Documentos de Académico
Documentos de Profesional
Documentos de Cultura
Modelo Paper
Modelo Paper
SISTEMAS DE HEMODIÁLISIS
Keywords:Biometrics,security,GPS,Monitoring,Authen
tification II. THEORETICAL FRAMEWORK
C. GSM
Four subsystems are found in the GSM
network main each of which contains a certain amount
of functional units which are connected to the another
through interfaces. The main subsystems of the
network and the elements are [6]:
SEGMENTATION
The first thing that is found is the circle or edge of the
pupil, which will serve us later on knowing the radius
of the pupil in addition to taking the center of the pupil
as a reference for the iris (but these are not concentric).
With which will generate a grayscale histogram
ranging from 0 to 255 pixels, where 0 is black and 255
the whitest hue possible, this will help us to determine
the threshold Because the pupil is the darkest part,
when binarizing the image we will have the image fig.
13 (c). [14]
1. Capture the image Fig. 13 (a) histogram of the image (b) determination of the
The first step for user recognition through of threshold (c) conversion of pixels less than the threshold in
the iris is the image taking. This step is essential since white (source: Trujillo-Peru biometrics presentation)
the development of the entire system will be influenced
by quality of the image taken, so the image should: In the worst case the top tab is turns white
have good resolution, be focused and have good whereupon a median filter is applied to remove it. Fig.
lighting. That is why a high camera is necessary. 13 (c). [14]
quality. [eleven] The Chinese Academy of Sciences-
Institute of automation (CASIA) make various
databases available free iris data. [11], [12], [13].
Fig. 14 (a) the tab was removed (b) the graph theory
algorithm (c) we get the edge the pupil (source: Trujillo-
Peru biometrics presentation)
Segmentation: the image of the iris is Fig. 15 (a) smoothed image (b) detection of edges (c)
located. Normalization: it will allow us to compare circumference detection. (source: paper of biometrics
different irises. Trujillo-Peru)
18 th LACCEI International Multi-Conference for Engineering, Education, and Technology: “Engineering, Integration, and Alliances for a Sustainable
Development” “Hemispheric Cooperation for Competitiveness and Prosperity on a Knowledge-Based Economy”, 29-31 July 2020, Buenos Aires, Argentina.
4
Now the eyelids are located and for this task the eyelid) or also called a mask that will serve to
makes use of Canny again for edge detection, but only subsequent comparisons.
considering horizontal edges fig. 16 (a) and it remove
the eyelids with the Hough transform, but this time
applied to lines fig. 16 (b). [11], [14]
Fig. 18(a) image of the segmented iris (b) iris normalized (c)
noise template (source: argentina magazine student work)
Fig. 16 (a) edge detection, (b) edge detection eyelid lines. CODING
(source: biometrics presentation Trujillo-Peru) After you have processed segmented and normalized
of the image thus obtaining the corresponding
templates, it is necessary to obtain biometric
STANDARDIZATION characteristics and their subsequent coding binary so
Once the iris of the ocular region has been detected,
this crown circular we proceed to convert it into a that a unique code is generated in this way for each
rectangle constant dimensions with which it can be user.
compared to other irises. In this way various images of
To obtain this binary coding, will make use
it irises under different light factors will have the same
spatial characteristics. of the one-dimensional Log-Gabor filters in which the
normalized image will be decomposed into a group of
That is why the normalization of the iris with one-dimensional signals, then each signal is filtered
the use of Daugman's algorithm, called homogeneous using the Log-Gabor filter. Finally, each signal will be
model “Ruber sheet” [18], which defines the area of the
circular crown as polar coordinates and not Cartesian. quantified in 4 different levels according to its location
Each point on the iris is assigned a coordinate (r, θ) and end. [11]
where r varies from [0, 1] and θ from [0, 2π]. He
Redrawn of the iris image can be represented as:
COMPARISON
Table 1
INDICATORS OF FALSE COINCIDENCE FOR SEVERAL
HAMING DISTANCE SELECTION CRITERIA. SOURCE:
ELABORATION BASED ON [DAUGMAN, 2004]
Fig. 21 SIM initialization (source: own)
18 th LACCEI International Multi-Conference for Engineering, Education, and Technology: “Engineering, Integration, and Alliances for a Sustainable
Development” “Hemispheric Cooperation for Competitiveness and Prosperity on a Knowledge-Based Economy”, 29-31 July 2020, Buenos Aires, Argentina.
6
D. GPS TRACKING PHASE At System is easy to implement. The following table
this stage of the System, once the Alert system shows the price of the materials used.
begins GPS tracking in real time for which we Table 2
use the internal GPS that has the SIM808 that It is a COST OF MATERIALS
2G-GPRS gateway and GPS at the same time, all this
We program on the PIC18F47K42.
Fig. 22 Obtaining GPS coordinates (source: own) There is greater control from owners about
who uses their vehicles and the theft rate is reduced.
Where:
4807.038, N Latitude 48 degrees 07.038 'N
01131.000, E Longitude 11 degrees 31.000
'E
1 Quality of arrangement Fig. 24 Index of recovered vehicles, INEI
VI. RECOMMENDATIONS