06.03.2013 Views

Artificial Intelligence and Soft Computing: Behavioral ... - Arteimi.info

Artificial Intelligence and Soft Computing: Behavioral ... - Arteimi.info

Artificial Intelligence and Soft Computing: Behavioral ... - Arteimi.info

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

features in human faces <strong>and</strong> their relative distances. The matching scheme has<br />

other advantages of size <strong>and</strong> rotational invariance. This means that the<br />

matching scheme is insensitive to variation of image sizes or their angular<br />

rotation on the facial image plane. In case facial image matching also fails to<br />

identify the suspects, a voice classification scheme may be employed to check<br />

whether the suspect is a marked criminal of known voice.<br />

The voice classification requires prior training instances. The input <strong>and</strong><br />

the output training instances in the present context are speech features <strong>and</strong><br />

recorded suspect number respectively. We trained a multi-layered feedforward<br />

neural net with the known training instances. The training is given<br />

offline by the well-known back-propagation algorithm. During the recognition<br />

phase, only the speech features of the suspect are determined <strong>and</strong> supplied to<br />

the input of the neural net. A forward pass through the network generates the<br />

output signals. The node with the highest value in the output layer is<br />

considered to have correspondence with the suspect. In case these tests are<br />

inadequate for identification of the suspects, the incidental description is used<br />

to solve the problem.<br />

The incidental description includes facts like Loved (jim, mita), Hadstrained-relations-between<br />

(jim, mita) <strong>and</strong> may contain both imprecision <strong>and</strong><br />

inconsistency of facts. We used a simplified model of fuzzy Petri net,<br />

presented in chapter 10, to continue reasoning in the presence of the above<br />

types of incompleteness of the database. The reasoning system finally<br />

identifies the culprit <strong>and</strong> gives an explanation for declaring the person as the<br />

culprit. The proposed system was tested with a number of simulated<br />

criminology problems. The field testing of the system is under progress.<br />

The next section covers image matching as it has been used in both fingerprint<br />

<strong>and</strong> face identification from raw images.<br />

23.2 Introduction to Image Matching<br />

Fuzzy logic has been successfully used for matching of digital images [2],<br />

[3]. However, the methods of matching adopted in these works are<br />

computationally intensive <strong>and</strong> sensitive to rotation <strong>and</strong> size variation of<br />

images. Further, the existing matching techniques, which search a reference<br />

image among a set of images, often fail to identify the correct image in the<br />

presence of noise. The present work attempts to overcome these limitations by<br />

a new approach using the concept of ‘fuzzy moments’ [2].<br />

In this work, a gray image has been partitioned into n 2 non- overlapped<br />

blocks of equal dimensions. Blocks containing regions of three possible<br />

characteristics, namely, ‘edge’, ‘shade’ <strong>and</strong> ‘mixed-range’ [14], are then<br />

identified <strong>and</strong> the sub-classes of edges based on their slopes in a given block

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!