<?xml version="1.0" encoding="UTF-8"?><feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
<title>Reji R</title>
<link href="http://202.88.229.59:8080/xmlui/handle/123456789/360" rel="alternate"/>
<subtitle/>
<id>http://202.88.229.59:8080/xmlui/handle/123456789/360</id>
<updated>2026-04-14T19:51:50Z</updated>
<dc:date>2026-04-14T19:51:50Z</dc:date>
<entry>
<title>3D Facial Features in Neuro Fuzzy Model for Predictive Grading of Childhood Autism</title>
<link href="http://202.88.229.59:8080/xmlui/handle/123456789/1065" rel="alternate"/>
<author>
<name>Reji, R</name>
</author>
<id>http://202.88.229.59:8080/xmlui/handle/123456789/1065</id>
<updated>2018-01-23T06:40:03Z</updated>
<published>2017-01-01T00:00:00Z</published>
<summary type="text">3D Facial Features in Neuro Fuzzy Model for Predictive Grading of Childhood Autism
Reji, R
Autism Spectrum Disorder (ASD) is a clinically heterogeneous neurological developmental &#13;
disorder. It is called a spectrum disorder because of its range of symptoms. Early diagnosis and proper&#13;
intervention is required for the effective treatment of autism. Diagnosis is based on the quantitative&#13;
and qualitative analysis made by the clinician. The expertise of the clinician is so important in the&#13;
proper diagnosis and classification of autism. This paper proposes an Expert system that act as a&#13;
support system to the clinician. Major clinical attributes of autism along with facial features are used&#13;
as input to the expert system. The main highlight is the use of feautures from 3D facial imagery for&#13;
autism classification. The expert system operates in two modes, diagnosis mode and grading mode.&#13;
Naïve Bayes classifier is initially used for diagnosis mode where as overall system is implemented&#13;
using a Neuro-Fuzzy approach. In the diagnosis mode 100% accuracy and in classification mode&#13;
98.8% accuracy is obtained.
</summary>
<dc:date>2017-01-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>3D Face Recognition System in Time Critical Security Applications</title>
<link href="http://202.88.229.59:8080/xmlui/handle/123456789/1064" rel="alternate"/>
<author>
<name>Reji, R</name>
</author>
<id>http://202.88.229.59:8080/xmlui/handle/123456789/1064</id>
<updated>2018-01-23T06:35:24Z</updated>
<published>2017-01-01T00:00:00Z</published>
<summary type="text">3D Face Recognition System in Time Critical Security Applications
Reji, R
3D face recognition has gained lot of attention due to improved sensors and advanced algorithms,&#13;
deployment of this modality in biometrics systems is common now days. This paper presents the application&#13;
of Region based 3D face recognition system. Region based face recognition system works by extracting 15 small&#13;
regions from the frontal face; Modified face recognition algorithm along with hierarchical contour based&#13;
registration technique is applied for finding similarity. We are operating this system in two modes namely the&#13;
verification mode and the confirmation mode. The approaches employed is Distributed computing which gives&#13;
more insight into the implementation of the system in time critical applications.
</summary>
<dc:date>2017-01-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>Altered Fingerprints: Identification and Analysis</title>
<link href="http://202.88.229.59:8080/xmlui/handle/123456789/692" rel="alternate"/>
<author>
<name>Reji</name>
</author>
<author>
<name>Philip, Akhil Mathew</name>
</author>
<id>http://202.88.229.59:8080/xmlui/handle/123456789/692</id>
<updated>2017-07-19T12:37:46Z</updated>
<published>2015-01-01T00:00:00Z</published>
<summary type="text">Altered Fingerprints: Identification and Analysis
Reji; Philip, Akhil Mathew
Automated Fingerprint Identification Systems (AFIS) is&#13;
deployed in law authorization and fringe control applications.&#13;
This has elevated the requirement for guaranteeing that these&#13;
frameworks are not traded off. A few issues identified with&#13;
finger print analysis frameworks security have been explored.&#13;
This includes the utilization of fake fingerprints for disguising&#13;
personality. The issues of finger print alteration or jumbling&#13;
has gotten almost no consideration.  Fingerprint Obfuscation&#13;
alludes to the planned change of the finger print pattern of a&#13;
single person with the goal of veiling his personality. A few&#13;
instances of unique finger print Obfuscation have been&#13;
reported so far. Finger print image quality assessment&#13;
software can't generally identify adjusted fingerprints.   This&#13;
paper highlights the significance of the issue by analyzing&#13;
altered fingerprints and proposes an effective algorithm for&#13;
them.
</summary>
<dc:date>2015-01-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>FACE The most Attractive Biometric</title>
<link href="http://202.88.229.59:8080/xmlui/handle/123456789/364" rel="alternate"/>
<author>
<name>R, Reji</name>
</author>
<id>http://202.88.229.59:8080/xmlui/handle/123456789/364</id>
<updated>2017-06-07T08:51:30Z</updated>
<published>2012-01-01T00:00:00Z</published>
<summary type="text">FACE The most Attractive Biometric
R, Reji
Face Recognition has become one of the most attractive research&#13;
area among Computer Vision and Image processing researchers.This&#13;
technique is one of the least intrusive modalities in biometrics.Face is&#13;
the only biometric that allows us to perform passive detection. Biometrics&#13;
is a science that could assist in this recognition process.There&#13;
is a number of reasons to make face biometric to be superior compared&#13;
to other biometric. Face Contain Anatomical information which is&#13;
unique to each person and no physical interaction is needed.There is a&#13;
growing need for an accurate and automatic human recognition procedure.&#13;
Pattern recognition techniques are an important component of&#13;
intelligent systems and are used for data processing and decision making.FACE&#13;
recognition in 2-D and 3-D has been addressed using a variety&#13;
of methods, including alignment, subregion matching,mapping,&#13;
and principal component analysis (PCA).
</summary>
<dc:date>2012-01-01T00:00:00Z</dc:date>
</entry>
</feed>
