Filippo Sorbello

ORCID: 0000-0002-4947-3453
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Biometric Identification and Security
  • User Authentication and Security Systems
  • Neural Networks and Applications
  • Algebraic and Geometric Analysis
  • Digital Image Processing Techniques
  • Forensic Fingerprint Detection Methods
  • Advanced Vision and Imaging
  • Face and Expression Recognition
  • Advanced Steganography and Watermarking Techniques
  • Parallel Computing and Optimization Techniques
  • Speech Recognition and Synthesis
  • Mobile Agent-Based Network Management
  • Image Retrieval and Classification Techniques
  • Handwritten Text Recognition Techniques
  • Medical Image Segmentation Techniques
  • Speech and Audio Processing
  • Vehicle License Plate Recognition
  • Image and Signal Denoising Methods
  • AI-based Problem Solving and Planning
  • Microbial Metabolic Engineering and Bioproduction
  • Web Data Mining and Analysis
  • Image Enhancement Techniques
  • Mathematics and Applications
  • Computer Graphics and Visualization Techniques
  • Advanced Image Processing Techniques

University of Palermo
2007-2016

Institute for High Performance Computing and Networking
2005-2006

National Research Council
2004-2005

National Academies of Sciences, Engineering, and Medicine
2004

The basic aim of a biometric identification system is to discriminate automatically between subjects in reliable and dependable way, according specific-target application. Multimodal systems fuse two or more physical behavioral traits provide optimal False Acceptance Rate (FAR) Rejection (FRR), thus improving accuracy dependability. In this paper, an innovative multimodal based on iris fingerprint proposed. paper state-of-the-art advancement multibiometrics, offering perspective features...

10.1109/tsmcc.2010.2045374 article EN IEEE Transactions on Systems Man and Cybernetics Part C (Applications and Reviews) 2010-04-28

Medical imaging involves important computational geometric problems, such as image segmentation and analysis, shape approximation, three-dimensional (3D) modeling, registration of volumetric data. In the last few years, Conformal Geometric Algebra (CGA), based on five-dimensional (5D) Clifford Algebra, is emerging a new paradigm that offers simple universal operators for representation solution complex problems. However, widespread use CGA has been so far hindered by its high dimensionality...

10.1109/tc.2014.2315652 article EN IEEE Transactions on Computers 2014-04-04

Automatic road sign recognition systems are aimed at detection and of one or more signs from real-world color images. In this research, detected extracted real world scenes on the basis their shape features. A dynamic region growing technique is adopted to enhance segmentation results obtained in HSV space. The based a threshold that reduces effect hue instability due external brightness variation. Classification then performed candidate regions using multilayer perceptron neural networks....

10.1109/ijcnn.2002.1007503 article EN 2003-06-25

Driver's drowsiness is stated as an important cause of road and highway accidents. Therefore, the development a system for monitoring driver's level fatigue desirable in order to prevent The paper presents design implementation able find evidence driver ordinary motor vehicle, car system, made up installed infrared video camera connected Celoxica RC203E FPGA based board, perform real time stream processing. exploits "bright pupil" phenomenon produced by retina, that reflects 90% incident...

10.1109/aina.2010.151 article EN 2010-04-01

10.1007/s12652-011-0049-z article EN Journal of Ambient Intelligence and Humanized Computing 2011-03-29

Fingerprint classification and matching are two key issues in automatic fingerprint recognition. Generally, recognition is based on a set of relevant local characteristics, such as ridge ending bifurcation (minutiae). global features, core delta singularity points. Unfortunately, points not always present image: the acquisition process ideal, so that broken, or belongs to arch class. In above cases, pseudo-singularity-points will be detected extracted make possible matching. As result,...

10.1109/cisis.2010.134 article EN ˜... œInternational Conference on Complex, Intelligent and Software Intensive Systems 2010-02-01

The development and the diffusion of distributed systems, directly connected to recent communication technologies, move people towards era mobile ubiquitous systems. Distributed systems make merchant-customer relationships closer more flexible, using reliable e-commerce technologies. These environments need many access points, for creation management secure identities recognition users. Traditionally, these points can be made possible by a software system with main central server. This work...

10.1155/2009/284124 article EN cc-by Mobile Information Systems 2009-01-01

In this paper a novel embedded fingerprints authentication system based on core and delta singularity points detection is proposed. Typical fingerprint recognition systems use for classification tasks. On the other hand, available optical photoelectric sensors give high quality images with well defined points, if they are present. proposed system, matching position, orientation, relative distance detection. As result, involves comparison between few features leading to very fast rates...

10.1109/cisis.2008.56 article EN ˜... œInternational Conference on Complex, Intelligent and Software Intensive Systems 2008-01-01

Computer graphics applications require efficient tools to model geometric objects. The traditional approach based on compute-intensive matrix calculations is error-prone due a lack of integration between reasoning and matrix-based algorithms. Clifford algebra offers solution these issues since it permits specification geometry at coordinate-free level. best way exploit the symbolic computing power (Clifford) supporting its data types operators directly in hardware. This paper outlines...

10.1109/dsd.2007.4341505 article EN 2007-08-01

Computer graphics applications require efficient tools to model geometric objects. The traditional approach based on compute-intensive matrix calculations is error-prone due a lack of integration between reasoning and matrix-based algorithms. Clifford algebra offers solution these issues since it permits specification geometry at coordinate-free level. best way exploit the symbolic computing power (Clifford) supporting its data types operators directly in hardware. This paper outlines...

10.1109/dsd.2007.17 article EN Digital Systems Design 2007-08-29

Geometric or Clifford algebra (CA) is a powerful mathematical tool that offers natural and intuitive way to model geometric facts in number of research fields, such as robotics, machine vision, computer graphics. Operating higher dimensional spaces, its practical use hindered, however, by significant computational cost, only partially addressed dedicated software libraries hardware/software codesigns. For low-dimensional algebras, several hardware accelerators coprocessing architectures have...

10.1109/tc.2012.225 article EN IEEE Transactions on Computers 2012-09-14

Fingerprint classification is a key issue in automatic fingerprint identification systems. One of the main goals to reduce item search time within database without affecting accuracy rate. In this paper, novel technique, based on topological information, for efficient described. The proposed system composed two independent modules: former module, Fuzzy C-Means, extracts best set training images, latter C-Means and Naive Bayes classifier, assigns class each processed using only directional...

10.1109/cisis.2014.23 article EN 2014-07-01

The present work deals with modern computing systems security issues, focusing on biometric based asymmetric keys generation process. Conventional PKI are private/public generated through RSA or similar algorithms. solution embeds information the In addition corresponding private key depends physical behavioural features and it can be when is needed. Starting from fingerprint acquisition, identifier extracted, cyphered, stored in tamper-resistant smart card to overcome problems of...

10.1109/cisis.2012.116 article EN 2012-07-01

User identification is a very interesting and complex task. Invasive biometrics based on traits uniqueness immutability over time. In forensic field, fingerprints have always been considered an essential element for personal recognition. The traditional issue focused full fingerprint images matching. this paper advanced technique recognition partial proposed. This system local analysis micro-features, endpoints bifurcations, extraction. proposed approach starts from minutiae extraction image...

10.1109/cisis.2013.46 article EN 2013-07-01

The efficiency and the accuracy of a digital feedforward neural networks must be optimized to obtain both high classification rate minimum area on chip. In this paper an efficient MLP implementation. key features hardware implementation are virtual neuron based architecture use sinusoidal activation function for hidden layer. effectiveness proposed solutions has been evaluated developing different FPGA prototypes energy physics domain automatic road sign recognition domain. decreases...

10.1109/dsd.2005.38 article EN 2022 25th Euromicro Conference on Digital System Design (DSD) 2005-12-22
Coming Soon ...