This book provides an integrated solution for security and safety in the home, covering both assistance in health monitoring and safety from strangers/intruders who want to enter the home with harmful intentions. It defines a system whereby recognition of a person/stranger at the door is done using three modules: Face Recognition, Voice Recognition and Similarity Index. These three modules are taken together to provide a percentage likelihood that the individual is in the "known" or "unknown" category. The system can also continuously monitor the health parameters of a vulnerable person living alone at home and aid them in calling for help in an emergency. The authors have analyzed a number of existing biometric techniques to provide security for an individual living alone at home. These biometric techniques have been tested using MATLAB® image processing and signal processing toolboxes, and results have been calculated on the basis of recognition rate. A major contribution in providing security is a hybrid algorithm proposed by the author named PICA, which combines features of both PCA (Principle Component Analysis) and ICA (Independent Component Analysis) algorithms. This hybrid approach gives better performance recognition than either system alone. The second proposed hybrid algorithm for voice recognition is named as a MFRASTA algorithm by combining features of MFCC (Mel Frequency Cepstral Coefficient) and RASTA-PLP (RelAtive SpecTrA-Perceptual Linear Prediction) algorithm. After performing experiments, results are collected on the basis of recognition rate. The authors have also proposed a third technique named as a Similarity Index to provide trust-based security for an individual. This technique is text independent in which a person is recognized by pronunciation, frequency, tone, pitch, etc., irrespective of the content spoken by the person. By combining these three techniques, a high recognition rate is provided to the person at the door and high security to the individual living independently at home. In the final contribution, the authors have proposed a fingertip-based application for health monitoring by using the concept of sensors. This application is developed using iPhone 6’s camera. When a person puts their fingertip on a camera lens, with the help of brightness of the skin, the person’s heartbeat will be monitored. This is possible even with a low-quality camera. In case of any emergency, text messages will be sent to the family members of the individual living alone by using 3G Dongle and MATLAB tool. Results show that the proposed work outperforms all the existing techniques used in face recognition, voice recognition, and health monitoring alone.
IoT Fundamentals with a Practical Approach is an insightful book that serves as a comprehensive guide to understanding the foundations and key concepts of Internet of Things (IoT) technologies. The book begins by introducing readers to the concept of IoT, explaining the significance and potential impact on various industries and domains. It covers the underlying principles of IoT, including its architecture, connectivity, and communication protocols, providing readers with a solid understanding of how IoT systems are structured and how devices interact within an IoT ecosystem. This book dives into the crucial components that form the backbone of IoT systems. It explores sensors and actuators, explaining their roles in collecting and transmitting data from the physical environment. The book also covers electronic components used in IoT devices, such as microcontrollers, communication modules, and power management circuits. This comprehensive understanding of the building blocks of IoT allows readers to grasp the technical aspects involved in developing IoT solutions. Security is a vital aspect of IoT, and the book dedicates a significant portion to exploring security challenges and best practices in IoT deployments. It delves into topics such as authentication, encryption, access control, and secure firmware updates, providing readers with essential insights into safeguarding IoT systems against potential threats and vulnerabilities. This book also addresses the scalability and interoperability challenges of IoT. It discusses IoT platforms and frameworks that facilitate the development and management of IoT applications, highlighting their role in enabling seamless integration and communication between devices and systems. The book is written in a clear and accessible manner and includes real-world examples, making it suitable for both beginners and professionals looking to enhance their understanding of IoT. It serves as a valuable resource for engineers, developers, researchers, and decision-makers involved in IoT projects and provides them with the knowledge and tools necessary to design, implement, and secure IoT solutions.
Neurological illnesses pose one of the biggest hazards to the healthcare system today. This new book brings together the latest methods of gene therapy that can be used to treat both inherited and sporadic neurodegenerative diseases. It presents the most significant advances in gene transfer methods as well as the most recent understandings of the mechanisms behind specific neurodegenerative illnesses, placing these into the context of gene therapy approaches for the central nervous system. The book introduces the basics of neurodegenerative conditions and the physiological basis for their occurrence in humans. It also discusses the various proteins useful in neuro diseases and their viral applications. The book explores how stem cells can be used to learn about the future of gene therapy along with the significance of the sequences that silence genes. It discusses the functions of astrocytes in different brain regions, as well as in-vivo research in gene therapy for neurodegenerative disorders.
Sustainability in Healthcare: Advances in mHealth AI and Robotics" explores sustainable methods in the healthcare industry, focusing on rural and community healthcare improvement, the use of robots for sustainability, and the implementation of AI in healthcare. It also explores additive manufacturing, mobile health, biomedical engineering, and telemedicine's role in healthcare sustainability management. The book also discusses the ethical concerns, environmental, social, and economic implications of sustainability in healthcare supply chain management and pandemic management.
This book offers valuable insights into the principles, mechanisms of action and applications of traditional and novel enzymes involved in the degradation of wastes. Enzymes are biological catalysts that play an important role in various biochemical reactions. The generation of value-added products by means of these biological processes is also discussed. This book covers the use of in silico and computational methods in understanding the biodegradation processes, and reveals the importance of enzymes in various biochemical reactions and kinetics. The book’s target audience includes undergraduate and graduate students, faculty members at colleges and universities, research students, scientists and industry professionals.
World War II produced a fundamental shift in modern racial discourse. In the postwar period, racism was situated for the first time at the center of international political life, and race's status as conceptual common sense and a justification for colonial rule was challenged with new intensity. In response to this crisis of race, the UN and UNESCO initiated a project of racial reeducation. This global antiracist campaign was framed by the persecution of Europe's Jews and anchored by UNESCO's epochal 1950 Statement on Race, which redefined the race concept and canonized the midcentury liberal antiracist consensus that continues to shape our present. In this book, Sonali Thakkar tells the story of how UNESCO's race project directly influenced anticolonial thought and made Jewish difference and the Holocaust enduring preoccupations for anticolonial and postcolonial writers. Drawing on UNESCO's rich archival resources and shifting between the scientific, social scientific, literary, and cultural, Thakkar offers new readings of a varied collection of texts from the postcolonial, Jewish, and Black diasporic traditions. Anticolonial thought and postcolonial literature critically recast liberal scientific antiracism, Thakkar argues, and the concepts central to this new moral economy were the medium for postcolonialism's engagement with Jewishness. By recovering these connections, she shows how the midcentury crisis of racial meaning shaped the kinds of solidarities between racialized subjects that are thinkable today.
COVID-19 has isolated women from friends and family, and the support systems that mothers rely on to deal with anxieties and share in the excitement of pregnancy and parenting. It has created unforeseen and unbearable situations for both mothers and fathers. But it has also been a hidden blessing for many. Navigating COVID-19 is an anthology that highlights the realities of bringing a new life into the world and raising them in the middle of a pandemic, as well as parenting children of all ages while adapting to the ‘new normal’. The stories are ones of love, bonding, kindness, compassion, strength, survival, resilience, fear, isolation, stress, panic, anxiety and more. It will empower expecting, new and veteran parents in different ways. There is no better way to inspire others to share their stories than by acknowledging your own and sharing them with the world. It forges the most soulful and fulfilling human connections.
This book provides an integrated solution for security and safety in the home, covering both assistance in health monitoring and safety from strangers/intruders who want to enter the home with harmful intentions. It defines a system whereby recognition of a person/stranger at the door is done using three modules: Face Recognition, Voice Recognition and Similarity Index. These three modules are taken together to provide a percentage likelihood that the individual is in the "known" or "unknown" category. The system can also continuously monitor the health parameters of a vulnerable person living alone at home and aid them in calling for help in an emergency. The authors have analyzed a number of existing biometric techniques to provide security for an individual living alone at home. These biometric techniques have been tested using MATLAB® image processing and signal processing toolboxes, and results have been calculated on the basis of recognition rate. A major contribution in providing security is a hybrid algorithm proposed by the author named PICA, which combines features of both PCA (Principle Component Analysis) and ICA (Independent Component Analysis) algorithms. This hybrid approach gives better performance recognition than either system alone. The second proposed hybrid algorithm for voice recognition is named as a MFRASTA algorithm by combining features of MFCC (Mel Frequency Cepstral Coefficient) and RASTA-PLP (RelAtive SpecTrA-Perceptual Linear Prediction) algorithm. After performing experiments, results are collected on the basis of recognition rate. The authors have also proposed a third technique named as a Similarity Index to provide trust-based security for an individual. This technique is text independent in which a person is recognized by pronunciation, frequency, tone, pitch, etc., irrespective of the content spoken by the person. By combining these three techniques, a high recognition rate is provided to the person at the door and high security to the individual living independently at home. In the final contribution, the authors have proposed a fingertip-based application for health monitoring by using the concept of sensors. This application is developed using iPhone 6’s camera. When a person puts their fingertip on a camera lens, with the help of brightness of the skin, the person’s heartbeat will be monitored. This is possible even with a low-quality camera. In case of any emergency, text messages will be sent to the family members of the individual living alone by using 3G Dongle and MATLAB tool. Results show that the proposed work outperforms all the existing techniques used in face recognition, voice recognition, and health monitoring alone.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.