Free Essay

Student

In:

Submitted By gunajyo
Words 6435
Pages 26
Sensors 2012, 12, 3418-3437; doi:10.3390/s120303418
OPEN ACCESS

sensors
ISSN 1424-8220 www.mdpi.com/journal/sensors Article

Improving Fingerprint Verification Using Minutiae Triplets
Miguel Angel Medina-P´ rez 1,2,⋆ , Milton Garc´a-Borroto 1 , e ı Andres Eduardo Gutierrez-Rodr´guez 1 and Leopoldo Altamirano-Robles 2 ı ´ ´ Centro de Bioplantas, Universidad de Ciego de Avila, Carretera a Mor´ n km 9, Ciego de Avila , o C.P. 69450, Cuba 2 ´ Instituto Nacional de Astrof´sica, Optica y Electr´ nica. Luis Enrique Erro No. 1, Sta. Mar´a ı o ı Tonanzintla, Puebla, C.P. 72840, M´ xico e
1 ⋆

Author to whom correspondence should be addressed; E-Mail: migue@bioplantas.cu; Tel.: +53-33-224-016.

Received: 25 January 2012; in revised form: 28 February 2012 / Accepted: 28 February 2012 / Published: 8 March 2012

Abstract: Improving fingerprint matching algorithms is an active and important research area in fingerprint recognition. Algorithms based on minutia triplets, an important matcher family, present some drawbacks that impact their accuracy, such as dependency to the order of minutiae in the feature, insensitivity to the reflection of minutiae triplets, and insensitivity to the directions of the minutiae relative to the sides of the triangle. To alleviate these drawbacks, we introduce in this paper a novel fingerprint matching algorithm, named M3gl. This algorithm contains three components: a new feature representation containing clockwise-arranged minutiae without a central minutia, a new similarity measure that shifts the triplets to find the best minutiae correspondence, and a global matching procedure that selects the alignment by maximizing the amount of global matching minutiae. To make M3gl faster, it includes some optimizations to discard non-matching minutia triplets without comparing the whole representation. In comparison with six verification algorithms, M3gl achieves the highest accuracy in the lowest matching time, using FVC2002 and FVC2004 databases. Keywords: fingerprint verification; minutiae descriptor; minutiae triplet

Sensors 2012, 12 1. Introduction

3419

Fingerprints are the marks made by ridges and furrows in the fingers. They are formed during the sixth month of intrauterine life of human beings and do not disappear until some time after death. Since there are not two persons with the same fingerprints and they do not change naturally, they are an important element to identify people. Due to the high complexity of fingerprint matching and the huge amount of existing fingerprints, it is necessary to build computer systems that automatically process fingerprints with high accuracy and low computational costs. Historically, fingerprint recognition systems were mostly used in forensic sciences, but the current popularity of these systems is mainly due to civilian applications such as the control of physical access to facilities, the control of logical access to software, and the control of voters during elections. A key component in fingerprint recognition systems is the fingerprint matching algorithm. To measure the quality of a fingerprint matching algorithm, the evaluator must consider the context in which it is applied. For example, the algorithms based on microscopic characteristics are suitable for applications where fingerprints are acquired with high resolution sensors (1,000 dpi or higher); the quality of these algorithms dramatically decreases when the resolution is low [1]. The following quality parameters are proved to be important for evaluating general matchers: • Low computational cost: The algorithm satisfies memory and time restrictions for its application context [2]. • Invariance to translation: The algorithm returns a high similarity value when comparing fingerprints from the same finger notwithstanding that fingerprints be translated horizontally and/or vertically [3]. • Invariance to rotation: The algorithm returns a high similarity value when comparing fingerprints from the same finger in spite of fingerprints rotation [3]. • Tolerance to non-linear distortion: The algorithm returns a high similarity value when comparing fingerprints from the same finger even when fingerprints are affected by non-linear distortion, as a result of fingerprint creation mechanisms [4]. • Sensitivity to the individuality of fingerprints: The algorithm returns a high similarity value when comparing fingerprints from the same finger and returns a low similarity value when comparing fingerprints from different fingers [5]. • Insensitivity to select a single alignment: The algorithm does not perform a single global alignment from the best local alignment. Maximizing the local similarity value does not guarantee to find a true matching local structure pair. Even if the selected local structure pair is a true matching pair, it is not necessarily the best pair to carry out fingerprint alignment [3]. • Tolerance to partial fingerprints: The algorithm returns a high similarity value when comparing fingerprints from the same finger even when the fingerprints are not complete [5]. Partial fingerprints can be produced by the restrictions of the sensors, latent fingerprints in crime scenes, and different fingerprint creation mechanisms. • Tolerance to the low quality of fingerprints: The results of the algorithm are not significantly affected by low fingerprint quality [6]. Due to different skin conditions and/or the different fingerprint creation mechanisms, sometimes many details of the fingerprints do not appear clearly.

Sensors 2012, 12

3420

• Tolerance to errors of the feature extractor: The algorithm returns a high similarity value when comparing fingerprints from the same finger even when the feature extractor has missed some features and/or has extracted some non-existent features [3]. • Determinism: Two executions of the algorithm with the same parameters return the same results. Modern technologies impose new challenges to fingerprint matching algorithms; new systems reside on light architectures, need standards for systems interoperability, and use small area sensors [3,4,7]. In these contexts, the algorithms with higher quality are those based on minutiae [2]. Minutiae are the points where the ridge continuity breaks and they are typically represented as (x, y, θ); where (x, y) represent the 2D point coordinates, and θ the ridge direction at that point. As a minutia-based matcher should be invariant to translation and rotation, the process of minutia pairing is ambiguous [8]. Thus, most matchers in this family use local minutia structures (minutiae descriptors) to quickly establish the minutiae correspondences [4]. A simple and accurate minutiae descriptor is based on minutiae triplets [3]. Minutiae triplets are local structures represented by three minutiae. Algorithms based on minutiae triplets have the following advantages, which make them of higher quality than algorithms based on other representations: • They are tolerant to fingerprint deformations [9]. • They are faster and more accurate, compared to algorithms based on other representations [10,11], especially in applications with partial fingerprints [12]. • They are suitable for applications based on interoperability standards because the most popular standards are based only on minutiae [2]. • They are appropriate for systems embedded on light architectures because the representation and comparison of minutiae triplets can be performed efficiently [13]. • Minutiae triplets have higher discriminative power than minutiae pairs and single minutiae [10]. Some important quality parameters related to fingerprint matching algorithms based on minutiae triplets are: • Invariance to the order of minutiae in the feature: No matter the minutiae order in the triplet, the algorithm finds the correct correspondences of minutiae when matching similar triplets (Figure 1). • Sensitivity to the reflection of minutiae triplets: The algorithm does not match a triplet with its reflected version (Figure 2). • Sensitivity to the directions of the minutiae relative to the sides of the triangle: In order to find similar triplets, the algorithm takes into account the directions of the minutiae relative to the sides of the triangles formed by the triplets (Figure 3).

Sensors 2012, 12 Figure 1. Similar minutiae triplets that were not classified as true matching by some algorithms because in image (a) the features are arranged according to the length of the sides, in image (b) the algorithms try to match the main minutia q1 (left triplet) with the main minutia p1 (right triplet).

3421

(a)

(b)

Figure 2. Minutiae triplets that do not match because (p1 , p2 , p3 ) is a reflected version of (q1 , q2 , q3 ).

Figure 3. Minutiae triplets that do not match because minutiae pairs (q1 , p1 ), (q2 , p2 ) and (q3 , p3 ) highly differ in the directions of the minutiae relative to the sides of the triangles.

State-of-the-art algorithms based on minutiae triplets do not fulfil all the quality parameters, which has a negative impact on their accuracy. Table 1 shows the lacking quality parameter of all the reviewed matchers, according to the following parameters: I Invariance to the order of minutiae in the feature.

Sensors 2012, 12 II III IV V VI Sensitivity to the reflection of minutiae triplets. Sensitivity to the directions of the minutiae relative to the sides of the triangle. Insensitivity to select a single alignment. Tolerance to errors of the feature extractor. Determinism.

3422

Table 1. Summary of the lacking quality parameter on fingerprint matching algorithms based on minutiae triplets. Lacking quality parameter Algorithms JY [9] KV [14] PN [11] JG1 [12] JG2 [5] RUR [13] TB [15] FFCS [16] CTYZ [17] XCF [18] ZGZ [19] HK [20] GSM [21] I X X X X X X X X X X X X X X X X X X X X X X X II III IV V X X X X X VI

X X X

X

In this research, we introduce M3gl, a new fingerprint matcher that fulfils most quality parameters. M3gl is based on a new representation and a new comparison function for minutia triplets. An experimental comparison with algorithms based on different types of minutiae descriptors shows that M3gl is highly accurate and it has acceptable computational costs. 2. Definitions This section defines some basic functions that we use throughout the paper. Given two minutiae pi = (xi , yi , θi ) and pj = (xj , yj , θj ), ed(pi , pj ) represents the Euclidean distance between the coordinates of pi and pj Equation (1). √ ed(pi , pj ) = (xi − xj )2 + (yi − yj )2 (1) For two given angles α and β, adπ (α, β) computes the minimum angle required to superpose two vectors with the same origin and angles α and β respectively using Equation (2), while ad2π (α, β)

Sensors 2012, 12

3423

computes the angle required to rotate a vector with angle β in clockwise sense to superpose it to another vector with the same origin and angle α using Equation (3). ( ) adπ (α, β) = min |α − β| , 2π − |α − β| { β−α if β > α ad2π (α, β) = β − α + 2π otherwise (2) (3)

Finally, for a given pair of minutiae pi and pj , ang(pi , pj ) computes the angle of the vector with initial point at pi and terminal point at pj using Equation (4).   arctan(∆y/∆x)     arctan(∆y/∆x) + 2π   ang(pi , pj ) = arctan(∆y/∆x) + π    π/2     3π/2 where ∆y = yi − yj and ∆x = xi − xj . 3. Feature Representation In this section, we introduce m-triplets, a robust feature representation based on minutiae triplets. Provided that a fingerprint is described by the minutia set P , our representation is a tuple with the following components (see Figure 4): • minutiae pi ∈ P are clockwise arranged starting on p1 . • di∈1...3 , where di is the Euclidean distance between the minutiae different than pi . • dmax , dmid and dmin are the maximum, middle and minimum distances in the triplet, respectively. Although these components can be calculated based on distance values, we store them because they are a key point for the algorithm optimizations. ( ) • αi∈1...6 are the angles ad2π ang(p, q), θ required to rotate the direction θ of a minutia to superpose it to the vectors associated with the other two minutiae in the triplet. ( ) • βi = ad2π θj , θk is the angle required to rotate the direction of the minutia pk in order to superpose it to the direction of the minutia pj . The m-triplets are sensitive to the directions of the minutiae relative to the sides of the triangle (angles α). The minutiae in this representation are arranged in clockwise direction without a central minutia. Therefore, in order to compare m-triplets, the similarity function considers the three minutiae rotations in clockwise sense (next section contains a formal definition of this procedure). This representation and the comparison function guarantee the invariance to the order of minutiae in the feature, and the sensitivity to the reflection of minutiae triplets. if ∆x > 0 ∧ ∆y if ∆x > 0 ∧ ∆y if ∆x < 0 if ∆x = 0 ∧ ∆y if ∆x = 0 ∧ ∆y ≥0 0 π/4) π i i (7) sθ (t, r) = 1 otherwise

Sensors 2012, 12

3425

The function sd Equation (8) compares m-triplets in terms of the side lengths of the triangle formed by the triplet minutiae. sd returns values in the interval [0, 1], returning 0 if at least one length difference is greater than threshold tl . sd returns 1 if all length differences are 0; that is, the triangles formed by both m-triplets are identical.  ( 0 if ∃i |dt − dr | > tl ) i i (8) sd (t, r) = 1 − maxi=1...3 {|dt − dr |}/tl otherwise i i

The function sα Equation (9) compares m-triplets based on the angles formed by minutiae directions and the sides of the triangles (angles α on Figure 4).  ( 0 t r if ∃i adπ (αi , αi ) > ta ) sα (t, r) = (9) 1 − maxi=1...6 {adπ (αt , αr )}/ta otherwise i i

The function sβ Equation (10) compares m-triplets based on relative minutiae directions (angles β on Figure 4  ( 0 if ∃i adπ (βit , βir ) > ta ) sβ (t, r) = (10) 1 − maxi=1...3 {adπ (β t , β r )}/ta otherwise i i Equations (9) and (10) return values in the interval [0, 1]. They return 0 if at least two compared angles differ more than threshold ta . The less the angles differ, the higher is the value returned by the equations; therefore, they return 1 if the compared angles are identical. In order to detect dissimilar m-triplets in advance, avoiding all costly shifts, we use Theorems 1, 2, and 3. Proofs for Theorems 1 and 2 appear in the appendixes. Proof of Theorem 3 is similar to the proof of Theorem 1 and is not stated. Theorem 1. Given two m-triplets t and r, if |dt − dr | > tl then sinv (t, r) = 0. max max Theorem 2. Given two m-triplets t and r, if |dt − dr | > tl then sinv (t, r) = 0. mid mid Theorem 3. Given two m-triplets t and r, if |dt − dr | > tl then sinv (t, r) = 0. min min Based on these theorems, we can modify sinv Equation (5). This way, our m-triplets similarity can be re-written as Equation (11). { 0 if (|dt − dr | > tl ) ∨ (|dt − dr | > tl ) ∨ (|dt − dr | > tl ) min min max max mid mid (11) sinv (t, r) = max{spart (t, r), spart (t, shif t(r)), spart (t, shif t(shif t(r)))}, otherwise Local distance threshold tl and angle threshold ta are parameters of the algorithm and must be tuned according to the image characteristics. The function sinv , by means of spart , achieves the invariance to translation and the invariance to restricted rotation, the tolerance to non-linear distortion and the sensitivity to the directions of the minutiae relative to the sides of the triangle. The clockwise shifting makes function sinv invariant to the order of minutiae in the feature and sensitive to the reflection of minutiae triplets.

Sensors 2012, 12 5. M3GL Algorithm

3426

In this section, we introduce M3gl, a new fingerprint verification algorithm based on the proposed minutiae triplet representation and similarity measure. Given a fingerprint described by the minutia set P we compute the m-triplets as follows. For each p ∈ P , find its c nearest minutiae in P and build all m-triplets that include p and two of its nearest minutiae, discarding duplicates. This way of computing m-triplets makes M3gl tolerant to the low quality of fingerprints and tolerant to errors of the feature extractor. Additionally, m-triplets in the fingerprint are sorted according to the length of the largest side to perform a binary search when looking for similar m-triplets; Theorem 1 guarantees the safety of this procedure. M3gl consists of the following major steps: local minutiae matching, global minutiae matching, and similarity score computation. 5.1. Local Minutiae Matching This step finds the similar m-triplets in the template fingerprint using binary search. Then, it sorts all matching pairs according to the similarity value and finds the local matching minutiae. Formally, the algorithm is the following: 1. Let Q and P be the query and template fingerprint minutiae sets respectively. Let R and T be the query and template fingerprint m-triplets sets respectively. Let A ← {} be the set that will contain local matching m-triplets pairs. 2. For each query m-triplet ri ∈ R perform binary search looking for the template m-triplets {t1 , t2 , . . . , tu } ⊂ T with similarity value higher than 0 and add the pairs (ri , t1 ), (ri , t2 ), . . . , (ri , tu ) to A. 3. Sort in descendant order all matching pairs (r, t) in A according to the similarity value. 4. Let M ← {} be the set containing local matching minutiae pairs. 5. For each (r, t) ∈ A do { } (a) Let B ← (q1 , p1 ), (q2 , p2 ), (q3 , p3 ) be the matching minutiae that maximizes sinv (r, t) where q1 , q2 , q3 ∈ Q and p1 , p2 , p3 ∈ P . (b) For each (qi , pi ) ∈ B do: i. If there is not any pair (qj , pj ) ∈ M that qj = qi or pj = pi then M ← M ∪ {(qi , pi )}. 5.2. Global Minutiae Matching This step uses every minutiae pair as a reference pair for fingerprint rotation and performs a query minutiae transformation for each reference pair. Later, it selects the transformation that maximizes the amount of matching minutiae. This strategy overcomes the limitations of the single alignment based matching. M3gl uses three criteria to determine if two minutiae match at global level and to achieve the tolerance to non-linear distortion. First, the Euclidean distance must not exceed threshold tg . Second, minutia directions must not exceed threshold ta . Third, the directions differences relative to reference minutiae pair must not exceed threshold ta . The formal algorithm is the following:

Sensors 2012, 12

3427

1. Let n ← 0 be the maximum number of matching minutiae computed after performing all fingerprint rotations. 2. For each (qi , pi ) ∈ M do: (a) Let E ← {} be the set containing global matching minutiae pairs for the current iteration. [ ] (b) For each (qj , pj ) ∈ M , if ∀(qk , pk ) ∈ E (qj ̸= qk ) ∧ (pj ̸= pk )        x2 cos(∆θ) −sin(∆θ) 0 x 3 − x1 x′      ′  ′ ′ ′ ′ i. Compute q = (x , y , θ ) as y  = sin(∆θ) cos(∆θ) 0  y3 − y1  +  y2  θ2 0 0 1 θ3 − θ1 θ′ where qi = (x1 , y1 , θ1 ), pi = (x2 , y2 , θ2 ), ∆θ = θ2 − θ1 , qj = (x3 , y3 , θ3 ). ( ) ii. Let pj = (x4 , y4 , θ4 ); if ed(q′ , pj ) ≤ tg ∧ adπ ad2π (θ2 , θ1 ), ad2π (θ4 , θ3 ) ≤ ta ∧ adπ (θ′ , θ4 ) ≤ ta , then E ← E ∪ {(qj , pj )}. (c) if n < |E| then n ← |E|. 5.3. Similarity Score Computation The similarity value is computed using the formula |Pn ; where P and Q are the template and query ||Q| fingerprint minutiae sets respectively, and n is the amount of matching minutiae pairs. Global distance threshold tg and angle threshold ta are parameters of the algorithm, and must be tuned based on the image characteristics. 6. Experimental Results In order to evaluate the new fingerprint matching algorithm, we use databases DB1 A, DB2 A, DB3 A and DB4 A of FVC2002 and FVC2004 competitions. These databases are commonly used as benchmarks for evaluating fingerprint matchers in the context of fingerprint verification. We also use the FVC evaluation protocol [22]. Performance is measured by indicators EER, FMR100, FMR1000 and ZeroFMR. The indicator Time refers to the average matching time in milliseconds. We carry out all the experiments on a laptop with an Intel Core i7 740QM processor (1.73 GHz) and 4 GB of RAM. We use the same parameters values for M3gl in all databases (tl = 12, tg = 12, ta = π/6, c = 4). We estimate these parameters through a few experiments using fingerprint databases DB1 B, DB2 B, DB3 B and DB4 B of FVC2004 competition. In the experimental comparisons, we include the algorithm proposed by Jiang and Yau [9] (JY) because it is the most popular algorithm based on minutiae triplets in the literature. We implement the algorithm proposed by Parziale and Niel [11] (PN) because it is the algorithm based on minutiae triplets more similar to our proposal and we are interested in showing the difference in accuracy and speed. We also compare our proposal with algorithms based on other types of minutiae descriptors, that is why we implement the algorithms proposed by Wang et al. [23] (WLC), Qi et al. [24] (QYW), Tico and Kuosmanen [25] (TK), and Udupa et al. [26] (UGS). Figures 5 and 6 show that M3gl achieves lower FNMR for most of the FMR values. Tables 2 and 3 show that our algorithm achieves the best results for most of the performance indicators. Figure 7 shows examples where our algorithm is able to find true matching minutiae in difficult cases (partial
2

Sensors 2012, 12

3428

fingerprints with low overlapping, non-linear distortion and low quality) where the other algorithms fail. M3gl is also the fastest algorithm due to the following reasons: • The m-triplets similarity function includes the properties demonstrated in Theorems 1, 2 and 3 to discard comparisons without performing all its operations. • The algorithm performs binary search when looking for similar m-triplets in the local minutiae matching step. Figure 5. ROC curves with the performance of the compared algorithms in FVC2002.

Sensors 2012, 12 Figure 6. ROC curves with the performance of the compared algorithms in FVC2004.

3429

The similarity score computation of M3gl is simple but robust. In order to test this robustness we substitute the similarity score computation of M3gl for the strategies proposed by Wang et al. [23], Qi et al. [24], Jiang and Yau [9], and Tico and Kuosmanen [25]; we name the new algorithms M3gl1, M3gl2, M3gl3 and M3gl4 respectively. We test M3gl and its variations in the testing databases DB1 B, DB2 B, DB3 B and DB4 B of FVC2002 and FVC2004. The experimental results (Tables 4 and 5) do not show a clear superiority of any algorithm; nevertheless, when comparing M3gl with the other algorithms by pairs, we find that M3gl wins in most of the accuracy indicators.

Sensors 2012, 12

3430

Table 2. Experimental results on databases DB1 A, DB2 A, DB3 A and DB4 A of FVC2002. Database Algorithm D B 1 A WLC QYW JY TK PN UGS M3gl WLC QYW JY TK PN UGS M3gl WLC QYW JY TK PN UGS M3gl WLC QYW JY TK PN UGS M3gl EER 29.5 22.8 5.1 4.0 1.9 2.2 1.1 34.0 22.8 4.5 3.6 1.4 1.9 1.3 29.8 30.0 9.4 7.7 5.6 5.3 3.1 22.9 24.3 7.4 5.1 3.1 4.2 2.4 FMR100 FMR1000 ZeroFMR Time(ms) 57.2 46.8 10.6 4.9 2.5 2.8 1.3 63.6 47.8 8.3 4.6 1.6 2.3 1.4 57.4 55.7 16.4 9.8 6.9 8.0 4.5 51.7 57.3 13.0 7.1 3.9 7.1 3.4 63.6 52.6 23.9 7.0 3.4 4.1 2.3 69.3 53.7 17.3 6.3 2.4 4.9 1.9 62.7 63.5 26.1 12.6 10.2 12.2 7.5 61.0 63.2 23.0 9.4 5.6 12.6 5.6 66.9 55.9 31.9 8.9 5.8 5.9 3.8 72.6 59.2 27.6 23.1 3.5 5.6 2.2 65.0 77.9 33.1 16.4 12.8 26.4 9.4 63.5 67.6 28.3 12.1 10.3 16.8 11.2 123.0 13.6 3.3 12.4 20.3 1,239.4 1.4 269.6 27.2 4.6 19.1 44.4 2,846.1 1.6 27.1 6.3 1.5 5.8 5.6 96.0 0.6 37.0 8.5 2.1 8.4 10.3 463.0 1.0

D B 2 A

D B 3 A

D B 4 A

Sensors 2012, 12 Figure 7. Two examples where all matching algorithms fail but our algorithm finds true matching minutiae. The first row contains fingerprints db1 36 1 and db1 36 4 of database DB1 A (FVC2002); the second row contains fingerprints 85 6 and 85 8 of database DB1 A (FVC2004).

3431

Table 3. Experimental results on databases DB1 A, DB2 A, DB3 A and DB4 A of FVC2004. Database Algorithm D B 1 A WLC QYW JY TK PN UGS M3gl WLC QYW JY EER 27.3 24.3 13.5 15.9 11.4 7.9 6.3 28.1 24.8 11.0 FMR100 FMR1000 ZeroFMR Time(ms) 64.8 60.6 28.5 29.1 17.7 14.8 11.4 62.1 52.1 19.4 73.9 80.3 42.8 41.8 24.4 24.9 19.3 68.9 58.9 28.4 77.3 97.3 55.9 51.0 25.9 31.3 21.7 78.0 73.7 39.2 150.0 15.5 4.2 11.7 20.9 1,649.4 1.3 103.0 12.9 3.0

D B

Sensors 2012, 12

3432

Table 3. Cont. Database Algorithm 2 A TK PN UGS M3gl WLC QYW JY TK PN UGS M3gl WLC QYW JY TK PN UGS M3gl EER 7.8 10.0 6.4 6.2 24.5 19.7 12.0 9.6 7.1 5.1 6.1 23.6 25.5 9.7 7.6 5.2 5.1 3.0 FMR100 FMR1000 ZeroFMR Time(ms) 12.0 12.1 10.5 9.1 57.9 47.7 22.1 19.7 10.7 8.6 8.6 54.9 55.5 16.3 11.4 6.9 7.6 4.0 18.7 15.1 16.7 13.6 64.9 65.9 32.3 32.9 17.6 14.1 14.4 65.0 65.8 25.3 16.6 9.3 11.2 6.9 24.9 16.9 19.9 15.3 69.5 87.5 41.4 37.3 24.9 22.4 16.4 70.0 74.7 28.6 39.4 11.9 13.1 10.3 11.6 14.9 1,210.8 1.1 312.0 22.6 6.4 17.0 38.0 6,510.9 1.9 108.8 13.3 3.2 11.8 17.2 1,687.1 1.2

D B 3 A

D B 4 A

Table 4. Experimental results on databases DB1 B, DB2 B, DB3 B and DB4 B of FVC2002. Database Algorithm D B 1 B D B 2 B D M3gl1 M3gl2 M3gl3 M3gl4 M3gl M3gl1 M3gl2 M3gl3 M3gl4 M3gl M3gl1 EER 1.7 2.5 1.4 1.6 2.0 0.7 1.9 0.8 1.9 0.7 6.5 FMR100 FMR1000 ZeroFMR Time(ms) 2.5 1.6 2.9 2.9 2.5 1.1 2.5 0.8 2.9 1.1 9.4 3.6 3.2 3.6 3.2 3.2 1.8 3.2 1.8 2.9 1.8 12.1 3.6 3.2 3.6 3.2 3.2 1.8 3.2 1.8 2.9 1.8 12.1

Sensors 2012, 12

3433

Table 4. Cont. Database Algorithm B 3 B D B 4 B M3gl2 M3gl3 M3gl4 M3gl M3gl1 M3gl2 M3gl3 M3gl4 M3gl EER 7.7 6.9 6.9 6.4 2.3 2.8 2.2 4.0 2.4 FMR100 FMR1000 ZeroFMR Time(ms) 13.9 9.3 11.4 9.3 3.6 3.9 3.2 32.5 3.6 18.6 11.8 27.9 11.1 19.6 11.1 16.4 78.2 19.6 18.6 11.8 27.9 11.1 19.6 11.1 16.4 78.2 19.6

Table 5. Experimental results on databases DB1 B, DB2 B, DB3 B and DB4 B of FVC2004. Database Algorithm D B 1 B D B 2 B D B 3 B D B 4 B M3gl1 M3gl2 M3gl3 M3gl4 M3gl M3gl1 M3gl2 M3gl3 M3gl4 M3gl M3gl1 M3gl2 M3gl3 M3gl4 M3gl M3gl1 M3gl2 M3gl3 M3gl4 M3gl EER 4.0 5.8 3.8 6.4 2.5 9.7 12.9 8.9 11.4 10.5 0.9 3.1 1.0 3.7 0.6 3.4 4.6 3.8 5.3 4.2 FMR100 FMR1000 ZeroFMR Time(ms) 5.4 24.3 6.1 33.6 5 21.1 25.0 18.9 25.0 20.7 1.4 6.1 1.4 48.2 0.7 6.1 11.4 6.1 20.0 6.1 10.4 30.7 13.6 50.4 9.3 24.3 28.6 20.7 31.1 25.7 2.5 24.6 2.5 70.4 1.4 7.5 13.2 7.9 72.9 7.5 10.4 30.7 13.6 50.4 9.3 24.3 28.6 20.7 31.1 25.7 2.5 24.6 2.5 70.4 1.4 7.5 13.2 7.9 72.9 7.5

Sensors 2012, 12

3434

Experimental results confirm that fulfilling the quality parameters discussed in Section 1 has a direct impact in the matcher accuracy. 7. Conclusions Fingerprint matching algorithms based on minutiae triplets have proved to be fast and accurate. They are commonly used on light architectures and in systems based on interoperability standards for fingerprints represented by minutiae. However, existing algorithms have several limitations that affect their accuracy. In this paper, we identify the quality parameters that have a more significant impact on fingerprint matching accuracy in order to create M3gl, a more accurate matcher. M3gl uses a new representation based on minutiae triplets and a new comparison function that achieves the invariance to the translation and rotation of fingerprints, and achieves the sensitivity to the directions of the minutiae relative to the sides of the triangle. The new representation arranges the minutiae in clockwise sense and the comparison function performs the three possible rotations of the triplets achieving the invariance to the order of minutiae in the feature and the sensitivity to the reflection of minutiae triplets. The components of the proposed representation are compared using thresholds that allow the tolerance to the non-linear distortion of fingerprints. Besides, the new comparison function includes optimizations that avoid comparing all the components of the triplets, increasing the matching speed in many cases. M3gl is deterministic, insensitive to select a single alignment, and sensitive to the individuality of fingerprints. It uses a simple and effective procedure to compute minutiae triplets which makes the algorithm tolerant to the low quality of fingerprints and to errors of the feature extractor. Experimental results in databases of the FVC2002 and FVC2004 competitions show that M3gl has low computational costs and is more accurate than other algorithms based on minutiae triplets and other algorithms based on different representations. In the near future we plan to study the behaviour of the new algorithm for latent fingerprint identification. Acknowledgment The authors would like to thank Dania Yudith Su´ rez Abreu for her valuable contribution improving a the grammar and style of this paper. References 1. Zhao, Q.; Zhang, D.; Zhanga, L.; Luoa, N. High resolution partial fingerprint alignment using pore-valley descriptors. Pattern Recogn. 2010, 43, 1050–1061. 2. Cappelli, R.; Ferrara, M.; Maltoni, D. Minutia cylinder-code: A new representation and matching technique for fingerprint recognition. IEEE Trans. Pattern. Anal. Mach. Intell. 2010, 32, 2128–2141. 3. Maltoni, D.; Maio, D.; Jain, A.K.; Prabhakar, S. Handbook of Fingerprint Recognition, 2nd ed.; Springer-Verlag: London, UK, 2009. 4. Jain, A.K.; Feng, J.; Nandakumar, K. Fingerprint matching. Computer 2010, 43, 36–44.

Sensors 2012, 12

3435

5. Jea, T.Y. Minutiae-Based Partial Fingerprint Recognition. PhD Thesis, State University of New York, NY, USA, 2005. 6. Jain, A.K.; Feng, J. Latent fingerprint matching. IEEE Trans. Pattern. Anal. Mach. Intell. 2011, 33, 88–100. 7. Prabhakar, S.; Ivanisov, A.; Jain, A.K. Biometric recognition: Sensor characteristics and image quality. IEEE Instrum. Meas. Mag. 2011, 14, 10–16. 8. Feng, J. Combining minutiae descriptors for fingerprint matching. Pattern Recogn. 2008, 41, 342–352. 9. Jiang, X.; Yau, W.Y. Fingerprint Minutiae Matching Based on the Local and Global Structures. In Proceedings of the 15th International Conference on Pattern Recognition, Barcelona, Spain, 3–7 September 2000; Volume 2, pp. 1038–1041. 10. Chen, X.; Tian, J.; Yang, X. A new algorithm for distorted fingerprints matching based on normalized fuzzy similarity measure. IEEE Trans. Image Process. 2006, 15, 767–776. 11. Parziale, G.; Niel, A. A Fingerprint Matching Using Minutiae Triangulation. In Proceedings of the 1st International Conference on Biometric Authentication, Hong Kong, China, 15–17 July 2004; Volume LNCS 3072, pp. 241–248. 12. Jea, T.Y.; Govindaraju, V. A minutia-based partial fingerprint recognition system. Pattern Recogn. 2005, 38, 1672–1684. 13. Reisman, J.; Uludag, U.; Ross, A. Secure Fingerprint Matching with External Registration. In Proceedings of the 5th International Conference on Audio- and Video-Based Biometric Person Authentication (AVBPA ’05), Tarrytown, NY, USA, July 2005; Volume LNCS 3546, pp. 720–729. 14. Kovcs-Vajna, Z.M. A fingerprint verification system based on triangular matching and dynamic time warping. IEEE Trans. Pattern. Anal. Mach. Intell. 2000, 22, 1266–1276. 15. Tan, X.; Bhanu, B. Fingerprint matching by genetic algorithms. Pattern Recogn. 2006, 39, 465–477. 16. Feng, Y.; Feng, J.; Chen, X.; Song, Z. A Novel Fingerprint Matching Scheme Based on Local Structure Compatibility. In Proceedings of the 18th International Conference on Pattern Recognition, Hong Kong, China, 20–24 August 2006; Volume 4, pp. 374–377. 17. Chen, X.; Tian, J.; Yang, X.; Zhang, Y. An algorithm for distorted fingerprint matching based on local triangle feature set. IEEE Trans. Inf. Forensics Secur. 2006, 1, 169–177. 18. Xu, W.; Chen, X.; Feng, J. A Robust Fingerprint Matching Approach: Growing and Fusing of Local Structures. In Proceedings of the 2nd International Conference on Biometrics, Seoul, Korea, 27–29 August 2007; Volume LNCS 4642, pp. 134–143. 19. Zheng, J.D.; Gao, Y.; Zhang, M.Z. Fingerprint Matching Algorithm Based on Similar Vector Triangle. In Proceedings of the 2nd International Congress on Image and Signal Processing (CISP ’09), Tianjin, China, 17–19 October 2009; pp. 1–6. 20. Hoyle, K. Minutiae Triplet-Based Features with Extended Ridge Information for Determining Sufficiency in Fingerprints. Master Thesis, Virginia Polytechnic Institute and State University, Burruss Hall Blacksburg, VA, USA, 2011.

Sensors 2012, 12

3436

21. Ghazvini, M.; Sufikarimi, H.; Mohammadi, K. Fingerprint Matching Using Genetic Algorithm and Triangle Descriptors. In Proceedings of the 19th Iranian Conference on Electrical Engineering, Tehran, Iran, 17–19 May 2011; pp. 1–6. 22. Cappelli, R.; Maio, D.; Maltoni, D.; Wayman, J.L.; Jain, A.K. Performance evaluation of fingerprint verification systems. IEEE Trans. Pattern. Anal. Mach. Intell. 2006, 28, 3–18. 23. Wang, W.; Li, J.; Chen, W. Fingerprint Minutiae Matching Based on Coordinate System Bank and Global Optimum Alignment. In Proceedings of the 18th International Conference on Pattern Recognition, Hong Kong, China, 20–24 August 2006; Volume 4, pp. 401–404. 24. Qi, J.; Yang, S.; Wang, Y. Fingerprint matching combining the global orientation field with minutia. Pattern Recogn. Lett. 2005, 26, 2424–2430. 25. Tico, M.; Kuosmanen, P. Fingerprint matching using an orientation-based minutia descriptor. IEEE Trans. Pattern. Anal. Mach. Intell. 2003, 25, 1009–1014. 26. Udupa U, R.; Garg, G.; Sharma, P. Fast and Accurate Fingerprint Verification. In Proceedings of the 3rd International Conference on Audio- and Video-Based Biometric Person Authentication (AVBPA ’01), Halmstad, Sweden, 6–8 June 2001; Volume LNCS 2091, pp. 192–197. Appendix Theorem Proofs Theorem A1. Given two m-triplets t and r, if |dt − dr | > tl then sinv (t, r) = 0. max max Proof. From the definition of m-triplet we have: dr ≥ dr max mid dr ≥ dr max min dr ≥ dr mid min (A1) (A2) (A3)

Assume, without loss of generality, that dt > dr ; then, from the hypothesis of Theorem A1, we max max infer that: dt − dr > tl (A4) max max which is equivalent to: dt − tl > dr max max From Equations (A5) and (A1) we have dt − tl > dr ; which is equivalent to: max mid dt − dr > tl mid max Similarly, from Equations (A5) and (A2) we obtain: dt − dr > tl min max (A7) (A6) (A5)

From Equations (A4), (A6) and (A7) we conclude that dt differs more than threshold tl with respect max r r r to dmax , dmid and dmin respectively. Therefore, sd (t, r) returns 0 for every clockwise shifting of r and consequently sinv (t, r) = 0.

Sensors 2012, 12 Theorem A2. Given two m-triplets t and r, if |dt − dr | > tl then sinv (t, r) = 0. mid mid Proof. From the definition of m-triplet we have: dt ≥ dt max mid

3437

(A8)

Assume, without loss of generality, that dt > dr ; then, from the hypothesis of Theorem A2, we mid mid infer that: dt − dr > tl (A9) mid mid which is equivalent to: dt − tl > dr mid mid From Equation (A10) and (A3) we have dt − tl > dr ; which is equivalent to: min mid dt − dr > tl mid min Similarly, from Equations (A8) and (A9) we obtain: dt − dr > tl max mid Additionally, from Equations (A8) and (A11) we obtain: dt − dr > tl max min (A13) (A12) (A11) (A10)

t From Equations (A9), (A11), (A12) and (A13) we conclude that dt max and dmid differ more than threshold tl with respect to both dr , dr . Therefore, sd (t, r) returns 0 for every clockwise shifting of min mid r and consequently sinv (t, r) = 0.

c ⃝ 2012 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/).

Similar Documents

Free Essay

Student

...Revision of Critical essay *Introduction In today's society there is a lot of pressure on students academically to have a good performance and with that comes a lot of stress. Some students find a way to try to balance their hectic school life style whether it be some kind of recreational activity. One of those activities is sports and whether it can make a better student. I believe that yes it can increase your performance academically because it teaches you skills such as focus, fitness and communication with others. In the article “do athletes make better students, Natalie Gil written for the guardian.com. Natlie Gil claims that studies show that doing both can benefit studies and sports performance, providing motivation and preparation. Natalie Gil also goes on to state that it helps organization and pervents procrastination and that being fit alters students mood in a good way claiming a healthy body is a healthy mind. Lastly, Natalie Gil goes on to show evidence that it also helps with communication and team work whether at school or later in landing a career. Pathos Natalie Gil Appeals to the stress and desire to succeed in today's world as students upcoming in today's society. She also uses the points or appeal to support her view or stance on the subject that athletes do make better students and that this will lead to success not only in their academic life but also in their career choice Logos Natalie...

Words: 616 - Pages: 3

Premium Essay

Student

...are important to be included in the evaluation of teaching effectiveness. These factors are as the criteria for the evaluating of educational effectiveness. Some of these factors still work as a criterion for the evaluation process. While, the other factors have to be excluded from the evaluation and not to be given as much weight. Therefore, the main goal of this study is to ask administrators about which items still valid until the now and have to be included in the evaluation process and which of these items are invalid to be an evaluation criterion. This article also offers the main sources of data for evaluation of faculty performance as one of the important components of evaluation of educational effectiveness. There sources are students’ evaluation tools, teaching portfolios, classroom visitation reports, and scholarship activities. These sources offer significant information about the faculty performance and consequently they will contribute significantly in assessing and evaluating the teaching effectiveness. There are some items of evaluation have to be included and be given more weight in any evaluation process of the educational effectiveness because they have a significant relation to the success of the evaluation process. These items are currency in field, peers evaluation, classroom visits, professors preparations. While, there are some items have to be excluded because they do not contribute in success of evaluation of teaching effectiveness...

Words: 325 - Pages: 2

Free Essay

Student

...SOX testing, I was also assigned to assist building the Compliance Universe for the whole organization. I appropriately allocated my time and energy to these two projects, so that I completed most of my work in a high quality and on a timely basis. I am a dedicated team player who loves communicating with people. I interviewed Hologic’s employees to understand key business processes, joined all the staff meetings and presented my ideas and achievements to the team, collaborated with colleagues to work on other projects to meet the deadline. I am also a person with great research and analytical skills. I used CCH, FASB Codification and some other information sources to finish my cases in academic study. Even though I am an international student, I believe that I am better for this position than anyone else. Companies like Signiant need global perspective people. I majored in International economy and trade during undergraduate study. I have knowledge about foreign currency, international transactions and taxes. All I need is a chance to learn and contribute in a fast-paced company like Signiant. The enclosed resume briefly summarizes my educational background and experiences, I would like to meet with you for an interview during which I can fully express my capacity and desire to work for Signiant. In the meantime, if you need any additional information, please contact me by phone at 781-502-8582 or via e- mal at liulezi2012@hotmail.com Thank you for your time and...

Words: 319 - Pages: 2

Free Essay

Student

...Study of Asia-Pacific MBA Programs Bloomberg Business week posted an article on March 17th 2014 titled, Elite Business Schools Hike Tuition for the Class of 2016. This article draws a comparison between tuition costs for the class of 2015 for selected US MBA programs and the class of 2016. Tuition costs are increasing more and more every year, for this reason looking at other alternatives may be more cost effective. The following study provides and interpretation of tuition cots both local and foreign in the Asia-Pacific region. From this study we can see the comparison between tuition costs and starting salaries. We can also see other deciding factors such as admission requirements. Finally this study provides a recommendation for an MBA program in the Asia-Pacific region. Please note Table 1.1 listing the study’s programs with their correlating graph ID. Table 1.1 Business School | Graph ID | Lahore University of Management Sciences | LUMS | Indian Institute of Management (Calcutta) | IIMC | University of New South Wales (Sydney) | UNSW | Indian Institute of Management (Bangalore) | IIMB | Curtin Institute of Technology (Perth) | CIT | Massey University (Palmerston North, New Zealand) | MU | University of Queensland (Brisbane) | UQ | University of Adelaide | UA | Monash Mt. Eliza Business School (Melbourne) | MMEBS | Melbourne Business School | MBS | Royal Melbourne Institute of Technology | RMIT | Macquarie Graduate School of Management...

Words: 3907 - Pages: 16

Free Essay

Student

...THE RATE OF INVOLVEMENT OF KPTM KL’S STUDENTS IN SPORTS AT THE COLLEGE Prepared by : MUHAMMAD AEZHAD BIN AZHAR CVB130724387 MUHAMMAD FARHAN BIN ABDUL RAHMAN CVB130724287 RAHMAN MUSTAQIM BIN KHOSAIM CVB130724279 MUHAMMAD AIMAN BIN MOHD HUSNI CVB130724388 Prepared for : Madam Jaaz Suhaiza Jaafar Submitted in partial fulfillments of the requirement of the 106km course. TABLE OF CONTENTS NUMBER | CONTENTS | PAGES | 1. | ACKNOWLEDGEMENT | 3 | 2. | INTRODUCTION | 4 | 3. | OBJECTIVES | 5 | 4. | METHODOLOGY | 6-7 | 5. | GRAPH | 8-11 | 6. | CONCLUSION | 12 | 7. | APPENDIX TABLE | 13 | 8. | APPENDIX | 14-17 | ACKNOWLEDGEMENT First of all,we really want to thankful to Madam Jaaz Suhaiza Jaafar because allowed me to do this mini project until we’ve successfully completed it.We want thankful too because madam helped us a lot such as give instructions or order how to make it properly done until we’ve finished it. If we didn’t get help from madam,its really hard to us for completed it in a short time. We also want to very thankful too all our 50 respondents which all of them its from KPTM KL students who was in diploma,degree or professional. They all was nice and very friendly with us and nobody refuse to give a little time to fill up our questionnaire. We really want to wish thanked you so much because without them we can’t finished our mini project. Last but not least,thank you so much too our...

Words: 2116 - Pages: 9

Premium Essay

Student

...playing a basic rule in the education, and the government was searching for a solution to eliminate this phenomenon. They found that establish public schools overall the states will improve a lot of the poor income people to be introduced in the educational field, and over the years will produce community with cultured educated society. The education is varies in all levels, starting from preschool reaching to postgraduate like masters and doctoral degree. The insurance of improvement in education that any non U.S graduate must have multiple exams prior to admission e.g. TOEFL, ILETS, GRE, GMAT. Nowadays there are gradual increase in the numbers of international students want to continue their educations in United States. The improvement of the education in United States is very obvious and attracts the students worldwide, and they release a lot of plans in progress. All the opportunities social, health, economic, academic will depend on the basic structure...

Words: 306 - Pages: 2

Free Essay

Student

...Retention(n), retain verb (used with object) the ​continued use, ​existence, or ​possession of something or someone:Two ​influential ​senators have ​argued for the retention of the ​unpopular ​tax.The retention of ​old ​technology has ​slowed the company's ​growth.​water/​heat retention Particularly(adv) Especially(adv) Deter(v) to make someone less likely to do something, or to make something less likely to happen caydırmak, vazgeçirmek, yıldırmak Perception(n) BELIEF [C]› what you think or believe about someone or something algılama, sezgi, görme The public perception of him as a hero is surprising. NOTICE [U] the ability to notice something fark etme, farkına varma, tanıma, görme Alcohol reduces your perception of pain. Conationimpulse Unanimous agreed by everyoneoy birliği ile üzerinde uzlaşılan; herkesçe kabul edilen; genel kabul görenThe jury was unanimous in finding him guilty. unanimity     /ˌjuːnəˈnɪməti/ noun [U]› when everyone agrees about somethinggenel/toplumsal uzlaşı; oy birliği ile anlaşma; genel kabul; fikir birliğiunanimously adverb›oy birliği ile kabul edilmişThe members unanimously agreed to the proposal. dissonancenoun [U]  UK   /ˈdɪs.ən.əns/  US   /ˈdɪs.ə.nəns/      › specialized music a ​combination of ​sounds or ​musical ​notes that are not ​pleasant when ​heard together:the ​jarring dissonance of Klein's ​musical ​score› formal ​disagreement dissonant adjective UK   /ˈdɪs.ən.ənt/  US   /ˈdɪs.ə.nənt/ specializedor formal ›a dissonant ​combination of...

Words: 335 - Pages: 2

Premium Essay

Student

...Student Handbook 2015/2016 www.praguecollege.cz Table of Contents Introduction Message from the Director Mission, Vision and Values Why study at Prague College Admissions A short guide to Prague College qualifications English for Higher Education Foundation Diploma in Business Foundation Diploma in Computing Foundation Diploma in Art & Design Professional Diplomas in Business Professional Diplomas in Computing Higher National Diploma BA (Hons) International Business Management BA (Hons) International Business Management (Flexible Study Programme) BA (Hons) Business Finance & Accounting BA (Hons) Graphic Design BA (Hons) Fine Art Exp. Media BSc (Hons) Computing BA (Hons) Communications & Media Studies MSc International Management MSc Computing Accreditation & Validation UK/Pearson Credit system Transfer of credits Student support Accommodation Study Advising and Support Financial support Visas for foreign students Scholarships Benefits for students Study abroad Internships Assistance in employment Counselling Centre Student Resources Computer labs Online Learning Centre (Moodle) Prague College email Physical library Digital Library ISIFA Images Textbooks and class materials Graphic Design/Interactive Media/Fine Art materials and costs Personal computers Message boards and digital signs Newsletters Open lectures, seminars and events Student ID cards Centre for Research and Interdisciplinary Studies (CRIS) Prague...

Words: 27092 - Pages: 109

Free Essay

International Student

...[pic] TOPIC: INTERNATIONAL STUDENTS’ ATTITUDES ABOUT HIGHER EDUCATION IN THE UK Student: Pham Trang Huyen My Student ID: 77142444 10 weeks Pre-sessional course December, 2013 List of content Abstract 3 1. Introduction 4 2. Literature review 5 2.1. Higher Education in the UK 5 2.2. Teacher-student relationships and the quality of teaching 5 2.3. Different learning styles 6 2.4. Group work 7 2.5. Financial issues 8 3. Methodology 9 4. Results 10 5. Discussion 14 6. Conclusion 16 List of References 17 Appendix 19 Abstract Higher education is a competitive business which produces huge benefits for the UK economy. This paper reveals international students’ attitudes about UK higher education and focuses on direct factors which can affect students’ opinions. Reports of international students’ attitudes already carried out in Leeds Metropolitan University are analyzed and the main findings are emphasized. A total of eighteen international students interviewed provided data on their experience in UK education that involves the challenges they have faced and what they have achieved. The project concludes that not only UK tuition fees but also the quality of education can affect international students’ decision to study in the UK. Therefore measures should be taken in...

Words: 3732 - Pages: 15

Free Essay

Working Student

...INTRODUCTION Many students of HRM in Taguig City University work part-time Employment during school could improve grades if working promotes aspects that correspond with academic success, such as industriousness or time management skills, or instead reduce grades by reducing time and energy available for school work. Otherwise, working might be associated with academic performance, yet not directly influence it, if unobserved student differences influence both labor supply and grades. Unmotivated students might neither work for pay nor receive good grades because they put little effort into the labor market or school. In contrast, HRM students uninterested in academics might work long hours that would otherwise have been devoted to leisure. Students might misjudge the link between college achievement and future earnings when making labor supply decisions. If so, obtaining a consistent estimate of how such decisions affect academic performance is prospectively important for policy consideration. Some of HRM students in Taguig City University Students are more likely to work than they are to live on campus, to study full time, to attend a four-year college or university, or to apply for or receive financial aid. Students work regardless of the type of institution they attend, their age or family responsibilities, or even their family income or educational and living expenses. Most HRM students at Taguig City University face many challenges in their already busy everyday lives...

Words: 2898 - Pages: 12

Free Essay

Student Adversity

... Adversity allows an individual to develop a sense of discipline, as well as encouraging individuals to exercise their mind to confront a problem or conflict. Specifically, students who encounter hardships are more inclined to try harder, which promotes competition within the school. Although adversity may be beneficial towards some students, challenges can be detrimental for students who lack confidence. For instance, some students develop a mentality of despair; they believe that if one has to work hard, then the person does not have the natural ability for the assignment. Based on the effects of adversity aforementioned, I believe that students can both benefit from the obstacles faced in school with the proper mentality or the effects could be hindering. Students face adversity every day, regardless of how transparent the obstacle may be; some problems may not be as evident as others. According to Carol S. Dweck, author of Brainology, all students face adversities throughout their high-school career, specifically, the challenge of overcoming a fixed mindset. In this excerpt, “The belief that intelligence is fixed dampened students’ motivation to learn, made them afraid of effort, and made them want to quit after a setback”, Carol portrays the illusion that students have over intuitive intelligence (Dweck 2). Students who share this belief of a...

Words: 1029 - Pages: 5

Free Essay

Student Handbook

...Student Handbook (Procedure & Guideline) for Undergraduate Programmes 2014 Revised: April 2014 UCSI Education Sdn. Bhd. (185479-U) VISION AND MISSION STATEMENT OF UCSI UNIVERSITY VISION STATEMENT To be an intellectually resilient praxis university renowned for its leadership in academic pursuits and engagement with the industry and community MISSION STATEMENT  To promote transformative education that empowers students from all walks of life to be successful individuals with integrity, professionalism and a desire to contribute to society  To optimize relationships between industry and academia through the provision of quality education and unparalleled workplace exposure via Praxis Centres  To spearhead innovation in teaching and learning excellence through unique delivery systems  To foster a sustainable culture of research, value innovation and practice, in partnership with industries and society  To operate ethically at the highest standards of efficiency, while instilling values of inclusiveness, to sustain the vision for future generations 2 UCSI Education Sdn. Bhd. (185479-U) Graduate Attributes Getting a university degree is every student‟s ultimate dream because it opens doors to career opportunities anywhere in the world. A university degree is proof of one‟s intellectual capacity to absorb, utilize and apply knowledge at the workplace. However, in this current competitive world, one‟s knowledge and qualifications...

Words: 28493 - Pages: 114

Premium Essay

Student Policy

...Student Academic Policies Computer Usage: Sullivan University Systems (SUS) provides computer networking for all staff, students and anyone else affiliated with the university community. Sullivan University will provide a platform that is conducive for learning while maintain and respecting the user privacy. Users are authorized to use the accounts only. Passwords should be protected, please keep the confidential (Computer Usage. (2012) Sullivan University. Student Handbook 2012-2013, pp. 12-14.). While using the SUS users have a responsibility and are expected to follow some key rules: 1. Do not abuse the equipment 2. Computers must be used for course work 3. No unauthorized down loading 4. At no time will user install software of any kind Disciplinary action for violations of the Computer usage of policy will be enforced and are as follows: 1. Loss of computer privileges 2. Disconnection from the network 3. Expulsion 4. Prosecution The Compute usage policy is standard and pretty straight forward. The statement lets students know what is and is not proper usage. What I would have like to have seen is a social media portion in the usage policy. Academic Integrity: Cheating and Plagiarism is a violation of the University’s Academic Integrity Policy. All students are expected to submit their own work. Penalties for those who are found guilty of cheating may include: (Academic Integrity. (2014, January 1) Sullivan University. Sullivan University 2014 Catalog...

Words: 320 - Pages: 2

Premium Essay

Student Satisfaction

...between the quality of school facilities and student...

Words: 2174 - Pages: 9

Premium Essay

Working Students

...performance of hiring working students Introduction While most students have parents that can support them, there are those students that need get what you call a “part-time job” to help their parents that can’t support them all the way. However, being employed and being a student can be too much to a person. The business process outsourcing industry in the Philippines has grown 46% annually since 2006. In its 2013 top 100 ranking of global outsourcing destinations. Significance of the Study There are situations in the life when one must do what they can to achieve their dreams or help their families. Especially if dealt with financial difficulties and there is a need work while studying. They also need to deal with their everyday busy schedules. This research aims to help understand and discuss the issues and concerns of the employed students to benefit the following: Working Students – Being an employee and student at the same time takes a lot of hard work. It can be rigorous but also rewarding especially if you helped your parents. It can also be a good working experience for them for their future. This study will assist them to see the behaviors that help them achieve their professional skills. Scope and Limitations This is study is conducted at the LPU-Manila and the information is viewed only in the light of the particular student and his or her experience as working student. It does not reflect the view of the general working student population or that of other...

Words: 606 - Pages: 3