov (United States)

    Dan, Zhiping; Sun, Shuifa; Chen, Yanfei; Gan, Haitao

    2013-10-01

    Biometrics recognition aims to identify and predict new personal identities based on their existing knowledge. As the use of multiple biometric traits of the individual may enables more information to be used for recognition, it has been proved that multi-biometrics can produce higher accuracy than single biometrics. However, a common problem with traditional machine learning is that the training and test data should be in the same feature space, and have the same underlying distribution. If the distributions and features are different between training and future data, the model performance often drops. In this paper, we propose a transfer learning method for face recognition on bimodal biometrics. The training and test samples of bimodal biometric images are composed of the visible light face images and the infrared face images. Our algorithm transfers the knowledge across feature spaces, relaxing the assumption of same feature space as well as same underlying distribution by automatically learning a mapping between two different but somewhat similar face images. According to the experiments in the face images, the results show that the accuracy of face recognition has been greatly improved by the proposed method compared with the other previous methods. It demonstrates the effectiveness and robustness of our method.

  18. Biometric and Emotion Identification: An ECG Compression Based Method

    Directory of Open Access Journals (Sweden)

    Susana Brás

    2018-04-01

    Full Text Available We present an innovative and robust solution to both biometric and emotion identification using the electrocardiogram (ECG. The ECG represents the electrical signal that comes from the contraction of the heart muscles, indirectly representing the flow of blood inside the heart, it is known to convey a key that allows biometric identification. Moreover, due to its relationship with the nervous system, it also varies as a function of the emotional state. The use of information-theoretic data models, associated with data compression algorithms, allowed to effectively compare ECG records and infer the person identity, as well as emotional state at the time of data collection. The proposed method does not require ECG wave delineation or alignment, which reduces preprocessing error. The method is divided into three steps: (1 conversion of the real-valued ECG record into a symbolic time-series, using a quantization process; (2 conditional compression of the symbolic representation of the ECG, using the symbolic ECG records stored in the database as reference; (3 identification of the ECG record class, using a 1-NN (nearest neighbor classifier. We obtained over 98% of accuracy in biometric identification, whereas in emotion recognition we attained over 90%. Therefore, the method adequately identify the person, and his/her emotion. Also, the proposed method is flexible and may be adapted to different problems, by the alteration of the templates for training the model.

  19. 3D Biometrics for Hindfoot Alignment Using Weightbearing CT.

    Science.gov (United States)

    Lintz, François; Welck, Matthew; Bernasconi, Alessio; Thornton, James; Cullen, Nicholas P; Singh, Dishan; Goldberg, Andy

    2017-06-01

    Hindfoot alignment on 2D radiographs can present anatomical and operator-related bias. In this study, software designed for weightbearing computed tomography (WBCT) was used to calculate a new 3D biometric tool: the Foot and Ankle Offset (FAO). We described the distribution of FAO in a series of data sets from clinically normal, varus, and valgus cases, hypothesizing that FAO values would be significantly different in the 3 groups. In this retrospective cohort study, 135 data sets (57 normal, 38 varus, 40 valgus) from WBCT (PedCAT; CurveBeam LLC, Warrington, PA) were obtained from a specialized foot and ankle unit. 3D coordinates of specific anatomical landmarks (weightbearing points of the calcaneus, of the first and fifth metatarsal heads and the highest and centermost point on the talar dome) were collected. These data were processed with the TALAS system (CurveBeam), which resulted in an FAO value for each case. Intraobserver and interobserver reliability were also assessed. In normal cases, the mean value for FAO was 2.3% ± 2.9%, whereas in varus and valgus cases, the mean was -11.6% ± 6.9% and 11.4% ± 5.7%, respectively, with a statistically significant difference among groups ( P biometrics. The present study introduces the concept of 3D biometrics and describes an efficient, semiautomatic tool for measuring hindfoot alignment. Level III, retrospective comparative study.

  20. Digital holographic-based cancellable biometric for personal authentication

    International Nuclear Information System (INIS)

    Verma, Gaurav; Sinha, Aloka

    2016-01-01

    In this paper, we propose a new digital holographic-based cancellable biometric scheme for personal authentication and verification. The realization of cancellable biometric is presented by using an optoelectronic experimental approach, in which an optically recorded hologram of the fingerprint of a person is numerically reconstructed. Each reconstructed feature has its own perspective, which is utilized to generate user-specific fingerprint features by using a feature-extraction process. New representations of the user-specific fingerprint features can be obtained from the same hologram, by changing the reconstruction distance (d) by an amount Δd between the recording plane and the reconstruction plane. This parameter is the key to make the cancellable user-specific fingerprint features using a digital holographic technique, which allows us to choose different reconstruction distances when reissuing the user-specific fingerprint features in the event of compromise. We have shown theoretically that each user-specific fingerprint feature has a unique identity with a high discrimination ability, and the chances of a match between them are minimal. In this aspect, a recognition system has also been demonstrated using the fingerprint biometric of the enrolled person at a particular reconstruction distance. For the performance evaluation of a fingerprint recognition system—the false acceptance ratio, the false rejection ratio and the equal error rate are calculated using correlation. The obtained results show good discrimination ability between the genuine and the impostor populations with the highest recognition rate of 98.23%. (paper)

  1. Biometric and Emotion Identification: An ECG Compression Based Method.

    Science.gov (United States)

    Brás, Susana; Ferreira, Jacqueline H T; Soares, Sandra C; Pinho, Armando J

    2018-01-01

    We present an innovative and robust solution to both biometric and emotion identification using the electrocardiogram (ECG). The ECG represents the electrical signal that comes from the contraction of the heart muscles, indirectly representing the flow of blood inside the heart, it is known to convey a key that allows biometric identification. Moreover, due to its relationship with the nervous system, it also varies as a function of the emotional state. The use of information-theoretic data models, associated with data compression algorithms, allowed to effectively compare ECG records and infer the person identity, as well as emotional state at the time of data collection. The proposed method does not require ECG wave delineation or alignment, which reduces preprocessing error. The method is divided into three steps: (1) conversion of the real-valued ECG record into a symbolic time-series, using a quantization process; (2) conditional compression of the symbolic representation of the ECG, using the symbolic ECG records stored in the database as reference; (3) identification of the ECG record class, using a 1-NN (nearest neighbor) classifier. We obtained over 98% of accuracy in biometric identification, whereas in emotion recognition we attained over 90%. Therefore, the method adequately identify the person, and his/her emotion. Also, the proposed method is flexible and may be adapted to different problems, by the alteration of the templates for training the model.

  2. Biometric and Emotion Identification: An ECG Compression Based Method

    Science.gov (United States)

    Brás, Susana; Ferreira, Jacqueline H. T.; Soares, Sandra C.; Pinho, Armando J.

    2018-01-01

    We present an innovative and robust solution to both biometric and emotion identification using the electrocardiogram (ECG). The ECG represents the electrical signal that comes from the contraction of the heart muscles, indirectly representing the flow of blood inside the heart, it is known to convey a key that allows biometric identification. Moreover, due to its relationship with the nervous system, it also varies as a function of the emotional state. The use of information-theoretic data models, associated with data compression algorithms, allowed to effectively compare ECG records and infer the person identity, as well as emotional state at the time of data collection. The proposed method does not require ECG wave delineation or alignment, which reduces preprocessing error. The method is divided into three steps: (1) conversion of the real-valued ECG record into a symbolic time-series, using a quantization process; (2) conditional compression of the symbolic representation of the ECG, using the symbolic ECG records stored in the database as reference; (3) identification of the ECG record class, using a 1-NN (nearest neighbor) classifier. We obtained over 98% of accuracy in biometric identification, whereas in emotion recognition we attained over 90%. Therefore, the method adequately identify the person, and his/her emotion. Also, the proposed method is flexible and may be adapted to different problems, by the alteration of the templates for training the model. PMID:29670564

  3. Playful biometrics: controversial technology through the lens of play.

    Science.gov (United States)

    Ellerbrok, Ariane

    2011-01-01

    This article considers the role of play in the context of technological emergence and expansion, particularly as it relates to recently emerging surveillance technologies. As a case study, I consider the trajectory of automated face recognition—a biometric technology of numerous applications, from its more controversial manifestations under the rubric of national security to a clearly emerging orientation toward play. This shift toward “playful” biometrics—or from a technology traditionally coded as “hard” to one now increasingly coded as “soft”—is critical insofar as it renders problematic the traditional modes of critique that have, up until this point, challenged the expansion of biometric systems into increasingly ubiquitous realms of everyday life. In response to this dynamic, I propose theorizing the expansion of face recognition specifically in relation to “play,” a step that allows us to broaden the critical space around newly emerging playful biometrics, as well as playful surveillance more generally. In addition, play may also have relevance for theorizing other forms of controversial technology, particularly given its potential role in processes of obfuscation, normalization, and marginalization.

  4. Holistic nurses' stories of healing of another.

    Science.gov (United States)

    Enzman Hines, Mary; Wardell, Diane Wind; Engebretson, Joan; Zahourek, Rothlyn; Smith, Marlaine C

    2015-03-01

    The purpose of this study was to uncover the essence and meaning of healing through narrative accounts of holistic nurses, using a qualitative, descriptive design integrating narrative and story inquiry. Twenty-five stories were collected. Seven stories revealed personal healing and have been published in a prior article. Eighteen stories, the focus of this analysis, revealed healing of another. A hybrid method blending narrative and story guided the overall process for the study. Nine themes emerged describing healing of another within three story segments: The Call to Healing, The Experience of Healing, and Insights. The theme within The Call to the Healing Encounter was Drawn by Compassion to the Vulnerability and/or Suffering of Another. Five themes describe the Experience of Healing: Connection: Cocreating Relationships; Taking Risks and Dealing With Skeptical Colleagues; Use of Modalities and Actions as Tools in Developing Self as an Instrument of Healing; Profound, Ineffable Events; and Using Metaphor and Rituals to Describe Healing. Three themes describe Insights: Mutual Transformation, Change, and Reciprocity; Gratitude for the Healing Encounter; and Leaving a Legacy. The metastory, a reconstructed story created by the researchers, was the final phase of research synthesizing and demonstrating themes of healing of another. Results were compared to existing healing literature. © The Author(s) 2014.

  5. Synthetic Self-Healing Methods

    Energy Technology Data Exchange (ETDEWEB)

    Bello, Mollie [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-06-02

    Given enough time, pressure, temperature fluctuation, and stress any material will fail. Currently, synthesized materials make up a large part of our everyday lives, and are used in a number of important applications such as; space travel, under water devices, precise instrumentation, transportation, and infrastructure. Structural failure of these material scan lead to expensive and dangerous consequences. In an attempt to prolong the life spans of specific materials and reduce efforts put into repairing them, biologically inspired, self-healing systems have been extensively investigated. The current review explores recent advances in three methods of synthesized self-healing: capsule based, vascular, and intrinsic. Ideally, self-healing materials require no human intervention to promote healing, are capable of surviving all the steps of polymer processing, and heal the same location repeatedly. Only the vascular method holds up to all of these idealities.

  6. The relation between the secrecy rate of biometric template protection and biometric recognition performance

    NARCIS (Netherlands)

    Veldhuis, Raymond N.J.

    2015-01-01

    A theoretical result relating the maximum achievable security of the family of biometric template protection systems known as key-binding systems to the recognition performance of a biometric recognition system that is optimal in Neyman-Pearson sense is derived. The relation allows for the

  7. The role of bone marrow-derived cells during the bone healing process in the GFP mouse bone marrow transplantation model.

    Science.gov (United States)

    Tsujigiwa, Hidetsugu; Hirata, Yasuhisa; Katase, Naoki; Buery, Rosario Rivera; Tamamura, Ryo; Ito, Satoshi; Takagi, Shin; Iida, Seiji; Nagatsuka, Hitoshi

    2013-03-01

    Bone healing is a complex and multistep process in which the origin of the cells participating in bone repair is still unknown. The involvement of bone marrow-derived cells in tissue repair has been the subject of recent studies. In the present study, bone marrow-derived cells in bone healing were traced using the GFP bone marrow transplantation model. Bone marrow cells from C57BL/6-Tg (CAG-EGFP) were transplanted into C57BL/6 J wild mice. After transplantation, bone injury was created using a 1.0-mm drill. Bone healing was histologically assessed at 3, 7, 14, and 28 postoperative days. Immunohistochemistry for GFP; double-fluorescent immunohistochemistry for GFP-F4/80, GFP-CD34, and GFP-osteocalcin; and double-staining for GFP and tartrate-resistant acid phosphatase were performed. Bone marrow transplantation successfully replaced the hematopoietic cells into GFP-positive donor cells. Immunohistochemical analyses revealed that osteoblasts or osteocytes in the repair stage were GFP-negative, whereas osteoclasts in the repair and remodeling stages and hematopoietic cells were GFP-positive. The results indicated that bone marrow-derived cells might not differentiate into osteoblasts. The role of bone marrow-derived cells might be limited to adjustment of the microenvironment by differentiating into inflammatory cells, osteoclasts, or endothelial cells in immature blood vessels.

  8. A study on the healing process of bone defect-examination of healing stages of bone defect in the irradiated mandibular rim by microradiography and autoradiography

    International Nuclear Information System (INIS)

    Shimoyama, Tetsuo

    1980-01-01

    The mandibular rim of 150 female Donryu strain rats was exposed to 2000 rads (B group) or to 3000 rads (C group), and a bone defect of 1 x 1 x 2 mm in size was formed in the madibular rim. Cure process of this bone defect was observed periodically by microradiography and autoradiography using 45 Ca as a tracer, compared with that in the control group (A group, non-irradiated). Irradiated rats having bone defects recovered smoothly. Microradiographic findings of the A group showed that new bone was formed on the surface of the perosteum of the mandible on the 7th days after the irradiation. Bone defects in all rats were repaired completely by the 49th days after the irradiation. Microradiographic findings of the B and C groups showed that new bone was formed on the tongue side surface of the periosteum of the mandible in the early stage after the irradiation. However, after that, osteogenesis became slower, and the edge of bone defects or a part of the mandible became smaller. Bone defects were not repaired and became larger. These findings were more marked in the C group than in the B group. Autoradiographic findings showed marked uptake of 45 Ca into new bone in the A group. Rats of which bone defects were repaired showed the uptake of 45 Ca in accordance with the shape of the mandibular rim. The edge of bone defect of the B and C groups where new bone was not formed was destroyed since the 14th day after the irradiation. There were some cases in which the uptake of 45 Ca into the surface of the periosteum of the mandible near bone defect was observed even when bone defect was enlarged. (Tsunoda, M.)

  9. Optimization of process factors for self-healing vanadium-based conversion coating on AZ31 magnesium alloy

    Energy Technology Data Exchange (ETDEWEB)

    Li, Kun; Liu, Junyao [State Key Laboratory of Powder Metallurgy, Central South University, Changsha 410083 (China); Lei, Ting, E-mail: tlei@mail.csu.edu.cn [State Key Laboratory of Powder Metallurgy, Central South University, Changsha 410083 (China); Xiao, Tao [2nd Xiangya Hospital, Central South University, Changsha 410011 (China)

    2015-10-30

    Highlights: • The optimum operating conditions were determined by an orthogonal experiment. • The coating is composed of oxides and hydroxides of V{sup 5+}, V{sup 4+} and Mg(OH){sub 2}. • The self-healing performance was investigated by cross-cut immersion test. • The vanadia conversion coating provided active corrosion protection to AZ31 alloy. - Abstract: A self-healing vanadium-based conversion coating was prepared on AZ31 magnesium alloy. The optimum operating conditions including vanadia solution concentration, pH and treating temperature for obtaining the best corrosion protective vanadia coatings and improved localized corrosion resistance to the magnesium substrate were determined by an orthogonal experiment design. Surface morphology and composition of the resultant conversion coatings were investigated by scanning electron microscope (SEM) and X-ray photoelectron spectroscopy (XPS). The self-healing behavior of the coating was investigated by cross-cut immersion test and electrochemical impedance spectroscopy (EIS) measurements in 3.5% NaCl solution.

  10. Optimization of process factors for self-healing vanadium-based conversion coating on AZ31 magnesium alloy

    International Nuclear Information System (INIS)

    Li, Kun; Liu, Junyao; Lei, Ting; Xiao, Tao

    2015-01-01

    Highlights: • The optimum operating conditions were determined by an orthogonal experiment. • The coating is composed of oxides and hydroxides of V"5"+, V"4"+ and Mg(OH)_2. • The self-healing performance was investigated by cross-cut immersion test. • The vanadia conversion coating provided active corrosion protection to AZ31 alloy. - Abstract: A self-healing vanadium-based conversion coating was prepared on AZ31 magnesium alloy. The optimum operating conditions including vanadia solution concentration, pH and treating temperature for obtaining the best corrosion protective vanadia coatings and improved localized corrosion resistance to the magnesium substrate were determined by an orthogonal experiment design. Surface morphology and composition of the resultant conversion coatings were investigated by scanning electron microscope (SEM) and X-ray photoelectron spectroscopy (XPS). The self-healing behavior of the coating was investigated by cross-cut immersion test and electrochemical impedance spectroscopy (EIS) measurements in 3.5% NaCl solution.

  11. Microbial network of the carbonate precipitation process induced by microbial consortia and the potential application to crack healing in concrete.

    Science.gov (United States)

    Zhang, Jiaguang; Zhou, Aijuan; Liu, Yuanzhen; Zhao, Bowei; Luan, Yunbo; Wang, Sufang; Yue, Xiuping; Li, Zhu

    2017-11-06

    Current studies have employed various pure-cultures for improving concrete durability based on microbially induced carbonate precipitation (MICP). However, there have been very few reports concerned with microbial consortia, which could perform more complex tasks and be more robust in their resistance to environmental fluctuations. In this study, we constructed three microbial consortia that are capable of MICP under aerobic (AE), anaerobic (AN) and facultative anaerobic (FA) conditions. The results showed that AE consortia showed more positive effects on inorganic carbon conversion than AN and FA consortia. Pyrosequencing analysis showed that clear distinctions appeared in the community structure between different microbial consortia systems. Further investigation on microbial community networks revealed that the species in the three microbial consortia built thorough energetic and metabolic interaction networks regarding MICP, nitrate-reduction, bacterial endospores and fermentation communities. Crack-healing experiments showed that the selected cracks of the three consortia-based concrete specimens were almost completely healed in 28 days, which was consistent with the studies using pure cultures. Although the economic advantage might not be clear yet, this study highlights the potential implementation of microbial consortia on crack healing in concrete.

  12. Preparation and characterisation of Punica granatum pericarp aqueous extract loaded chitosan-collagen-starch membrane: role in wound healing process.

    Science.gov (United States)

    Amal, B; Veena, B; Jayachandran, V P; Shilpa, Joy

    2015-05-01

    Engineered scaffolds made from natural biomaterials are crucial elements in tissue engineering strategies. In this study, biological scaffold like chitosan-collagen-starch membrane (CCSM) loaded with the antibacterial agent, Punica granatum pericarp aqueous extract was explored for enhanced regeneration of epithelial tissue during wound healing. Collagen was extracted from Rachycentron canadum fish skin. Membranous scaffold was prepared by mixing collagen, starch and chitosan in a fixed proportion, loaded with aqueous extract of P. granatum and its anti-pseudomonal activity was studied. Morphological characterization by SEM and mechanical property like tensile strength of the membrane were studied. Excision wound of 2 cm(2) size was induced in Guinea pig and the effect of P. granatum extract loaded CCSM in wound healing was studied. The SEM image showed deep pores in the membrane and also possessed good tensile strength. Wound surface area was reduced prominently in the experimental group with P. granatum extract loaded CCSM when compared to the group with unloaded membrane and the one with no membrane. Punica granatum extract loaded CCSM has antipseudomonal property and supported enhanced epithelial cell proliferation without leaving a scar after wound healing. This has significant therapeutic application in membranous scaffold mediated skin repair and regeneration.

  13. Unveiling Cebuano Traditional Healing Practices

    Directory of Open Access Journals (Sweden)

    ZachiaRaiza Joy S. Berdon

    2016-02-01

    Full Text Available This study aims to identify the features of Cebuano’s traditional healing practices. Specifically, it also answers the following objectives: analyze traditional healing in Cebuano’s perspectives, explain the traditional healing process practiced in terms of the traditional healers’ belief, and extrapolate perceptions of medical practitioners toward traditional healing. This study made use of qualitative approach, among five traditional healers who performed healing for not less than ten years, in the mountain barangays of Cebu City. These healers served as the primary informants who were selected because of their popularity in healing. The use of open-ended interview in local dialect and naturalistic observation provided a free listing of their verbatim accounts were noted and as primary narratives. Participation in the study was voluntary and participants were interviewed privately after obtaining their consent. The Cebuano traditional healing practices or “panambal” comprise the use of “himolso” (pulse-checking, “palakaw” (petition, “pasubay” (determining what causes the sickness and its possible means of healing, “pangalap” (searching of medicinal plants for “palina” (fumigation, “tayhop” (gentle-blowing, “tutho” (saliva-blowing,“tuob” (boiling, “orasyon” (mystical prayers, “hilot” (massage, and “barang” (sorcery. Though traditional with medical science disapproval, it contributes to a mystical identity of Cebuano healers, as a manifestation of folk Catholicism belief, in order to do a good legacy to the community that needs help. For further study, researchers may conduct further the studies on the: curative effects of medicinal plants in Cebu, psychological effect pulsechecking healed persons by the mananambal, and unmasking the other features of traditional healing.

  14. Biometrics in support of special forces medical operations.

    Science.gov (United States)

    Kershner, Michael R

    2012-01-01

    Recommendations on ways in which the ODA can leverage biometrics in medical operations to improve their security, improve relations with indigenous personnel, and contribute to the larger theater biometrics program. 2012.

  15. Review of modern biometric user authentication and their development prospects

    Science.gov (United States)

    Boriev, Z. V.; Sokolov, S. S.; Nyrkov, A. P.

    2015-09-01

    This article discusses the possibility of using biometric information technologies in management. Made a brief overview of access control and time attendance. Analyzed biometrics and identification system user. Recommendations on the use of various systems depending on the specific tasks.

  16. Application of Some Biometric Indices in the Assessment of the ...

    African Journals Online (AJOL)

    Application of Some Biometric Indices in the Assessment of the Water Quality of the Benin River, Niger Delta, Nigeria. ... Username, Password, Remember me, or Register ... Rapid Bioassessment Protocols (RBP) using some biometric indices ...

  17. Sigmund Freud: pioneer in energy healing.

    Science.gov (United States)

    Edwards, Stephen D; Edwards, David J

    2010-02-01

    Energy healing is a popular contemporary term for forms of healing that facilitate a natural healing process through harmonizing, rebalancing, and releasing energy flow disturbed or blocked by disease and illness. Biographical evidence indicates that Freud used physical, suggestive, and radiant forms of energy healing, and that his personal life, metapsychology, and psychoanalysis were founded on dynamic, energetic experiences and conceptualizations. Analysis of Freud's life and work leads to the conclusion that in experience, theory, and practice, Freud typified the traditional role of therapist and was a pioneer in modern forms of energy healing.

  18. Improving energy efficiency in handheld biometric applications

    Science.gov (United States)

    Hoyle, David C.; Gale, John W.; Schultz, Robert C.; Rakvic, Ryan N.; Ives, Robert W.

    2012-06-01

    With improved smartphone and tablet technology, it is becoming increasingly feasible to implement powerful biometric recognition algorithms on portable devices. Typical iris recognition algorithms, such as Ridge Energy Direction (RED), utilize two-dimensional convolution in their implementation. This paper explores the energy consumption implications of 12 different methods of implementing two-dimensional convolution on a portable device. Typically, convolution is implemented using floating point operations. If a given algorithm implemented integer convolution vice floating point convolution, it could drastically reduce the energy consumed by the processor. The 12 methods compared include 4 major categories: Integer C, Integer Java, Floating Point C, and Floating Point Java. Each major category is further divided into 3 implementations: variable size looped convolution, static size looped convolution, and unrolled looped convolution. All testing was performed using the HTC Thunderbolt with energy measured directly using a Tektronix TDS5104B Digital Phosphor oscilloscope. Results indicate that energy savings as high as 75% are possible by using Integer C versus Floating Point C. Considering the relative proportion of processing time that convolution is responsible for in a typical algorithm, the savings in energy would likely result in significantly greater time between battery charges.

  19. A comparison of the effect of triamcinolone ointment and mouthwash with or without zinc on the healing process of aphthous stomatitis lesions

    Directory of Open Access Journals (Sweden)

    Masoumeh

    2016-06-01

    Full Text Available Background. Recurrent aphthous stomatitis (RAS is one of the most common ulcerative diseases of the oral mucosa. Definitive etiology of RAS has not been conclusively established. There is no certain treatment for aphthous stomatitis but some drugs such as steroids are commonly used for the treatment of RAS. Regarding the effect of zinc on the healing process of epithelial layer and cell division, in this research the effect of triamcinolone (with orabase in combination with a zinc-containing mouthwash and triamcinolone alone on the healing process of RAS lesions was assessed. Methods. The present study consisted of 20 patients diagnosed with RAS. The patients were instructed to rinse the mouth-wash or placebo three times a day and triamcinolone ointment twice a day for two weeks. The largest dimension of the ulcer was measured by a digital caliper and the severity of pain was assessed by visual analogue scale (VAS. Number, size, dura-tion, ulcer-free period and pain of the lesions were evaluated twice a week for twomonths. Data were analyzed by SPSS 16 using Mann-Whitney U test and t-test. Results. A decrease was seen in the mean pain severity score (P = 0.631 and the size of the lesions but it was not statistically significant (P = 0.739. Also the difference between the number of lesions (P = 0.739, duration and ulcer-free period (P = 0.873 were not statistically significant. Conclusion. Zinc mouthwash seems to be as effective on wound healing process as typical treatment modalities for RAS.

  20. Securing information using optically generated biometric keys

    Science.gov (United States)

    Verma, Gaurav; Sinha, Aloka

    2016-11-01

    In this paper, we present a new technique to obtain biometric keys by using the fingerprint of a person for an optical image encryption system. The key generation scheme uses the fingerprint biometric information in terms of the amplitude mask (AM) and the phase mask (PM) of the reconstructed fingerprint image that is implemented using the digital holographic technique. Statistical tests have been conducted to check the randomness of the fingerprint PM key that enables its usage as an image encryption key. To explore the utility of the generated biometric keys, an optical image encryption system has been further demonstrated based on the phase retrieval algorithm and the double random phase encoding scheme in which keys for the encryption are used as the AM and the PM key. The advantage associated with the proposed scheme is that the biometric keys’ retrieval requires the simultaneous presence of the fingerprint hologram and the correct knowledge of the reconstruction parameters at the decryption stage, which not only verifies the authenticity of the person but also protects the valuable fingerprint biometric features of the keys. Numerical results are carried out to prove the feasibility and the effectiveness of the proposed encryption system.

  1. The ocular biometric differences of diabetic patients.

    Science.gov (United States)

    Kocatürk, Tolga; Zengin, Mehmet Özgür; Cakmak, Harun; Evliçoglu, Gökhan Evren; Dündar, Sema Oruç; Omürlü, Imran Kurt; Unübol, Mustafa; Güney, Engin

    2014-01-01

    To investigate the differences in ocular biometric and keratometric characteristics in comparison with biometric measurements using the noncontact optical low coherence reflectometer (OLCR) (Lenstar LS 900, Haag-Streit) on diabetic patients. The eyes of 170 patients were included in this study, including 81 diabetic and 89 nondiabetic subjects. Optical biometric measurements of diabetic and nondiabetic patients (between the ages of 25 and 85 years) who applied to the ophthalmology clinic were noted from March to June 2013. Detailed ophthalmologic examinations were done for every subject. Biometric measurements were done using the noncontact OLCR device. Patient age ranged from 29 to 83 years. Subgroup analyses were done in diabetic patients according to their Hba1C levels. The minimum Hba1C value was 5.3, maximum was 12.4, and mean was 7.56 ± 1.48. The median duration of diabetes was 5 years (25th-75th percentile 3.00-11.75). Diabetic patients were found to have thicker lens and shallower anterior chamber in both eyes compared to nondiabetic control subjects. There were no statistical differences between the groups according to central corneal thickness, axial length, or keratometric values in both eyes. However, lens thicknesses were found to be thicker and anterior chamber depth values were found to be shallower in the diabetic group in both eyes. It may useful to determine eyeglasses prescription, refractive surgery calculation, lens selection, and previous cataract surgery according to biometric measurements after the regulation of blood glucose.

  2. Entropy Measurement for Biometric Verification Systems.

    Science.gov (United States)

    Lim, Meng-Hui; Yuen, Pong C

    2016-05-01

    Biometric verification systems are designed to accept multiple similar biometric measurements per user due to inherent intrauser variations in the biometric data. This is important to preserve reasonable acceptance rate of genuine queries and the overall feasibility of the recognition system. However, such acceptance of multiple similar measurements decreases the imposter's difficulty of obtaining a system-acceptable measurement, thus resulting in a degraded security level. This deteriorated security needs to be measurable to provide truthful security assurance to the users. Entropy is a standard measure of security. However, the entropy formula is applicable only when there is a single acceptable possibility. In this paper, we develop an entropy-measuring model for biometric systems that accepts multiple similar measurements per user. Based on the idea of guessing entropy, the proposed model quantifies biometric system security in terms of adversarial guessing effort for two practical attacks. Excellent agreement between analytic and experimental simulation-based measurement results on a synthetic and a benchmark face dataset justify the correctness of our model and thus the feasibility of the proposed entropy-measuring approach.

  3. Biometrics Enabling Capability Increment 1 (BEC Inc 1)

    Science.gov (United States)

    2016-03-01

    modal biometrics submissions to include iris, face, palm and finger prints from biometrics collection devices, which will support the Warfighter in...2016 Major Automated Information System Annual Report Biometrics Enabling Capability Increment 1 (BEC Inc 1) Defense Acquisition Management...Phone: 227-3119 DSN Fax: Date Assigned: July 15, 2015 Program Information Program Name Biometrics Enabling Capability Increment 1 (BEC Inc 1) DoD

  4. Biometric Passport Validation Scheme using Radio Frequency Identification

    OpenAIRE

    V.K. Narendira Kumar; B. Srinivasan

    2013-01-01

    Biometric passports issued nowadays have an embedded RFID chip that carries digitally signed biometric information. This RIFD chip is integrated into the cover of a passport, called a biometric passport. Electronic passports as it is sometimes called, represents a bold initiative in the deployment of two new technologies: RIFD and biometrics such as face, fingerprints, palm prints and iris. The electronic passport is the privacy and security risks that arise by embedding RFID technology. The ...

  5. Multi-biometrics based cryptographic key regeneration scheme

    OpenAIRE

    Kanade , Sanjay Ganesh; Petrovska-Delacrétaz , Dijana; Dorizzi , Bernadette

    2009-01-01

    International audience; Biometrics lack revocability and privacy while cryptography cannot detect the user's identity. By obtaining cryptographic keys using biometrics, one can achieve the properties such as revocability, assurance about user's identity, and privacy. In this paper, we propose a multi-biometric based cryptographic key regeneration scheme. Since left and right irises of a person are uncorrelated, we treat them as two independent biometrics and combine in our system. We propose ...

  6. On the Quantification of Aging Effects on Biometric Features

    OpenAIRE

    Lanitis , Andreas; Tsapatsoulis , Nicolas

    2010-01-01

    International audience; Biometric templates are often used in intelligent human computer interaction systems that include automated access control and personalization of user interaction. The effectiveness of biometric systems is directly linked with aging that causes modifications on biometric features. For example the long term performance of person identification systems decreases as biometric templates derived from aged subjects may display substantial differences when compared to referen...

  7. Progress in corneal wound healing

    Science.gov (United States)

    Ljubimov, Alexander V.; Saghizadeh, Mehrnoosh

    2015-01-01

    Corneal wound healing is a complex process involving cell death, migration, proliferation, differentiation, and extracellular matrix remodeling. Many similarities are observed in the healing processes of corneal epithelial, stromal and endothelial cells, as well as cell-specific differences. Corneal epithelial healing largely depends on limbal stem cells and remodeling of the basement membrane. During stromal healing, keratocytes get transformed to motile and contractile myofibroblasts largely due to activation of transforming growth factor-β system. Endothelial cells heal mostly by migration and spreading, with cell proliferation playing a secondary role. In the last decade, many aspects of wound healing process in different parts of the cornea have been elucidated, and some new therapeutic approaches have emerged. The concept of limbal stem cells received rigorous experimental corroboration, with new markers uncovered and new treatment options including gene and microRNA therapy tested in experimental systems. Transplantation of limbal stem cell-enriched cultures for efficient re-epithelialization in stem cell deficiency and corneal injuries has become reality in clinical setting. Mediators and course of events during stromal healing have been detailed, and new treatment regimens including gene (decorin) and stem cell therapy for excessive healing have been designed. This is a very important advance given the popularity of various refractive surgeries entailing stromal wound healing. Successful surgical ways of replacing the diseased endothelium have been clinically tested, and new approaches to accelerate endothelial healing and suppress endothelial-mesenchymal transformation have been proposed including Rho kinase (ROCK) inhibitor eye drops and gene therapy to activate TGF-β inhibitor SMAD7. Promising new technologies with potential for corneal wound healing manipulation including microRNA, induced pluripotent stem cells to generate corneal epithelium, and

  8. Biometrics and their use in e-passports

    NARCIS (Netherlands)

    Schouten, B.A.M.; Jacobs, B.P.F.

    2009-01-01

    A successful design, deployment and operation of biometric systems depends highly on the results for existing biometrical technologies and components. These existing technologies as well as new solutions need to be evaluated on their performance. However it is often forgotten that the biometric

  9. Biometrics and their use in e-passports

    NARCIS (Netherlands)

    Prof. Bart Jacobs; B.A.M. Ben Schouten

    2007-01-01

    A succesful design, deployment and operation of biometric systems depends highly on the results for existing biometrical technologies and components. These existing technologies as well as new solutions need to be evaluated on their performance. However it is often forgotten that the biometric

  10. Biometrics in Forensic Science: Challenges, Lessons and New Technologies

    NARCIS (Netherlands)

    Tistarelli, Massimo; Grosso, Enrico; Meuwly, Didier

    2014-01-01

    Biometrics has historically found its natural mate in Forensics. The first applications found in the literature and over cited so many times, are related to biometric measurements for the identification of multiple offenders from some of their biometric and anthropometric characteristics (tenprint

  11. 75 FR 39323 - Amendment to the Biometric Visa Program

    Science.gov (United States)

    2010-07-08

    ... DEPARTMENT OF STATE [Public Notice: 7047] Amendment to the Biometric Visa Program AGENCY: Department of State. ACTION: Notice of Amendment to the Biometric Visa Program. This public notice announces an amendment to the Biometric Visa Program. Section 303 of the Enhanced Border Security and Visa...

  12. Secret-key rates and privacy leakage in biometric systems

    NARCIS (Netherlands)

    Ignatenko, T.

    2009-01-01

    In this thesis both the generation of secret keys from biometric data and the binding of secret keys to biometric data are investigated. These secret keys can be used to regulate access to sensitive data, services, and environments. In a biometric secrecy system a secret key is generated or chosen

  13. Biometric security from an information-theoretical perspective

    NARCIS (Netherlands)

    Ignatenko, T.; Willems, F.M.J.

    2012-01-01

    In this review, biometric systems are studied from an information theoretical point of view. In the first part biometric authentication systems are studied. The objective of these systems is, observing correlated enrollment and authentication biometric sequences, to generate or convey as large as

  14. Biometrics based key management of double random phase encoding scheme using error control codes

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2013-08-01

    In this paper, an optical security system has been proposed in which key of the double random phase encoding technique is linked to the biometrics of the user to make it user specific. The error in recognition due to the biometric variation is corrected by encoding the key using the BCH code. A user specific shuffling key is used to increase the separation between genuine and impostor Hamming distance distribution. This shuffling key is then further secured using the RSA public key encryption to enhance the security of the system. XOR operation is performed between the encoded key and the feature vector obtained from the biometrics. The RSA encoded shuffling key and the data obtained from the XOR operation are stored into a token. The main advantage of the present technique is that the key retrieval is possible only in the simultaneous presence of the token and the biometrics of the user which not only authenticates the presence of the original input but also secures the key of the system. Computational experiments showed the effectiveness of the proposed technique for key retrieval in the decryption process by using the live biometrics of the user.

  15. Correlation of iris biometrics and DNA

    DEFF Research Database (Denmark)

    Harder, Stine; Clemmensen, Line Katrine Harder; Dahl, Anders Bjorholm

    2013-01-01

    The presented work concerns prediction of complex human phenotypes from genotypes. We were interested in correlating iris color and texture with DNA. Our data consist of 212 eye images along with DNA: 32 single-nucleotide polymorphisms (SNPs). We used two types of biometrics to describe the eye...... images: One for iris color and one for iris texture. Both biometrics were high dimensional and a sparse principle component analysis (SPCA) reduced the dimensions and resulted in a representation of data with good interpretability. The correlations between the sparse principal components (SPCs......) and the 32 SNPs were found using a canonical correlation analysis (CCA). The result was a single significant canonical correlation (CC) for both biometrics. Each CC comprised two correlated canonical variables, consisting of a linear combination of SPCs and a linear combination of SNPs, respectively...

  16. A survey of keystroke dynamics biometrics.

    Science.gov (United States)

    Teh, Pin Shen; Teoh, Andrew Beng Jin; Yue, Shigang

    2013-01-01

    Research on keystroke dynamics biometrics has been increasing, especially in the last decade. The main motivation behind this effort is due to the fact that keystroke dynamics biometrics is economical and can be easily integrated into the existing computer security systems with minimal alteration and user intervention. Numerous studies have been conducted in terms of data acquisition devices, feature representations, classification methods, experimental protocols, and evaluations. However, an up-to-date extensive survey and evaluation is not yet available. The objective of this paper is to provide an insightful survey and comparison on keystroke dynamics biometrics research performed throughout the last three decades, as well as offering suggestions and possible future research directions.

  17. Enhancing Privacy for Biometric Identification Cards

    Directory of Open Access Journals (Sweden)

    2009-01-01

    Full Text Available Most developed countries have started the implementation of biometric electronic identification cards, especially passports. The European Union and the United States of America struggle to introduce and standardize these electronic documents. Due to the personal nature of the biometric elements used for the generation of these cards, privacy issues were raised on both sides of the Atlantic Ocean, leading to civilian protests and concerns. The lack of transparency from the public authorities responsible with the implementation of such identification systems, and the poor technological approaches chosen by these authorities, are the main reasons for the negative popularity of the new identification methods. The following article shows an approach that provides all the benefits of modern technological advances in the fields of biometrics and cryptography, without sacrificing the privacy of those that will be the beneficiaries of the new system

  18. 3D face analysis for demographic biometrics

    Energy Technology Data Exchange (ETDEWEB)

    Tokola, Ryan A [ORNL; Mikkilineni, Aravind K [ORNL; Boehnen, Chris Bensing [ORNL

    2015-01-01

    Despite being increasingly easy to acquire, 3D data is rarely used for face-based biometrics applications beyond identification. Recent work in image-based demographic biometrics has enjoyed much success, but these approaches suffer from the well-known limitations of 2D representations, particularly variations in illumination, texture, and pose, as well as a fundamental inability to describe 3D shape. This paper shows that simple 3D shape features in a face-based coordinate system are capable of representing many biometric attributes without problem-specific models or specialized domain knowledge. The same feature vector achieves impressive results for problems as diverse as age estimation, gender classification, and race classification.

  19. Self-Healing Wire Insulation

    Science.gov (United States)

    Parrish, Clyde F. (Inventor)

    2012-01-01

    A self-healing system for an insulation material initiates a self-repair process by rupturing a plurality of microcapsules disposed on the insulation material. When the plurality of microcapsules are ruptured, reactants within the plurality of microcapsules react to form a replacement polymer in a break of the insulation material. This self-healing system has the ability to repair multiple breaks in a length of insulation material without exhausting the repair properties of the material.

  20. The effect of methotrexate on the bone healing of mandibular condylar process fracture: an experimental study in rats.

    Science.gov (United States)

    Cavalcanti, Samantha Cristine Santos X B; Corrêa, Luciana; Mello, Suzana Beatriz Veríssimo; Luz, João Gualberto C

    2014-10-01

    Methotrexate (MTX) is an anti-metabolite used in rheumatology and oncology. High doses are indicated for oncological treatment, whereas low doses are indicated for chronic inflammatory diseases. This study evaluated the effect of two MTX treatment schedules on the bone healing of the temporomandibular joint fracture in rats. Seventy-five adult male Wistar rats were used to generate an experimental unilateral medially rotated condylar fracture model that allows an evaluation of bone healing and the articular structures. The animals were subdivided into three groups that each received one of the following treatments intraperitoneally: saline (1 mL/week), low-dose MTX (3 mg/kg/week) and high-dose MTX (30 mg/kg). The histological study comprised fracture site and temporomandibular joint evaluations and bone neoformation was evaluated by histomorphometric analysis. A biochemical parameter of bone formation was also assessed. When compared with saline, high-dose MTX delayed bone fracture repairs. In this latter group, after 90 days, the histological analysis revealed atrophy of the fibrocartilage and the presence of fibrous tissue in the joint space. The histomorphometric analysis revealed diminished bone neoformation. The alkaline phosphatase levels also decreased after MTX treatment. It was concluded that high-dose MTX impaired mandibular condyle repair and induced degenerative articular changes. Copyright © 2014 European Association for Cranio-Maxillo-Facial Surgery. Published by Elsevier Ltd. All rights reserved.

  1. The role of the lateral pterygoid muscle in the sagittal fracture of mandibular condyle (SFMC) healing process.

    Science.gov (United States)

    Liu, Chng-Kui; Liu, Ping; Meng, Fan-Wen; Deng, Bang-Lian; Xue, Yang; Mao, Tian-Qiu; Hu, Kai-Jin

    2012-06-01

    The aim of this study was to examine the role of the lateral peterygoid muscle in the reconstruction of the shape of the condyle during healing of a sagittal fracture of the mandibular condyle. Twenty adult sheep were divided into 2 groups: all had a unilateral operation on the right side when the anterior and posterior attachments of the discs were cut, and an oblique vertical osteotomy was made from the lateral pole of the condyle to the medial side of the condylar neck. Ten sheep had the lateral pterygoid muscle cut, and the other 10 sheep did not. Sheep were killed at 4 weeks (n=2 from each group), 12 weeks (n=4), and 24 weeks (n=4) postoperatively. Computed tomograms (CT) were taken before and after operations. We dissected the joints, and recorded with the naked eye the shape, degree of erosion, and amount of calcification of the temporomandibular joint (TMJ). In the group in which the lateral peterygoid muscle had not been cut the joints showed overgrowth of new bone and more advanced ankylosis. Our results show that the lateral pterygoid muscle plays an important part in reconstructing the shape of the condyle during the healing of a sagittal fracture of the mandibular condyle, and combined with the dislocated and damaged disc is an important factor in the aetiology of traumatic ankylosis of the TMJ. Copyright © 2011. Published by Elsevier Ltd.

  2. Analyzing personalized policies for online biometric verification.

    Science.gov (United States)

    Sadhwani, Apaar; Yang, Yan; Wein, Lawrence M

    2014-01-01

    Motivated by India's nationwide biometric program for social inclusion, we analyze verification (i.e., one-to-one matching) in the case where we possess similarity scores for 10 fingerprints and two irises between a resident's biometric images at enrollment and his biometric images during his first verification. At subsequent verifications, we allow individualized strategies based on these 12 scores: we acquire a subset of the 12 images, get new scores for this subset that quantify the similarity to the corresponding enrollment images, and use the likelihood ratio (i.e., the likelihood of observing these scores if the resident is genuine divided by the corresponding likelihood if the resident is an imposter) to decide whether a resident is genuine or an imposter. We also consider two-stage policies, where additional images are acquired in a second stage if the first-stage results are inconclusive. Using performance data from India's program, we develop a new probabilistic model for the joint distribution of the 12 similarity scores and find near-optimal individualized strategies that minimize the false reject rate (FRR) subject to constraints on the false accept rate (FAR) and mean verification delay for each resident. Our individualized policies achieve the same FRR as a policy that acquires (and optimally fuses) 12 biometrics for each resident, which represents a five (four, respectively) log reduction in FRR relative to fingerprint (iris, respectively) policies previously proposed for India's biometric program. The mean delay is [Formula: see text] sec for our proposed policy, compared to 30 sec for a policy that acquires one fingerprint and 107 sec for a policy that acquires all 12 biometrics. This policy acquires iris scans from 32-41% of residents (depending on the FAR) and acquires an average of 1.3 fingerprints per resident.

  3. Improvement of security techniques and protection of biometric data in biometric systems: Presentation of International Standard ISO 24745

    OpenAIRE

    Milinković, Milorad

    2017-01-01

    This paper presents the International Standard ISO 24745 as a potential security tool for biometric information protection, more precisely as a tool for privacy protection in biometric systems. This is one of the latest internationally accepted standards that address the security issues of biometric systems.

  4. Privacy Enhancements for Inexact Biometric Templates

    Science.gov (United States)

    Ratha, Nalini; Chikkerur, Sharat; Connell, Jonathan; Bolle, Ruud

    Traditional authentication schemes utilize tokens or depend on some secret knowledge possessed by the user for verifying his or her identity. Although these techniques are widely used, they have several limitations. Both tokenand knowledge-based approaches cannot differentiate between an authorized user and an impersonator having access to the tokens or passwords. Biometrics-based authentication schemes overcome these limitations while offering usability advantages in the area of password management. However, despite its obvious advantages, the use of biometrics raises several security and privacy concerns.

  5. Practical biometrics from aspiration to implementation

    CERN Document Server

    Ashbourn, Julian

    2015-01-01

    This practically-focused text presents a hands-on guide to making biometric technology work in real-life scenarios. Extensively revised and updated, this new edition takes a fresh look at what it takes to integrate biometrics into wider applications. An emphasis is placed on the importance of a complete understanding of the broader scenario, covering technical, human and implementation factors. This understanding may then be exercised through interactive chapters dealing with educational software utilities and the BANTAM Program Manager. Topics and features: provides a concise introduction t

  6. Development of a Mobile EEG-based Biometric Authentication System

    DEFF Research Database (Denmark)

    Klonovs, Juris; Petersen, Christoffer Kjeldgaard; Olesen, Henning

    In recent years the need for greater security for storing personal and business data or accessing corporate networks on mobile devices is growing rapidly, and one of the potential solutions is to employ the innovative biometric authentication techniques. This paper presents the development...... and present a mobile prototype system capable of authenticating users based on the uniqueness of their brainwaves. Furthermore, we implement a novel authentication process, which leads the authentication system to be more secure. We also give suggestions for future improvements of the system....

  7. Heart Sound Biometric System Based on Marginal Spectrum Analysis

    Science.gov (United States)

    Zhao, Zhidong; Shen, Qinqin; Ren, Fangqin

    2013-01-01

    This work presents a heart sound biometric system based on marginal spectrum analysis, which is a new feature extraction technique for identification purposes. This heart sound identification system is comprised of signal acquisition, pre-processing, feature extraction, training, and identification. Experiments on the selection of the optimal values for the system parameters are conducted. The results indicate that the new spectrum coefficients result in a significant increase in the recognition rate of 94.40% compared with that of the traditional Fourier spectrum (84.32%) based on a database of 280 heart sounds from 40 participants. PMID:23429515

  8. Effects of herbal ointment containing the leaf extracts of Madeira vine (Anredera cordifolia (Ten.) Steenis) for burn wound healing process on albino rats.

    Science.gov (United States)

    Yuniarti, Wiwik Misaco; Lukiswanto, Bambang Sektiari

    2017-07-01

    Skin burn is a health problem that requires fast and accurate treatment. If not well-treated, the burn will cause various damaging conditions for the patient. The leaf extract of Madeira vine ( Anredera cordifolia (Ten.) Steenis), or popularly known as Binahong in Indonesia, has been used to treat various diseases. The purpose of this research is to determine the effects of leaf extracts of Madeira vine ( A. cordifolia (Ten.) Steenis) on skin burn healing process in rats as an animal model. In this research, there were four treatment groups: G0, G1, G2, and G3, each consisting of five rats. All these rats were given skin burns, using hot metal plates. Then, sulfadiazine was given to G0, 2.5% leaf extract of Madeira vine was given to G1, 5% extract was given to G2, and 10% extract was given to G3, for straight 14 days topically, 3 times a day. At the end of the treatment period, skin excisions were conducted, and histopathological examination was carried out. Microscopic observation on the wound healing process on the collagen deposition, polymorphonuclear infiltration, angiogenesis, and fibrosis showed that G2 had a significant difference with G0, G1, and G3 (pMadeira vine, which have the antioxidant, anti-inflammatory, and antibacterial effects. The ointment from the 5% leaf extract of Madeira vine ( A. cordifolia (Ten.) Steenis) has been proven to be effective to be used for topical burn therapy.

  9. Biometrics encryption combining palmprint with two-layer error correction codes

    Science.gov (United States)

    Li, Hengjian; Qiu, Jian; Dong, Jiwen; Feng, Guang

    2017-07-01

    To bridge the gap between the fuzziness of biometrics and the exactitude of cryptography, based on combining palmprint with two-layer error correction codes, a novel biometrics encryption method is proposed. Firstly, the randomly generated original keys are encoded by convolutional and cyclic two-layer coding. The first layer uses a convolution code to correct burst errors. The second layer uses cyclic code to correct random errors. Then, the palmprint features are extracted from the palmprint images. Next, they are fused together by XORing operation. The information is stored in a smart card. Finally, the original keys extraction process is the information in the smart card XOR the user's palmprint features and then decoded with convolutional and cyclic two-layer code. The experimental results and security analysis show that it can recover the original keys completely. The proposed method is more secure than a single password factor, and has higher accuracy than a single biometric factor.

  10. Improving the Security of Internet Banking Applications by Using Multimodal Biometrics

    Directory of Open Access Journals (Sweden)

    Cătălin Lupu

    2015-03-01

    Full Text Available Online banking applications are used by more and more people all over the world. Most of the banks are providing these services to their customers. The authentication methods varies from the basic user and password to username and a onetime password (OTP generated by a virtual or a physical digipass. The common thing among authentication methods is that the login wepage is provided through a secure channel. Some banks have introduced (especially for testing purposes the authentication using common biometric characteristics, like fingerprint, voice or keystroke recognition. This paper will present some of the most common online banking authentication methods, together with basic biometric characteristics that could be used in these applications. The security in internet banking applications can be improved by using biometrics for the authentication process. Also, the authors have developed an application for authentication of users using fingerprint as the main characteristic, which will be presented at the end of this paper.

  11. BIOMETRIC IDENTITY VERIFICATION IN HEALTH SERVICES: A BIOMETRIC SURVEILLANCE PRACTICE IN TURKEY

    OpenAIRE

    İlker ŞİRİN

    2014-01-01

    Determination or verification of identity with biometric methods has a widespread use especially at borders for security reasons. Social Security Institution transferred the biometric identity verification practice to health sercives that are provided by private and university hospitals. The risks of the new system considering the privacy of personal data are under debate. Although there are announcements or manuals of Social Security Institution regarding the implementation...

  12. A Systems Approach to Biometrics in the Military Domain.

    Science.gov (United States)

    Wilson, Lauren; Gahan, Michelle; Lennard, Chris; Robertson, James

    2018-02-21

    Forensic biometrics is the application of forensic science principles to physical and behavioral characteristics. Forensic biometrics is a secondary sub-system in the forensic science "system of systems," which describes forensic science as a sub-system in the larger criminal justice, law enforcement, intelligence, and military system. The purpose of this paper is to discuss biometrics in the military domain and integration into the wider forensic science system of systems. The holistic system thinking methodology was applied to the U.S. biometric system to map it to the system of systems framework. The U.S. biometric system is used as a case study to help guide other countries to develop military biometric systems that are integrated and interoperable at the whole-of-government level. The aim is to provide the system of systems framework for agencies to consider for proactive design of biometric systems. © 2018 American Academy of Forensic Sciences.

  13. Privacy-Preserving Biometric Authentication: Challenges and Directions

    Directory of Open Access Journals (Sweden)

    Elena Pagnin

    2017-01-01

    Full Text Available An emerging direction for authenticating people is the adoption of biometric authentication systems. Biometric credentials are becoming increasingly popular as a means of authenticating people due to the wide range of advantages that they provide with respect to classical authentication methods (e.g., password-based authentication. The most characteristic feature of this authentication method is the naturally strong bond between a user and her biometric credentials. This very same advantageous property, however, raises serious security and privacy concerns in case the biometric trait gets compromised. In this article, we present the most challenging issues that need to be taken into consideration when designing secure and privacy-preserving biometric authentication protocols. More precisely, we describe the main threats against privacy-preserving biometric authentication systems and give directions on possible countermeasures in order to design secure and privacy-preserving biometric authentication protocols.

  14. Conducted healing to treat large skin wounds.

    Science.gov (United States)

    Salgado, M I; Petroianu, A; Alberti, L R; Burgarelli, G L; Barbosa, A J A

    2013-01-01

    Improvement of the healing process to provide better aesthetical and functional results continues to be a surgical challenge. This study compared the treatment of skin wounds by means of conducted healing (an original method of treatment by secondary healing) and by the use of autogenous skin grafts. Two skin segments, one on each side of the dorsum,were removed from 17 rabbits. The side that served as a graft donor site was left open as to undergo conducted healing (A)and was submitted only to debridement and local care with dressings. The skin removed from the side mentioned above was implanted as a graft (B) to cover the wound on the other side. Thus, each animal received the two types of treatment on its dorsum (A and B). The rabbits were divided into two groups according to the size of the wounds: Group 1 - A and B (4 cm2)and Group 2 - A and B (25 cm2). The healing time was 19 days for Group 1 and 35 days for Group 2. The final macro- and microscopic aspects of the healing process were analysed comparatively among all subgroups. The presence of inflammatory cells, epidermal cysts and of giant cells was evaluated. No macro- or microscopic differences were observed while comparing the wounds that underwent conducted healing and those in which grafting was employed, although the wounds submitted to conducted healing healed more rapidly. Conducted wound healing was effective for the treatment of skin wounds. Celsius.

  15. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  16. Capillary-Patterns for Biometric Authentication

    NARCIS (Netherlands)

    Paloma Benedicto, J.; Bruekers, A.A.M.; Presura, C.N.; Garcia Molina, G.

    2007-01-01

    In this report, we present a method using the capillary structuresunder the "distal interphalangeal joint" (DIP joint), which is located between the second and third (distal) phalanges of the finger, for achieving secure biometric authentication. Images of the DIPjoint are acquired using a

  17. Quantum Biometrics with Retinal Photon Counting

    Science.gov (United States)

    Loulakis, M.; Blatsios, G.; Vrettou, C. S.; Kominis, I. K.

    2017-10-01

    It is known that the eye's scotopic photodetectors, rhodopsin molecules, and their associated phototransduction mechanism leading to light perception, are efficient single-photon counters. We here use the photon-counting principles of human rod vision to propose a secure quantum biometric identification based on the quantum-statistical properties of retinal photon detection. The photon path along the human eye until its detection by rod cells is modeled as a filter having a specific transmission coefficient. Precisely determining its value from the photodetection statistics registered by the conscious observer is a quantum parameter estimation problem that leads to a quantum secure identification method. The probabilities for false-positive and false-negative identification of this biometric technique can readily approach 10-10 and 10-4, respectively. The security of the biometric method can be further quantified by the physics of quantum measurements. An impostor must be able to perform quantum thermometry and quantum magnetometry with energy resolution better than 10-9ℏ , in order to foil the device by noninvasively monitoring the biometric activity of a user.

  18. Towards Biometric Assessment of Audience Affect

    DEFF Research Database (Denmark)

    Lyng Wieland, Jakob; Larsen, Lars Bo; Laursen, Jeanette Kølbæk

    2016-01-01

    This paper investigates how reliable affective responses can be obtained using objective biometric measures for media audience research. We use Galvanic Skin Response (GSR) to detect sixteen respondents’ arousal levels and as an objective measure to show how self- reporting disrupts the experience...

  19. Analysis of eigenvalue correction applied to biometrics

    NARCIS (Netherlands)

    Hendrikse, A.J.; Veldhuis, Raymond N.J.; Spreeuwers, Lieuwe Jan; Bazen, A.M.

    Eigenvalue estimation plays an important role in biometrics. However, if the number of samples is limited, estimates are significantly biased. In this article we analyse the influence of this bias on the error rates of PCA/LDA based verification systems, using both synthetic data with realistic

  20. Biometric authentication for a mobile personal device

    NARCIS (Netherlands)

    Tao, Q.; Veldhuis, Raymond N.J.

    2006-01-01

    Secure access is prerequisite for a mobile personal device (MPD) in a personal network (PN). An authentication method using biometrics, specifically face, is proposed in this paper. A fast face detection and registration method based on a Viola-Jones detector is implemented, and a

  1. Biometric Authentication System on Mobile Personal Devices

    NARCIS (Netherlands)

    Tao, Q.; Veldhuis, Raymond N.J.

    We propose a secure, robust, and low-cost biometric authentication system on the mobile personal device for the personal network. The system consists of the following five key modules: 1) face detection; 2) face registration; 3) illumination normalization; 4) face verification; and 5) information

  2. Likelihood-ratio-based biometric verification

    NARCIS (Netherlands)

    Bazen, A.M.; Veldhuis, Raymond N.J.

    2002-01-01

    This paper presents results on optimal similarity measures for biometric verification based on fixed-length feature vectors. First, we show that the verification of a single user is equivalent to the detection problem, which implies that for single-user verification the likelihood ratio is optimal.

  3. Zero leakage quantization scheme for biometric verification

    NARCIS (Netherlands)

    Groot, de J.A.; Linnartz, J.P.M.G.

    2011-01-01

    Biometrics gain increasing interest as a solution for many security issues, but privacy risks exist in case we do not protect the stored templates well. This paper presents a new verification scheme, which protects the secrets of the enrolled users. We will show that zero leakage is achieved if

  4. Likelihood Ratio-Based Biometric Verification

    NARCIS (Netherlands)

    Bazen, A.M.; Veldhuis, Raymond N.J.

    The paper presents results on optimal similarity measures for biometric verification based on fixed-length feature vectors. First, we show that the verification of a single user is equivalent to the detection problem, which implies that, for single-user verification, the likelihood ratio is optimal.

  5. News in wound healing and management

    DEFF Research Database (Denmark)

    Gottrup, Finn; Jørgensen, Bo; Karlsmark, Tonny

    2009-01-01

    -TNFalpha) and Lactobacillus plantarum cultures have also been successfully used in hard to heal, atypical wounds. Knowledge on influencing factors as smoking and biofilm on the healing process has also been improved. Smoking results in delayed healing and increased risk of postoperative infection, whereas the role of biofilm...... is still at an exploratory level. Organizing models for optimal wound management are constantly being developed and refined. SUMMARY: Recent knowledge on the importance of new dressing materials containing active substances, new treatments for atypical wounds, influencing factors on the healing process...

  6. BossPro: a biometrics-based obfuscation scheme for software protection

    Science.gov (United States)

    Kuseler, Torben; Lami, Ihsan A.; Al-Assam, Hisham

    2013-05-01

    This paper proposes to integrate biometric-based key generation into an obfuscated interpretation algorithm to protect authentication application software from illegitimate use or reverse-engineering. This is especially necessary for mCommerce because application programmes on mobile devices, such as Smartphones and Tablet-PCs are typically open for misuse by hackers. Therefore, the scheme proposed in this paper ensures that a correct interpretation / execution of the obfuscated program code of the authentication application requires a valid biometric generated key of the actual person to be authenticated, in real-time. Without this key, the real semantics of the program cannot be understood by an attacker even if he/she gains access to this application code. Furthermore, the security provided by this scheme can be a vital aspect in protecting any application running on mobile devices that are increasingly used to perform business/financial or other security related applications, but are easily lost or stolen. The scheme starts by creating a personalised copy of any application based on the biometric key generated during an enrolment process with the authenticator as well as a nuance created at the time of communication between the client and the authenticator. The obfuscated code is then shipped to the client's mobile devise and integrated with real-time biometric extracted data of the client to form the unlocking key during execution. The novelty of this scheme is achieved by the close binding of this application program to the biometric key of the client, thus making this application unusable for others. Trials and experimental results on biometric key generation, based on client's faces, and an implemented scheme prototype, based on the Android emulator, prove the concept and novelty of this proposed scheme.

  7. Wound healing and infection in surgery

    DEFF Research Database (Denmark)

    Sørensen, Lars Tue

    2012-01-01

    : The aim was to clarify how smoking and nicotine affects wound healing processes and to establish if smoking cessation and nicotine replacement therapy reverse the mechanisms involved.......: The aim was to clarify how smoking and nicotine affects wound healing processes and to establish if smoking cessation and nicotine replacement therapy reverse the mechanisms involved....

  8. Nanotechnology and bone healing.

    Science.gov (United States)

    Harvey, Edward J; Henderson, Janet E; Vengallatore, Srikar T

    2010-03-01

    Nanotechnology and its attendant techniques have yet to make a significant impact on the science of bone healing. However, the potential benefits are immediately obvious with the result that hundreds of researchers and firms are performing the basic research needed to mature this nascent, yet soon to be fruitful niche. Together with genomics and proteomics, and combined with tissue engineering, this is the new face of orthopaedic technology. The concepts that orthopaedic surgeons recognize are fabrication processes that have resulted in porous implant substrates as bone defect augmentation and medication-carrier devices. However, there are dozens of applications in orthopaedic traumatology and bone healing for nanometer-sized entities, structures, surfaces, and devices with characteristic lengths ranging from 10s of nanometers to a few micrometers. Examples include scaffolds, delivery mechanisms, controlled modification of surface topography and composition, and biomicroelectromechanical systems. We review the basic science, clinical implications, and early applications of the nanotechnology revolution and emphasize the rich possibilities that exist at the crossover region between micro- and nanotechnology for developing new treatments for bone healing.

  9. "Healing is a Done Deal": Temporality and Metabolic Healing Among Evangelical Christians in Samoa.

    Science.gov (United States)

    Hardin, Jessica

    2016-01-01

    Drawing on fieldwork in independent Samoa, in this article, I analyze the temporal dimensions of evangelical Christian healing of metabolic disorders. I explore how those suffering with metabolic disorders draw from multiple time-based notions of healing, drawing attention to the limits of biomedicine in contrast with the effectiveness of Divine healing. By simultaneously engaging evangelical and biomedical temporalities, I argue that evangelical Christians create wellness despite sickness and, in turn, re-signify chronic suffering as a long-term process of Christian healing. Positioning biomedical temporality and evangelical temporality as parallel yet distinctive ways of practicing healing, therefore, influences health care choices.

  10. The effects of Anadara granosa shell-Stichopus hermanni on bFGF expressions and blood vessel counts in the bone defect healing process of Wistar rats

    Directory of Open Access Journals (Sweden)

    Rima Parwati Sari

    2017-12-01

    Full Text Available Background: Bone damage can be caused by various factors with treatment usually involving graft materials being applied to the defective area. Moreover, in the bone defect healing process, blood vessels are also considered to be an important energy source for cell proliferation. One of the angiogenic factors playing an important role in blood vessel formation is basic fibroblast growth factor (bFGF. Furthermore, synthesized hydroxyapatite derived from Anadara granosa (AG shells constitutes one of the potential materials for use in bone graft. The gold sea cucumber genus Stichopus hermanni (SH possesses the ability to stimulate endothelial progenitor cells inducing bFGF. Purpose: This study aims to investigate the effects of AG shells and SH on bFGF expressions and blood vessel counts within the bone healing process. Methods: Twenty four male Wistar rats were divided into three groups, namely: a control group (C, a treatment group was administered with blood cockle shell (AG, and a treatment group with blood cockle shell and golden sea cucumber (AG+SH. Defects were made on their femurs measuring half the diameter of a circular, no. 018. bur These rats were subsequently sacrificed on day 7 after surgery. The expressions of bFGF were measured by means of IHC technique, while the number of blood vessels was quantified using HE technique. The resulting data was subjected to statistical analysis using an Anova test followed by an LSD test (p < 0.05. Results: The one-way Anova test results combined with those of an LSD test showed there to be significant differences in bFGF expressions and blood vessel counts between the control group (K and the treatment group (AG as well as between the treatment group (AG and the treatment group (AG+SH. Conclusions: A combination of Anadara granosa shell and Stichopus hermanni can increase the expression of bFGF and the number of blood vessels on day 7 during the bone healing process in Wistar rats.

  11. Unveiling the Biometric Potential of Finger-Based ECG Signals

    Science.gov (United States)

    Lourenço, André; Silva, Hugo; Fred, Ana

    2011-01-01

    The ECG signal has been shown to contain relevant information for human identification. Even though results validate the potential of these signals, data acquisition methods and apparatus explored so far compromise user acceptability, requiring the acquisition of ECG at the chest. In this paper, we propose a finger-based ECG biometric system, that uses signals collected at the fingers, through a minimally intrusive 1-lead ECG setup recurring to Ag/AgCl electrodes without gel as interface with the skin. The collected signal is significantly more noisy than the ECG acquired at the chest, motivating the application of feature extraction and signal processing techniques to the problem. Time domain ECG signal processing is performed, which comprises the usual steps of filtering, peak detection, heartbeat waveform segmentation, and amplitude normalization, plus an additional step of time normalization. Through a simple minimum distance criterion between the test patterns and the enrollment database, results have revealed this to be a promising technique for biometric applications. PMID:21837235

  12. Unveiling the biometric potential of finger-based ECG signals.

    Science.gov (United States)

    Lourenço, André; Silva, Hugo; Fred, Ana

    2011-01-01

    The ECG signal has been shown to contain relevant information for human identification. Even though results validate the potential of these signals, data acquisition methods and apparatus explored so far compromise user acceptability, requiring the acquisition of ECG at the chest. In this paper, we propose a finger-based ECG biometric system, that uses signals collected at the fingers, through a minimally intrusive 1-lead ECG setup recurring to Ag/AgCl electrodes without gel as interface with the skin. The collected signal is significantly more noisy than the ECG acquired at the chest, motivating the application of feature extraction and signal processing techniques to the problem. Time domain ECG signal processing is performed, which comprises the usual steps of filtering, peak detection, heartbeat waveform segmentation, and amplitude normalization, plus an additional step of time normalization. Through a simple minimum distance criterion between the test patterns and the enrollment database, results have revealed this to be a promising technique for biometric applications.

  13. Biometric identification systems: the science of transaction facilitation

    Science.gov (United States)

    Rogers, Robert R.

    1994-10-01

    The future ofthe "secure transaction" and the success ofall undertakings that depend on absolute certainty that the individuals involved really are who and what they represent themselves to be is dependent upon the successful development of absolutely accurate, low-cost and easy-to-operate Biometric Identification Systems. Whether these transactions are political, military, financial or administrative (e.g. health cards, drivers licenses, welfare entitlement, national identification cards, credit card transactions, etc.), the need for such secure and positive identification has never been greater -and yet we are only at the beginning ofan era in which we will see the emergence and proliferation of Biometric Identification Systems in nearly every field ofhuman endeavor. Proper application ofthese systems will change the way the world operates, and that is precisely the goal ofComparator Systems Corporation. Just as with the photo-copier 40 years ago and the personal computer 20 years ago, the potential applications for positive personal identification are going to make the Biometric Identification System a commonplace component in the standard practice ofbusiness, and in interhuman relationships ofall kinds. The development of new and specific application hardware, as well as the necessary algorithms and related software required for integration into existing operating procedures and newly developed systems alike, has been a more-than-a-decade-long process at Comparator -and we are now on the verge of delivering these systems to the world markets so urgently in need of them. An individual could feel extremely confident and satisfied ifhe could present his credit, debit, or ATM card at any point of sale and, after inserting his card, could simply place his finger on a glass panel and in less than a second be positively accepted as being the person that the card purported him to be; not to mention the security and satisfaction of the vendor involved in knowing that

  14. Study of Biometric Identification Method Based on Naked Footprint

    Directory of Open Access Journals (Sweden)

    Raji Rafiu King

    2013-10-01

    Full Text Available The scale of deployment of biometric identity-verification systems has recently seen an enormous increase owing to the need for more secure and reliable way of identifying people. Footprint identification which can be defined as the measurement of footprint features for recognizing the identity of a user has surfaced recently. This study is based on a biometric personal identification method using static footprint features viz. friction ridge / texture and foot shape / silhouette. To begin with, naked footprints of users are captured; images then undergo pre processing followed by the extraction of two features; shape using Gradient Vector Flow (GVF) snake model and minutiae extraction respectively. Matching is then effected based on these two features followed by a fusion of these two results for either a reject or accept decision. Our shape matching feature is based on cosine similarity while the texture one is based on miniature score matching. The results from our research establish that the naked footprint is a credible biometric feature as two barefoot impressions of an individual match perfectly while that of two different persons shows a great deal of dissimilarity. Normal 0 false false false IN X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} Doi: 10.12777/ijse.5.2.29-35 How to cite this article: King

  15. Growth Hormone-Releasing Peptide 6 Enhances the Healing Process and Improves the Esthetic Outcome of the Wounds

    Directory of Open Access Journals (Sweden)

    Yssel Mendoza Marí

    2016-01-01

    Full Text Available In addition to its cytoprotective effects, growth hormone-releasing peptide 6 (GHRP-6 proved to reduce liver fibrotic induration. CD36 as one of the GHRP-6 receptors appears abundantly represented in cutaneous wounds granulation tissue. The healing response in a scenario of CD36 agonistic stimulation had not been previously investigated. Excisional full-thickness wounds (6 mmØ were created in the dorsum of Wistar rats and topically treated twice a day for 5 days. The universal model of rabbit’s ears hypertrophic scars was implemented and the animals were treated daily for 30 days. Treatments for both species were based on a CMC jelly composition containing GHRP-6 400 μg/mL. Wounds response characterization included closure dynamic, RT-PCR transcriptional profile, histology, and histomorphometric procedures. The rats experiment indicated that GHRP-6 pharmacodynamics involves attenuation of immunoinflammatory mediators, their effector cells, and the reduction of the expression of fibrotic cytokines. Importantly, in the hypertrophic scars rabbit’s model, GHRP-6 intervention dramatically reduced the onset of exuberant scars by activating PPARγ and reducing the expression of fibrogenic cytokines. GHRP-6 showed no effect on the reversion of consolidated lesions. This evidence supports the notion that CD36 is an active and pharmacologically approachable receptor to attenuate wound inflammation and accelerate its closure so as to improve wound esthetic.

  16. BIOMETRIC SECURITY: ALTERNATIF PENGENDALIAN DALAM SISTEM INFORMASI AKUNTANSI TERKOMPUTERISASI

    Directory of Open Access Journals (Sweden)

    Josua Tarigan

    2004-01-01

    Full Text Available As organization search more secure authentication method for user access, biometric security technology is gaining more and more attention. The implementation of biometric security technology in accounting information systems was physical access, virtual access, e-commerce applications and covert suveillance. There are three phase when an organization implementation biometric technology: strategic planning and budgeting, developing a system reliability plan and documentation. The challenges will face when develop biometric technology as control in accounting information system are standardization, hybrid technology uses, life cycle management. Abstract in Bahasa Indonesia : Adanya keinginan setiap organisasi untuk mencari metode pengamanan authentication yang lebih untuk akses user, dijawab dengan adanya teknologi biometric security yang mendapat perhatian yang cukup besar bagi organisasi. Implementasi teknologi biometric security cukup luas dalam sistem informasi akuntansi yaitu sebagai pengendalian pada physical access, virtual access, e-commerce applications dan covert surveillance. Dalam mengimplementasikan teknologi biometric, ada tiga tahapan yang harus dilakukan organisasi, yakni strategic planning and budgeting, developing a system reliability plan dan documentation. Tantangan yang akan dihadapi dalam mengembangkan teknologi biometric sebagai pengendalian dalam sistem informasi akuntansi yakni standarisasi, aplikasi teknologi hybrid dan manajemen siklus hidup pada biometric security. Kata kunci: authentication, akses user dan biometric security.

  17. The healing process of intracorporeally and in situ devitalized distal femur by microwave in a dog model and its mechanical properties in vitro.

    Directory of Open Access Journals (Sweden)

    Zhenwei Ji

    Full Text Available BACKGROUND: Limb-salvage surgery has been well recognized as a standard treatment and alternative to amputation for patients with malignant bone tumors. Various limb-sparing techniques have been developed including tumor prosthesis, allograft, autograft and graft-prosthesis composite. However, each of these methods has short- and long-term disadvantages such as nonunion, mechanical failures and poor limb function. The technique of intracorporeal devitalization of tumor-bearing bone segment in situ by microwave-induced hyperthermia after separating it from surrounding normal tissues with a safe margin is a promising limb-salvage method, which may avoid some shortcomings encountered by the above-mentioned conventional techniques. The purpose of this study is to assess the healing process and revitalization potential of the devitalized bone segment by this method in a dog model. In addition, the immediate effect of microwave on the biomechanical properties of bone tissue was also explored in an in vitro experiment. METHODS: We applied the microwave-induced hyperthermia to devitalize the distal femurs of dogs in situ. Using a monopole microwave antenna, we could produce a necrotic bone of nearly 20 mm in length in distal femur. Radiography, bone scintigraphy, microangiography, histology and functional evaluation were performed at 2 weeks and 1, 2, 3, 6, 9 and 12 months postoperatively to assess the healing process. In a biomechanical study, two kinds of bone specimens, 3 and 6 cm in length, were used for compression and three-point bending test respectively immediately after extracorporeally devitalized by microwave. FINDINGS: An in vivo study showed that intracorporeally and in situ devitalized bone segment by microwave had great revitalization potential. An in vitro study revealed that the initial mechanical strength of the extracorporeally devitalized bone specimen may not be affected by microwave. CONCLUSION: Our results suggest that the

  18. Thermally induced self-healing epoxy/glass laminates with porous layers containing crystallized healing agent

    Directory of Open Access Journals (Sweden)

    T. Szmechtyk

    2018-07-01

    Full Text Available Porous glass fiber and paper layers were tested for application in thermally induced self healing epoxy laminates as healing porous layers. Both types of layers were impregnated using high purity bisphenol A diglycidyl ether (BADGE epoxy with ability to crystallize during storage under 25 °C. Absorption capacity of porous layers was evaluated. Differential scanning calorimetry was used to investigate BADGE healing agent recrystallization process. Healing porous glass layers (HPGL were selected for further tests. Liquid chromatography and Fourier transform infrared (FT IR spectroscopy provided information about average molecular mass of embedded healing agent and functional groups in HPGL layers. Self-healing efficiency of three different laminates with HPGL layers was calculated based on the results of three-point bending test and Charpy impact test. Also, flexural properties and impact strength of laminates were evaluated. The obtained results confirm competitive self healing ability of composites with HPGL.

  19. Behavioral Biometrics in Assisted Living: A Methodology for Emotion Recognition

    Directory of Open Access Journals (Sweden)

    S. Xefteris

    2016-08-01

    Full Text Available Behavioral biometrics aim at providing algorithms for the automatic recognition of individual behavioral traits, stemming from a person’s actions, attitude, expressions and conduct. In the field of ambient assisted living, behavioral biometrics find an important niche. Individuals suffering from the early stages of neurodegenerative diseases (MCI, Alzheimer’s, dementia need supervision in their daily activities. In this context, an unobtrusive system to monitor subjects and alert formal and informal carers providing information on both physical and emotional status is of great importance and positively affects multiple stakeholders. The primary aim of this paper is to describe a methodology for recognizing the emotional status of a subject using facial expressions and to identify its uses, in conjunction with pre-existing risk-assessment methodologies, for its integration into the context of a smart monitoring system for subjects suffering from neurodegenerative diseases. Paul Ekman’s research provided the background on the universality of facial expressions as indicators of underlying emotions. The methodology then makes use of computational geometry, image processing and graph theory algorithms for the detection of regions of interest and then a neural network is used for the final classification. Findings are coupled with previous published work for risk assessment and alert generation in the context of an ambient assisted living environment based on Service oriented architecture principles, aimed at remote web-based estimation of the cognitive and physical status of MCI and dementia patients.

  20. Four Machine Learning Algorithms for Biometrics Fusion: A Comparative Study

    Directory of Open Access Journals (Sweden)

    I. G. Damousis

    2012-01-01

    Full Text Available We examine the efficiency of four machine learning algorithms for the fusion of several biometrics modalities to create a multimodal biometrics security system. The algorithms examined are Gaussian Mixture Models (GMMs, Artificial Neural Networks (ANNs, Fuzzy Expert Systems (FESs, and Support Vector Machines (SVMs. The fusion of biometrics leads to security systems that exhibit higher recognition rates and lower false alarms compared to unimodal biometric security systems. Supervised learning was carried out using a number of patterns from a well-known benchmark biometrics database, and the validation/testing took place with patterns from the same database which were not included in the training dataset. The comparison of the algorithms reveals that the biometrics fusion system is superior to the original unimodal systems and also other fusion schemes found in the literature.

  1. On Hunting Animals of the Biometric Menagerie for Online Signature.

    Directory of Open Access Journals (Sweden)

    Nesma Houmani

    Full Text Available Individuals behave differently regarding to biometric authentication systems. This fact was formalized in the literature by the concept of Biometric Menagerie, defining and labeling user groups with animal names in order to reflect their characteristics with respect to biometric systems. This concept was illustrated for face, fingerprint, iris, and speech modalities. The present study extends the Biometric Menagerie to online signatures, by proposing a novel methodology that ties specific quality measures for signatures to categories of the Biometric Menagerie. Such measures are combined for retrieving automatically writer categories of the extended version of the Biometric Menagerie. Performance analysis with different types of classifiers shows the pertinence of our approach on the well-known MCYT-100 database.

  2. On Hunting Animals of the Biometric Menagerie for Online Signature.

    Science.gov (United States)

    Houmani, Nesma; Garcia-Salicetti, Sonia

    2016-01-01

    Individuals behave differently regarding to biometric authentication systems. This fact was formalized in the literature by the concept of Biometric Menagerie, defining and labeling user groups with animal names in order to reflect their characteristics with respect to biometric systems. This concept was illustrated for face, fingerprint, iris, and speech modalities. The present study extends the Biometric Menagerie to online signatures, by proposing a novel methodology that ties specific quality measures for signatures to categories of the Biometric Menagerie. Such measures are combined for retrieving automatically writer categories of the extended version of the Biometric Menagerie. Performance analysis with different types of classifiers shows the pertinence of our approach on the well-known MCYT-100 database.

  3. A robust probabilistic collaborative representation based classification for multimodal biometrics

    Science.gov (United States)

    Zhang, Jing; Liu, Huanxi; Ding, Derui; Xiao, Jianli

    2018-04-01

    Most of the traditional biometric recognition systems perform recognition with a single biometric indicator. These systems have suffered noisy data, interclass variations, unacceptable error rates, forged identity, and so on. Due to these inherent problems, it is not valid that many researchers attempt to enhance the performance of unimodal biometric systems with single features. Thus, multimodal biometrics is investigated to reduce some of these defects. This paper proposes a new multimodal biometric recognition approach by fused faces and fingerprints. For more recognizable features, the proposed method extracts block local binary pattern features for all modalities, and then combines them into a single framework. For better classification, it employs the robust probabilistic collaborative representation based classifier to recognize individuals. Experimental results indicate that the proposed method has improved the recognition accuracy compared to the unimodal biometrics.

  4. On enabling secure applications through off-line biometric identification

    Energy Technology Data Exchange (ETDEWEB)

    Davida, G.I. [Univ. of Wisconsin, Milwaukee, WI (United States); Frankel, Y. [CertCo LLC, New York, NY (United States); Matt, B.J. [Sandia National Labs., Albuquerque, NM (United States)

    1998-04-01

    In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, the authors study secure off line authenticated user identification schemes based on a biometric system that can measure a user`s biometric accurately (up to some Hamming distance). The schemes presented here enhance identification and authorization in secure applications by binding a biometric template with authorization information on a token such as a magnetic strip. Also developed here are schemes specifically designed to minimize the compromise of a user`s private biometrics data, encapsulated in the authorization information, without requiring secure hardware tokens. In this paper the authors furthermore study the feasibility of biometrics performing as an enabling technology for secure system and application design. The authors investigate a new technology which allows a user`s biometrics to facilitate cryptographic mechanisms.

  5. On enabling secure applications through off-line biometric identification

    International Nuclear Information System (INIS)

    Davida, G.I.; Frankel, Y.; Matt, B.J.

    1998-04-01

    In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, the authors study secure off line authenticated user identification schemes based on a biometric system that can measure a user's biometric accurately (up to some Hamming distance). The schemes presented here enhance identification and authorization in secure applications by binding a biometric template with authorization information on a token such as a magnetic strip. Also developed here are schemes specifically designed to minimize the compromise of a user's private biometrics data, encapsulated in the authorization information, without requiring secure hardware tokens. In this paper the authors furthermore study the feasibility of biometrics performing as an enabling technology for secure system and application design. The authors investigate a new technology which allows a user's biometrics to facilitate cryptographic mechanisms

  6. A biometric method to secure telemedicine systems.

    Science.gov (United States)

    Zhang, G H; Poon, Carmen C Y; Li, Ye; Zhang, Y T

    2009-01-01

    Security and privacy are among the most crucial issues for data transmission in telemedicine systems. This paper proposes a solution for securing wireless data transmission in telemedicine systems, i.e. within a body sensor network (BSN), between the BSN and server as well as between the server and professionals who have assess to the server. A unique feature of this solution is the generation of random keys by physiological data (i.e. a biometric approach) for securing communication at all 3 levels. In the performance analysis, inter-pulse interval of photoplethysmogram is used as an example to generate these biometric keys to protect wireless data transmission. The results of statistical analysis and computational complexity suggest that this type of key is random enough to make telemedicine systems resistant to attacks.

  7. Unconstrained and contactless hand geometry biometrics.

    Science.gov (United States)

    de-Santos-Sierra, Alberto; Sánchez-Ávila, Carmen; Del Pozo, Gonzalo Bailador; Guerra-Casanova, Javier

    2011-01-01

    This paper presents a hand biometric system for contact-less, platform-free scenarios, proposing innovative methods in feature extraction, template creation and template matching. The evaluation of the proposed method considers both the use of three contact-less publicly available hand databases, and the comparison of the performance to two competitive pattern recognition techniques existing in literature: namely support vector machines (SVM) and k-nearest neighbour (k-NN). Results highlight the fact that the proposed method outcomes existing approaches in literature in terms of computational cost, accuracy in human identification, number of extracted features and number of samples for template creation. The proposed method is a suitable solution for human identification in contact-less scenarios based on hand biometrics, providing a feasible solution to devices with limited hardware requirements like mobile devices.

  8. Remote Biometrics for Robust Persistent Authentication

    DEFF Research Database (Denmark)

    Ingwar, Mads Ingerslew; Jensen, Christian D.

    2014-01-01

    This paper examines the problem of providing a robust non-invasive authentication service for mobile users in a smart environment. We base our work on the persistent authentication model (PAISE), which relies on available sensors to track principals from the location where they authenticate, e.......g., through a smart card based access control system, to the location where the authentication is required by a location-based service. The PAISE model is extended with remote biometrics to prevent the decay of authentication confidence when authenticated users encounter and interact with other users...... in the environment. The result is a calm approach to authentication, where mobile users are transparently authenticated towards the system, which allows the provision of location-based services. The output of the remote biometrics are fused using error-rate-based fusion to solve a common problem that occurs in score...

  9. Carbon Nanotube Embedded Nanostructure for Biometrics.

    Science.gov (United States)

    Park, Juhyuk; Youn, Jae Ryoun; Song, Young Seok

    2017-12-27

    Low electric energy loss is a very important problem to minimize the decay of transferred energy intensity due to impedance mismatch. This issue has been dealt with by adding an impedance matching layer at the interface between two media. A strategy was proposed to improve the charge transfer from the human body to a biometric device by using an impedance matching nanostructure. Nanocomposite pattern arrays were fabricated with shape memory polymer and carbon nanotubes. The shape recovery ability of the nanopatterns enhanced durability and sustainability of the structure. It was found that the composite nanopatterns improved the current transfer by two times compared with the nonpatterned composite sample. The underlying mechanism of the enhanced charge transport was understood by carrying out a numerical simulation. We anticipate that this study can provide a new pathway for developing advanced biometric devices with high sensitivity to biological information.

  10. Unconstrained and Contactless Hand Geometry Biometrics

    Directory of Open Access Journals (Sweden)

    Carmen Sánchez-Ávila

    2011-10-01

    Full Text Available This paper presents a hand biometric system for contact-less, platform-free scenarios, proposing innovative methods in feature extraction, template creation and template matching. The evaluation of the proposed method considers both the use of three contact-less publicly available hand databases, and the comparison of the performance to two competitive pattern recognition techniques existing in literature: namely Support Vector Machines (SVM and k-Nearest Neighbour (k-NN. Results highlight the fact that the proposed method outcomes existing approaches in literature in terms of computational cost, accuracy in human identification, number of extracted features and number of samples for template creation. The proposed method is a suitable solution for human identification in contact-less scenarios based on hand biometrics, providing a feasible solution to devices with limited hardware requirements like mobile devices.

  11. Comparing of athletic performance and biometric features of selected teenagers based on the specific talent identification pattern of Karate with elite athletes

    Directory of Open Access Journals (Sweden)

    seyed Ehsan Naghibi

    2017-12-01

    Conclusion: According to that no significant difference in both groups between athletic performance and biometric parameters except one variable, we can conclude that the process of talent identification in the club studied, in order to distinguish and talented people from other potentially effective. Also according to the native data used in the analysis of the tests in this process can be patterns of biometric indices based on talent and sport performance in karate developed.

  12. Template characterization and correlation algorithm created from segmentation for the iris biometric authentication based on analysis of textures implemented on a FPGA

    International Nuclear Information System (INIS)

    Giacometto, F J; Vilardy, J M; Torres, C O; Mattos, L

    2011-01-01

    Among the most used biometric signals to set personal security permissions, taker increasingly importance biometric iris recognition based on their textures and images of blood vessels due to the rich in these two unique characteristics that are unique to each individual. This paper presents an implementation of an algorithm characterization and correlation of templates created for biometric authentication based on iris texture analysis programmed on a FPGA (Field Programmable Gate Array), authentication is based on processes like characterization methods based on frequency analysis of the sample, and frequency correlation to obtain the expected results of authentication.

  13. Evaluation methodologies for security testing biometric systems beyond technological evaluation

    OpenAIRE

    Fernández Saavedra, María Belén

    2013-01-01

    The main objective of this PhD Thesis is the specification of formal evaluation methodologies for testing the security level achieved by biometric systems when these are working under specific contour conditions. This analysis is conducted through the calculation of the basic technical biometric system performance and its possible variations. To that end, the next two relevant contributions have been developed. The first contribution is the definition of two independent biometric performance ...

  14. Joint Sparse Representation for Robust Multimodal Biometrics Recognition

    Science.gov (United States)

    2014-01-01

    Biometrics with error term Finger 1 Finger 2 Finger 3 Finger ...Individual Biometrics without error term Finger 1 Finger 2 Finger 3 Finger 4 Iris 1 Iris 2 (a) (b) 20 40 60 80 100 120 140 160 180 200 220 60 65 70...75 80 85 90 95 Rank C um ul at iv e R ec og ni tio n R at e (% ) CMC Curve for Individual Biometrics using SLR Finger 1 Finger 2

  15. Towards the Security Evaluation of Biometric Authentication Systems

    OpenAIRE

    El-Abed , Mohamad; Giot , Romain; Hemery , Baptiste; Rosenberger , Christophe; Schwartzmann , Jean-Jacques

    2011-01-01

    International audience; Despite the obvious advantages of biometric authentication systems over traditional security ones (based on tokens or passwords), they are vulnerable to attacks which may considerably decrease their security. In order to contribute in resolving such problematic, we propose a modality-independent evaluation methodology for the security evaluation of biometric systems. It is based on the use of a database of common threats and vulnerabilities of biometric systems, and th...

  16. Multi-modal Behavioural Biometric Authentication for Mobile Devices

    OpenAIRE

    Saevanee , Hataichanok; Clarke , Nathan ,; Furnell , Steven ,

    2012-01-01

    Part 12: Authentication and Delegation; International audience; The potential advantages of behavioural biometrics are that they can be utilised in a transparent (non-intrusive) and continuous authentication system. However, individual biometric techniques are not suited to all users and scenarios. One way to increase the reliability of transparent and continuous authentication systems is create a multi-modal behavioural biometric authentication system. This research investigated three behavi...

  17. Biometric Authentication System using Non-Linear Chaos

    OpenAIRE

    Dr.N.Krishnan; A.Senthil Arumugam,

    2010-01-01

    A major concern nowadays for any Biometric Credential Management System is its potential vulnerability to protect its information sources; i.e. protecting a genuine user’s template from both internal and external threats. These days’ biometric authentication systems face various risks. One of the most serious threats is the ulnerability of the template's database. An attacker with access to a reference template could try to impersonate a legitimate user by reconstructing the biometric sample...

  18. Behavioural Biometrics for Multi-factor Authentication in Biomedicine

    Czech Academy of Sciences Publication Activity Database

    Schlenker, Anna; Šárek, M.

    2012-01-01

    Roč. 8, č. 5 (2012), s. 19-24 ISSN 1801-5603 Grant - others:GA MŠk(CZ) LM2010005; GA UK(CZ) SVV-2012-264513 Institutional support: RVO:67985807 Keywords : biometric s * anatomical-physiological biometric s * behavioural biometric s * multi-factor authentication * keystroke dynamics * mouse dynamics Subject RIV: IN - Informatics, Computer Science http://www.ejbi.org/img/ejbi/2012/5/Schlenker_en.pdf

  19. Biometric Security: Alternatif Pengendalian Dalam Sistem Informasi Akuntansi Terkomputerisasi

    OpenAIRE

    Tarigan, Josua

    2004-01-01

    As organization search more secure authentication method for user access, biometric security technology is gaining more and more attention. The implementation of biometric security technology in accounting information systems was physical access, virtual access, e-commerce applications and covert suveillance. There are three phase when an organization implementation biometric technology: strategic planning and budgeting, developing a system reliability plan and documentation. The challenges w...

  20. BIOMETRIC SECURITY: ALTERNATIF PENGENDALIAN DALAM SISTEM INFORMASI AKUNTANSI TERKOMPUTERISASI

    OpenAIRE

    Josua Tarigan

    2004-01-01

    As organization search more secure authentication method for user access, biometric security technology is gaining more and more attention. The implementation of biometric security technology in accounting information systems was physical access, virtual access, e-commerce applications and covert suveillance. There are three phase when an organization implementation biometric technology: strategic planning and budgeting, developing a system reliability plan and documentation. The challenges w...

  1. Prospects of Biometrics at-a-Distance

    Science.gov (United States)

    2015-09-01

    face or fingerprint. For instance, light levels affect the ability of the sensor to collect accurate imagery (Pato & Millet , 2010). When conducting...accurate data on a subject given environmental or hardware restraints (Pato & Millet , 2010). These issues degrade biometric system capabilities when...where the arch pattern looks more like a hill with ridges entering from one side, moving across the finger while rising, then falling and exiting the

  2. A biometric approach to laboratory rodent identification.

    Science.gov (United States)

    Cameron, Jens; Jacobson, Christina; Nilsson, Kenneth; Rögnvaldsson, Thorsteinn

    2007-03-01

    Individual identification of laboratory rodents typically involves invasive methods, such as tattoos, ear clips, and implanted transponders. Beyond the ethical dilemmas they may present, these methods may cause pain or distress that confounds research results. The authors describe a prototype device for biometric identification of laboratory rodents that would allow researchers to identify rodents without the complications of other methods. The device, which uses the rodent's ear blood vessel pattern as the identifier, is fast, automatic, noninvasive, and painless.

  3. Device for biometric verification of maternity

    OpenAIRE

    Lalović Komlen; Milosavljević Milan; Tot Ivan; Maček Nemanja

    2015-01-01

    Biometry is the scientific discipline and technology that measures and analyzes physiological or behavioral characteristics of people and is widely deployed in modern society security systems. Device for biometric identification of maternity is a dual fingerprint scanner that acquires fingerprint templates of the mother and the child at the very moment of birth, generates unique ID reference, and further guarantees mother-child relationship with that refere...

  4. A Study on EMG-based Biometrics

    OpenAIRE

    Jin Su Kim; Sung Bum Pan

    2017-01-01

    Biometrics is a technology that recognizes user's information by using unique physical features of his or her body such as face, fingerprint, and iris. It also uses behavioral features such as signature, electrocardiogram (ECG), electromyogram (EMG), and electroencephalogram (EEG). Among them, the EMG signal is a sign generated when the muscles move, which can be used in various fields such as motion recognition, personal identification, and disease diagnosis. In this paper, we analyze EMG-ba...

  5. Biometric Methods for Application in Biomedicine

    Czech Academy of Sciences Publication Activity Database

    Schlenker, Anna; Šárek, Milan

    2011-01-01

    Roč. 7, č. 1 (2011), s. 37-43 ISSN 1801-5603 R&D Projects: GA MŠk(CZ) 1M06014 Institutional research plan: CEZ:AV0Z10300504 Keywords : biometrics * data security * EHR ( electronic health record ) * fingerprints * hand geometry * face recognition * iris recognition * retinal scanning * keystroke dynamics * multi-factor authentification Subject RIV: IN - Informatics, Computer Science http://www.ejbi.eu/images/2011-1/Schlenker_en.pdf

  6. Iris analysis for biometric recognition systems

    CERN Document Server

    Bodade, Rajesh M

    2014-01-01

    The book presents three most significant areas in Biometrics and Pattern Recognition. A step-by-step approach for design and implementation of Dual Tree Complex Wavelet Transform (DTCWT) plus Rotated Complex Wavelet Filters (RCWF) is discussed in detail. In addition to the above, the book provides detailed analysis of iris images and two methods of iris segmentation. It also discusses simplified study of some subspace-based methods and distance measures for iris recognition backed by empirical studies and statistical success verifications.

  7. Heart Electrical Actions as Biometric Indicia

    Science.gov (United States)

    Schipper, John F. (Inventor); Dusan, Sorin V. (Inventor); Jorgensen, Charles C. (Inventor); Belousof, Eugene (Inventor)

    2013-01-01

    A method and associated system for use of statistical parameters based on peak amplitudes and/or time interval lengths and/or depolarization-repolarization vector angles and/or depolarization-repolarization vector lengths for PQRST electrical signals associated with heart waves, to identify a person. The statistical parameters, estimated to be at least 192, serve as biometric indicia, to authenticate, or to decline to authenticate, an asserted identity of a candidate person.

  8. The healing stages of an intramedullary implanted tibia: A stress strain comparative analysis of the calcification process

    Science.gov (United States)

    Filardi, Vincenzo

    2015-01-01

    Aims The extended usage of unreamed tibial nailing resulted in reports of an increased rate of complications, especially for the distal portion of the tibia. Unreamed nailing favours biology at the expense of the achievable mechanical stability, it is therefore of interest to define the limits of the clinical indications for this method. Extra-articular fractures of the distal tibial metaphysis, meta-diaphyseal junction, and adjacent diaphysis are distinct in their management from impaction derived ‘‘pilon’’ type fractures and mid-diaphyseal fractures. The goals of this work were to gain a thorough understanding of the load-sharing mechanism between unreamed nail and bones in a fractured tibia. With this purpose a complete model of the human leg was realised, simulating a mid-diaphyseal fracture, classified as A2 type 1, according to the AO classification. The analysis of the entire chain allows to have a complete picture of the stress distribution and of the most stressed bones and soft tissues, but, more importantly can overcome problems connected with boundary conditions imposed at single bony components. Methods Model consists of six bony structures: pelvis, femur, patella, fibula, tibia, and a simplified lump of the feet, configured in a standing up position. Their articular cartilage layers, were simulated by 3D membranes of opportune stiffness connecting the different segments. Moreover an unreamed intra-medullary nail Expert Tibial Nail (DePuy Synthes®) stabilized the fractured tibia. A load of 700 N has been applied at the top of pelvis and a part the feet, at the tip, was rigidly fixed. Five different contact interfaces have been imposed at the different bony surfaces in contact. Results Three different conditions were analysed: the initially healthy tibia, the A2 type 1 fractured tibia with the Expert tibial nail implanted, and the follow up stage after complete healing of tibia. Non-linear finite element analysis of the models were performed

  9. Prescription for herbal healing

    National Research Council Canada - National Science Library

    Balch, Phyllis A; Bell, Stacey J

    2012-01-01

    .... From the most trusted name in natural healing, Phyllis A. Balch's new edition of Prescription for Herbal Healing provides the most current research and comprehensive facts in an easy-to-read A- to-Z format, including...

  10. Robust and Secure Watermarking Using Sparse Information of Watermark for Biometric Data Protection

    OpenAIRE

    Rohit M Thanki; Ved Vyas Dwivedi; Komal Borisagar

    2016-01-01

    Biometric based human authentication system is used for security purpose in many organizations in the present world. This biometric authentication system has several vulnerable points. Two of vulnerable points are protection of biometric templates at system database and protection of biometric templates at communication channel between two modules of biometric authentication systems. In this paper proposed a robust watermarking scheme using the sparse information of watermark biometric to sec...

  11. Optical coherence tomography used for internal biometrics

    Science.gov (United States)

    Chang, Shoude; Sherif, Sherif; Mao, Youxin; Flueraru, Costel

    2007-06-01

    Traditional biometric technologies used for security and person identification essentially deal with fingerprints, hand geometry and face images. However, because all these technologies use external features of human body, they can be easily fooled and tampered with by distorting, modifying or counterfeiting these features. Nowadays, internal biometrics which detects the internal ID features of an object is becoming increasingly important. Being capable of exploring under-skin structure, optical coherence tomography (OCT) system can be used as a powerful tool for internal biometrics. We have applied fiber-optic and full-field OCT systems to detect the multiple-layer 2D images and 3D profile of the fingerprints, which eventually result in a higher discrimination than the traditional 2D recognition methods. More importantly, the OCT based fingerprint recognition has the ability to easily distinguish artificial fingerprint dummies by analyzing the extracted layered surfaces. Experiments show that our OCT systems successfully detected the dummy, which was made of plasticene and was used to bypass the commercially available fingerprint scanning system with a false accept rate (FAR) of 100%.

  12. Improving Speaker Recognition by Biometric Voice Deconstruction

    Directory of Open Access Journals (Sweden)

    Luis Miguel eMazaira-Fernández

    2015-09-01

    Full Text Available Person identification, especially in critical environments, has always been a subject of great interest. However, it has gained a new dimension in a world threatened by a new kind of terrorism that uses social networks (e.g. YouTube to broadcast its message. In this new scenario, classical identification methods (such fingerprints or face recognition have been forcedly replaced by alternative biometric characteristics such as voice, as sometimes this is the only feature available. Through the present paper, a new methodology to characterize speakers will be shown. This methodology is benefiting from the advances achieved during the last years in understanding and modelling voice production. The paper hypothesizes that a gender dependent characterization of speakers combined with the use of a new set of biometric parameters extracted from the components resulting from the deconstruction of the voice into its glottal source and vocal tract estimates, will enhance recognition rates when compared to classical approaches. A general description about the main hypothesis and the methodology followed to extract gender-dependent extended biometric parameters are given. Experimental validation is carried out both on a highly controlled acoustic condition database, and on a mobile phone network recorded under non-controlled acoustic conditions.

  13. Biometric technology authentication, biocryptography, and cloud-based architecture

    CERN Document Server

    Das, Ravi

    2014-01-01

    Most biometric books are either extraordinarily technical for technophiles or extremely elementary for the lay person. Striking a balance between the two, Biometric Technology: Authentication, Biocryptography, and Cloud-Based Architecture is ideal for business, IT, or security managers that are faced with the task of making purchasing, migration, or adoption decisions. It brings biometrics down to an understandable level, so that you can immediately begin to implement the concepts discussed.Exploring the technological and social implications of widespread biometric use, the book considers the

  14. Biometric templates selection and update using quality measures

    Science.gov (United States)

    Abboud, Ali J.; Jassim, Sabah A.

    2012-06-01

    To deal with severe variation in recording conditions, most biometric systems acquire multiple biometric samples, at the enrolment stage, for the same person and then extract their individual biometric feature vectors and store them in the gallery in the form of biometric template(s), labelled with the person's identity. The number of samples/templates and the choice of the most appropriate templates influence the performance of the system. The desired biometric template(s) selection technique must aim to control the run time and storage requirements while improving the recognition accuracy of the biometric system. This paper is devoted to elaborating on and discussing a new two stages approach for biometric templates selection and update. This approach uses a quality-based clustering, followed by a special criterion for the selection of an ultimate set of biometric templates from the various clusters. This approach is developed to select adaptively a specific number of templates for each individual. The number of biometric templates depends mainly on the performance of each individual (i.e. gallery size should be optimised to meet the needs of each target individual). These experiments have been conducted on two face image databases and their results will demonstrate the effectiveness of proposed quality-guided approach.

  15. Voice Biometrics over the Internet in the Framework of COST Action 275

    Directory of Open Access Journals (Sweden)

    Evans Nicholas WD

    2004-01-01

    Full Text Available The emerging field of biometric authentication over the Internet requires both robust person authentication and secure computer network protocols. This paper presents investigations of vocal biometric person authentication over the Internet, both at the protocol and authentication robustness levels. As part of this study, an appropriate client-server architecture for biometrics on the Internet is proposed and implemented. It is shown that the transmission of raw biometric data in this application is likely to result in unacceptably long delays in the process. On the other hand, by using data models (or features, the transmission time can be reduced to an acceptable level. The use of encryption/decryption for enhancing the data security in the proposed client-server link and its effects on the transmission time are also examined. Furthermore, the scope of the investigations includes an analysis of the effects of packet loss and speech coding on speaker verification performance. It is experimentally demonstrated that whilst the adverse effects of packet loss can be negligible, the encoding of speech, particularly at a low bit rate, can reduce the verification accuracy considerably. The paper details the experimental investigations conducted and presents an analysis of the results.

  16. A user authentication scheme using physiological and behavioral biometrics for multitouch devices.

    Science.gov (United States)

    Koong, Chorng-Shiuh; Yang, Tzu-I; Tseng, Chien-Chao

    2014-01-01

    With the rapid growth of mobile network, tablets and smart phones have become sorts of keys to access personal secured services in our daily life. People use these devices to manage personal finances, shop on the Internet, and even pay at vending machines. Besides, it also helps us get connected with friends and business partners through social network applications, which were widely used as personal identifications in both real and virtual societies. However, these devices use inherently weak authentication mechanism, based upon passwords and PINs that is not changed all the time. Although forcing users to change password periodically can enhance the security level, it may also be considered annoyances for users. Biometric technologies are straightforward because of the simple authentication process. However, most of the traditional biometrics methodologies require diverse equipment to acquire biometric information, which may be expensive and not portable. This paper proposes a multibiometric user authentication scheme with both physiological and behavioral biometrics. Only simple rotations with fingers on multitouch devices are required to enhance the security level without annoyances for users. In addition, the user credential is replaceable to prevent from the privacy leakage.

  17. A User Authentication Scheme Using Physiological and Behavioral Biometrics for Multitouch Devices

    Science.gov (United States)

    Koong, Chorng-Shiuh; Tseng, Chien-Chao

    2014-01-01

    With the rapid growth of mobile network, tablets and smart phones have become sorts of keys to access personal secured services in our daily life. People use these devices to manage personal finances, shop on the Internet, and even pay at vending machines. Besides, it also helps us get connected with friends and business partners through social network applications, which were widely used as personal identifications in both real and virtual societies. However, these devices use inherently weak authentication mechanism, based upon passwords and PINs that is not changed all the time. Although forcing users to change password periodically can enhance the security level, it may also be considered annoyances for users. Biometric technologies are straightforward because of the simple authentication process. However, most of the traditional biometrics methodologies require diverse equipment to acquire biometric information, which may be expensive and not portable. This paper proposes a multibiometric user authentication scheme with both physiological and behavioral biometrics. Only simple rotations with fingers on multitouch devices are required to enhance the security level without annoyances for users. In addition, the user credential is replaceable to prevent from the privacy leakage. PMID:25147864

  18. A User Authentication Scheme Using Physiological and Behavioral Biometrics for Multitouch Devices

    Directory of Open Access Journals (Sweden)

    Chorng-Shiuh Koong

    2014-01-01

    Full Text Available With the rapid growth of mobile network, tablets and smart phones have become sorts of keys to access personal secured services in our daily life. People use these devices to manage personal finances, shop on the Internet, and even pay at vending machines. Besides, it also helps us get connected with friends and business partners through social network applications, which were widely used as personal identifications in both real and virtual societies. However, these devices use inherently weak authentication mechanism, based upon passwords and PINs that is not changed all the time. Although forcing users to change password periodically can enhance the security level, it may also be considered annoyances for users. Biometric technologies are straightforward because of the simple authentication process. However, most of the traditional biometrics methodologies require diverse equipment to acquire biometric information, which may be expensive and not portable. This paper proposes a multibiometric user authentication scheme with both physiological and behavioral biometrics. Only simple rotations with fingers on multitouch devices are required to enhance the security level without annoyances for users. In addition, the user credential is replaceable to prevent from the privacy leakage.

  19. Dynamic detection-rate-based bit allocation with genuine interval concealment for binary biometric representation.

    Science.gov (United States)

    Lim, Meng-Hui; Teoh, Andrew Beng Jin; Toh, Kar-Ann

    2013-06-01

    Biometric discretization is a key component in biometric cryptographic key generation. It converts an extracted biometric feature vector into a binary string via typical steps such as segmentation of each feature element into a number of labeled intervals, mapping of each interval-captured feature element onto a binary space, and concatenation of the resulted binary output of all feature elements into a binary string. Currently, the detection rate optimized bit allocation (DROBA) scheme is one of the most effective biometric discretization schemes in terms of its capability to assign binary bits dynamically to user-specific features with respect to their discriminability. However, we learn that DROBA suffers from potential discriminative feature misdetection and underdiscretization in its bit allocation process. This paper highlights such drawbacks and improves upon DROBA based on a novel two-stage algorithm: 1) a dynamic search method to efficiently recapture such misdetected features and to optimize the bit allocation of underdiscretized features and 2) a genuine interval concealment technique to alleviate crucial information leakage resulted from the dynamic search. Improvements in classification accuracy on two popular face data sets vindicate the feasibility of our approach compared with DROBA.

  20. Interfacial self-healing of nanocomposite hydrogels: Theory and experiment

    Science.gov (United States)

    Wang, Qiming; Gao, Zheming; Yu, Kunhao

    2017-12-01

    Polymers with dynamic bonds are able to self-heal their fractured interfaces and restore the mechanical strengths. It is largely elusive how to analytically model this self-healing behavior to construct the mechanistic relationship between the self-healing properties (e.g., healed interfacial strength and equilibrium healing time) and the material compositions and healing conditions. Here, we take a self-healable nanocomposite hydrogel as an example to illustrate an interfacial self-healing theory for hydrogels with dynamic bonds. In the theory, we consider the free polymer chains diffuse across the interface and reform crosslinks to bridge the interface. We analytically reveal that the healed strengths of nanocomposite hydrogels increase with the healing time in an error-function-like form. The equilibrium self-healing time of the full-strength recovery decreases with the temperature and increases with the nanoparticle concentration. We further analytically reveal that the healed interfacial strength decreases with increasing delaying time before the healing process. The theoretical results quantitatively match with our experiments on nanosilica hydrogels, and also agree well with other researchers' experiments on nanoclay hydrogels. We expect that this theory would open promising avenues for quantitative understanding of the self-healing mechanics of various polymers with dynamic bonds, and offer insights for designing high-performance self-healing polymers.

  1. BIOMETRIC IDENTITY VERIFICATION IN HEALTH SERVICES: A BIOMETRIC SURVEILLANCE PRACTICE IN TURKEY

    Directory of Open Access Journals (Sweden)

    İlker ŞİRİN

    2014-08-01

    Full Text Available Determination or verification of identity with biometric methods has a widespread use especially at borders for security reasons. Social Security Institution transferred the biometric identity verification practice to health sercives that are provided by private and university hospitals. The risks of the new system considering the privacy of personal data are under debate. Although there are announcements or manuals of Social Security Institution regarding the implementation and legislation for data sharing and security exists, lack of a national data protection law brings with it security gaps.

  2. Molecular pathology of wound healing.

    Science.gov (United States)

    Kondo, Toshikazu; Ishida, Yuko

    2010-12-15

    Skin-wound healing is an orchestrated biological phenomena consisting of three sequential phases, inflammation, proliferation, and maturation. Many biological substances are involved in the process of wound repair, and this short and simplified overview of wound healing can be adopted to determine wound vitality or wound age in forensic medicine. With the development of genetically engineered animals, essential molecules for skin-wound healing have been identified. Especially, cytokines, and growth factors are useful candidates and markers for the determination of wound vitality or age. Moreover, bone marrow-derived progenitor cells would give significant information to wound age determination. In this review article, some interesting observations are presented, possibly contributing to the future practice of forensic pathologists. Copyright © 2010. Published by Elsevier Ireland Ltd.

  3. Interior design and healing architecture

    DEFF Research Database (Denmark)

    Mogensen, Jeppe; Poulsen, Søren Bolvig; Hansen, Allan Grutt

    2015-01-01

    . Through a mixed-method study, 43 patients from the outpatient-lung department at Hospital Vendsyssel, Denmark were presented with different types of furniture and materials and were asked about their preferences. Additional questions on their experience of the hospital interior were asked to guide......Hospital design is today influenced by the design concept healing architecture, stating that the patients’ healing process is promoted through accommodating physical surroundings. However, despite the increasing amount of research in the field of healing architecture, research on interior design...... and materials are rather limited. To compliment research in hospital interior design with particular focus on the use of interior textiles, this pilot study explores if the patients’ preferences for more home-like hospital interiors can be linked to a preference for textile-based furniture and materials...

  4. On the Design of Forgiving Biometric Security Systems

    Science.gov (United States)

    Phan, Raphael C.-W.; Whitley, John N.; Parish, David J.

    This work aims to highlight the fundamental issue surrounding biometric security systems: it’s all very nice until a biometric is forged, but what do we do after that? Granted, biometric systems are by physical nature supposedly much harder to forge than other factors of authentication since biometrics on a human body are by right unique to the particular human person. Yet it is also due to this physical nature that makes it much more catastrophic when a forgery does occur, because it implies that this uniqueness has been forged as well, threatening the human individuality; and since crime has by convention relied on identifying suspects by biometric characteristics, loss of this biometric uniqueness has devastating consequences on the freedom and basic human rights of the victimized individual. This uniqueness forgery implication also raises the motivation on the adversary to forge since a successful forgery leads to much more impersonation situations when biometric systems are used i.e. physical presence at crime scenes, identification and access to security systems and premises, access to financial accounts and hence the ability to use the victim’s finances. Depending on the gains, a desperate highly motivated adversary may even resort to directly obtaining the victim’s biometric parts by force e.g. severing the parts from the victim’s body; this poses a risk and threat not just to the individual’s uniqueness claim but also to personal safety and well being. One may then wonder if it is worth putting one’s assets, property and safety into the hands of biometrics based systems when the consequences of biometric forgery far outweigh the consequences of system compromises when no biometrics are used.

  5. Identification of a transcriptional signature for the wound healing continuum

    OpenAIRE

    Peake, Matthew A; Caley, Mathew; Giles, Peter J; Wall, Ivan; Enoch, Stuart; Davies, Lindsay C; Kipling, David; Thomas, David W; Stephens, Phil

    2014-01-01

    There is a spectrum/continuum of adult human wound healing outcomes ranging from the enhanced (nearly scarless) healing observed in oral mucosa to scarring within skin and the nonhealing of chronic skin wounds. Central to these outcomes is the role of the fibroblast. Global gene expression profiling utilizing microarrays is starting to give insight into the role of such cells during the healing process, but no studies to date have produced a gene signature for this wound healing continuum. Mi...

  6. A Cross-Layer Biometric Recognition System for Mobile IoT Devices

    Directory of Open Access Journals (Sweden)

    Shayan Taheri

    2018-02-01

    Full Text Available A biometric recognition system is one of the leading candidates for the current and the next generation of smart visual systems. The visual system is the engine of the surveillance cameras that have great importance for intelligence and security purposes. These surveillance devices can be a target of adversaries for accomplishing various malicious scenarios such as disabling the camera in critical times or the lack of recognition of a criminal. In this work, we propose a cross-layer biometric recognition system that has small computational complexity and is suitable for mobile Internet of Things (IoT devices. Furthermore, due to the involvement of both hardware and software in realizing this system in a decussate and chaining structure, it is easier to locate and provide alternative paths for the system flow in the case of an attack. For security analysis of this system, one of the elements of this system named the advanced encryption standard (AES is infected by four different Hardware Trojansthat target different parts of this module. The purpose of these Trojans is to sabotage the biometric data that are under process by the biometric recognition system. All of the software and the hardware modules of this system are implemented using MATLAB and Verilog HDL, respectively. According to the performance evaluation results, the system shows an acceptable performance in recognizing healthy biometric data. It is able to detect the infected data, as well. With respect to its hardware results, the system may not contribute significantly to the hardware design parameters of a surveillance camera considering all the hardware elements within the device.

  7. Healing history? Aboriginal healing, historical trauma, and personal responsibility.

    Science.gov (United States)

    Waldram, James B

    2014-06-01

    What can an exploration of contemporary Aboriginal healing programs such as those offered in Canadian prisons and urban clinics tell us about the importance of history in understanding social and psychological pathology, and more significantly the salience of the concept of "historical trauma"? The form of Aboriginal "healing" that has emerged in recent decades to become dominant in many parts of the country is itself a reflection of historical processes and efforts to ameliorate the consequences of what is today often termed "historical trauma." In other words, contemporary notions of "healing" and the social, cultural, medical, and psychological disruption and distress caused by colonialism and captured in the term "historical trauma" have coevolved in an interdependent manner. I also argue that there is a tension between the attribution of this distress to both specific (e.g., residential schools) and generalized (e.g., colonialism) historical factors, as evident in the "historical trauma" concept, and the prevailing emphasis in many healing programs to encourage the individual to take personal responsibility for their situation and avoid attributing blame to other factors. I conclude that "historical trauma" represents an idiom of distress that captures a variety of historical and contemporary phenomena and which provides a language for expressing distress that is gaining currency, at least among scholars, and that the contemporary Aboriginal healing movement represents an effort to deal with the absence or failure of both "traditional" Aboriginal healing and government-sponsored medical and psychological services to adequately deal with this distress of colonialism. © The Author(s) 2013 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav.

  8. Different healing process of esophageal large mucosal defects by endoscopic mucosal dissection between with and without steroid injection in an animal model.

    Science.gov (United States)

    Nonaka, Kouichi; Miyazawa, Mitsuo; Ban, Shinichi; Aikawa, Masayasu; Akimoto, Naoe; Koyama, Isamu; Kita, Hiroto

    2013-04-25

    Stricture formation is one of the major complications after endoscopic removal of large superficial squamous cell neoplasms of the esophagus, and local steroid injections have been adopted to prevent it. However, fundamental pathological alterations related to them have not been well analyzed so far. The aim of this study was to analyze the time course of the healing process of esophageal large mucosal defects resulting in stricture formation and its modification by local steroid injection, using an animal model. Esophageal circumferential mucosal defects were created by endoscopic mucosal dissection (ESD) for four pigs. One pig was sacrificed five minutes after the ESD, and other two pigs were followed-up on endoscopy and sacrificed at the time of one week and three weeks after the ESD, respectively. The remaining one pig was followed-up on endoscopy with five times of local steroid injection and sacrificed at the time of eight weeks after the ESD. The esophageal tissues of all pigs were subjected to pathological analyses. For the pigs without steroid injection, the esophageal stricture was completed around three weeks after the ESD on both endoscopy and esophagography. Histopathological examination of the esophageal tissues revealed that spindle-shaped α-smooth muscle actin (SMA)-positive myofibroblasts arranged in a parallel fashion and extending horizontally were identified at the ulcer bed one week after the ESD, and increased contributing to formation of the stenotic luminal ridge covered with the regenerated epithelium three weeks after the ESD. The proper muscle layer of the stricture site was thinned with some myocytes which seemingly showed transition to the myofibroblast layer. By contrast, for the pig with steroid injection, esophageal stricture formation was not evident with limited appearance of the spindle-shaped myofibroblasts, instead, appearance of stellate or polygocal SMA-positive stromal cells arranged haphazardly in the persistent granulation

  9. Multi-biometric Liveness Detection – A New Perspective

    African Journals Online (AJOL)

    2016-12-01

    Dec 1, 2016 ... Basic Multi-biometric Authentication System was thought to have sealed the vulnerabilities ..... action of a real physical human being and not from a pattern ... of authentication is referred to as multi-biometric fusion, and such a ...

  10. Efficient and privacy-preserving biometric identification in cloud

    Directory of Open Access Journals (Sweden)

    Changhee Hahn

    2016-09-01

    Full Text Available With the rapid growth in the development of smart devices equipped with biometric sensors, client identification system using biometric traits are widely adopted across various applications. Among many biometric traits, fingerprint-based identification systems have been extensively studied and deployed. However, to adopt biometric identification systems in practical applications, two main obstacles in terms of efficiency and client privacy must be resolved simultaneously. That is, identification should be performed at an acceptable time, and only a client should have access to his/her biometric traits, which are not revocable if leaked. Until now, multiple studies have demonstrated successful protection of client biometric data; however, such systems lack efficiency that leads to excessive time utilization for identification. The most recently researched scheme shows efficiency improvements but reveals client biometric traits to other entities such as biometric database server. This violates client privacy. In this paper, we propose an efficient and privacy-preserving fingerprint identification scheme by using cloud systems. The proposed scheme extensively exploits the computation power of a cloud so that most of the laborious computations are performed by the cloud service provider. According to our experimental results on an Amazon EC2 cloud, the proposed scheme is faster than the existing schemes and guarantees client privacy by exploiting symmetric homomorphic encryption. Our security analysis shows that during identification, the client fingerprint data is not disclosed to the cloud service provider or fingerprint database server.

  11. Forensic biometrics: From two communities to one discipline

    NARCIS (Netherlands)

    Meuwly, Didier; Meuwly, Didier; Veldhuis, Raymond N.J.

    2012-01-01

    This article describes how the fields of biometrics and forensic science can contribute and benefit from each other. The aim is to foster the development of new methods and tools improving the current forensic biometric applications and allowing for the creation of new ones. The article begins with

  12. 21 CFR 1311.116 - Additional requirements for biometrics.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Additional requirements for biometrics. 1311.116 Section 1311.116 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE REQUIREMENTS FOR... for biometrics. (a) If one of the factors used to authenticate to the electronic prescription...

  13. Security analysis for biometric data in ID documents

    NARCIS (Netherlands)

    Schimke, S.; Kiltz, S.; Vielhauer, C.; Kalker, A.A.C.M.

    2005-01-01

    In this paper we analyze chances and challenges with respect to the security of using biometrics in ID documents. We identify goals for ID documents, set by national and international authorities, and discuss the degree of security, which is obtainable with the inclusion of biometric into documents

  14. Practical considerations in privacy preserving biometric face recognition algorithms

    NARCIS (Netherlands)

    Papatsimpa, Ch.; de Groot, J.; Linnartz, J.-P.

    2013-01-01

    The popularity of authentication via fingerprints, iris, face or other biometric features is growing. Hence there is an increasing need to allow a wide variety of verifying parties to have access to biometric template (or reference) data. In this paper, we discuss solutions to ensure that in a

  15. A study of dorsal vein pattern for biometric security

    African Journals Online (AJOL)

    Nafiisah

    ensure more reliable security, many biometric verification techniques have been developed .... 3.0 HA D DORSAL VEI PATTER AS A BIOMETRIC ... image for the back of the hand, and converted by a computer into a digital image that can be.

  16. Semiparametric copula models for biometric score level fusion

    NARCIS (Netherlands)

    Susyanto, N.

    2016-01-01

    In biometric recognition, biometric samples (images of faces, fingerprints, voices, gaits, etc.) of people are compared and matchers (classifiers) indicate the level of similarity between any pair of samples by a score. If we model the joint distribution of all scores by a (semiparametric) Gaussian

  17. Towards User Acceptance of Biometric Technology in E-Government: A Survey Study in the Kingdom of Saudi Arabia

    Science.gov (United States)

    Alhussain, Thamer; Drew, Steve

    The paper discussed an exploratory study of government employees’ perceptions of the introduction of biometric authentication at the workplace in the Kingdom of Saudi Arabia. We suggest that studying the factors affecting employees’ acceptance of new technology will help ease the adoption of biometric technology in other e-government applications. A combination of survey and interviews was used to collect the required data. Interviews were conducted with managers and questionnaires were given to employees from two different government organisations in the Kingdom of Saudi Arabia to investigate the employees’ perceptions of using biometrics. The results of this study indicate a significant digital and cultural gap between the technological awareness of employees and the preferred authentication solutions promoted by management. A lack of trust in technology, its potential for misuse and management motives reflect the managers’ need to consider their responsibilities for narrowing these gaps. It was apparent that overcoming employees’ resistance is an essential issue facing biometric implementation. Based on the research we recommend that an awareness and orientation process about biometrics should take place before the technology is introduced into the organisation.

  18. Fixation compliance in a mouse osteotomy model induces two different processes of bone healing but does not lead to delayed union

    NARCIS (Netherlands)

    Gröngröft, I.; Heil, P.H.; Matthys, R.; Lezuo, P.; Tami, A.E.; Perren, S.; Montavon, P.M.; Ito, K.

    2009-01-01

    Delayed unions are a problematic complication of fracture healing whose pathophysiology is not well understood. Advanced molecular biology methods available with mice would be advantageous for investigation. In humans, decreased fixation rigidity and poor reduction are generally associated with

  19. Identification of a transcriptional signature for the wound healing continuum.

    Science.gov (United States)

    Peake, Matthew A; Caley, Mathew; Giles, Peter J; Wall, Ivan; Enoch, Stuart; Davies, Lindsay C; Kipling, David; Thomas, David W; Stephens, Phil

    2014-01-01

    There is a spectrum/continuum of adult human wound healing outcomes ranging from the enhanced (nearly scarless) healing observed in oral mucosa to scarring within skin and the nonhealing of chronic skin wounds. Central to these outcomes is the role of the fibroblast. Global gene expression profiling utilizing microarrays is starting to give insight into the role of such cells during the healing process, but no studies to date have produced a gene signature for this wound healing continuum. Microarray analysis of adult oral mucosal fibroblast (OMF), normal skin fibroblast (NF), and chronic wound fibroblast (CWF) at 0 and 6 hours post-serum stimulation was performed. Genes whose expression increases following serum exposure in the order OMF healing phenotype (the dysfunctional healing group), whereas genes with the converse pattern are potentially associated with a positive/preferential healing phenotype (the enhanced healing group). Sixty-six genes in the enhanced healing group and 38 genes in the dysfunctional healing group were identified. Overrepresentation analysis revealed pathways directly and indirectly associated with wound healing and aging and additional categories associated with differentiation, development, and morphogenesis. Knowledge of this wound healing continuum gene signature may in turn assist in the therapeutic assessment/treatment of a patient's wounds. © 2014 The Authors. Wound Repair and Regeneration published by Wiley Periodicals, Inc. on behalf of Wound Healing Society.

  20. Faith healing and faith in healing.

    Science.gov (United States)

    Gopichandran, Vijayaprasad

    2015-01-01

    Sarkar and Seshadri have presented an interesting paper in this issue on the ethical approach that a physician should take when faced with requests for faith healing (1). The paper describes four approaches that the physician can take. These are rejecting the request, keeping oneself detached from the issue, endorsing the request and trying to understand the practices concerned so as to make a reasoned decision. This commentary attempts to explore the issue of faith healing further, from the point of view of clinical care. It shall discuss five important dimensions which can supplement the arguments by Sarkar and Seshadri. These are the concepts of faith, spirituality and religion and faith healing; the difference between cure and healing; patient-centred care; the various factors influencing a doctor's response to requests for faith healing; and finally, the ethical issues to be considered while making a decision. Before launching into the discussion, it should be made clear that this commentary refers mainly to those faith healing practices which are not overtly harmful, such as prayers, and wearing rings and amulets.

  1. Unobtrusive Multimodal Biometric Authentication: The HUMABIO Project Concept

    Directory of Open Access Journals (Sweden)

    Evangelos Bekiaris

    2008-03-01

    Full Text Available Human Monitoring and Authentication using Biodynamic Indicators and Behavioural Analysis (HUMABIO (2007 is an EU Specific Targeted Research Project (STREP where new types of biometrics are combined with state of the art sensorial technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system which utilizes a biodynamic physiological profile, unique for each individual, and advancements of the state-of-the art in behavioural and other biometrics, such as face, speech, gait recognition, and seat-based anthropometrics. Several shortcomings in biometric authentication will be addressed in the course of HUMABIO which will provide the basis for improving existing sensors, develop new algorithms, and design applications, towards creating new, unobtrusive biometric authentication procedures in security sensitive, controlled environments. This paper presents the concept of this project, describes its unobtrusive authentication demonstrator, and reports some preliminary results.

  2. Can visual evoked potentials be used in biometric identification?

    Science.gov (United States)

    Power, Alan J; Lalor, Edmund C; Reilly, Richard B

    2006-01-01

    Due to known differences in the anatomical structure of the visual pathways and generators in different individuals, the use of visual evoked potentials offers the possibility of an alternative to existing biometrics methods. A study based on visual evoked potentials from 13 individuals was carried out to assess the best combination of temporal, spectral and AR modeling features to realize a robust biometric. From the results it can be concluded that visual evoked potentials show considerable biometric qualities, with classification accuracies reaching a high of 86.54% and that a specific temporal and spectral combination was found to be optimal. Based on these results the visual evoked potential may be a useful tool in biometric identification when used in conjunction with more established biometric methods.

  3. Advances in biometrics for secure human authentication and recognition

    CERN Document Server

    Kisku, Dakshina Ranjan; Sing, Jamuna Kanta

    2013-01-01

    GENERAL BIOMETRICSSecurity and Reliability Assessment for Biometric Systems; Gayatri MirajkarReview of Human Recognition Based on Retinal Images; Amin DehghaniADVANCED TOPICS IN BIOMETRICSVisual Speech as Behavioral Biometric; Preety Singh, Vijay Laxmi, and Manoj Singh GaurHuman Gait Signature for Biometric Authentication; Vijay JohnHand-Based Biometric for Personal Identification Using Correlation Filter Classifier; Mohammed Saigaa , Abdallah Meraoumia , Salim Chitroub, and Ahmed BouridaneOn Deciding the Dynamic Periocular Boundary for Human Recognition; Sambit Bakshi , Pankaj Kumar Sa, and Banshidhar MajhiRetention of Electrocardiogram Features Insignificantly Devalorized as an Effect of Watermarking for a Multimodal Biometric Authentication System; Nilanjan Dey, Bijurika Nandi, Poulami Das, Achintya Das, and Sheli Sinha ChaudhuriFacial Feature Point Extraction for Object Identification Using Discrete Contourlet Transform and Principal Component Analysis; N. G. Chitaliya and A. I. TrivediCASE STUDIES AND LA...

  4. On humanitarian refugee biometrics and new forms of intervention

    DEFF Research Database (Denmark)

    Jacobsen, Katja Lindskov

    2017-01-01

    This article traces a development from UNHCR's initial use of biometrics in a few pilot projects (early/mid-2000s), to the emergence of a UNHCR policy where biometric registration is considered a "strategic decision". Next it engages key insights from current debates about 'materiality' and agentic...... capacity in combination with current debates about new forms of intervention. Finally, these insights are combined into a framework through which the last part of the article engages critically with this development of humanitarian refugee biometrics by posing the following question: how does an approach...... biometric refugee data, has affected the relationship between UNHCR, donor states, host states and refugees, the article shows how UNHCR's trialling of new biometric technologies, combined with actual and potential data-sharing practices, has advanced the technology's performance as well as its...

  5. Are Haar-like Rectangular Features for Biometric Recognition Reducible?

    DEFF Research Database (Denmark)

    Nasrollahi, Kamal; Moeslund, Thomas B.

    2013-01-01

    Biometric recognition is still a very difficult task in real-world scenarios wherein unforeseen changes in degradations factors like noise, occlusion, blurriness and illumination can drastically affect the extracted features from the biometric signals. Very recently Haar-like rectangular features...... which have usually been used for object detection were introduced for biometric recognition resulting in systems that are robust against most of the mentioned degradations [9]. The problem with these features is that one can define many different such features for a given biometric signal...... and it is not clear whether all of these features are required for the actual recognition or not. This is exactly what we are dealing with in this paper: How can an initial set of Haar-like rectangular features, that have been used for biometric recognition, be reduced to a set of most influential features...

  6. Enzymetically regulating the self-healing of protein hydrogels with high healing efficiency.

    Science.gov (United States)

    Gao, Yuzhou; Luo, Quan; Qiao, Shanpeng; Wang, Liang; Dong, Zeyuan; Xu, Jiayun; Liu, Junqiu

    2014-08-25

    Enzyme-mediated self-healing of dynamic covalent bond-driven protein hydrogels was realized by the synergy of two enzymes, glucose oxidase (GOX) and catalase (CAT). The reversible covalent attachment of glutaraldehyde to lysine residues of GOX, CAT, and bovine serum albumin (BSA) led to the formation and functionalization of the self-healing protein hydrogel system. The enzyme-mediated protein hydrogels exhibit excellent self-healing properties with 100% recovery. The self-healing process was reversible and effective with an external glucose stimulus at room temperature. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  7. Healing through prayer: a qualitative study.

    Science.gov (United States)

    Helming, Mary Blaszko

    2011-01-01

    A qualitative study using a semistructured interview process explored the experience of being healed through prayer in 20 participants from several Protestant Christian faith traditions. Five cluster themes and their subthemes were identified, such as Spirituality and Suffering (subthemes of Purpose of Suffering and Spiritual Meaning of Suffering); The Healing Experience (subthemes of Problems that Were Healed, Incomplete Healings or Recurrences, and Healing of Friends and Family Members); The Connecting Network of Prayer (subthemes of Connection to God, Connection to Others, Meaning of Prayer, Methods of Prayer, and Unanswered Prayer); Spiritual Transformation of Prayer (subthemes of Changed Lives and Sense of Purpose); and Spiritual Phenomena (subthemes of Sense of God's Presence, Use of Complementary and Alternative Practices, and Mysterious Phenomena).

  8. Security and privacy in biometrics

    CERN Document Server

    Campisi, Patrizio

    2013-01-01

    This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and features: presents a unique focus on novel approaches and new architectures for unimodal and multimodal template protection; examines signal processing techniques in the encrypted domain, security and privacy leakage assessment, and aspects of standardizati

  9. Enhanced biometric access control for mobile devices

    CSIR Research Space (South Africa)

    Brown, Dane

    2017-09-01

    Full Text Available is investigated to determine whether it is comparable to the well-established face biometric. The rest of the paper is organized as follows: Section II presents related face, iris and fused systems found in the literature. Section III discusses the construction.... This diagram is referred to throughout this section, in which the different phases of the system are explained. A. Feature Detection 1) Face: An initial region of interest (ROI) is determined by detecting the face by classifying Histogram of Gaussian (HoG...

  10. [Personal identification with biometric and genetic methods].

    Science.gov (United States)

    Cabanis, Emmanuel-Alain; Le Gall, Jean-Yves; Ardaillou, Raymond

    2007-11-01

    The need for personal identification is growing in many avenues of society. To "identify" a person is to establish a link between his or her observed characteristics and those previously stored in a database. To "authenticate" is to decide whether or not someone is the person he or she claims to be. These two objectives can now be achieved by analysing biometric data and genetic prints. All biometric techniques proceed in several stages: acquisition of an image or physical parameters, encoding them with a mathematical model, comparing the results of this model with those contained in the database, and calculating the error risk. These techniques must be usable worldwide and must examine specific and permanent personal data. The most widely used are facial recognition, digital prints (flexion folds and dermatoglyphs, that offer the advantage of leaving marks), and the surface and texture of the iris. Other biometric techniques analyse behaviours such as walking, signing, typing, or speaking. Implanted radio-transmitters are another means of identification. All these systems are evaluated on the basis of the same parameters, namely the false rejection rate, the false acceptance rate, and the failure-to-enrol rate. The uses of biometrics are increasing and diversifying, and now include national and international identification systems, control of access to protected sites, criminal and victim identification, and transaction security. Genetic methods can identify individuals almost infallibly, based on short tandem repeats of 2-5 nucleotides, or microsatellites. The most recent kits analyze 11-16 independent autosomal markers. Mitochondrial DNA and Y chromosome DNA can also be analyzed. These genetic tests are currently used to identify suspected criminals or their victims from biological samples, and to establish paternity. Personal identification raises many ethical questions, however, such as when to create and how to use a database while preserving personal freedom

  11. Biometry, biometrics, biostatistics, bioinformatics,..., bio-X.

    Science.gov (United States)

    Molenberghs, Geert

    2005-03-01

    Recent scientific evolutions force us to rethink our profession's position on the scientific map, in relation to our neighboring professions, the ones with which we traditionally have strong collaborative links as well as the newly emerging fields, but also within our own, diverse professional group. We will show that great inspiration can be drawn from our own history, in fact from the early days of the Society. A recent inspiring example has been set by the late Rob Kempton, who died suddenly just months before he was to become President of the International Biometric Society.

  12. Biometrics and Psychometrics: Origins, Commonalities and Differences

    Directory of Open Access Journals (Sweden)

    John Gower

    2016-09-01

    Full Text Available Starting with the common origins of biometrics and psychometrics at the beginning of the twentieth century, the paper compares and contrasts subsequent developments, informed by the author's 35 years at Rothamsted Experimental Station followed by a period with the data theory group in Leiden and thereafter. Although the methods used by biometricians and psychometricians have much in common, there are important differences arising from the different fields of study. Similar differences arise wherever data are generated and may be regarded as a major driving force in the development of statistical ideas.

  13. Secure Biometric E-Voting Scheme

    Science.gov (United States)

    Ahmed, Taha Kh.; Aborizka, Mohamed

    The implementation of the e-voting becomes more substantial with the rapid increase of e-government development. The recent growth in communications and cryptographic techniques facilitate the implementation of e-voting. Many countries introduced e-voting systems; unfortunately most of these systems are not fully functional. In this paper we will present an e-voting scheme that covers most of the e-voting requirements, smart card and biometric recognition technology were implemented to guarantee voter's privacy and authentication.

  14. Expression and activity levels of chymase in mast cells of burn wound tissues increase during the healing process in a hamster model.

    Science.gov (United States)

    Dong, Xianglin; Xu, Tao; Ma, Shaolin; Wen, Hao

    2015-06-01

    The present study aimed to investigate the changes in the expression levels and activity of mast cell chymase in the process of burn wound healing in a hamster model of deep second-degree burn. The hamster model was established by exposing a ~3 cm diameter area of bare skin to hot water (75°C) for 0, 6, 8, 10 or 12 sec. Tissue specimens were collected 24 h after burning and histological analysis revealed that hot water contact for 12 sec was required to produce a deep second-degree burn. Quantitative polymerase chain reaction and a radioimmunoassay were used to the determine changes in chymase mRNA expression levels and activity. The mRNA expression levels and activity of chymase were increased in the burn wound tissues when compared with the normal skin. However, no statistically significant differences were observed in mast cell chymase activity amongst the various post-burn stages. Chymase mRNA expression levels peaked at day 1 post-burn, subsequently decreasing at days 3 and 7 post-burn and finally increasing again at day 14 post-burn. In summary, a hamster model of deep second-degree burn can be created by bringing the skin into contact with water at 75°C for 12 sec. Furthermore, the mRNA expression levels and activity of chymase in the burn wound tissues increased when compared with those in normal skin tissues.

  15. Biometric verificaton and biometric identification of a person by methods of statistical analysis of digitized iris images

    Czech Academy of Sciences Publication Activity Database

    Machala, L.; Pospíšil, Jaroslav

    40-41, - (2001), s. 155-162 ISSN 0231-9365 Institutional research plan: CEZ:AV0Z1010921 Keywords : biometric verification * biometric idntification * human eye`s iris * statistical error of type I * statistical erroer II * charasteristic iris vector Subject RIV: BH - Optics, Masers, Lasers

  16. The meaning of healing: transcending suffering.

    Science.gov (United States)

    Egnew, Thomas R

    2005-01-01

    Medicine is traditionally considered a healing profession, but it has neither an operational definition of healing nor an explanation of its mechanisms beyond the physiological processes related to curing. The objective of this study was to determine a definition of healing that operationalizes its mechanisms and thereby identifies those repeatable actions that reliably assist physicians to promote holistic healing. This study was a qualitative inquiry consisting of in-depth, open-ended, semistructured interviews with Drs. Eric J. Cassell, Carl A. Hammerschlag, Thomas S. Inui, Elisabeth Kubler-Ross, Cicely Saunders, Bernard S. Siegel, and G. Gayle Stephens. Their perceptions regarding the definition and mechanisms of healing were subjected to grounded theory content analysis. Healing was associated with themes of wholeness, narrative, and spirituality. Healing is an intensely personal, subjective experience involving a reconciliation of the meaning an individual ascribes to distressing events with his or her perception of wholeness as a person. Healing may be operationally defined as the personal experience of the transcendence of suffering. Physicians can enhance their abilities as healers by recognizing, diagnosing, minimizing, and relieving suffering, as well as helping patients transcend suffering.

  17. Supporting the Maritime Information Dominance: Optimizing Tactical Network for Biometric Data Sharing in Maritime Interdiction Operations

    Science.gov (United States)

    2015-03-01

    biometric data collection. Capture role- player mock biometric data including finger prints, iris scans, and facial recognition photos. (MOC training...MARITIME INFORMATION DOMINANCE: OPTIMIZING TACTICAL NETWORK FOR BIOMETRIC DATA SHARING IN MARITIME INTERDICTION OPERATIONS by Adam R. Sinsel...MARITIME INFORMATION DOMINANCE: OPTIMIZING TACTICAL NETWORK FOR BIOMETRIC DATA SHARING IN MARITIME INTERDICTION OPERATIONS 6. AUTHOR(S) Adam R

  18. Privacy leakage in binary biometric systems : from gaussian to binary data

    NARCIS (Netherlands)

    Ignatenko, T.; Willems, F.M.J.; Campisi, P.

    2013-01-01

    In this chapter we investigate biometric key-binding systems for i.i.d. Gaussian biometric sources. In these systems two terminals observe two correlated biometric sequences. Moreover, a secret key, which is independent of the biometric sequences, is selected at the first terminal. The first

  19. Effect of low-level laser therapy on the healing process of donor site in patients with grade 3 burn ulcer after skin graft surgery (a randomized clinical trial).

    Science.gov (United States)

    Vaghardoost, Reza; Momeni, Mahnoush; Kazemikhoo, Nooshafarin; Mokmeli, Soheila; Dahmardehei, Mostafa; Ansari, Fereshteh; Nilforoushzadeh, Mohammad Ali; Sabr Joo, Parisa; Mey Abadi, Sara; Naderi Gharagheshlagh, Soheila; Sassani, Saeed

    2018-04-01

    Skin graft is a standard therapeutic technique in patients with deep ulcers, but managing donor site after grafting is very important. Although several modern dressings are available to enhance the comfort of donor site, using techniques that accelerate wound healing may enhance patient satisfaction. Low-level laser therapy (LLLT) has been used in several medical fields, including healing of diabetic, surgical, and pressure ulcers, but there is not any report of using this method for healing of donor site in burn patients. The protocols and informed consent were reviewed according to Medical Ethics Board of Shahid Beheshti University of Medical Sciences (IR.SBMU.REC.1394.363) and Iranian Registry of Clinical Trials (IRCT2016020226069N2). Eighteen donor sites in 11 patients with grade 3 burn ulcer were selected. Donor areas were divided into 2 parts, for laser irradiation and control randomly. Laser area was irradiated by a red, 655-nm laser light, 150 mW, 2 J/cm 2 , on days 0 (immediately after surgery), 3, 5, and 7. Dressing and other therapeutic care for both sites were the same. The patients and the person who analyzed the results were blinded. The size of donor site reduced in both groups during the 7-day study period (P < 0.01) and this reduction was significantly greater in the laser group (P = 0.01). In the present study, for the first time, we evaluate the effects of LLLT on the healing process of donor site in burn patients. The results showed that local irradiation of red laser accelerates wound healing process significantly.

  20. Wound healing in animal models: review article

    Directory of Open Access Journals (Sweden)

    Fariba Jaffary

    2017-10-01

    Full Text Available Wound healing and reduction of its recovery time is one of the most important issues in medicine. Wound is defined as disruption of anatomy and function of normal skin. This injury could be the result of physical elements such as  surgical incision, hit or pressure cut of the skin and gunshot wound. Chemical or caustic burn is another category of wound causes that can be induced by acid or base contact irritation. Healing is a process of cellular and extracellular matrix interactions that occur in the damaged tissue. Wound healing consists of several stages including hemostasis, inflammatory phase, proliferative phase and new tissue formation which reconstructs by new collagen formation. Wounds are divided into acute and chronic types based on their healing time. Acute wounds have sudden onset and in normal individuals usually have healing process of less than 4 weeks without any residual side effects. In contrast, chronic wounds have gradual onset. Their inflammatory phase is prolonged and the healing process is stopped due to some background factors like diabetes, ischemia or local pressure. If the healing process lasts more than 4 weeks it will be classified as chronic wound. Despite major advances in the treatment of wounds, still finding effective modalities for healing wounds in the shortest possible time with the fewest side effects is a current challenge. In this review different phases of wound healing and clinical types of wound such as venous leg ulcer, diabetic foot ulcer and pressure ulcer are discussed. Also acute wound models (i.e burn wounds or incisional wound and chronic wound models (such as venous leg ulcers, diabetic foot ulcer, pressure ulcers or bedsore in laboratory animals are presented. This summary can be considered as a preliminary step to facilitate designing of more targeted and applied research in this area.

  1. [System of biometric identification: by the way of control].

    Science.gov (United States)

    Simões, José Augusto

    2011-01-01

    The ethics and morals make the line between lawful to unlawful, the right and wrong, acceptable from the unacceptable. Furthermore the purpose of ethics in the field of profesional practice is, in particular the application of moral standards based on honesty, courtesy and honour. But they are not the only ones. Confidentiality should be the first of duties the professional has no right to disclose information that was only reported in their work and because it was necessary to run it. This requirement aims to protect the recipient of the service and avoid damage to society. The professional should also encourage members of his team, because solidarity is a very effective way to improve the intellectual and moral qualities of work partners and ensure their involvement. When you have an honest professional conduct within and outside of professional practice, you attract confidence and prestige, which is an incentive to drive, with safety, the proper course of his career. The purpose of the biometric control based on the need to expedite the fulfilment of a goal whose integration is recognized by law under the control of the employer's: the setting of working hours, monitoring the attendance and registration of working time. This record is also the accounting and control of additional work. To consider the biometric control as an appropriate mean to ensure a «legitimate purpose», the Law 67/98 requires the National Commission for Data Protection, in each case, to ascertain whether the prevailing interests the rights and freedoms guarantees data subjects on the interest for the treatment of data relied upon by the employer. This procedure seems to be the best fit to the principle of proportionality and therefore the processing of data should be refused where it appears unjustified, inappropriate and excessive, or when, by their lack of reliability, it undermines the purpose of determining it.

  2. Temporal stability of visual search-driven biometrics

    Science.gov (United States)

    Yoon, Hong-Jun; Carmichael, Tandy R.; Tourassi, Georgia

    2015-03-01

    Previously, we have shown the potential of using an individual's visual search pattern as a possible biometric. That study focused on viewing images displaying dot-patterns with different spatial relationships to determine which pattern can be more effective in establishing the identity of an individual. In this follow-up study we investigated the temporal stability of this biometric. We performed an experiment with 16 individuals asked to search for a predetermined feature of a random-dot pattern as we tracked their eye movements. Each participant completed four testing sessions consisting of two dot patterns repeated twice. One dot pattern displayed concentric circles shifted to the left or right side of the screen overlaid with visual noise, and participants were asked which side the circles were centered on. The second dot-pattern displayed a number of circles (between 0 and 4) scattered on the screen overlaid with visual noise, and participants were asked how many circles they could identify. Each session contained 5 untracked tutorial questions and 50 tracked test questions (200 total tracked questions per participant). To create each participant's "fingerprint", we constructed a Hidden Markov Model (HMM) from the gaze data representing the underlying visual search and cognitive process. The accuracy of the derived HMM models was evaluated using cross-validation for various time-dependent train-test conditions. Subject identification accuracy ranged from 17.6% to 41.8% for all conditions, which is significantly higher than random guessing (1/16 = 6.25%). The results suggest that visual search pattern is a promising, temporally stable personalized fingerprint of perceptual organization.

  3. Temporal Stability of Visual Search-Driven Biometrics

    Energy Technology Data Exchange (ETDEWEB)

    Yoon, Hong-Jun [ORNL; Carmichael, Tandy [Tennessee Technological University; Tourassi, Georgia [ORNL

    2015-01-01

    Previously, we have shown the potential of using an individual s visual search pattern as a possible biometric. That study focused on viewing images displaying dot-patterns with different spatial relationships to determine which pattern can be more effective in establishing the identity of an individual. In this follow-up study we investigated the temporal stability of this biometric. We performed an experiment with 16 individuals asked to search for a predetermined feature of a random-dot pattern as we tracked their eye movements. Each participant completed four testing sessions consisting of two dot patterns repeated twice. One dot pattern displayed concentric circles shifted to the left or right side of the screen overlaid with visual noise, and participants were asked which side the circles were centered on. The second dot-pattern displayed a number of circles (between 0 and 4) scattered on the screen overlaid with visual noise, and participants were asked how many circles they could identify. Each session contained 5 untracked tutorial questions and 50 tracked test questions (200 total tracked questions per participant). To create each participant s "fingerprint", we constructed a Hidden Markov Model (HMM) from the gaze data representing the underlying visual search and cognitive process. The accuracy of the derived HMM models was evaluated using cross-validation for various time-dependent train-test conditions. Subject identification accuracy ranged from 17.6% to 41.8% for all conditions, which is significantly higher than random guessing (1/16 = 6.25%). The results suggest that visual search pattern is a promising, fairly stable personalized fingerprint of perceptual organization.

  4. A Study on EMG-based Biometrics

    Directory of Open Access Journals (Sweden)

    Jin Su Kim

    2017-05-01

    Full Text Available Biometrics is a technology that recognizes user's information by using unique physical features of his or her body such as face, fingerprint, and iris. It also uses behavioral features such as signature, electrocardiogram (ECG, electromyogram (EMG, and electroencephalogram (EEG. Among them, the EMG signal is a sign generated when the muscles move, which can be used in various fields such as motion recognition, personal identification, and disease diagnosis. In this paper, we analyze EMG-based biometrics and implement a motion recognition and personal identification system. The system extracted features using non-uniform filter bank and Waveform Length (WL, and reduces the dimension using Principal Component Analysis (PCA and Linear Discriminant Analysis (LDA. Afterward, it classified the features using Euclidean Distance (ED, Support Vector Machine (SVM and K Nearest Neighbors (KNN. As a result of the motion recognition experiment, 95% of acquired EMG data and 84.66% of UCI data were obtained and as a result of the personal recognition experiment, 85% of acquired EMG data and 88.66% of UCI data were obtained.

  5. Biometric feature embedding using robust steganography technique

    Science.gov (United States)

    Rashid, Rasber D.; Sellahewa, Harin; Jassim, Sabah A.

    2013-05-01

    This paper is concerned with robust steganographic techniques to hide and communicate biometric data in mobile media objects like images, over open networks. More specifically, the aim is to embed binarised features extracted using discrete wavelet transforms and local binary patterns of face images as a secret message in an image. The need for such techniques can arise in law enforcement, forensics, counter terrorism, internet/mobile banking and border control. What differentiates this problem from normal information hiding techniques is the added requirement that there should be minimal effect on face recognition accuracy. We propose an LSB-Witness embedding technique in which the secret message is already present in the LSB plane but instead of changing the cover image LSB values, the second LSB plane will be changed to stand as a witness/informer to the receiver during message recovery. Although this approach may affect the stego quality, it is eliminating the weakness of traditional LSB schemes that is exploited by steganalysis techniques for LSB, such as PoV and RS steganalysis, to detect the existence of secrete message. Experimental results show that the proposed method is robust against PoV and RS attacks compared to other variants of LSB. We also discussed variants of this approach and determine capacity requirements for embedding face biometric feature vectors while maintain accuracy of face recognition.

  6. Improving Speaker Recognition by Biometric Voice Deconstruction

    Science.gov (United States)

    Mazaira-Fernandez, Luis Miguel; Álvarez-Marquina, Agustín; Gómez-Vilda, Pedro

    2015-01-01

    Person identification, especially in critical environments, has always been a subject of great interest. However, it has gained a new dimension in a world threatened by a new kind of terrorism that uses social networks (e.g., YouTube) to broadcast its message. In this new scenario, classical identification methods (such as fingerprints or face recognition) have been forcedly replaced by alternative biometric characteristics such as voice, as sometimes this is the only feature available. The present study benefits from the advances achieved during last years in understanding and modeling voice production. The paper hypothesizes that a gender-dependent characterization of speakers combined with the use of a set of features derived from the components, resulting from the deconstruction of the voice into its glottal source and vocal tract estimates, will enhance recognition rates when compared to classical approaches. A general description about the main hypothesis and the methodology followed to extract the gender-dependent extended biometric parameters is given. Experimental validation is carried out both on a highly controlled acoustic condition database, and on a mobile phone network recorded under non-controlled acoustic conditions. PMID:26442245

  7. Methods for using a biometric parameter in the identification of persons

    Science.gov (United States)

    Hively, Lee M [Philadelphia, TN

    2011-11-22

    Brain waves are used as a biometric parameter to provide for authentication and identification of personnel. The brain waves are sampled using EEG equipment and are processed using phase-space distribution functions to compare digital signature data from enrollment of authorized individuals to data taken from a test subject to determine if the data from the test subject matches the signature data to a degree to support positive identification.

  8. Authentication: From Passwords to Biometrics: An implementation of a speaker recognition system on Android

    OpenAIRE

    Heimark, Erlend

    2012-01-01

    We implement a biometric authentication system on the Android platform, which is based on text-dependent speaker recognition. The Android version used in the application is Android 4.0. The application makes use of the Modular Audio Recognition Framework, from which many of the algorithms are adapted in the processes of preprocessing and feature extraction. In addition, we employ the Dynamic Time Warping (DTW) algorithm for the comparison of different voice features. A training procedure is i...

  9. Sex hormones and mucosal wound healing.

    Science.gov (United States)

    Engeland, Christopher G; Sabzehei, Bahareh; Marucha, Phillip T

    2009-07-01

    Wound healing studies, which have chiefly examined dermal tissues, have reported a female advantage in healing rates. In contrast, our laboratory recently demonstrated women heal mucosal wounds more slowly than men. We hypothesized sex hormones influence wound healing rates, possibly through their modulating effects on inflammation. This study involved 329 younger subjects aged 18-43 (165 women, 164 men) and 93 older subjects aged 50-88 (60 women, 33 men). A 3.5mm diameter wound was created on the hard oral palate and videographed daily to assess wound closure. Blood collected at the time of wounding was used to assess circulating testosterone, progesterone and estradiol levels, and in vitro cytokine production in response to LPS. No strong associations were observed between healing times and estradiol or progesterone levels. However, in younger subjects, lower testosterone levels related to faster wound closure. Conversely, in older women higher testosterone levels related to (1) lower inflammatory responses; and (2) faster healing times. No such relationships were seen in older men, or in women taking oral contraceptives or hormone replacement therapy [HRT]. Older women (50-54 years) not yet experiencing menopause healed similarly to younger women and dissimilarly from age-matched post-menopausal women. This suggests that the deleterious effects of aging on wound healing occur secondary to the effects of menopause. Supporting this, there was evidence in post-menopausal women that HRT augmented wound closure. Overall, this study suggests that human mucosal healing rates are modulated by testosterone levels. Based upon when between-group differences were observed, testosterone may impact upon the proliferative phase of healing which involves immune processes such as re-epithelialization and angiogenesis.

  10. Self-healing of lime based mortars : Microscopy observations on case studies

    NARCIS (Netherlands)

    Lubelli, B.; Nijland, T.G.; Van Hees, R.P.J.

    2011-01-01

    Lime mortars have, up to a certain extent, a self-healing capacity which may contribute to their durability. Self-healing in lime mortars consists of a process of dissolution, transport and re-precipitation of calcium compounds to heal cracks and fissures. The spontaneous occurrence of self-healing

  11. Self-healing of lime based mortars: Microscopy observations on case studies

    NARCIS (Netherlands)

    Lubelli, B.; Nijland, T.G.; Hees, R.P.J. van

    2011-01-01

    Lime mortars have, up to a certain extent, a self-healing capacity which may contribute to their durability. Self-healing in lime mortars consists of a process of dissolution, transport and re-precipitation of calcium compounds to heal cracks and fissures. The spontaneous occurrence of self-healing

  12. Greek Tragedy and Ancient Healing: Poems as Theater and Asclepian Temple in Miniature.

    Science.gov (United States)

    Gorelick, Kenneth

    1987-01-01

    Explores the healing processes at work in poetry therapy by examining two healing traditions that were contemporary in Athens of the fifth century B.C.: the tragic drama and the Asclepian healing procedure. Suggests that poetry therapy unites the powerful healing forces inherent in these ancient Greek practices, which accounts for some of its…

  13. Identification of a transcriptional signature for the wound healing continuum

    Science.gov (United States)

    Peake, Matthew A; Caley, Mathew; Giles, Peter J; Wall, Ivan; Enoch, Stuart; Davies, Lindsay C; Kipling, David; Thomas, David W; Stephens, Phil

    2014-01-01

    There is a spectrum/continuum of adult human wound healing outcomes ranging from the enhanced (nearly scarless) healing observed in oral mucosa to scarring within skin and the nonhealing of chronic skin wounds. Central to these outcomes is the role of the fibroblast. Global gene expression profiling utilizing microarrays is starting to give insight into the role of such cells during the healing process, but no studies to date have produced a gene signature for this wound healing continuum. Microarray analysis of adult oral mucosal fibroblast (OMF), normal skin fibroblast (NF), and chronic wound fibroblast (CWF) at 0 and 6 hours post-serum stimulation was performed. Genes whose expression increases following serum exposure in the order OMF healing phenotype (the dysfunctional healing group), whereas genes with the converse pattern are potentially associated with a positive/preferential healing phenotype (the enhanced healing group). Sixty-six genes in the enhanced healing group and 38 genes in the dysfunctional healing group were identified. Overrepresentation analysis revealed pathways directly and indirectly associated with wound healing and aging and additional categories associated with differentiation, development, and morphogenesis. Knowledge of this wound healing continuum gene signature may in turn assist in the therapeutic assessment/treatment of a patient's wounds. PMID:24844339

  14. Possibilities of dynamic biometrics for authentication and the circumstances for using dynamic biometric signature

    Directory of Open Access Journals (Sweden)

    Frantisek Hortai

    2018-01-01

    Full Text Available New information technologies alongside their benefits also bring new dangers with themselves. It is difficult to decide which authentication tool to use and implement in the information systems and electronic documents. The final decision has to compromise among the facts that it faces several conflicting requirements: highly secure tool, to be a user-friendly and user simplicity method, ensure protection against errors and failures of users, speed of authentication and provide these features for a reasonable price. Even when the compromised solution is found it has to fulfill the given technology standards. For the listed reasons the paper argues one of the most natural biometric authentication method the dynamic biometric signature and lists its related standards. The paper also includes measurement evaluation which solves the independence between the person’s signature and device on which it was created

  15. Haar-like Rectangular Features for Biometric Recognition

    DEFF Research Database (Denmark)

    Nasrollahi, Kamal; Moeslund, Thomas B.; Rashidi, Maryam

    2013-01-01

    Developing a reliable, fast, and robust biometric recognition system is still a challenging task. This is because the inputs to these systems can be noisy, occluded, poorly illuminated, rotated, and of very low-resolutions. This paper proposes a probabilistic classifier using Haar-like features......, which mostly have been used for detection, for biometric recognition. The proposed system has been tested for three different biometrics: ear, iris, and hand vein patterns and it is shown that it is robust against most of the mentioned degradations and it outperforms state-of-the-art systems...

  16. Biomimetic Self-Healing

    Science.gov (United States)

    2015-07-21

    methyl-2-pyrrolidone (NMP), dimethylacetamide (DMA), dimethylformamide (DMF), and dimethylsulfoxide ( DMSO ) displayed the best results; unfortunately...Both techniques demand the production of a stable emulsion, using solvents that do not react with the healing substances. If water is used (and it...highly cross-linked UF polymer. Healing chemicals, solvents , surfactants, and emulsifiers are not shown. Figure 6. Synthesis of PU capsules

  17. Increasing the Robustness of Biometric Templates for Dynamic Signature Biometric Systems

    OpenAIRE

    Tolosana Moranchel, Rubén; Vera-Rodríguez, Rubén; Ortega-García, Javier; Fiérrez, Julián

    2015-01-01

    Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. R. Tolosana, R. Vera-Rodriguez, J. Ortega-Garcia and J. Fierrez, "Increasing the robustness of biometric templates for dynamic...

  18. On the implementation of IP protection using biometrics based information hiding and firewall

    Science.gov (United States)

    Basu, Abhishek; Nandy, Kingshuk; Banerjee, Avishek; Giri, Supratick; Sarkar, Souvik; Sarkar, Subir Kumar

    2016-02-01

    System-on-chip-based design style creates a revolution in very large scale integration industry with design efficiency, operating speed and development time. To support this process, reuse and exchange of components are essential in electronic form called intellectual property (IP). This, however, increases the possibility of encroachment of IP of the design. So copyright protection of IP against piracy is the most important concern for IP vendors. The existing solutions for IP protection are still not secure enough with flexibility, cost, etc. This paper proposes an information-hiding-based solution for IP protection by embedding a biometric copyright information and firewall inside an IP in the form of a finite state machine with unique configuration. The scheme first introduces biometric signature-based copyright as ownership proof. Second, firewall interrupts the normal functionality of IP at the end of the user time period. The experimental outcomes of field-programmable-gate-array implementation illustrate the efficiency of the proposed method.

  19. Template security analysis of multimodal biometric frameworks based on fingerprint and hand geometry

    Directory of Open Access Journals (Sweden)

    Arvind Selwal

    2016-09-01

    Full Text Available Biometric systems are automatic tools used to provide authentication during various applications of modern computing. In this work, three different design frameworks for multimodal biometric systems based on fingerprint and hand geometry modalities are proposed. An analysis is also presented to diagnose various types of template security issues in the proposed system. Fuzzy analytic hierarchy process (FAHP is applied with five decision parameters on all the designs and framework 1 is found to be better in terms of template data security, templates fusion and computational efficiency. It is noticed that template data security before storage in database is a challenging task. An important observation is that a template may be secured at feature fusion level and an indexing technique may be used to improve the size of secured templates.

  20. The non-contact biometric identified bio signal measurement sensor and algorithms.

    Science.gov (United States)

    Kim, Chan-Il; Lee, Jong-Ha

    2018-04-25

    In these days, wearable devices have been developed for effectively measuring biological data. However, these devices have tissue allege and noise problem. To solve these problems, biometric measurement based on a non-contact method, such as face image sequencing is developed. This makes it possible to measure biometric data without any operation and side effects. However, it is impossible for a remote center to identify the person whose data are measured by the novel methods. In this paper, we propose the novel non-contact heart rate and blood pressure imaging system, Deep Health Eye. This system has authentication process at the same time as measuring bio signals, through non-contact method. In the future, this system can be convenient home bio signal monitoring system by combined with smart mirror.

  1. Combining Biometric Fractal Pattern and Particle Swarm Optimization-Based Classifier for Fingerprint Recognition

    Directory of Open Access Journals (Sweden)

    Chia-Hung Lin

    2010-01-01

    Full Text Available This paper proposes combining the biometric fractal pattern and particle swarm optimization (PSO-based classifier for fingerprint recognition. Fingerprints have arch, loop, whorl, and accidental morphologies, and embed singular points, resulting in the establishment of fingerprint individuality. An automatic fingerprint identification system consists of two stages: digital image processing (DIP and pattern recognition. DIP is used to convert to binary images, refine out noise, and locate the reference point. For binary images, Katz's algorithm is employed to estimate the fractal dimension (FD from a two-dimensional (2D image. Biometric features are extracted as fractal patterns using different FDs. Probabilistic neural network (PNN as a classifier performs to compare the fractal patterns among the small-scale database. A PSO algorithm is used to tune the optimal parameters and heighten the accuracy. For 30 subjects in the laboratory, the proposed classifier demonstrates greater efficiency and higher accuracy in fingerprint recognition.

  2. The activity of pomegranate extract standardized 40% ellagic acid during the healing process of incision wounds in albino rats (Rattus norvegicus

    Directory of Open Access Journals (Sweden)

    Wiwik Misaco Yuniarti

    2018-03-01

    Full Text Available Aim: This research aimed to evaluate the effects of pomegranate extract standardized to 40% ellagic acid on the incised wound in albino rats. Materials and Methods: Fifty albino rats were divided into 10 treatment groups. The five groups were sacrificed on the 8th day, while the others were sacrificed on the 15th day. Two groups of albino rats with incised wound were not treated at all (P0, the other two groups of albino rats with incised wound were treated with Betadine® (P1 ointment, and the rest of the groups were treated with pomegranate extract standardized to 40% ellagic acid with a concentration of 2.5% (P2, 5% (P3, and 7.5% (P4. The treatments were carried out twice a day with an interval of 12 h for 7 and 14 days. At the end of the research, the skin tissue of those albino rats had been taken for histopathologic preparations before H and E staining was performed. Results: Collagen deposition, polymorphonuclear neutrophils (PMN infiltration, angiogenesis, and fibrosis degree in Group P4 treated with 7.5% pomegranate extract standardized to 40% ellagic acid for 14 days were significantly different from those in Groups P0, P1, P2, and P3, especially in the case of PMN inflammation (p<0.05. Conclusion: The administration of 7.5% pomegranate extract standardized to 40% ellagic acid for 14 days on incised wounds of those albino rats can accelerate the wound healing process characterized by collagen deposition improvement, PMN infiltration in the wound area, angiogenesis, and fibrosis degree.

  3. Self Healing Percolation

    Science.gov (United States)

    Scala, Antonio

    2015-03-01

    We introduce the concept of self-healing in the field of complex networks modelling; in particular, self-healing capabilities are implemented through distributed communication protocols that exploit redundant links to recover the connectivity of the system. Self-healing is a crucial in implementing the next generation of smart grids allowing to ensure a high quality of service to the users. We then map our self-healing procedure in a percolation problem and analyse the interplay between redundancies and topology in improving the resilience of networked infrastructures to multiple failures. We find exact results both for planar lattices and for random lattices, hinting the role of duality in the design of resilient networks. Finally, we introduce a cavity method approach to study the recovery of connectivity after damage in self-healing networks. CNR-PNR National Project ``Crisis-Lab,'' EU HOME/2013/CIPS/AG/4000005013 project CI2C and EU FET project MULTIPLEX nr.317532.

  4. Nanotoxicity in Systemic Circulation and Wound Healing.

    Science.gov (United States)

    Bakshi, Mandeep Singh

    2017-06-19

    Nanotoxicity of nanomaterials is an important issue in view of their potential applications in systemic circulation and wound healing dressing. This account specifically deals with several characteristic features of different nanomaterials which induce hemolysis and how to make them hemocompatible. The shape, size, and surface functionalities of naked metallic as well as nonmetallic nanoparticles surfaces are responsible for the hemolysis. An appropriate coating of biocompatible molecules dramatically reduces hemolysis and promotes their ability as safe drug delivery vehicles. The use of coated nanomaterials in wound healing dressing opens several new strategies for rapid wound healing processes. Properly designed nanomaterials should be selected to minimize the nanotoxicity in the wound healing process. Future directions need new synthetic methods for engineered nanomaterials for their best use in nanomedicine and nanobiotechnology.

  5. Effect of astaxanthin on cutaneous wound healing

    Directory of Open Access Journals (Sweden)

    Meephansan J

    2017-07-01

    Full Text Available Jitlada Meephansan,1 Atiya Rungjang,1 Werayut Yingmema,2 Raksawan Deenonpoe,3 Saranyoo Ponnikorn3 1Division of Dermatology, Chulabhorn International College of Medicine, Thammasat University, Pathum Thani, Thailand; 2Laboratory Animal Centers, Thammasat University, Pathum Thani, Thailand; 3Chulabhorn International College of Medicine, Thammasat University, Pathum Thani, Thailand Abstract: Wound healing consists of a complex series of convoluted processes which involve renewal of the skin after injury. ROS are involved in all phases of wound healing. A balance between oxidative and antioxidative forces is necessary for a favorable healing outcome. Astaxanthin, a member of the xanthophyll group, is considered a powerful antioxidant. In this study, we investigated the effect of topical astaxanthin on cutaneous wound healing. Full-thickness dermal wounds were created in 36 healthy female mice, which were divided into a control group and a group receiving 78.9 µM topical astaxanthin treatment twice daily for 15 days. Astaxanthin-treated wounds showed noticeable contraction by day 3 of treatment and complete wound closure by day 9, whereas the wounds of control mice revealed only partial epithelialization and still carried scabs. Wound healing biological markers including Col1A1 and bFGF were significantly increased in the astaxanthin-treated group since day 1. Interestingly, the oxidative stress marker iNOS showed a significantly lower expression in the study. The results indicate that astaxanthin is an effective compound for accelerating wound healing. Keywords: astaxanthin, wound healing, reactive oxygen species, antioxidant 

  6. Multimodal Authentication - Biometric Password And Steganography

    Directory of Open Access Journals (Sweden)

    Alvin Prasad

    2017-06-01

    Full Text Available Security is a major concern for everyone be it individuals or organizations. As the nature of information systems is becoming distributed securing them is becoming difficult as well. New applications are developed by researchers and developers to counter security issues but as soon as the application is released new attacks are formed to bypass the application. Kerberos is an authentication protocol which helps in to verify and validate a user to a server. As it is a widely used protocol minimizing or preventing the password attack is important. In this research we have analyzed the Kerberos protocol and suggested some ideas which can be considered while updating Kerberos to prevent the password attack. In the proposed solution we are suggesting to use password and biometric technique while registering on the network to enjoy the services and a combination of cryptography and steganography technique while communicating back to the user.

  7. Bioinformatic and Biometric Methods in Plant Morphology

    Directory of Open Access Journals (Sweden)

    Surangi W. Punyasena

    2014-08-01

    Full Text Available Recent advances in microscopy, imaging, and data analyses have permitted both the greater application of quantitative methods and the collection of large data sets that can be used to investigate plant morphology. This special issue, the first for Applications in Plant Sciences, presents a collection of papers highlighting recent methods in the quantitative study of plant form. These emerging biometric and bioinformatic approaches to plant sciences are critical for better understanding how morphology relates to ecology, physiology, genotype, and evolutionary and phylogenetic history. From microscopic pollen grains and charcoal particles, to macroscopic leaves and whole root systems, the methods presented include automated classification and identification, geometric morphometrics, and skeleton networks, as well as tests of the limits of human assessment. All demonstrate a clear need for these computational and morphometric approaches in order to increase the consistency, objectivity, and throughput of plant morphological studies.

  8. Biometric measurements in highly myopic eyes.

    Science.gov (United States)

    Shen, Peiyang; Zheng, Yingfeng; Ding, Xiaohu; Liu, Bin; Congdon, Nathan; Morgan, Ian; He, Mingguang

    2013-02-01

    To assess the repeatability and accuracy of optical biometry (Lenstar LS900 optical low-coherence reflectometry [OLCR] and IOLMaster partial coherence interferometry [PCI]) and applanation ultrasound biometry in highly myopic eyes. Division of Preventive Ophthalmology, Zhongshan Ophthalmic Center, Guangzhou, China. Comparative evaluation of diagnostic technology. Biometric measurements were taken in highly myopic subjects with a spherical equivalent (SE) of -6.00 diopters (D) or higher and an axial length (AL) longer than 25.0 mm. Measurements of AL and anterior chamber depth (ACD) obtained by OLCR were compared with those obtained by PCI and applanation A-scan ultrasound. Right eyes were analyzed. Repeatability was evaluated using the coefficient of variation (CoV) and agreement, using Bland-Altman analyses. The mean SE was -11.20 D ± 4.65 (SD). The CoVs for repeated AL measurements using OLCR, PCI, and applanation ultrasound were 0.06%, 0.07%, and 0.20%, respectively. The limits of agreement (LoA) for AL were 0.11 mm between OLCR and PCI, 1.01 mm between OLCR and applanation ultrasound, and 1.03 mm between PCI and ultrasound. The ACD values were 0.29 mm, 0.53 mm, and 0.51 mm, respectively. These repeatability and agreement results were comparable in eyes with extreme myopia (AL ≥ 27.0 mm) or posterior staphyloma. The mean radius of corneal curvature was similar between OLCR and PCI (7.66 ± 0.24 mm versus 7.64 ± 0.25 mm), with an LoA of 0.12 mm. Optical biometry provided more repeatable and precise measurements of biometric parameters, including AL and ACD, than applanation ultrasound biometry in highly myopic eyes. No author has a financial or proprietary interest in any material or method mentioned. Copyright © 2012 ASCRS and ESCRS. Published by Elsevier Inc. All rights reserved.

  9. Ethical considerations in implementing a biometric co-enrol- ment ...

    African Journals Online (AJOL)

    The biometrics co-enrolment prevention system (BCEPS) is a novel ... capture participant's identification details in real time was approved by the SAMRC Ethics Committee. ... for guidelines and standard operating procedures (SOPs) for the.

  10. Biometric identification based on novel frequency domain facial asymmetry measures

    Science.gov (United States)

    Mitra, Sinjini; Savvides, Marios; Vijaya Kumar, B. V. K.

    2005-03-01

    In the modern world, the ever-growing need to ensure a system's security has spurred the growth of the newly emerging technology of biometric identification. The present paper introduces a novel set of facial biometrics based on quantified facial asymmetry measures in the frequency domain. In particular, we show that these biometrics work well for face images showing expression variations and have the potential to do so in presence of illumination variations as well. A comparison of the recognition rates with those obtained from spatial domain asymmetry measures based on raw intensity values suggests that the frequency domain representation is more robust to intra-personal distortions and is a novel approach for performing biometric identification. In addition, some feature analysis based on statistical methods comparing the asymmetry measures across different individuals and across different expressions is presented.

  11. Joint sparse representation for robust multimodal biometrics recognition.

    Science.gov (United States)

    Shekhar, Sumit; Patel, Vishal M; Nasrabadi, Nasser M; Chellappa, Rama

    2014-01-01

    Traditional biometric recognition systems rely on a single biometric signature for authentication. While the advantage of using multiple sources of information for establishing the identity has been widely recognized, computational models for multimodal biometrics recognition have only recently received attention. We propose a multimodal sparse representation method, which represents the test data by a sparse linear combination of training data, while constraining the observations from different modalities of the test subject to share their sparse representations. Thus, we simultaneously take into account correlations as well as coupling information among biometric modalities. A multimodal quality measure is also proposed to weigh each modality as it gets fused. Furthermore, we also kernelize the algorithm to handle nonlinearity in data. The optimization problem is solved using an efficient alternative direction method. Various experiments show that the proposed method compares favorably with competing fusion-based methods.

  12. Factors impacting on the adoption of biometric technology by South ...

    African Journals Online (AJOL)

    and is limited to the use of biometric technology within the financial services sector. Within this ..... reality for the banking sector is that these systems are not as easily replaceable as the idea may sound. ... the respondents' mixed perceptions.

  13. Biometric Enhancement of Home and Office Security to Reduce ...

    African Journals Online (AJOL)

    PROF. OLIVER OSUAGWA

    Biometrics security technology uses the physiological and ... verification and authentication methodology to verify how facial screening explores the different ... mouth, nose etc and stores the bio-information extracted from the face of every ...

  14. A cancelable biometric scheme based on multi-lead ECGs.

    Science.gov (United States)

    Peng-Tzu Chen; Shun-Chi Wu; Jui-Hsuan Hsieh

    2017-07-01

    Biometric technologies offer great advantages over other recognition methods, but there are concerns that they may compromise the privacy of individuals. In this paper, an electrocardiogram (ECG)-based cancelable biometric scheme is proposed to relieve such concerns. In this scheme, distinct biometric templates for a given beat bundle are constructed via "subspace collapsing." To determine the identity of any unknown beat bundle, the multiple signal classification (MUSIC) algorithm, incorporating a "suppression and poll" strategy, is adopted. Unlike the existing cancelable biometric schemes, knowledge of the distortion transform is not required for recognition. Experiments with real ECGs from 285 subjects are presented to illustrate the efficacy of the proposed scheme. The best recognition rate of 97.58 % was achieved under the test condition N train = 10 and N test = 10.

  15. Demographic Analysis from Biometric Data: Achievements, Challenges, and New Frontiers.

    Science.gov (United States)

    Sun, Yunlian; Zhang, Man; Sun, Zhenan; Tan, Tieniu

    2018-02-01

    Biometrics is the technique of automatically recognizing individuals based on their biological or behavioral characteristics. Various biometric traits have been introduced and widely investigated, including fingerprint, iris, face, voice, palmprint, gait and so forth. Apart from identity, biometric data may convey various other personal information, covering affect, age, gender, race, accent, handedness, height, weight, etc. Among these, analysis of demographics (age, gender, and race) has received tremendous attention owing to its wide real-world applications, with significant efforts devoted and great progress achieved. This survey first presents biometric demographic analysis from the standpoint of human perception, then provides a comprehensive overview of state-of-the-art advances in automated estimation from both academia and industry. Despite these advances, a number of challenging issues continue to inhibit its full potential. We second discuss these open problems, and finally provide an outlook into the future of this very active field of research by sharing some promising opportunities.

  16. Paranormal healing and hypertension

    Science.gov (United States)

    Beutler, Jaap J; Attevelt, Johannes T M; Schouten, Sybo A; Faber, Joop A J; Mees, Evert J Dorhout; Geijskes, Gijsbert G

    1988-01-01

    A prospective randomised trial was carried out to see whether paranormal healing by laying on of hands might reduce blood pressure in essential hypertension and whether such an effect might be due to a paranormal, psychological, or placebo factor. Patients were randomised to three treatment groups: paranormal healing by laying on of hands (n=40), paranormal healing at a distance (n=37), and no paranormal healing (controls; n=38). Healing at a distance and no paranormal healing were investigated double blind. Systolic and diastolic blood pressures were significantly reduced in all three groups at week 15 (mean reduction (95% confidence interval) 17·1 (14·0 to 20·2)/8·3 (6·6 to 10·0) mm Hg). Only the successive reductions in diastolic blood pressures among the groups from week to week were significantly different. Each week diastolic pressure was consistently lower (average 1·9 mm Hg) after healing at a distance compared with control, but on paired comparison these differences were not significant. Probably week to week variations among the groups accounted for any differences noted. In this study no treatment was consistently better than another and the data cannot therefore be taken as evidence of a paranormal effect on blood pressure. Probably the fall in blood pressure in all three groups either was caused by the psychosocial approach or was a placebo effect of the trial itself. PMID:3134082

  17. Saliva and wound healing.

    Science.gov (United States)

    Brand, Henk S; Ligtenberg, Antoon J M; Veerman, Enno C I

    2014-01-01

    Oral wounds heal faster and with less scar formation than skin wounds. One of the key factors involved is saliva, which promotes wound healing in several ways. Saliva creates a humid environment, thus improving the survival and functioning of inflammatory cells that are crucial for wound healing. In addition, saliva contains several proteins which play a role in the different stages of wound healing. Saliva contains substantial amounts of tissue factor, which dramatically accelerates blood clotting. Subsequently, epidermal growth factor in saliva promotes the proliferation of epithelial cells. Secretory leucocyte protease inhibitor inhibits the tissue-degrading activity of enzymes like elastase and trypsin. Absence of this protease inhibitor delays oral wound healing. Salivary histatins in vitro promote wound closure by enhancing cell spreading and cell migration, but do not stimulate cell proliferation. A synthetic cyclic variant of histatin exhibits a 1,000-fold higher activity than linear histatin, which makes this cyclic variant a promising agent for the development of a new wound healing medication. Conclusively, recognition of the many roles salivary proteins play in wound healing makes saliva a promising source for the development of new drugs involved in tissue regeneration.

  18. Alveolar process fractures in the permanent dentition. Part 2. The risk of healing complications in teeth involved in an alveolar process fracture

    DEFF Research Database (Denmark)

    Lauridsen, Eva; Gerds, Thomas; Andreasen, Jens Ove

    2016-01-01

    AIM: To analyze the risk of pulp canal obliteration (PCO), pulp necrosis (PN), repair-related resorption (RRR), infection-related resorption (IRR), ankylosis-related resorption (ARR), marginal bone loss (MBL), and tooth loss (TL) for teeth involved in an alveolar process fracture and to identify ...

  19. Biometrics and smart card based applications for nuclear industry

    International Nuclear Information System (INIS)

    Nishanth Reddy, J.; Dheeraj Reddy, J.; Narender Reddy, J.

    2004-01-01

    Biometrics has emerged as a convenient, foolproof and well-accepted technology for identification around the globe. Nucleonix has developed innovative solutions based on finger scan biometrics for various industries. This paper closely looks into the application areas for the nuclear industry and how it will benefit this industry, in terms of identification, access control, security of PCs and applications, attendance, machinery usage control and other custom applications. (author)

  20. Direct Problems and Inverse Problems in Biometric Systems

    OpenAIRE

    Mihailescu Marius Iulian

    2013-01-01

    The article purpose is to describe the two sides of biometrics technologies, direct problems and inverse problems. The advance that we face today in field of Information Technology makes Information Security an inseparable part. The authentication has a huge role when we deal about security. The problems that can appear in implementing and developing biometrics systems is raising many problems, and one of the goal of this article is to focus on direct and inverse problems which is a new and c...