Volume 15 , Issue 1 , PP: 277-287, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
Ajay Kushwaha 1 , Tushar Kumar Pandey 2 , B. Laxmi Kantha 3 , Prashant Kumar Shukla 4 , Sheo Kumar 5 , Rajesh Tiwari 6 *
Doi: https://doi.org/10.54216/JCIM.150122
Different biological data may be used to identify people in this investigation. The system uses complex multimodal fusion, feature extraction, classification, template matching, adjustable thresholding, and more. A trustworthy multimodal feature vector (B) is created using the Multimodal Fusion Algorithm from voice, face, and fingerprint data. The key objectives are weighing, normalizing, and extracting characteristics. Complex feature extraction algorithms improve this vector and ensure its accuracy and reliability. Hamming distance is utilized in template matching for accuracy. Support vector machines to ensure classification accuracy. The adaptive threshold technique adjusts option limits based on the biology score mean and standard deviation when external conditions change. A thorough look at the research shows how algorithms operate together and how vital each aspect is for locating criminals. Change the multimodal fusion weights for optimum results. Thorough research using tables and photographs revealed that the fingerprint approach is optimal. Fast, simple, and precise technologies may enable new unlawful recognition tools. The adaptive thresholding algorithm's multiple adaptation steps allow the system to adjust to diverse study circumstances. The Multimodal Biometric Identification System is a cutting-edge leader in its area and provides a trustworthy, practical, and customizable research choice. This novel strategy is at the forefront of criminal recognition technology and has been supported by ablation research. It affects reliability, accuracy, and adaptability.
Multimodal Biometrics , Criminal Identification , Multimodal Fusion Algorithm , Feature Extraction , Classification Algorithm , Template Matching , Adaptive Thresholding , Ablation Study , Forensic Technology
[1] H. F. Thurner, I. Jasarevic, Z. Tavas, I. Muhovec, B. Nesrsta, and N. Krauland, "Detection of invisible faults on rockbolts in-situ," in Proceedings of the International Symposium on Rock Bolting Theory and Application in Mining and Underground Construction, August-September 1983. [Online].
[2] P. W. Jayawickrama, Y. Tinkey, G. Jie, and J. Turner, "Non-destructive evaluation of installed soil nails," M.S. thesis, Texas Tech University, Lubbock, Tex, USA, 2007.
[3] V. Roy. " An Effective FOG Computing Based Distributed Forecasting of Cyber-Attacks in Internet of Things" Journal of Cybersecurity and Information Management, Vol. 12, No. 2, 2023 ,PP. 8-17.
[4] S.-T. Liao, C.-K. Huang, and C.-Y. Wang, "Sonic echo and impulse response tests for length evaluation of soil nails in various bonding mediums," Canadian Geotechnical Journal, vol. 45, no. 7, pp. 1025–1035, 2008.
[5] R. Cheung and D. Lo, "Use of time-domain reflectometry for quality control of soil-nailing works," Journal Geotechnical Geoenvironmental Engineering, vol. 137, no. 12, pp. 1222–1235, 2011.
[6] M. D. Beard and M. J. S. Lowe, "Non-destructive testing of rock bolts using guided ultrasonic waves," International Journal of Rock Mechanics and Mining Sciences, vol. 40, no. 4, pp. 527–536, 2003.
[7] Shubham Gupta , Aarushi Dhawan , Arpit Gupta , Arun Kumar Dubey, Facial Expression Recognition with Gender Identification, Fusion: Practice and Applications, Vol. 2 , No. 2 , (2020) : 57-63 (Doi : https://doi.org/10.54216/FPA.020203).
[8] Sujeetha Devi, Bhagyalakshmi L and Sanjay Kumar Suman, “Enhancing the Performance of Wireless Sensor Networks through Clustering and Joint Routing with Mobile Sink”, International Journal of Engineering and Advanced Technology, vol. 8, issue 6, pp. 323-327, 2019
[9] L. Bhagyalakshmi, Sanjay Kumar Suman, S. Mohanalakshmi, and Satyanand Singh, “Improving Spectral Efficiency and Coverage Capacity of 5G Networks: A Review”, Advances in mathematics: scientific journal, vol.9, no. 6, pp. 3387-3397, 2020.
[10] Shivam Grover , Kshitij Sidana , Vanita Jain, Egocentric Performance Capture: A Review, Fusion: Practice and Applications, Vol. 2 , No. 2 , (2020) : 64-73 (Doi : https://doi.org/10.54216/FPA.020204)
[11] Y. Cui and D. H. Zou, "Assessing the effects of insufficient rebar and missing grout in grouted rock bolts using guided ultrasonic waves," Journal of Applied Geophysics, vol. 79, pp. 64–70, 2012.
[12] V. Madenga, "In application of guided ultrasonic waves to grout quality testing of rock bolts," M.S. thesis, Dalhousie University, 2004.
[13] D. H. Zou, Y. Cui, V. Madenga, and C. Zhang, "Effects of frequency and grouted length on the behavior of guided ultrasonic waves in rock bolts," International Journal of Rock Mechanics and Mining Sciences, vol. 44, no. 6, pp. 813–819, 2007.
[14] Xiaohui Yuan , Reem Atassi, Geological Landslide Disaster Monitoring Based on Wireless Network Technology, International Journal of Wireless and Ad Hoc Communication, Vol. 2 , No. 1 , (2021) : 21-32 (Doi : https://doi.org/10.54216/IJWAC.020102)
[15] Mohd Zainal Abidin Ab Kadir , Mhmed Algrnaodi , Ahmed N. Al-Masri, Optimal Algorithm for Shared Network Communication Bandwidth in IoT Applications, International Journal of Wireless and Ad Hoc Communication, Vol. 2 , No. 1 , (2021) : 33-48 (Doi : https://doi.org/10.54216/IJWAC.020103)
[16] D. H. S. Zou, J. Cheng, R. Yue, and X. Sun, "Grout quality and its impact on guided ultrasonic waves in grouted rock bolts," Journal of Applied Geophysics, vol. 72, no. 2, pp. 102–106, 2010.
[17] B. L. Ervin, D. A. Kuchma, J. T. Bernhard, and H. Reis, "Monitoring corrosion of rebar embedded in mortar using high-frequency guided ultrasonic waves," Journal of Engineering Mechanics, vol. 135, no. 1, pp. 9–19, 2009
[18] V. Roy. "An Improved Image Encryption Consuming Fusion Transmutation and Edge Operator." Journal of Cybersecurity and Information Management, Vol. 8, No. 1, 2021 ,PP. 42-52.
[19] S. Sharma and A. Mukherjee, "Monitoring corrosion in oxide and chloride environments using ultrasonic guided waves," Journal of Materials in Civil Engineering, vol. 23, no. 2, pp. 207–211, 2011.
[20] Ashish Sharma, Yogesh Sharma, Radhika Bansal, and Sushant Verma, Empirical Study of Function Point Analysis during Software Development Phase, Journal of Cybersecurity and Information Management, Vol. 2 , No. 1 , (2020) : 20-24 (Doi : https://doi.org/10.54216/JCIM.020103)
[21] Nada M. Alhakkak, A Validation Model for ERP systems, Journal of Cybersecurity and Information Management, Vol. 2 , No. 1 , (2020) : 25-34 (Doi : https://doi.org/10.54216/JCIM.020104)
[22] S. Sharma and A. Mukherjee, "Nondestructive evaluation of corrosion in varying environments using guided waves," Research in Nondestructive Evaluation, vol. 24, no. 2, pp. 63–88, 2013.
[23] J. S. Whittier and J. P. Jones, "Axially symmetric wave propagation in a two-layered cylinder," International Journal of Solids and Structures, vol. 3, no. 4, pp. 657–675, 1967
[24] M. J. S. Lowe, D. N. Alleyne, and P. Cawley, "Defect detection in pipes using guided waves," Ultrasonics, vol. 36, no. 1–5, pp. 147–154, 1998.
[25] F. Moser, L. J. Jacobs, and J. Qu, "Modeling elastic wave propagation in waveguides with the finite element method," NDT & E International, vol. 32, no. 4, pp. 225–234, 1999.
[26] Mustafa Altaee, Talib A., M. A. Jalil, Ali J., Thamer A. Alalwani, Intelligent Multi-Level Feature Fusion Using Remote Sensing and CNN Image Classification Algorithm, Journal of Intelligent Systems and Internet of Things, Vol. 9 , No. 1 , (2023) : 36-48 (Doi : https://doi.org/10.54216/JISIoT.090103)
[27] Ibrahim Najem, Tabarak Ali Abdulhussein, M. H. Ali, Asaad Shakir Hameed, Inas Ridha Ali, M. altaee, Fuzzy-Based Clustering for Larger-Scale Deep Learning in Autonomous Systems Based on Fusion Data, Journal of Intelligent Systems and Internet of Things, Vol. 9 , No. 1 , (2023) : 69-83 (Doi : https://doi.org/10.54216/JISIoT.090105)
[28] S.P. Samyuktha , Dr.P. Kavitha , V.A Kshaya , P. Shalini , R. Ramya, A Survey on Cyber Security Meets Artificial Intelligence: AI– Driven Cyber Security, Journal of Cognitive Human-Computer Interaction, Vol. 2 , No. 2 , (2022) : 50-55 (Doi : https://doi.org/10.54216/JCHCI.020202)
[29] Dwivedi, A., Agarwal, R., & Shukla, P. K. (2023, July). Enhancing Anonymity of Internet of Vehicle Identities in Connected Vehicle Security Services Using Batch Verification Algorithm. In International Conference on Data Science and Applications (pp. 323-335). Singapore: Springer Nature Singapore.
[30] Khare, A., Gupta, R., & Shukla, P. K. (2022). Improving the protection of wireless sensor network using a black hole optimization algorithm (BHOA) on best feasible node capture attack. In IoT and Analytics for Sensor Networks: Proceedings of ICWSNUCA 2021 (pp. 333-343). Springer Singapore.