2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf), 2019
IoT controlled Home Automation allows objects to be sensed and/or controlled remotely across exis... more IoT controlled Home Automation allows objects to be sensed and/or controlled remotely across existing network infrastructure, creating opportunities for more direct integration of the physical world into computer-based systems. Energy consumption can be measured through its environmental impact and usage; the measure of the amount of power consumed by the load side of an electrical circuit is termed energy consumption. Energy consumption is a major issue in the modern world. Inefficient power monitoring and controlling techniques in the households, businesses, and institutions are the main cause of power consumption. This system is intended to assist and provide support to the needy ones like the elderly, disabled etc. Also, the IoT controlled home concept will greatly help in reducing the power consumption and the risk of fire incidences.This study is to showcase the design and implementation of an IOT Controlled Home Automation Technologies. This unit was developed using low-cost ...
Objects can easily be remotely sensed, monitored and controlled when home is automated using the ... more Objects can easily be remotely sensed, monitored and controlled when home is automated using the Internet of Things (IoT); this will give room for direct integration of the real world into computerized systems. Energy consumption is defined as the degree of the amount of power expended by a given load in an electric circuit. Nowadays, inefficient techniques used in monitoring and control of power consuming devices has contributed immensely in the high rate of power consumption in our homes, institutions, business places, and marketplaces. The design and implementation of an IoT-based home automation, energy management and smart security system has been proposed in this paper. The components used in the development of the system unit include an ESP8266 Wi-Fi component and the universal Arduino imbedded controller. The proposed scheme is aimed at assisting and supporting an efficient usage of power, and by doing so, power consumption as well as the risk of fire outbreaks will be great...
this paper presents an output-based input shaping and a proportional integral derivative (PID) fo... more this paper presents an output-based input shaping and a proportional integral derivative (PID) for load hoisting control of a 3D crane. Unlike conventional input shaping in which model parameters are used for designing the filter, output-based filter is designed using the signal output of the target system thus, problem of model uncertainties are avoided. Simulation results show that, precise payload positioning with negligible sway is achieved. The proposed hybrid control is robust and can easily be implemented on higher order system.
IOP Conference Series: Materials Science and Engineering
The implementation of an accurate face recognition system in a hardware device is a very importan... more The implementation of an accurate face recognition system in a hardware device is a very important aspect of various security applications. In a security system, any type of password is used to access private and confidential data, some are hard to remember and can be stolen or guessed, misplaced, forgotten, purloined or duplicated, or become corrupted and unreadable. While there have been significant improvements in the algorithms with increasing recognition accuracy, only a few types of research were conducted on implementing these face recognitions in hardware devices. Door access control systems based on face recognition is geared towards simplifying much-difficult face recognition problems in uncontrolled environments. This report comprised mainly of three sub-phases: face detection, face recognition, and automatic door access control. The face is detected by using the Viola-Jones method and face recognition is implemented by using the Principal Component Analysis (PCA). If a f...
2021 International Conference on Computer & Information Sciences (ICCOINS)
This paper presents the design and implementation of the mobile student handbook for the Departme... more This paper presents the design and implementation of the mobile student handbook for the Department of Computer and Communications Engineering (DCCE), Abubakar Tafawa Balewa University (ATBU). The book was aimed at providing students with specific information for the curriculum of the department that indicates their structures as given by the Minimum Academic Standard of the National Universities Commission (NUC-MAS) Nigeria. It provides information on the brief history of the department, entry requirement, grading system, graduation requirements among many. The Conventional student handbook is a hard copy that is not easy to carry alone all the time, hard to manage, prone to damage, and easy to being misplaced. To address this setback, a software application of a student handbook is developed using Android SDK. This will help to provide an easy-to-use, interactive, and portable means for simple access to the department’s curriculum structure that will assist students during their academic pursuits. The user evaluation process was employed to validate the application, this involved installations of the application to the mobile phone of 100 students and 20 staff. Results were recorded and shown in both graphs and tabular format. This application provides basic features of the DCCE’s curriculum like the courses and their pre-requisites for all levels, grading system, degree nomenclature, graduation requirements, and examination guidelines, etc. Moreover, it is an all-in-one offline mobile application that was meant to resolve basic issues. In the future, the link to the university website should be incorporated for further access to information.
The thinning algorithm is one of the approaches of identifying each character printed on the car ... more The thinning algorithm is one of the approaches of identifying each character printed on the car plate. Malaysian car plate characters appear in different character sizes, styles, customized printed characters etc. These variations contribute to difficulty in thinning successfully segmented and extracted license plate characters for recognition. To address these problems, an improved thinning operation for Malaysian car plate character recognition is proposed. In this algorithm, samples from segmented and extracted license plates are used for a thinning operation which is passed to Zhang-Suen thinning algorithm that could not guarantee one pixel thick and then to single pixelate algorithm that provides one pixel width of character for recognition. From the simulation, the result obtained has clearly proven to be the best for character recognition systems with least number of white pixels (777 pixels) and 0.26% redundant pixel left in the medial curve.
In the wake of the sudden replacement of wood and kerosene by gas cookers for several purposes in... more In the wake of the sudden replacement of wood and kerosene by gas cookers for several purposes in Nigeria, gas leakage has caused several damages in our homes, Laboratories among others. installation of a gas leakage detection device was globally inspired to eliminate accidents related to gas leakage. We present an alternative approach to developing a device that can automatically detect and control gas leakages and also monitor temperature. The system detects the leakage of the LPG (Liquefied Petroleum Gas) using a gas sensor, then triggred the control system response which employs ventilator system, Mobile phone alert and alarm when the LPG concentration in the air exceeds a certain level. The performance of two gas sensors (MQ5 and MQ6) were tested for a guided decision. Also, when the temperature of the environment poses a danger, LED (indicator), buzzer and LCD (16x2) display was used to indicate temperature and gas leakage status in degree Celsius and PPM respectively. Attension was given to the response time of the control system, which was ascertained that this system significantly increases the chances and efficiency of eliminating gas leakage related accident.
Edge detection techniques are mathematical methods of detecting and localizing discontinuities in... more Edge detection techniques are mathematical methods of detecting and localizing discontinuities in an image. Edge detection is a well-developed field within image processing and image analysis because it helps in reducing some significant amount of data and cleans out irrelevant information. Therefore it’s pertinent to evaluate the differences, advantages and disadvantages of these edge detection techniques. In this paper we presented the evaluation of the conventional and commonly used edge detection techniques, that is, first and second order derivatives popularly known in image processing as gradient-based and Laplacian-based respectively. These edge detection techniques algorithms were developed using Matlab 7.7.0 version. The Prewitt, Sobel and Roberts operators are simple and quick to compute while the canny operator exhibits complexity in computations, implementations, and more execution time but since it employs probability method for error rate finding, well localization of ...
In the wake of the sudden replacement of wood and kerosene by gas cookers for several purposes in... more In the wake of the sudden replacement of wood and kerosene by gas cookers for several purposes in Nigeria, gas leakage has caused several damages in our homes, Laboratories among others. installation of a gas leakage detection device was globally inspired to eliminate accidents related to gas leakage. We present an alternative approach to developing a device that can automatically detect and control gas leakages and also monitor temperature. The system detects the leakage of the LPG (Liquefied Petroleum Gas) using a gas sensor, then triggred the control system response which employs ventilator system, Mobile phone alert and alarm when the LPG concentration in the air exceeds a certain level. The performance of two gas sensors (MQ5 and MQ6) were tested for a guided decision. Also, when the temperature of the environment poses a danger, LED (indicator), buzzer and LCD (16x2) display was used to indicate temperature and gas leakage status in degree Celsius and PPM respectively. Attension was given to the response time of the control system, which was ascertained that this system significantly increases the chances and efficiency of eliminating gas leakage related accident.
Residual vibrations and transient deflections are detrimental to the optimal performance of flexi... more Residual vibrations and transient deflections are detrimental to the optimal performance of flexible manipulators. This paper presents a linear quadratic regulator (LQR), combined with three command shapers, for position control and residual vibration suppression of a single link flexible manipulator. Conventional (time delay) zero vibration (ZV) and zero vibration derivative-derivative (ZVDD) input shaping filters are designed using the damping ratio and natural frequency of the flexible manipulator. While an output-based input shaping filter, in which model parameters are not required, is designed using the system’s output. In each case, the filters are incorporated with LQR for position tracking. Simulation results show the output-based filter performed better than the time delay filters in suppressing residual vibration. Keywords—Single link flexible manipulator; output-based filter; input shaping; LQR; residual vibration; ZV; ZVDD.
IAES International Journal of Robotics and Automation (IJRA), 2021
Objects can easily be remotely sensed, monitored and controlled when home is automated using the ... more Objects can easily be remotely sensed, monitored and controlled when home is automated using the Internet of Things (IoT); this will give room for direct integration of the real world into computerized systems. Energy consumption is defined as the degree of the amount of power expended by a given load in an electric circuit. Nowadays, inefficient techniques used in monitoring and control of power consuming devices has contributed immensely in the high rate of power consumption in our homes, institutions, business places, and marketplaces. The design and implementation of an IoT-based home automation, energy management and smart security system has been proposed in this paper. The components used in the development of the system unit include an ESP8266 Wi-Fi component and the universal Arduino imbedded controller. The proposed scheme is aimed at assisting and supporting an efficient usage of power, and by doing so, power consumption as well as the risk of fire outbreaks will be great...
this paper presents an output-based input shaping and a proportional integral derivative (PID) fo... more this paper presents an output-based input shaping and a proportional integral derivative (PID) for load hoisting control of a 3D crane. Unlike conventional input shaping in which model parameters are used for designing the filter, output-based filter is designed using the signal output of the target system thus, problem of model uncertainties are avoided. Simulation results show that, precise payload positioning with negligible sway is achieved. The proposed hybrid control is robust and can easily be implemented on higher order system.
In our homes or offices, security has been a vital issue. Control of home security system remotel... more In our homes or offices, security has been a vital issue. Control of home security system remotely always offers huge advantages like the arming or disarming of the alarms, video monitoring, and energy management control apart from safeguarding the home free up intruders. Considering the oldest simple methods of security that is the mechanical lock system that has a key as the authentication element, then an upgrade to a universal type, and now unique codes for the lock. The recent advancement in the communication system has brought the tremendous application of communication gadgets into our various areas of life. This work is a real-time smart doorbell notification system for home Security as opposes of the traditional security methods, it is composed of the doorbell interfaced with GSM Module, a GSM module would be triggered to send an SMS to the house owner by pressing the doorbell, the owner will respond to the guest by pressing a button to open the door, otherwise, a message w...
International Journal of Engineering and Manufacturing
He is currently a lecturer in the Department of Computer and Communications Engineering, Abubakar... more He is currently a lecturer in the Department of Computer and Communications Engineering, Abubakar Tafawa Balewa University Bauchi (ATBU), Nigeria. His research interest includes Image processing, Nano-material design, embedded systems, and Biomedical Systems.
Nowadays, it is evident that signature is commonly used for personal verification, this justifies... more Nowadays, it is evident that signature is commonly used for personal verification, this justifies the necessity for an Automatic Verification System (AVS). Based on the application, verification could either be achieved Offline or Online. An online system uses the signature's dynamic information; such information is captured at the instant the signature is generated. An offline system, on the other hand, uses an image (the signature is scanned). In this paper, some set of simple shaped geometric features are used in achieving offline Verification of signatures. These features include Baseline Slant Angle (BSA), Aspect Ratio (AR), and Normalized Area (NA), Center of Gravity as well as the line's Slope that joins the Center of Gravities of the signature's image two splits. Before the features extraction, a signature preprocessing is necessary to segregate its parts as well as to eliminate any available spurious noise. Primarily, System training is achieved via a signature record which was acquired from personalities whose signatures had to be validated through the system. An average signature is acquired for each subject as a result of incorporating the aforementioned features which were derived from a sample set of the subject's true signatures. Therefore, a signature functions as the prototype for authentication against a requested test signature. The similarity measure within the feature space between the two signatures is determined by Euclidian distance. If the Euclidian distance is lower than a set threshold (i.e. analogous to the minimum acceptable degree of similarity), the test signature is certified as that of the claiming subject otherwise detected as a forgery. Details on the stated features, pre-processing, implementation, and the results are presented in this work.
International Journal of Intelligent Systems and Applications
Nowadays, it is evident that signature is commonly used for personal verification, this justifies... more Nowadays, it is evident that signature is commonly used for personal verification, this justifies the necessity for an Automatic Verification System (AVS). Based on the application, verification could either be achieved Offline or Online. An online system uses the signature’s dynamic information; such information is captured at the instant the signature is generated. An offline system, on the other hand, uses an image (the signature is scanned). In this paper, some set of simple shaped geometric features are used in achieving offline Verification of signatures. These features include Baseline Slant Angle (BSA), Aspect Ratio (AR), and Normalized Area (NA), Center of Gravity as well as the line’s Slope that joins the Center of Gravities of the signature’s image two splits. Before the features extraction, a signature preprocessing is necessary to segregate its parts as well as to eliminate any available spurious noise. Primarily, System training is achieved via a signature record which...
International Journal of Intelligent Systems and Applications
Nowadays, it is evident that signature is commonly used for personal verification, this justifies... more Nowadays, it is evident that signature is commonly used for personal verification, this justifies the necessity for an Automatic Verification System (AVS). Based on the application, verification could either be achieved Offline or Online. An online system uses the signature’s dynamic information; such information is captured at the instant the signature is generated. An offline system, on the other hand, uses an image (the signature is scanned). In this paper, some set of simple shaped geometric features are used in achieving offline Verification of signatures. These features include Baseline Slant Angle (BSA), Aspect Ratio (AR), and Normalized Area (NA), Center of Gravity as well as the line’s Slope that joins the Center of Gravities of the signature’s image two splits. Before the features extraction, a signature preprocessing is necessary to segregate its parts as well as to eliminate any available spurious noise. Primarily, System training is achieved via a signature record which...
2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf), 2019
IoT controlled Home Automation allows objects to be sensed and/or controlled remotely across exis... more IoT controlled Home Automation allows objects to be sensed and/or controlled remotely across existing network infrastructure, creating opportunities for more direct integration of the physical world into computer-based systems. Energy consumption can be measured through its environmental impact and usage; the measure of the amount of power consumed by the load side of an electrical circuit is termed energy consumption. Energy consumption is a major issue in the modern world. Inefficient power monitoring and controlling techniques in the households, businesses, and institutions are the main cause of power consumption. This system is intended to assist and provide support to the needy ones like the elderly, disabled etc. Also, the IoT controlled home concept will greatly help in reducing the power consumption and the risk of fire incidences.This study is to showcase the design and implementation of an IOT Controlled Home Automation Technologies. This unit was developed using low-cost ...
Objects can easily be remotely sensed, monitored and controlled when home is automated using the ... more Objects can easily be remotely sensed, monitored and controlled when home is automated using the Internet of Things (IoT); this will give room for direct integration of the real world into computerized systems. Energy consumption is defined as the degree of the amount of power expended by a given load in an electric circuit. Nowadays, inefficient techniques used in monitoring and control of power consuming devices has contributed immensely in the high rate of power consumption in our homes, institutions, business places, and marketplaces. The design and implementation of an IoT-based home automation, energy management and smart security system has been proposed in this paper. The components used in the development of the system unit include an ESP8266 Wi-Fi component and the universal Arduino imbedded controller. The proposed scheme is aimed at assisting and supporting an efficient usage of power, and by doing so, power consumption as well as the risk of fire outbreaks will be great...
this paper presents an output-based input shaping and a proportional integral derivative (PID) fo... more this paper presents an output-based input shaping and a proportional integral derivative (PID) for load hoisting control of a 3D crane. Unlike conventional input shaping in which model parameters are used for designing the filter, output-based filter is designed using the signal output of the target system thus, problem of model uncertainties are avoided. Simulation results show that, precise payload positioning with negligible sway is achieved. The proposed hybrid control is robust and can easily be implemented on higher order system.
IOP Conference Series: Materials Science and Engineering
The implementation of an accurate face recognition system in a hardware device is a very importan... more The implementation of an accurate face recognition system in a hardware device is a very important aspect of various security applications. In a security system, any type of password is used to access private and confidential data, some are hard to remember and can be stolen or guessed, misplaced, forgotten, purloined or duplicated, or become corrupted and unreadable. While there have been significant improvements in the algorithms with increasing recognition accuracy, only a few types of research were conducted on implementing these face recognitions in hardware devices. Door access control systems based on face recognition is geared towards simplifying much-difficult face recognition problems in uncontrolled environments. This report comprised mainly of three sub-phases: face detection, face recognition, and automatic door access control. The face is detected by using the Viola-Jones method and face recognition is implemented by using the Principal Component Analysis (PCA). If a f...
2021 International Conference on Computer & Information Sciences (ICCOINS)
This paper presents the design and implementation of the mobile student handbook for the Departme... more This paper presents the design and implementation of the mobile student handbook for the Department of Computer and Communications Engineering (DCCE), Abubakar Tafawa Balewa University (ATBU). The book was aimed at providing students with specific information for the curriculum of the department that indicates their structures as given by the Minimum Academic Standard of the National Universities Commission (NUC-MAS) Nigeria. It provides information on the brief history of the department, entry requirement, grading system, graduation requirements among many. The Conventional student handbook is a hard copy that is not easy to carry alone all the time, hard to manage, prone to damage, and easy to being misplaced. To address this setback, a software application of a student handbook is developed using Android SDK. This will help to provide an easy-to-use, interactive, and portable means for simple access to the department’s curriculum structure that will assist students during their academic pursuits. The user evaluation process was employed to validate the application, this involved installations of the application to the mobile phone of 100 students and 20 staff. Results were recorded and shown in both graphs and tabular format. This application provides basic features of the DCCE’s curriculum like the courses and their pre-requisites for all levels, grading system, degree nomenclature, graduation requirements, and examination guidelines, etc. Moreover, it is an all-in-one offline mobile application that was meant to resolve basic issues. In the future, the link to the university website should be incorporated for further access to information.
The thinning algorithm is one of the approaches of identifying each character printed on the car ... more The thinning algorithm is one of the approaches of identifying each character printed on the car plate. Malaysian car plate characters appear in different character sizes, styles, customized printed characters etc. These variations contribute to difficulty in thinning successfully segmented and extracted license plate characters for recognition. To address these problems, an improved thinning operation for Malaysian car plate character recognition is proposed. In this algorithm, samples from segmented and extracted license plates are used for a thinning operation which is passed to Zhang-Suen thinning algorithm that could not guarantee one pixel thick and then to single pixelate algorithm that provides one pixel width of character for recognition. From the simulation, the result obtained has clearly proven to be the best for character recognition systems with least number of white pixels (777 pixels) and 0.26% redundant pixel left in the medial curve.
In the wake of the sudden replacement of wood and kerosene by gas cookers for several purposes in... more In the wake of the sudden replacement of wood and kerosene by gas cookers for several purposes in Nigeria, gas leakage has caused several damages in our homes, Laboratories among others. installation of a gas leakage detection device was globally inspired to eliminate accidents related to gas leakage. We present an alternative approach to developing a device that can automatically detect and control gas leakages and also monitor temperature. The system detects the leakage of the LPG (Liquefied Petroleum Gas) using a gas sensor, then triggred the control system response which employs ventilator system, Mobile phone alert and alarm when the LPG concentration in the air exceeds a certain level. The performance of two gas sensors (MQ5 and MQ6) were tested for a guided decision. Also, when the temperature of the environment poses a danger, LED (indicator), buzzer and LCD (16x2) display was used to indicate temperature and gas leakage status in degree Celsius and PPM respectively. Attension was given to the response time of the control system, which was ascertained that this system significantly increases the chances and efficiency of eliminating gas leakage related accident.
Edge detection techniques are mathematical methods of detecting and localizing discontinuities in... more Edge detection techniques are mathematical methods of detecting and localizing discontinuities in an image. Edge detection is a well-developed field within image processing and image analysis because it helps in reducing some significant amount of data and cleans out irrelevant information. Therefore it’s pertinent to evaluate the differences, advantages and disadvantages of these edge detection techniques. In this paper we presented the evaluation of the conventional and commonly used edge detection techniques, that is, first and second order derivatives popularly known in image processing as gradient-based and Laplacian-based respectively. These edge detection techniques algorithms were developed using Matlab 7.7.0 version. The Prewitt, Sobel and Roberts operators are simple and quick to compute while the canny operator exhibits complexity in computations, implementations, and more execution time but since it employs probability method for error rate finding, well localization of ...
In the wake of the sudden replacement of wood and kerosene by gas cookers for several purposes in... more In the wake of the sudden replacement of wood and kerosene by gas cookers for several purposes in Nigeria, gas leakage has caused several damages in our homes, Laboratories among others. installation of a gas leakage detection device was globally inspired to eliminate accidents related to gas leakage. We present an alternative approach to developing a device that can automatically detect and control gas leakages and also monitor temperature. The system detects the leakage of the LPG (Liquefied Petroleum Gas) using a gas sensor, then triggred the control system response which employs ventilator system, Mobile phone alert and alarm when the LPG concentration in the air exceeds a certain level. The performance of two gas sensors (MQ5 and MQ6) were tested for a guided decision. Also, when the temperature of the environment poses a danger, LED (indicator), buzzer and LCD (16x2) display was used to indicate temperature and gas leakage status in degree Celsius and PPM respectively. Attension was given to the response time of the control system, which was ascertained that this system significantly increases the chances and efficiency of eliminating gas leakage related accident.
Residual vibrations and transient deflections are detrimental to the optimal performance of flexi... more Residual vibrations and transient deflections are detrimental to the optimal performance of flexible manipulators. This paper presents a linear quadratic regulator (LQR), combined with three command shapers, for position control and residual vibration suppression of a single link flexible manipulator. Conventional (time delay) zero vibration (ZV) and zero vibration derivative-derivative (ZVDD) input shaping filters are designed using the damping ratio and natural frequency of the flexible manipulator. While an output-based input shaping filter, in which model parameters are not required, is designed using the system’s output. In each case, the filters are incorporated with LQR for position tracking. Simulation results show the output-based filter performed better than the time delay filters in suppressing residual vibration. Keywords—Single link flexible manipulator; output-based filter; input shaping; LQR; residual vibration; ZV; ZVDD.
IAES International Journal of Robotics and Automation (IJRA), 2021
Objects can easily be remotely sensed, monitored and controlled when home is automated using the ... more Objects can easily be remotely sensed, monitored and controlled when home is automated using the Internet of Things (IoT); this will give room for direct integration of the real world into computerized systems. Energy consumption is defined as the degree of the amount of power expended by a given load in an electric circuit. Nowadays, inefficient techniques used in monitoring and control of power consuming devices has contributed immensely in the high rate of power consumption in our homes, institutions, business places, and marketplaces. The design and implementation of an IoT-based home automation, energy management and smart security system has been proposed in this paper. The components used in the development of the system unit include an ESP8266 Wi-Fi component and the universal Arduino imbedded controller. The proposed scheme is aimed at assisting and supporting an efficient usage of power, and by doing so, power consumption as well as the risk of fire outbreaks will be great...
this paper presents an output-based input shaping and a proportional integral derivative (PID) fo... more this paper presents an output-based input shaping and a proportional integral derivative (PID) for load hoisting control of a 3D crane. Unlike conventional input shaping in which model parameters are used for designing the filter, output-based filter is designed using the signal output of the target system thus, problem of model uncertainties are avoided. Simulation results show that, precise payload positioning with negligible sway is achieved. The proposed hybrid control is robust and can easily be implemented on higher order system.
In our homes or offices, security has been a vital issue. Control of home security system remotel... more In our homes or offices, security has been a vital issue. Control of home security system remotely always offers huge advantages like the arming or disarming of the alarms, video monitoring, and energy management control apart from safeguarding the home free up intruders. Considering the oldest simple methods of security that is the mechanical lock system that has a key as the authentication element, then an upgrade to a universal type, and now unique codes for the lock. The recent advancement in the communication system has brought the tremendous application of communication gadgets into our various areas of life. This work is a real-time smart doorbell notification system for home Security as opposes of the traditional security methods, it is composed of the doorbell interfaced with GSM Module, a GSM module would be triggered to send an SMS to the house owner by pressing the doorbell, the owner will respond to the guest by pressing a button to open the door, otherwise, a message w...
International Journal of Engineering and Manufacturing
He is currently a lecturer in the Department of Computer and Communications Engineering, Abubakar... more He is currently a lecturer in the Department of Computer and Communications Engineering, Abubakar Tafawa Balewa University Bauchi (ATBU), Nigeria. His research interest includes Image processing, Nano-material design, embedded systems, and Biomedical Systems.
Nowadays, it is evident that signature is commonly used for personal verification, this justifies... more Nowadays, it is evident that signature is commonly used for personal verification, this justifies the necessity for an Automatic Verification System (AVS). Based on the application, verification could either be achieved Offline or Online. An online system uses the signature's dynamic information; such information is captured at the instant the signature is generated. An offline system, on the other hand, uses an image (the signature is scanned). In this paper, some set of simple shaped geometric features are used in achieving offline Verification of signatures. These features include Baseline Slant Angle (BSA), Aspect Ratio (AR), and Normalized Area (NA), Center of Gravity as well as the line's Slope that joins the Center of Gravities of the signature's image two splits. Before the features extraction, a signature preprocessing is necessary to segregate its parts as well as to eliminate any available spurious noise. Primarily, System training is achieved via a signature record which was acquired from personalities whose signatures had to be validated through the system. An average signature is acquired for each subject as a result of incorporating the aforementioned features which were derived from a sample set of the subject's true signatures. Therefore, a signature functions as the prototype for authentication against a requested test signature. The similarity measure within the feature space between the two signatures is determined by Euclidian distance. If the Euclidian distance is lower than a set threshold (i.e. analogous to the minimum acceptable degree of similarity), the test signature is certified as that of the claiming subject otherwise detected as a forgery. Details on the stated features, pre-processing, implementation, and the results are presented in this work.
International Journal of Intelligent Systems and Applications
Nowadays, it is evident that signature is commonly used for personal verification, this justifies... more Nowadays, it is evident that signature is commonly used for personal verification, this justifies the necessity for an Automatic Verification System (AVS). Based on the application, verification could either be achieved Offline or Online. An online system uses the signature’s dynamic information; such information is captured at the instant the signature is generated. An offline system, on the other hand, uses an image (the signature is scanned). In this paper, some set of simple shaped geometric features are used in achieving offline Verification of signatures. These features include Baseline Slant Angle (BSA), Aspect Ratio (AR), and Normalized Area (NA), Center of Gravity as well as the line’s Slope that joins the Center of Gravities of the signature’s image two splits. Before the features extraction, a signature preprocessing is necessary to segregate its parts as well as to eliminate any available spurious noise. Primarily, System training is achieved via a signature record which...
International Journal of Intelligent Systems and Applications
Nowadays, it is evident that signature is commonly used for personal verification, this justifies... more Nowadays, it is evident that signature is commonly used for personal verification, this justifies the necessity for an Automatic Verification System (AVS). Based on the application, verification could either be achieved Offline or Online. An online system uses the signature’s dynamic information; such information is captured at the instant the signature is generated. An offline system, on the other hand, uses an image (the signature is scanned). In this paper, some set of simple shaped geometric features are used in achieving offline Verification of signatures. These features include Baseline Slant Angle (BSA), Aspect Ratio (AR), and Normalized Area (NA), Center of Gravity as well as the line’s Slope that joins the Center of Gravities of the signature’s image two splits. Before the features extraction, a signature preprocessing is necessary to segregate its parts as well as to eliminate any available spurious noise. Primarily, System training is achieved via a signature record which...
Uploads
Papers by usman bature