<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">IASC</journal-id>
<journal-id journal-id-type="nlm-ta">IASC</journal-id>
<journal-id journal-id-type="publisher-id">IASC</journal-id>
<journal-title-group>
<journal-title>Intelligent Automation &#x0026; Soft Computing</journal-title>
</journal-title-group>
<issn pub-type="epub">2326-005X</issn>
<issn pub-type="ppub">1079-8587</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">22583</article-id>
<article-id pub-id-type="doi">10.32604/iasc.2022.022583</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Performance Analysis of Two-Stage Optimal Feature-Selection Techniques for Finger Knuckle Recognition</article-title><alt-title alt-title-type="left-running-head">Performance Analysis of Two- Stage Optimal Feature-Selection Techniques for Finger Knuckle Recognition</alt-title><alt-title alt-title-type="right-running-head">Performance Analysis of Two- Stage Optimal Feature-Selection Techniques for Finger Knuckle Recognition</alt-title>
</title-group>
<contrib-group content-type="authors">
<contrib id="author-1" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Jayapriya</surname><given-names>P.</given-names></name><email>jayapriy@gmail.com</email>
</contrib>
<contrib id="author-2" contrib-type="author">
<name name-style="western"><surname>Umamaheswari</surname><given-names>K.</given-names></name>
</contrib><aff><institution>Department of Information Technology, PSG College of Technology</institution>, <addr-line>Coimbatore, 641004</addr-line>, <country>India</country></aff>
</contrib-group><author-notes><corresp id="cor1">&#x002A;Corresponding Author: P. Jayapriya. Email: <email>jayapriy@gmail.com</email></corresp></author-notes>
<pub-date pub-type="epub" date-type="pub" iso-8601-date="2021-11-3"><day>3</day>
<month>11</month>
<year>2021</year></pub-date>
<volume>32</volume>
<issue>2</issue>
<fpage>1293</fpage>
<lpage>1308</lpage>
<history>
<date date-type="received"><day>12</day><month>8</month><year>2021</year></date>
<date date-type="accepted"><day>14</day><month>9</month><year>2021</year></date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2022 Jayapriya and Umamaheswari</copyright-statement>
<copyright-year>2022</copyright-year>
<copyright-holder>Jayapriya and Umamaheswari</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_IASC_22583.pdf"></self-uri>
<abstract>
<p>Automated biometric authentication attracts the attention of researchers to work on hand-based images to develop applications in forensics science. Finger Knuckle Print (FKP) is one of the hand-based biometrics used in the recognition of an individual. FKP is rich in texture, less in contact and known for its unique features. The dimensionality of the features, extracted from the image, is one of the main problems in pattern recognition. Since selecting the relevant features is an important but challenging task, the feature subset selection is an optimization problem. A reduced number of features results in enhanced classification accuracy. The proposed FKP system presents a mulitalgorithm fusion based on subspace algorithms at feature level fusion technique. In this paper, a new feature-selection algorithm, which is a Modified Magnetotatic bacterium Optimization Algorithm (MMBOA), is proposed for finger knuckle recognition to select relevant and useful features that increase the classification accuracy. The distinct characteristic of this bacterium influences the design of a new optimization technique. The hybrid features such as <bold>Ei</bold>gen and <bold>Fi</bold>sher (EiFi) are extracted from the finger knuckle. The fusion of this feature vector is optimized using newly proposed MMBOA_mr optimization algorithm. The results demonstrate a significant improvement compared with unimodal identifiers, and the proposed approach significantly outperforms with a recognition accuracy of 99.7% with 22 features with the reduction rate of 72%. Additionally, the proposed approach is compared with the state-of-the-art methods.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>FKP</kwd>
<kwd>Eifi feature extraction</kwd>
<kwd>feature selection</kwd>
<kwd>MMBOA</kwd>
<kwd>GWO</kwd>
<kwd>KNN</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<label>1</label>
<title>Introduction</title>
<p>Authenticating a reliable user is important for e-commerce applications. In today&#x2019;s real-life application, the world is afraid of the Coronavirus, which moves our biometric recognition system towards the contactless user identification system. Out of the various hand-based biometrics, Finger Knuckle print (FKP) is unique for an individual. Finger Knuckle represents the dorsum back surface of the hand. The texture and geometric shape features of the finger knuckle are used in the identification process of an individual to give the projected results. The advantage of using finger knuckle instead of other biometrics is its user-friendliness, invariant to emotions, low cost and user acceptance rate, which is incredibly high. The convex form lines and skin wrinkles on the finger dorsal surface are small in size, making them very unique in individual identification, which is typically not smashed as it is with the upper hand. Furthermore, the acquisition techniques require very little user interaction, resulting in high-speed recognition with low-resolution image cameras. As a result, using finger knuckle biometrics for identification will provide a distinct advantage in the field of physical biometrics. Woodard et al. [<xref ref-type="bibr" rid="ref-1">1</xref>] are the first scholars who changed the Researchers&#x2019; perspective towards the finger knuckle as the biometric identification. Here, the 3D finger knuckle print is used for recognition. However, it did not provide a practical implication since it is time consuming when it comes to the acquisition and processing of image in real time applications. Additionally, the authors, in this research, only use the Finger surface shape information for FKP recognition.</p>
<p>Ajay Kumar proposed a FKP recognition model that uses finger knuckle lines and creases are highly rich in texture, local orientation features, which are extracted using radon transform performs better results when compared with Gabor, and Eigen knuckles [<xref ref-type="bibr" rid="ref-2">2</xref>]. The subspace algorithms, such as PCA, ICA and LDA combinations, are used in FKP feature extraction. The geometric features are also extracted to obtain promising results [<xref ref-type="bibr" rid="ref-3">3</xref>].</p>
<p>Zhang et al. proposed a feature extraction scheme for FKP recognition. The classification of the image pattern is based on the feature extraction scheme and plays a key role in matching images and ROI&#x2019;s accuracy. The local features such as local phase and local concurrency are integrated with the global features to enhance accuracy [<xref ref-type="bibr" rid="ref-4">4</xref>]. Local orientation and magnitude features are extracted using the Gabor filter [<xref ref-type="bibr" rid="ref-5">5</xref>]. The performance is much better for the large dataset. Features extracted from the triangular block of the finger knuckle image, which already small in size may cause the loss of some information. The combination of Local and global information is developed using the Gabor filter and Fourier transform respectively [<xref ref-type="bibr" rid="ref-6">6</xref>].</p>
<p>Feature Selection is a predictive model to select informative features and is considered as an input of the classification model. The dataset is large then it results to high dimensional data. Due to this phenomenon, the classification model is affected with negative impact in accuracy and computation cost [<xref ref-type="bibr" rid="ref-7">7</xref>]. The main goal of doing this preprocessing step is to reduce the computational cost and enhance better performance in recognition [<xref ref-type="bibr" rid="ref-8">8</xref>,<xref ref-type="bibr" rid="ref-9">9</xref>]. In feature selection, the selection of informative features results to an improvement of the classifier model by performance, speed and simplicity. As per literature, only a few optimization techniques are used in biometric recognition for feature selection such as Genetic algorithm (GA), Particle Swarm Optimization (PSO), and Ant Colony Optimization (ACO). Optimization techniques are mostly used in iris, ear, palm print and in multimodal biometric recognition [<xref ref-type="bibr" rid="ref-10">10</xref>&#x2013;<xref ref-type="bibr" rid="ref-15">15</xref>]. Even the number of algorithms related to bio-inspired and evolutionary algorithms is used in solving optimization problems. According to the &#x201C;No free Lunch&#x201D; theorem, no universal algorithm can solve the problem [<xref ref-type="bibr" rid="ref-16">16</xref>]. Therefore, it creates the required space to develop a new algorithm to provide the better solution.</p>
<p>Literature surveys show that many works have been done on Finger Knuckle recognition in feature extraction stage. However, Feature Selection is not much analyzed for finger knuckle recognition. For the first time, the MBOA optimization technique has been utilized for feature selection in FKP to provide promising results with reduced number of features. So far, the MBOA optimization technique is evaluated for the benchmarked dataset and this provides promising results. Salvatore Bellini, in 1963, identified the polyphyletic group of bacteria that move across the magnetic field line. The bacteria move towards an oxygen-concentrated region and the movement is performed with the help of magnetic crystals with magnetisms. It contains the fixed magnets, which align the bacteria moving towards the North Pole [<xref ref-type="bibr" rid="ref-17">17</xref>]. The traditional MBOA optimization technique is proposed by author [<xref ref-type="bibr" rid="ref-18">18</xref>,<xref ref-type="bibr" rid="ref-19">19</xref>]. The authors are likely to solve the optimization problems and promise fast convergence speed. In traditional MBOA, performance is based on the random replacement. The same author works with MBOA based on individual moments. Here, the solution is based on the local best cell moments and is tested in 13 benchmark functions that provide better performance [<xref ref-type="bibr" rid="ref-20">20</xref>]. The authors proposed a new moment-migration algorithm, which signifies that the moment of magnetosomes with good values can migrate to other solutions, which solve optimization problems. Due to this moment migration, the exploration problem is solved [<xref ref-type="bibr" rid="ref-21">21</xref>]. Based on the characteristics of the bacteria, the authors proposed a new optimization algorithm i.e., the Magnetotatic Bacteria Optimization Algorithm (MBOA). The MBOA is based on four stages: interaction distance, moment generation, moment regulation and moment replacement.</p>
<p>This paper is organized as follows; Section 2 presents the feature selection of the proposed optimization technique to select the discriminative features and feature extraction techniques. Section 3 provides the Experimental results and discussion of the proposed system, the Comparison of proposed feature selection with GWO method and also shows the comparison of proposed with other state of approaches and finally with conclusion in Section 4.</p>
</sec>
<sec id="s2">
<label>2</label>
<title>A Proposed MMBOA_mr Feature Selection for FKP Recognition</title>
<p>Finger knuckle recognition is based on the MMBOA_mr feature selection technique. Finger knuckle biometric exploits a new approach of choosing the optimal feature subset based on MMBOA_mr. The features are extracted based on the PCA and LDA combination and these feature vectors are fed to MMBOA_mr feature Selection.</p>
<p>The searching process is done iteratively to obtain the best subset features. It is based on the fitness function in terms of classification accuracy to validate the subset of features. The classification accuracy is taken as fitness value and is able to select the new feature subset. The bacteria contain multi cells and each cell contains the magnetosomes which is solution vector and the values of the vector are known for moment of the cells. The moment generation, moment regulation and moment replace are the factors which influences the feature reduction. Since the irrelevant features are eliminated the complexity of the system reduces the computational time and the search space.</p>
<p>The contributions of this work include:<list list-type="bullet"><list-item>
<p>Finger Knuckle recognition is based on a new feature selection algorithm MMBOA_mr</p></list-item><list-item>
<p>Ei and Fi features are extracted from the FKP image using PCA and LDA feature extraction techniques</p></list-item><list-item>
<p>The MMBOA_mr feature selection technique is proposed for FKP recognition</p></list-item><list-item>
<p>Performance of the proposed FKP recognition id evaluated using the performance metrics such as FAR, FRR, ERR and Accuracy.</p></list-item></list></p>
<sec id="s2_1">
<label>2.1</label>
<title>Feature Extraction</title>
<p>Features extraction is the transformation of the original features to lower dimensionality with reduced number of features. The first step is to extract the features from the image. This research employs an appearance-based algorithm such as Principle Component Analysis (PCA) and Linear Discriminant Analysis (LDA). Both the PCA and LDA are linear transformations that reduce the computational cost and processing time.</p>
<p>In this paper, the combination Eigen and Fisher knuckle features are proposed to extract the features and it is known as EiFi features. The PCA and LDA are applied to the cropped images to extract the features. <xref ref-type="fig" rid="fig-1">Fig. 1</xref>, shows the finger knuckle print and the segmented major knuckle print. In this work, the segmented major knuckle print is used for experimental analysis.</p>
<fig id="fig-1">
<label>Figure 1</label>
<caption>
<title>(a) Finger knuckle print, (b) Segmented major knuckle</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_22583-fig-1.png"/>
</fig>
<sec id="s2_1_1">
<label>2.1.1</label>
<title>Linear Discriminant Analysis (Fisher Features)</title>
<p>LDA describes the vectors in the classes by constructing the d-dimensional mean vector. Then it finds the scatter matrix within and between the classes. The next sort the Eigen vectors according to the Eigen value and largest Eigen value forms the matrix d &#x00D7; k, where each column represents the eigenvector. Based on the d &#x00D7; k, the sample is transformed into a new subspace [<xref ref-type="bibr" rid="ref-22">22</xref>]. LDA is defined as <inline-formula id="ieqn-1">
<mml:math id="mml-ieqn-1"><mml:mi>Y</mml:mi><mml:mo>=</mml:mo><mml:msubsup><mml:mi>W</mml:mi><mml:mrow><mml:mi>o</mml:mi><mml:mi>p</mml:mi><mml:mi>t</mml:mi></mml:mrow><mml:mi>T</mml:mi></mml:msubsup><mml:mi>X</mml:mi></mml:math>
</inline-formula>; the columns are Eigen vectors of <inline-formula id="ieqn-2">
<mml:math id="mml-ieqn-2"><mml:msubsup><mml:mi>S</mml:mi><mml:mi>w</mml:mi><mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msubsup><mml:mrow><mml:msub><mml:mi>S</mml:mi><mml:mi>b</mml:mi></mml:msub></mml:mrow></mml:math>
</inline-formula> [<xref ref-type="bibr" rid="ref-23">23</xref>]. The <inline-formula id="ieqn-3">
<mml:math id="mml-ieqn-3"><mml:mrow><mml:msub><mml:mi>S</mml:mi><mml:mi>w</mml:mi></mml:msub></mml:mrow></mml:math>
</inline-formula> and <inline-formula id="ieqn-4">
<mml:math id="mml-ieqn-4"><mml:mrow><mml:msub><mml:mi>S</mml:mi><mml:mi>b</mml:mi></mml:msub></mml:mrow></mml:math>
</inline-formula> are computed as</p>
<p><disp-formula id="eqn-1"><label>(1)</label>
<mml:math id="mml-eqn-1" display="block"><mml:mrow><mml:msub><mml:mi>S</mml:mi><mml:mi>w</mml:mi></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:msubsup><mml:mo movablelimits="false">&#x2211;</mml:mo><mml:mrow><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mi>C</mml:mi></mml:msubsup><mml:mrow><mml:msubsup><mml:mo movablelimits="false">&#x2211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mi>M</mml:mi></mml:msubsup><mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mrow><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mrow><mml:msub><mml:mi>&#x03BC;</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mrow><mml:mo>.</mml:mo><mml:mrow><mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mrow><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mrow><mml:msub><mml:mi>&#x03BC;</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mi>T</mml:mi></mml:msup></mml:mrow></mml:math>
</disp-formula></p>
<p><disp-formula id="eqn-2"><label>(2)</label>
<mml:math id="mml-eqn-2" display="block"><mml:mrow><mml:msub><mml:mi>&#x03BC;</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:mfrac><mml:mn>1</mml:mn><mml:mrow><mml:mrow><mml:msub><mml:mi>M</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:mrow></mml:mfrac></mml:mrow><mml:msubsup><mml:mo movablelimits="false">&#x2211;</mml:mo><mml:mrow><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mrow><mml:msub><mml:mi>M</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:mrow></mml:msubsup><mml:mrow><mml:mrow><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mrow></mml:math>
</disp-formula></p>
<p><disp-formula id="eqn-3"><label>(3)</label>
<mml:math id="mml-eqn-3" display="block"><mml:mrow><mml:msub><mml:mi>S</mml:mi><mml:mi>B</mml:mi></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:msubsup><mml:mo movablelimits="false">&#x2211;</mml:mo><mml:mrow><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mi>C</mml:mi></mml:msubsup><mml:mrow><mml:mrow><mml:msub><mml:mi>M</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mrow><mml:msub><mml:mi>&#x03BC;</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mi>&#x03BC;</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>.</mml:mo><mml:mrow><mml:msup><mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mrow><mml:msub><mml:mi>&#x03BC;</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mi>&#x03BC;</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mi>T</mml:mi></mml:msup></mml:mrow></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:math>
</disp-formula></p>
<p><disp-formula id="eqn-4"><label>(4)</label>
<mml:math id="mml-eqn-4" display="block"><mml:mi>&#x03BC;</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mfrac><mml:mn>1</mml:mn><mml:mi>C</mml:mi></mml:mfrac></mml:mrow><mml:msubsup><mml:mo movablelimits="false">&#x2211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mi>C</mml:mi></mml:msubsup><mml:mrow><mml:mrow><mml:msub><mml:mi>&#x03BC;</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:mrow></mml:math>
</disp-formula></p>
<p>The transformation depends on the number of classes (c), number of samples (s) and dimensionality d. The main aim of LDA is to maximize the measure between classes and minimize the measure within classes [<xref ref-type="bibr" rid="ref-3">3</xref>,<xref ref-type="bibr" rid="ref-22">22</xref>].</p>
</sec>
<sec id="s2_1_2">
<label>2.1.2</label>
<title>Principle Component Analysis (Eigen Features)</title>
<p>PCA identifies the subspace, in which the optimal solution lies. The size of the pixel is reduced to minimal without the loss of information. In this work, the feature vector of the finger knuckle image is the Eigen vectors of the covariance matrix (Q). The features extracted from the knuckle image contain n &#x00D7; m pixel. Before computing the covariance matrix, the vectors are normalized to make the system invariant to be illuminated. The covariance matrix is too large to compute Eigen vector. Various authors discussed different results while eliminating the first three Eigen vectors. Face recognition achieves better performance [<xref ref-type="bibr" rid="ref-23">23</xref>] and it results in poor performance [<xref ref-type="bibr" rid="ref-24">24</xref>]. In [<xref ref-type="bibr" rid="ref-2">2</xref>], the author uses a simplified model in reference to [<xref ref-type="bibr" rid="ref-25">25</xref>] where a set of projection coefficients, constructed from the finger knuckles during training phase, is used to refer to the testing phase. PCA fails to find the class separability. It typically aligns the transform axes with maximum variance and is not sure of the contained efficient features for recognition. Transformation depends on the number of classes (c), number of samples (s) and dimensionality denoted by d.</p>
</sec>
</sec>
<sec id="s2_2">
<label>2.2</label>
<title>Feature Selection</title>
<p>Feature Selection plays an important role in selecting the subset of features by eliminating the irrelevant and unnecessary features. Classification accuracy depends on the best subset of learning features [<xref ref-type="bibr" rid="ref-26">26</xref>]. The subset features should highly be correlated to the classes and uncorrelated with each other. As the dimension N of the feature increases, it expands the search space and computational cost [<xref ref-type="bibr" rid="ref-27">27</xref>]. The feature-selection evaluation procedure is classified into filters, wrappers and embedded [<xref ref-type="bibr" rid="ref-28">28</xref>]. Here, we used the wrapper approach MBOA where the evaluation procedure depends on the classifier. The quality of the learning algorithm is evaluated by the classification. The wrapper approach is based on the number of generations; whereby for each iteration, the best solution is found and highest accuracy-based subset features are selected [<xref ref-type="bibr" rid="ref-29">29</xref>].</p>
<sec id="s2_2_1">
<label>2.2.1</label>
<title>Biological Basis for MBOA</title>
<p>MBOA is a magnetotactic bacteria optimization algorithm that is also a new bio inspired algorithm. The Magnetotactic bacteria represent a group of prokaryotes occurring in the natural seawater and fresh water. The magnetic lines, which are known as magnetosomes create the moment to find the optimal solution in their environment. Magnetosomes consist of magnetite colloids and mineral particles arranged narrowly in the geomagnetic field direction. The moment is based on the energy level of each cell and the chemical signals around the environment. The biological characteristics of the bacteria are that they organize themselves and adjust automatically to move along the earth&#x2019;s magnetic field. The behavior of the bacteria is to find the best optimal oxygen-concentration and redox potentials in the water [<xref ref-type="bibr" rid="ref-30">30</xref>,<xref ref-type="bibr" rid="ref-31">31</xref>].</p>
<p>For survival, the magnetic lines in the magnetosomes that will bend to reduce the magnetostatic energy. The magnetosomes produce the moments, which support the minimization of energy. The optimization of minimized computational cost and storage achieves better performance in the recognition of finger knuckle biometric.</p>
</sec>
<sec id="s2_2_2">
<label>2.2.2</label>
<title>Parameter Setting</title>
<p>Here, the parameters are tuned with the number of iterations. The performance of the proposed algorithm varies according to the parameter tuning. Here, 30 iterations of 100 different generations, with the population size of 50, is performed and the results are <bold>discussed in Section 3.</bold> The parameters c1, c2, mp and B are used as objective function and the fitness value depends on the accuracy. The parameter setting for MMBOA_mr and GWO are shown in <xref ref-type="table" rid="table-1">Tab. 1</xref>.</p>
<table-wrap id="table-1"><label>Table 1</label>
<caption>
<title>Parameters for MMBOA_mr and GWO</title></caption>
<table><colgroup>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>MMBOA_mr and GWO</th>
<th>Experimental values</th>
</tr>
</thead>
<tbody>
<tr>
<td>Maximum no of iterations</td>
<td>3000</td>
</tr>
<tr>
<td>No of runs</td>
<td>30</td>
</tr>
<tr>
<td>Initial population size</td>
<td>50</td>
</tr>
<tr>
<td>MMBOA_mr</td>
<td>C<sub>1</sub> &#x003D; 1.5, C<sub>2</sub> &#x003D; 0.5 where, C<sub>1,</sub> C<sub>2</sub> are constants,<break/>mp &#x003D; 0.6, magnetic field B &#x003D; 1</td>
</tr>
<tr>
<td>GWO</td>
<td>No of wolves &#x003D; 4</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The parameter setting includes the values such as C<sub>1</sub> &#x003D; 30, C<sub>2</sub> &#x003D; 0.004, mp &#x003D; 0.7 and B &#x003D; 0.1 and are selected as best for the benchmark functions [<xref ref-type="bibr" rid="ref-21">21</xref>]. Here, constant variables setup as C<sub>1</sub> &#x003D; 1.5, C<sub>2</sub> &#x003D; 0.5, probability mp &#x003D; 0.6 and parameter, magnetic field B &#x003D; 1 for the Finger knuckle recognition and it plays a significant role on performance to reduce the computational cost without the loss of accuracy.</p>
</sec>
<sec id="s2_2_3">
<label>2.2.3</label>
<title>A Proposed FKP Feature Selection MMBOA_mr</title>
<fig id="fig-2">
<label>Figure 2</label>
<caption>
<title>Proposed FKP recognition</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_22583-fig-2.png"/>
</fig>
<p>The combination of PCA and LDA feature extraction techniques are used to extract the features using the optimization technique to select the relevant features. Finally, to analyze the accuracy, the selected features are fed to the KNN classifier. The proposed FKP recognition architecture is displayed in <xref ref-type="fig" rid="fig-2">Fig. 2</xref>. MBOA is a bio inspired optimization algorithm that regulates the moment of the magnetosomes cells. The regulating moment is mainly based on the continuous process following the three steps 1) MTS moment generation, 2) moment regulation, 3) moment replacement. Based on the original MBOA, novel MMBOA-mr is proposed to improve the performance of the single objective function. The multiple cells produce the moments based on the maximization of the magnetostatic energy. As such, this process is considered for optimization and minimization of the computational speed with minimal number of features. The feasible feature vector for finger knuckle recognition is obtained by continuous regulation of the moments by magnetosomes [<xref ref-type="bibr" rid="ref-21">21</xref>]. The overall work flow of the Feature Selection in MMBOA_mr is shown in <xref ref-type="fig" rid="fig-3">Fig. 3</xref>.</p>
<p>The similitude between the Original MBOA and feature selection MMOBA_mr is the non-multi cells in the bacteria population where each cell (vector) is considered a feasible solution and the feature values are magnetosomes and moment of magnetosomes. Finally, the state of low concentration of magnetostatic energy is an obtained optimal solution</p>
<p><bold>a) Initialization</bold></p>
<p>The population P. randomly generates the feature vector (cell). The cell is generated using <xref ref-type="disp-formula" rid="eqn-5">Eq. (5)</xref>.</p>
<p><disp-formula id="eqn-5"><label>(5)</label>
<mml:math id="mml-eqn-5" display="block"><mml:msubsup><mml:mi>F</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:msub><mml:mi>f</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow><mml:mo>+</mml:mo><mml:mi>r</mml:mi><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mi>d</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x00D7;</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mrow><mml:msub><mml:mi>f</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mrow><mml:msub><mml:mi>f</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mn>0</mml:mn></mml:msubsup></mml:math>
</disp-formula></p>
<p>where i &#x003D; 1, 2, 3 &#x2026;. P (P is the size of the population), j &#x003D; 1, 2, 3 &#x2026; n, (dimension of the cell), max and mini are upper and lower bounds for the dimension j, rand (0, 1) is a random number from the uniform distribution (0, 1).</p>
<fig id="fig-3">
<label>Figure 3</label>
<caption>
<title>Work flow chart of MMBOA_mr</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_22583-fig-3.png"/>
</fig>
<p><bold>b) Interaction Distance</bold></p>
<p>The distance between two cells is calculated as the interaction energy between the cells. The distance between the two cells are <inline-formula id="ieqn-5">
<mml:math id="mml-ieqn-5"><mml:mrow><mml:msub><mml:mi>F</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math>
</inline-formula> and <inline-formula id="ieqn-6">
<mml:math id="mml-ieqn-6"><mml:mrow><mml:msub><mml:mi>F</mml:mi><mml:mi>r</mml:mi></mml:msub></mml:mrow></mml:math>
</inline-formula>, <inline-formula id="ieqn-7">
<mml:math id="mml-ieqn-7"><mml:msubsup><mml:mi>X</mml:mi><mml:mi>i</mml:mi><mml:mi>t</mml:mi></mml:msubsup><mml:mo>=</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mn>1</mml:mn></mml:mrow><mml:mi>t</mml:mi></mml:msubsup><mml:mo>,</mml:mo><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mn>2</mml:mn></mml:mrow><mml:mi>t</mml:mi></mml:msubsup><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>n</mml:mi></mml:mrow><mml:mi>t</mml:mi></mml:msubsup></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:math>
</inline-formula>, and is measured as in <xref ref-type="disp-formula" rid="eqn-6">Eq. (6)</xref></p>
<p><disp-formula id="eqn-6"><label>(6)</label>
<mml:math id="mml-eqn-6" display="block"><mml:msubsup><mml:mi>X</mml:mi><mml:mi>i</mml:mi><mml:mi>t</mml:mi></mml:msubsup><mml:mo>=</mml:mo><mml:msubsup><mml:mi>F</mml:mi><mml:mi>i</mml:mi><mml:mi>t</mml:mi></mml:msubsup><mml:mo>&#x2212;</mml:mo><mml:msubsup><mml:mi>F</mml:mi><mml:mi>r</mml:mi><mml:mi>t</mml:mi></mml:msubsup></mml:math>
</disp-formula></p>
<p>Then P <inline-formula id="ieqn-8">
<mml:math id="mml-ieqn-8"><mml:mo>&#x00D7;</mml:mo></mml:math>
</inline-formula> n distance matrix is as follows:</p>
<p><inline-formula id="ieqn-9">
<mml:math id="mml-ieqn-9"><mml:mrow><mml:msup><mml:mi>X</mml:mi><mml:mi>t</mml:mi></mml:msup></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:msubsup><mml:mi>X</mml:mi><mml:mn>1</mml:mn><mml:mi>t</mml:mi></mml:msubsup><mml:mo>,</mml:mo><mml:msubsup><mml:mi>X</mml:mi><mml:mn>2</mml:mn><mml:mi>t</mml:mi></mml:msubsup><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:msubsup><mml:mi>X</mml:mi><mml:mi>i</mml:mi><mml:mi>t</mml:mi></mml:msubsup><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:msubsup><mml:mi>X</mml:mi><mml:mi>P</mml:mi><mml:mi>t</mml:mi></mml:msubsup></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:mtable rowspacing="4pt" columnspacing="1em"><mml:mtr><mml:mtd><mml:mrow><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mn>11</mml:mn></mml:mrow><mml:mrow><mml:mi>t</mml:mi></mml:mrow></mml:msubsup><mml:mtext>&#xA0;</mml:mtext><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mn>12</mml:mn></mml:mrow><mml:mi>t</mml:mi></mml:msubsup><mml:mo>&#x22EF;</mml:mo><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mn>1</mml:mn><mml:mi>n</mml:mi></mml:mrow><mml:mi>t</mml:mi></mml:msubsup></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:mo>&#x22EE;</mml:mo><mml:mo>&#x22EE;</mml:mo><mml:mo>&#x22EE;</mml:mo></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mn>21</mml:mn></mml:mrow><mml:mi>t</mml:mi></mml:msubsup><mml:mtext>&#xA0;</mml:mtext><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mn>22</mml:mn></mml:mrow><mml:mi>t</mml:mi></mml:msubsup><mml:mo>&#x22EF;</mml:mo><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mn>2</mml:mn><mml:mi>n</mml:mi></mml:mrow><mml:mi>t</mml:mi></mml:msubsup></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:mo>&#x22EE;</mml:mo><mml:mo>&#x22EE;</mml:mo><mml:mo>&#x22EE;</mml:mo></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>P</mml:mi><mml:mn>1</mml:mn></mml:mrow><mml:mi>t</mml:mi></mml:msubsup><mml:mtext>&#xA0;</mml:mtext><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>P</mml:mi><mml:mn>2</mml:mn></mml:mrow><mml:mi>t</mml:mi></mml:msubsup><mml:mo>&#x22EF;</mml:mo><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>P</mml:mi><mml:mi>n</mml:mi></mml:mrow><mml:mi>t</mml:mi></mml:msubsup></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow><mml:mo>]</mml:mo></mml:mrow></mml:math>
</inline-formula>, where i and r (randomly chosen) are indices from {1, 2, &#x2026; P}. P is population size, n is dimension of the cell (feature vector).</p>
<p><bold>c) Interaction Energy</bold></p>
<p>The obtained Interaction distance <inline-formula id="ieqn-10">
<mml:math id="mml-ieqn-10"><mml:msubsup><mml:mi>X</mml:mi><mml:mi>i</mml:mi><mml:mi>t</mml:mi></mml:msubsup></mml:math>
</inline-formula>, where the interaction energy is calculated using <xref ref-type="disp-formula" rid="eqn-7">Eq. (7)</xref>,</p>
<p><disp-formula id="eqn-7"><label>(7)</label>
<mml:math id="mml-eqn-7" display="block"><mml:mrow><mml:msub><mml:mi>e</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mrow><mml:mfrac><mml:mrow><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mn>1</mml:mn><mml:mo>+</mml:mo><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow><mml:mo>&#x00D7;</mml:mo><mml:mi>n</mml:mi><mml:mi>o</mml:mi><mml:mi>r</mml:mi><mml:mi>m</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mrow><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>r</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>+</mml:mo><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:mrow><mml:mo>&#x00D7;</mml:mo><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>p</mml:mi><mml:mi>q</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mfrac></mml:mrow></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mn>3</mml:mn></mml:msup></mml:mrow></mml:math>
</disp-formula></p>
<p>where &#x2018;t&#x2019; is the current generation, <inline-formula id="ieqn-11">
<mml:math id="mml-ieqn-11"><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow><mml:mo>,</mml:mo><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:mrow></mml:math>
</inline-formula> are constants, <inline-formula id="ieqn-12">
<mml:math id="mml-ieqn-12"><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math>
</inline-formula> one element of distance matrix X, <inline-formula id="ieqn-13">
<mml:math id="mml-ieqn-13"><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>p</mml:mi><mml:mi>q</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math>
</inline-formula> randomly selected from X, p, r <inline-formula id="ieqn-14">
<mml:math id="mml-ieqn-14"><mml:mo>&#x2208;</mml:mo></mml:math>
</inline-formula> [1, P], q <inline-formula id="ieqn-15">
<mml:math id="mml-ieqn-15"><mml:mo>&#x2208;</mml:mo></mml:math>
</inline-formula> dimension of the cell, <inline-formula id="ieqn-16">
<mml:math id="mml-ieqn-16"><mml:mrow><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>r</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math>
</inline-formula> is Euclidean distance between the two cells (Feature vector length).</p>
<p><bold>d) Moments Generation</bold></p>
<p>Moment&#x2019;s generation is produced using an interaction energy <inline-formula id="ieqn-17">
<mml:math id="mml-ieqn-17"><mml:mrow><mml:msub><mml:mi>e</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mi>e</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>,</mml:mo><mml:mrow><mml:msub><mml:mi>e</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:mrow><mml:msub><mml:mi>e</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mrow><mml:msub><mml:mi>e</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>n</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:math>
</inline-formula>, which is defined in eq. The moments <inline-formula id="ieqn-18">
<mml:math id="mml-ieqn-18"><mml:mrow><mml:msub><mml:mi>M</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:math>
</inline-formula> is calculated as in <xref ref-type="disp-formula" rid="eqn-8">Eq. (8)</xref> follows</p>
<p><disp-formula id="eqn-8"><label>(8)</label>
<mml:math id="mml-eqn-8" display="block"><mml:mrow><mml:msub><mml:mi>M</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:mfrac><mml:mrow><mml:mrow><mml:msub><mml:mi>e</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mi>B</mml:mi></mml:mfrac></mml:mrow></mml:math>
</disp-formula></p>
<p>In MBOA_mr, the magnetic field B is the constant value 1. Then, the moment generation will be <inline-formula id="ieqn-19">
<mml:math id="mml-ieqn-19"><mml:mrow><mml:msub><mml:mi>M</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:msub><mml:mi>e</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:math>
</inline-formula>. The moment vector matrix is generated as <inline-formula id="ieqn-20">
<mml:math id="mml-ieqn-20"><mml:mrow><mml:msub><mml:mi>M</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mrow><mml:msub><mml:mi>M</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>,</mml:mo><mml:mrow><mml:msub><mml:mi>M</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:mrow><mml:msub><mml:mi>M</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mrow><mml:msub><mml:mi>M</mml:mi><mml:mi>P</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:math>
</inline-formula> in <xref ref-type="disp-formula" rid="eqn-9">Eq. (9)</xref>.</p>
<p>The total moments can be regulated as follows:</p>
<p><disp-formula id="eqn-9"><label>(9)</label>
<mml:math id="mml-eqn-9" display="block"><mml:mrow><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:msub><mml:mi>f</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>+</mml:mo><mml:mrow><mml:msub><mml:mi>m</mml:mi><mml:mrow><mml:mi>l</mml:mi><mml:mi>s</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x2217;</mml:mo><mml:mi>r</mml:mi><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mi>d</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy="false">)</mml:mo></mml:math>
</disp-formula></p>
<p>Here, l <inline-formula id="ieqn-21">
<mml:math id="mml-ieqn-21"><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:mi>P</mml:mi></mml:mrow><mml:mo>}</mml:mo></mml:mrow></mml:math>
</inline-formula>, s <inline-formula id="ieqn-22">
<mml:math id="mml-ieqn-22"><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:mi>n</mml:mi></mml:mrow><mml:mo>}</mml:mo></mml:mrow></mml:math>
</inline-formula>, are randomly chosen integer.</p>
<p><bold>e) Moment Regulation</bold></p>
<p>The regular MBOA is not following the regulation setup for the moments. The proposed MMBOA_mr evaluates the population of the cells whereby the aspect of fitness value is based on the current generation (t) classification accuracy and regulates the moment as</p>
<p>If <italic>rand &#x003C; mp</italic></p>
<p><disp-formula id="eqn-10"><label>(10)</label>
<mml:math id="mml-eqn-10" display="block"><mml:msubsup><mml:mi>u</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow><mml:mi>t</mml:mi></mml:msubsup><mml:mo>=</mml:mo><mml:msubsup><mml:mi>y</mml:mi><mml:mrow><mml:mrow><mml:msup><mml:mi>r</mml:mi><mml:mn>1</mml:mn></mml:msup></mml:mrow><mml:mi>j</mml:mi></mml:mrow><mml:mi>t</mml:mi></mml:msubsup></mml:math>
</disp-formula></p>
<p>Otherwise</p>
<p><disp-formula id="eqn-11"><label>(11)</label>
<mml:math id="mml-eqn-11" display="block"><mml:msubsup><mml:mi>u</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow><mml:mi>t</mml:mi></mml:msubsup><mml:mo>=</mml:mo><mml:msubsup><mml:mi>y</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mrow><mml:msup><mml:mi>q</mml:mi><mml:mn>1</mml:mn></mml:msup></mml:mrow></mml:mrow><mml:mi>t</mml:mi></mml:msubsup><mml:mo>+</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:msubsup><mml:mi>y</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:mi>b</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi><mml:mi>q</mml:mi></mml:mrow><mml:mi>t</mml:mi></mml:msubsup><mml:mo>&#x2212;</mml:mo><mml:msubsup><mml:mi>y</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mrow><mml:msup><mml:mi>q</mml:mi><mml:mn>1</mml:mn></mml:msup></mml:mrow></mml:mrow><mml:mi>t</mml:mi></mml:msubsup></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x2217;</mml:mo><mml:mi>r</mml:mi><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mi>d</mml:mi></mml:math>
</disp-formula></p>
<p><inline-formula id="ieqn-23">
<mml:math id="mml-ieqn-23"><mml:mrow><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mi>c</mml:mi><mml:mi>b</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math>
</inline-formula> is the best cell (feature vector) in the current generation, <inline-formula id="ieqn-24">
<mml:math id="mml-ieqn-24"><mml:mrow><mml:msup><mml:mi>r</mml:mi><mml:mn>1</mml:mn></mml:msup></mml:mrow><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:mi>P</mml:mi></mml:mrow><mml:mo>}</mml:mo></mml:mrow></mml:math>
</inline-formula>, <inline-formula id="ieqn-25">
<mml:math id="mml-ieqn-25"><mml:mrow><mml:msup><mml:mi>q</mml:mi><mml:mn>1</mml:mn></mml:msup></mml:mrow><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:mi>n</mml:mi></mml:mrow><mml:mo>}</mml:mo></mml:mrow><mml:mo>,</mml:mo><mml:mi>r</mml:mi><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mi>d</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mo fence="false" stretchy="false">{</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mn>1</mml:mn><mml:mo fence="false" stretchy="false">}</mml:mo></mml:math>
</inline-formula> and <italic>mp</italic> is parameter in MMBOA mp &#x003D; 0.6 and rand condition is less than the <italic>mp</italic> parameter.</p>
<p>The worst features are omitted and the best features for each generation are included and calculated as per the fitness value. Some of the cell moments regulate the other cells, which improve the exploitation search (local minimum) as per <xref ref-type="disp-formula" rid="eqn-10">Eq. (10)</xref>. The exploration search is enhanced by identifying the best cell from the approximating the best one from the current generation as per <xref ref-type="disp-formula" rid="eqn-11">Eq. (11)</xref>.</p>
<p><bold>f) Moment Replacement</bold></p>
<p>After the moment migration, the population is evaluated according to the cell&#x2019;s fitness. Based on the cost, the solutions are sorted in ascending order. The replacement probability is set as 0.5. The worst features are ignored using the formula below.</p>
<p><disp-formula id="eqn-12"><label>(12)</label>
<mml:math id="mml-eqn-12" display="block"><mml:msubsup><mml:mi>F</mml:mi><mml:mi>i</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msubsup><mml:mo>=</mml:mo><mml:msubsup><mml:mi>m</mml:mi><mml:mrow><mml:msup><mml:mi>l</mml:mi><mml:mo>&#x2032;</mml:mo></mml:msup><mml:mi>s</mml:mi><mml:mi mathvariant="normal">&#x2032;</mml:mi></mml:mrow><mml:mi>t</mml:mi></mml:msubsup><mml:mo>&#x00D7;</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>r</mml:mi><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mi>d</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mi>n</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x00D7;</mml:mo><mml:mi>r</mml:mi><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mi>d</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mi>n</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:math>
</disp-formula></p>
<p>The remaining moments are replaced by the <xref ref-type="disp-formula" rid="eqn-13">Eq. (13)</xref></p>
<p><disp-formula id="eqn-13"><label>(13)</label>
<mml:math id="mml-eqn-13" display="block"><mml:msubsup><mml:mi>F</mml:mi><mml:mi>i</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msubsup><mml:mo>=</mml:mo><mml:msubsup><mml:mi>y</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow><mml:mi>t</mml:mi></mml:msubsup></mml:math>
</disp-formula></p>
<p><inline-formula id="ieqn-26">
<mml:math id="mml-ieqn-26"><mml:mi>l</mml:mi><mml:mi mathvariant="normal">&#x2032;</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:mi>P</mml:mi></mml:mrow><mml:mo>}</mml:mo></mml:mrow><mml:mo>,</mml:mo><mml:mi>s</mml:mi><mml:mi mathvariant="normal">&#x2032;</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:mi>n</mml:mi></mml:mrow><mml:mo>}</mml:mo></mml:mrow></mml:math>
</inline-formula>, <inline-formula id="ieqn-27">
<mml:math id="mml-ieqn-27"><mml:mi>l</mml:mi><mml:mi mathvariant="normal">&#x2032;</mml:mi></mml:math>
</inline-formula>, <inline-formula id="ieqn-28">
<mml:math id="mml-ieqn-28"><mml:mi>s</mml:mi><mml:mi mathvariant="normal">&#x2032;</mml:mi></mml:math>
</inline-formula> are randomly chosen integer and <inline-formula id="ieqn-29">
<mml:math id="mml-ieqn-29"><mml:msubsup><mml:mi>m</mml:mi><mml:mrow><mml:mi>l</mml:mi><mml:mtext mathcolor="red">\primes</mml:mtext><mml:mi mathvariant="normal">&#x2032;</mml:mi></mml:mrow><mml:mi>t</mml:mi></mml:msubsup></mml:math>
</inline-formula> is replaced for &#x03BB; as in traditional MBOA. <inline-formula id="ieqn-30">
<mml:math id="mml-ieqn-30"><mml:mi>r</mml:mi><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mi>d</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mi>n</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x2208;</mml:mo></mml:math>
</inline-formula> random vector with n dimension. Once again, the population is evaluated as per the fitness of the cell.</p>
</sec>
<sec id="s2_2_4">
<label>2.2.4</label>
<title>Pseudo Code of Modified MBOA_Moment Regulation (MMBOA_mr)</title>
<p><bold>// Initialization</bold></p>
<p>Initialize the random value as best value (Xbest)</p>
<p>Initialize the magnetic bacteria and memory as zero (X, F)</p>
<p>Initialize the population randomly (P) in search space</p>
<p>Initialize Parameters</p>
<p>Until stop criteria met to do</p>
<p><bold>// Interaction Distance</bold></p>
<p>Calculate the fitness of each cell</p>
<p>Normalize the fitness</p>
<p>// Interaction distance</p>
<p>Calculate the Interaction Distance D from <xref ref-type="disp-formula" rid="eqn-6">Eq. (6)</xref></p>
<p><bold>// Moment Interaction Energy</bold></p>
<p><bold>For each cell do</bold></p>
<p>If D &#x003E; r</p>
<p>Calculate the Moment interaction Energy of the two cells from <xref ref-type="disp-formula" rid="eqn-7">Eq. (7)</xref></p>
<p>Else</p>
<p>E &#x003D; rand (1, P)&#x002A; R</p>
<p>End if</p>
<p>End for</p>
<p><bold>// Moment Generations</bold></p>
<p>Obtain moment generation from <xref ref-type="disp-formula" rid="eqn-8">Eq. (8)</xref></p>
<p>Evaluate the population according to the fitness</p>
<p><bold>// Moment Regulation</bold></p>
<p>Visualize the moments and next the regulation of the moment follows</p>
<p>Calculate the moment M of each cell at t generation from <xref ref-type="disp-formula" rid="eqn-10">Eq. (10)</xref></p>
<p>Regulate the moment of each cell at t generation <xref ref-type="disp-formula" rid="eqn-11">Eq. (11)</xref></p>
<p>Evaluate the population according to the fitness</p>
<p><bold>// Moment Replacement</bold></p>
<p>For each cell do</p>
<p>According to cost, the solution is sorted in ascending order</p>
<p>MTS replacement as in <xref ref-type="disp-formula" rid="eqn-12">Eqs. (12)</xref> and <xref ref-type="disp-formula" rid="eqn-13">(13)</xref></p>
<p>End for</p>
<p>Archives best solution</p>
</sec>
<sec id="s2_2_5">
<label>2.2.5</label>
<title>K-Nearest Neighbor Classifier</title>
<p>The K-Nearest Neighbor (KNN) is a simple classifier. This supervised learning algorithm selects the minimum distance between the query samples and the trained samples. It is easy to implement using the K (K&#x003D;1) value that defines the nearer number of neighbors. In this proposed work, KNN is used to ensure classification accuracy for the finger knuckle Recognition [<xref ref-type="bibr" rid="ref-32">32</xref>].</p>
</sec>
</sec>
</sec>
<sec id="s3">
<label>3</label>
<title>Experiments and Discussions</title>
<p>The performance of the proposed algorithm MMBOA_rm is discussed and presented. The implementation and testing are done using the poly u dataset. The Poly u finger knuckle dataset is used to prove the efficient recognition of an individual. The dataset with two sets: 70% for training and 30% for testing is used. The dataset has five images for the single user and is further divided into two sets for training and testing. For training 3 and for testing 2 images are given.</p>
<p>Feature Selection with stopping criteria for optimization is considered, a maximum of 30 generations with 100 iterations for each generation. It is done to prove the statistical implication and stability of the outcomes. After selecting the subsets of feature set, it is valued using the test set. This evaluation is done with the KNN classifier. The experiments are conducted with respect to different parameters and finally the adoptable results are discussed in below. Implementation is done in Matlab (2016) core&#x2122; i3-7100U, x-64 based processor, 64-bit operating system, and 4GB RAM. Based on the evaluation criteria, the different classifiers are implemented and compared to show the one that achieves better performance in the proposed work. The performance of the FKP recognition is generated with the metrics such as accuracy, FAR, FAR, EER</p>
<sec id="s3_1">
<label>3.1</label>
<title>Evaluation of the Proposed Method</title>
<p>The FKP image features are extracted using PCA and LDA. It is represented as Eigen and fisher feature vectors. These two machine learning algorithms are used in feature extraction based on feature selection in various biometrics such as face, palm print, ear, finger vein [<xref ref-type="bibr" rid="ref-33">33</xref>&#x2013;<xref ref-type="bibr" rid="ref-38">38</xref>]. Here, FKP image features are extracted using this appearance-based algorithm individually and the results are tabulated. The results show that the LDA performs better than PCA. Finally, the EiFi features are concatenated and recognition of the results outperforms well.</p>
<sec id="s3_1_1">
<label>3.1.1</label>
<title>Performance Based on Classification Accuracy</title>
<p>The KNN classifier is used to classify the genuine users due to its simplicity. In <xref ref-type="table" rid="table-2">Tab. 2</xref>, the experimental results prove that the multi-algorithm feature level fusion with KNN reveals improved performance with better accuracy. The Ei knuckle feature outputs better accuracy of 91.16%. The Fi knuckle features achieve good performance for KNN classifiers with 93.42% accuracy. The results with the fusion of Eifi features show better and good results for KNN classifier with 99.67% accuracy. The FAR and FRR rate for the EiFi features based on the KNN classifiers gives lower rate of 0.361 and 0.28%. The EiFi features, with better accuracy, is given as an input to the proposed feature selection algorithms MMBOA_mr and GWO [<xref ref-type="bibr" rid="ref-39">39</xref>], which achieves 99.4% for GWO and 99.7% for MMBOA_mr accuracy with reduced number of features.</p>
</sec>
<sec id="s3_1_2">
<label>3.1.2</label>
<title>Performance of the Proposed MMBOA_mr with GWO Based on No of Generations/ Users</title>
<p>The proposed algorithm is compared with the Gray Wolf Optimizer (GWO). For Finger Knuckle recognition, the optimization algorithms for feature selection are used in limited study. Therefore, the comparison the Grey wolf Optimizer is implemented and the results compared with the proposed MBOA. Both the optimization algorithms such as MBOA and GWO show better results for the introduction of features. When GWO is compared with MBOA, MBOA outperforms well with minimum number of features and computational speed based on classification accuracy.</p>
<p>Performance comparison is based on these two algorithms: <bold>MMBOA_mr and GWO</bold> are shown in <xref ref-type="table" rid="table-3">Tabs. 3</xref> and <xref ref-type="table" rid="table-4">4</xref>. The results of both the algorithms show noteworthy enhancement in terms of classification accuracy based on feature selection. The GWO and MMBOA_mr algorithm show variations in accuracy. For 30 generations with 3000 iterations, algorithm shows nearly 99% accuracy. Regarding the number of features, GWO achieves 99.4% accuracy with 34 subset of features and MMBOA_mr achieves 99.7% accuracy with 22 subset of features. <xref ref-type="fig" rid="fig-4">Figs. 4</xref> and <xref ref-type="fig" rid="fig-5">5</xref> show the comparative analysis of MMBOA_mr and GWO based on different features sets and execution time for the given users respectively.</p>
<table-wrap id="table-2"><label>Table 2</label>
<caption>
<title>Performance of the classification accuracy for proposed feature selection technique</title></caption>
<table><colgroup>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th rowspan="2">Feature extraction</th>
<th rowspan="2">Total features</th>
<th rowspan="2">Optimized features</th>
<th colspan="4">Performance metrics (%)</th>
</tr>
<tr>
<th>FAR</th>
<th>FRR</th>
<th>ERR</th>
<th>Accuracy</th>
</tr>
</thead>
<tbody>
<tr>
<td>Ei features (PCA)</td>
<td>80</td>
<td>80</td>
<td>8.02</td>
<td>8.67</td>
<td>8.3</td>
<td>91.6</td>
</tr>
<tr>
<td>Fi features (LDA)</td>
<td>80</td>
<td>80</td>
<td>6.09</td>
<td>7.07</td>
<td>6.58</td>
<td>93.42</td>
</tr>
<tr>
<td>EiFi features (PCA &#x002B; LDA)</td>
<td>80</td>
<td>80</td>
<td>1.02</td>
<td>1.4</td>
<td>1.21</td>
<td>98.6</td>
</tr>
<tr>
<td>EiFi features with proposed GWO</td>
<td>80</td>
<td>34</td>
<td>0.43</td>
<td>0.58</td>
<td>0.505</td>
<td>99.49</td>
</tr>
<tr>
<td>EiFi features with proposed MMBOA_mr</td>
<td>80</td>
<td>22</td>
<td>0.28</td>
<td>0.32</td>
<td>0.3</td>
<td>99.7</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap id="table-3"><label>Table 3</label>
<caption>
<title>Comparison of the proposed feature selection algorithms based on no of generations</title></caption>
<table><colgroup>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th rowspan="2">No of generations</th>
<th rowspan="2">Input Eifi features (A)</th>
<th colspan="2">Reduced no of features (A-B)</th>
<th colspan="2">Optimized selected features (B)</th>
<th colspan="2">Accuracy (%)</th>
</tr>
<tr>
<th>GWO</th>
<th>MMBOA_mr</th>
<th>GWO</th>
<th>MMBOA_mr</th>
<th>GWO</th>
<th>MMBOA_mr</th>
</tr>
</thead>
<tbody>
<tr>
<td>10</td>
<td>80</td>
<td>71</td>
<td>63</td>
<td>9</td>
<td>17</td>
<td>90</td>
<td>93.2</td>
</tr>
<tr>
<td>15</td>
<td>80</td>
<td>62</td>
<td>63</td>
<td>18</td>
<td>17</td>
<td>95.3</td>
<td>97.6</td>
</tr>
<tr>
<td>20</td>
<td>80</td>
<td>62</td>
<td>61</td>
<td>18</td>
<td>19</td>
<td>98.8</td>
<td>99.4</td>
</tr>
<tr>
<td>25</td>
<td>80</td>
<td>51</td>
<td>63</td>
<td>29</td>
<td>17</td>
<td>98.7</td>
<td>99.6</td>
</tr>
<tr>
<td>30</td>
<td>80</td>
<td>46</td>
<td>58</td>
<td>34</td>
<td>22</td>
<td>99.4</td>
<td>99.7</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap id="table-4"><label>Table 4</label>
<caption>
<title>Comparison of the proposed feature selection algorithms based on number of users</title></caption>
<table><colgroup>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th rowspan="2">No of users</th>
<th rowspan="2">Total Eifi features</th>
<th colspan="2">Reduced no of features (A-B)</th>
<th colspan="2">Optimized selected features (B)</th>
<th colspan="2">Timing (s)</th>
</tr>
<tr>
<th>MBOA_mr</th>
<th>GWO</th>
<th>MBOA_mr</th>
<th>GWO</th>
<th>MBOA_mr</th>
<th>GWO</th>
</tr>
</thead>
<tbody>
<tr>
<td>10</td>
<td>20</td>
<td>1</td>
<td>1</td>
<td>19</td>
<td>19</td>
<td>130</td>
<td>140</td>
</tr>
<tr>
<td>15</td>
<td>30</td>
<td>1</td>
<td>1</td>
<td>29</td>
<td>29</td>
<td>150</td>
<td>160</td>
</tr>
<tr>
<td>20</td>
<td>40</td>
<td>1</td>
<td>1</td>
<td>39</td>
<td>39</td>
<td>210</td>
<td>270</td>
</tr>
<tr>
<td>25</td>
<td>50</td>
<td>3</td>
<td>2</td>
<td>47</td>
<td>48</td>
<td>270</td>
<td>290</td>
</tr>
<tr>
<td>30</td>
<td>60</td>
<td>1</td>
<td>1</td>
<td>59</td>
<td>59</td>
<td>330</td>
<td>340</td>
</tr>
<tr>
<td>35</td>
<td>70</td>
<td>4</td>
<td>3</td>
<td>66</td>
<td>67</td>
<td>402</td>
<td>450</td>
</tr>
<tr>
<td>40</td>
<td>80</td>
<td>58</td>
<td>46</td>
<td>22</td>
<td>34</td>
<td>420</td>
<td>550</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s3_1_3">
<label>3.1.3</label>
<title>Comparison of the Proposed MMBOA_mr with Other Metaheuristic Algorithms</title>
<p>Feature selection in various biometrics such as the hand based, palm print, ear and face [<xref ref-type="bibr" rid="ref-10">10</xref>,<xref ref-type="bibr" rid="ref-12">12</xref>,<xref ref-type="bibr" rid="ref-14">14</xref>,<xref ref-type="bibr" rid="ref-40">40</xref>,<xref ref-type="bibr" rid="ref-41">41</xref>] are compared to the proposed feature selection method MMBOA_mr and GWO. The results are tabulated in <xref ref-type="table" rid="table-5">Tab. 5</xref> in terms of total number of features, subset of features and accuracy. In [<xref ref-type="bibr" rid="ref-40">40</xref>], the index finger knuckle with 121 features reduced to 50 and 48 for various feature selection methods with accuracy ranges from 97% to 98%. The proposed MMBOA_mr and GWO achieve 99% accuracy with 22 and 34 subsets of features.</p>
</sec>
<sec id="s3_1_4">
<label>3.1.4</label>
<title>Comparison of the Proposed MMBOA_mr with Existing FKP Recognition System</title>
<p>In <xref ref-type="table" rid="table-6">Tab. 6</xref>, the proposed FKP recognition based on feature selection is compared with other existing works to show the unimodal performance where some of the work concentrated on unimodal and here, the unimodal recognition values for EER and accuracy are considered [<xref ref-type="bibr" rid="ref-42">42</xref>&#x2013;<xref ref-type="bibr" rid="ref-47">47</xref>]. The proposed unimodal FKP recognition achieves good results with optimized features.</p>
<fig id="fig-4">
<label>Figure 4</label>
<caption>
<title>Performance comparison of selected features based on number of user</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_22583-fig-4.png"/>
</fig>
<fig id="fig-5">
<label>Figure 5</label>
<caption>
<title>Comparison of execution time (s) for MMBOA_mr and GWO</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_22583-fig-5.png"/>
</fig>
<table-wrap id="table-5"><label>Table 5</label>
<caption>
<title>Comparative analysis of the proposed MMBOA-mr with other state of art approaches</title></caption>
<table><colgroup>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Reference</th>
<th>Feature selection technique</th>
<th>No of features</th>
<th>Reduced no of features</th>
<th>Accuracy</th>
<th>Timing (S)</th>
</tr>
</thead>
<tbody>
<tr>
<td>[<xref ref-type="bibr" rid="ref-10">10</xref>]</td>
<td>PSO</td>
<td>322</td>
<td>159</td>
<td>96.8</td>
<td>.05/image</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-12">12</xref>]</td>
<td>GA</td>
<td>3200</td>
<td>800</td>
<td>87.2</td>
<td>-</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-14">14</xref>]</td>
<td>ACO</td>
<td>168</td>
<td>30</td>
<td>99.75</td>
<td>960</td>
</tr>
<tr>
<td rowspan="3">[<xref ref-type="bibr" rid="ref-40">40</xref>]</td>
<td>Fast correlation-based filter (FCBF)</td>
<td rowspan="3">121</td>
<td>50</td>
<td>98.23</td>
<td rowspan="3">-</td>
</tr>
<tr>
<td>Sparse bayesian multinomial logistic regression (SBMLR)</td>
<td>48</td>
<td>99.02</td>
</tr>
<tr>
<td>Spectrum feature selection algorithm</td>
<td>50</td>
<td>97.31</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-41">41</xref>]</td>
<td>GA</td>
<td>403</td>
<td>25</td>
<td>97.51</td>
<td>-</td>
</tr>
<tr>
<td>In this paper</td>
<td>GWO</td>
<td>80</td>
<td>34</td>
<td>99.4</td>
<td>550</td>
</tr>
<tr>
<td>In this paper</td>
<td>MMBOA_mr</td>
<td>80</td>
<td>22</td>
<td>99.7</td>
<td>420</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap id="table-6"><label>Table 6</label>
<caption>
<title>Performance comparison of the proposed FKP system with existing FKP recognition system EER</title></caption>
<table><colgroup>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>References</th>
<th>EER</th>
<th>Accuracy</th>
</tr>
</thead>
<tbody>
<tr>
<td>[<xref ref-type="bibr" rid="ref-42">42</xref>]</td>
<td>3.94</td>
<td>-</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-43">43</xref>]</td>
<td>0.22</td>
<td>-</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-44">44</xref>]</td>
<td>5.95</td>
<td>88.27</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-45">45</xref>]</td>
<td>0.78</td>
<td>99.24</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-46">46</xref>]</td>
<td>3.97</td>
<td>90.52</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-47">47</xref>]</td>
<td>1.59</td>
<td>95.43</td>
</tr>
<tr>
<td>GWO</td>
<td>0.505</td>
<td>99.49</td>
</tr>
<tr>
<td>MMBOA_mr</td>
<td>0.3</td>
<td>99.7</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s3_1_5">
<label>3.1.5</label>
<title>Measure of Statistical Hypothesis Test</title>
<p>To evaluate the significant performance of the proposed algorithm, statistical test is done. Here, the MMBOA_mr and GWO algorithms are implemented with 30 runs. Here, the hypothesis test, t-test paired using two samples, is applied on the datasets that results 95% confidence level. The hypothesis test condition is depending on the <bold>p</bold> value. The hypothesis test is based on the conditional probability that is visualized for the given dataset. The assumption is that null hypothesis is true. It is defined as <inline-formula id="ieqn-31">
<mml:math id="mml-ieqn-31"><mml:mrow><mml:msub><mml:mi>H</mml:mi><mml:mn>0</mml:mn></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:msub><mml:mi>&#x03BC;</mml:mi><mml:mrow><mml:mrow><mml:msub><mml:mi>&#x03BC;</mml:mi><mml:mrow><mml:mi>M</mml:mi><mml:mi>M</mml:mi><mml:mi>B</mml:mi><mml:mi>O</mml:mi><mml:mi>A</mml:mi><mml:mi mathvariant="normal">&#x005F;</mml:mi><mml:mi>m</mml:mi><mml:mi>r</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mrow></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:msub><mml:mi>&#x03BC;</mml:mi><mml:mrow><mml:mi>G</mml:mi><mml:mi>W</mml:mi><mml:mi>O</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math>
</inline-formula> and represents null hypothesis where both the mean is same. Alternatively, <inline-formula id="ieqn-32">
<mml:math id="mml-ieqn-32"><mml:mrow><mml:msub><mml:mi>H</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:msub><mml:mi>&#x03BC;</mml:mi><mml:mrow><mml:mi>M</mml:mi><mml:mi>M</mml:mi><mml:mi>B</mml:mi><mml:mi>O</mml:mi><mml:mi>A</mml:mi><mml:mi mathvariant="normal">&#x005F;</mml:mi><mml:mi>m</mml:mi><mml:mi>r</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x2260;</mml:mo><mml:mrow><mml:msub><mml:mi>&#x03BC;</mml:mi><mml:mrow><mml:mi>G</mml:mi><mml:mi>W</mml:mi><mml:mi>O</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math>
</inline-formula> represents mean of MMBOA_mr is not equal to GWO. The significant of the P value is 0.0003 and this is less than 0.05 i.e., P &#x003C;&#x003D; 0.05. Therefore, we reject the null hypothesis. Comparatively, the proposed MMBOA_mr shows significant improvement in performance than GWO. The average best accuracy is taken for each run and the totally 30 runs average best accuracy for MMBOA_mr and GWO are visualized in <xref ref-type="fig" rid="fig-6">Fig. 6</xref>. The mean and median of the average best accuracy is depicted in interval Plot. The t-test is applied for average best accuracy values and the inferred result is shown in <xref ref-type="table" rid="table-7">Tab. 7</xref>. Even both the algorithm performs well for the finger knuckle images with reduced number of features with good accuracy. Accordingly, the t-test proves that MMBOA_mr achieves significant results than GWO.</p>
<fig id="fig-6">
<label>Figure 6</label>
<caption>
<title>Comparison of average best accuracy for MMBOA_mr and GWO</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_22583-fig-6.png"/>
</fig>
<table-wrap id="table-7"><label>Table 7</label>
<caption>
<title>t-test: paired two sample for means</title></caption>
<table><colgroup>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th><italic>Statistical measures</italic></th>
<th><italic>MBOA</italic></th>
<th><italic>GWO</italic></th>
</tr>
</thead>
<tbody>
<tr>
<td>Mean</td>
<td>0.982906</td>
<td>0.970137</td>
</tr>
<tr>
<td>Variance</td>
<td>8.31E-05</td>
<td>0.000554</td>
</tr>
<tr>
<td>Observations</td>
<td>30</td>
<td>30</td>
</tr>
<tr>
<td>Pearson correlation</td>
<td>&#x2212;0.32781</td>
<td></td>
</tr>
<tr>
<td>Hypothesized mean difference</td>
<td>0</td>
<td></td>
</tr>
<tr>
<td>df</td>
<td>29</td>
<td></td>
</tr>
<tr>
<td>t stat</td>
<td>2.507503</td>
<td></td>
</tr>
<tr>
<td>P(T &#x003C;&#x003D; t) one-tail</td>
<td>0.009005</td>
<td></td>
</tr>
<tr>
<td>t critical one-tail</td>
<td>1.699127</td>
<td></td>
</tr>
<tr>
<td>P(T &#x003C;&#x003D; t) two-tail</td>
<td>0.01801</td>
<td></td>
</tr>
<tr>
<td>t critical two-tail</td>
<td>2.04523</td>
<td></td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
</sec>
</sec>
<sec id="s4">
<label>4</label>
<title>Conclusion</title>
<p>For FKP recognition, this paper develops a novel feature-selection algorithm called Modified Magnetotatic Bacteria Optimization. The proposed FKP recognition extract features using hybrid EiFi feature extraction technique and Modified Magnetotatic Bacteria Optimization algorithm (MMBOA) for feature selection. MMBOA is able to provide the optimal subset of features for finger knuckle recognition that takes the least amount of time to compute and improves classification accuracy. MMBOA-KNN outperforms GWO-KNN in terms of accuracy and number of reduced features. Extensive experimental results and discussions indicate that our proposed methodology achieves significant enhancements than various existing finger Knuckle recognition algorithms. As demonstrated in the experiments, the proposed FKP recognition performs better and more efficiently than other state-of-the-art approaches, with higher accuracy of 99.7% and minimum EER of 0.3%.</p>
</sec>
</body>
<back><fn-group>
<fn fn-type="other">
<p><bold>Funding Statement</bold>: The authors received no specific funding for this study.</p>
</fn>
<fn fn-type="conflict">
<p><bold>Conflicts of Interest:</bold> The authors declare that they have no conflicts of interest to report regarding the present study.</p>
</fn>
</fn-group>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>[1]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>D. L.</given-names> <surname>Woodard</surname></string-name> and <string-name><given-names>P. J.</given-names> <surname>Flynn</surname></string-name></person-group>, &#x201C;<article-title>Finger surface as a biometric identifier</article-title>,&#x201D; <source>Computer Vision and Image Understanding</source>, vol. <volume>100</volume>, no. <issue>3</issue>, pp. <fpage>357</fpage>&#x2013;<lpage>384</lpage>, <year>2005</year>.</mixed-citation></ref>
<ref id="ref-2"><label>[2]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Kumar</surname></string-name> and <string-name><given-names>Y.</given-names> <surname>Zhou</surname></string-name></person-group>, &#x201C;<article-title>Personal identification using finger knuckle orientation features</article-title>,&#x201D; <source>Electronics Letters</source>, vol. <volume>45</volume>, no. <issue>20</issue>, pp. <fpage>1023</fpage>&#x2013;<lpage>1025</lpage>, <year>2009</year>.</mixed-citation></ref>
<ref id="ref-3"><label>[3]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Kumar</surname></string-name> and <string-name><given-names>C.</given-names> <surname>Ravikanth</surname></string-name></person-group>, &#x201C;<article-title>Personal authentication using finger knuckle surface</article-title>,&#x201D; <source>IEEE Transactions on Information Forensics and Security</source>, vol. <volume>4</volume>, no. <issue>1</issue>, pp. <fpage>98</fpage>&#x2013;<lpage>110</lpage>, <year>2009</year>.</mixed-citation></ref>
<ref id="ref-4"><label>[4]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>L.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>L.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>D.</given-names> <surname>Zhang</surname></string-name> and <string-name><given-names>Z.</given-names> <surname>Guo</surname></string-name></person-group>, &#x201C;<article-title>Phase congruency induced local features for finger-knuckle-print recognition</article-title>,&#x201D; <source>Pattern Recognition</source>, vol. <volume>45</volume>, no. <issue>7</issue>, pp. <fpage>2522</fpage>&#x2013;<lpage>2531</lpage>, <year>2012</year>.</mixed-citation></ref>
<ref id="ref-5"><label>[5]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>L.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>L.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>D.</given-names> <surname>Zhang</surname></string-name> and <string-name><given-names>H.</given-names> <surname>Zhu</surname></string-name></person-group>, &#x201C;<article-title>Online finger-knuckle-print verification for personal authentication</article-title>,&#x201D; <source>Pattern Recognition</source>, vol. <volume>43</volume>, no. <issue>7</issue>, pp. <fpage>2560</fpage>&#x2013;<lpage>2571</lpage>, <year>2010</year>.</mixed-citation></ref>
<ref id="ref-6"><label>[6]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>L.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>L.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>D.</given-names> <surname>Zhang</surname></string-name> and <string-name><given-names>H.</given-names> <surname>Zhu</surname></string-name></person-group>, &#x201C;<article-title>Ensemble of local and global information for finger-knuckle-print recognition</article-title>,&#x201D; <source>Pattern Recognition</source>, vol. <volume>44</volume>, no. <issue>9</issue>, pp. <fpage>1990</fpage>&#x2013;<lpage>1998</lpage>, <year>2011</year>.</mixed-citation></ref>
<ref id="ref-7"><label>[7]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Sihwail</surname></string-name>, <string-name><given-names>K.</given-names> <surname>Omar</surname></string-name>, <string-name><given-names>K. A. Z.</given-names> <surname>Ariffin</surname></string-name> and <string-name><given-names>M.</given-names> <surname>Tubishat</surname></string-name></person-group>, &#x201C;<article-title>Improved harris hawks optimization using elite opposition-based learning and novel search mechanism for feature selection</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>8</volume>, pp. <fpage>121127</fpage>&#x2013;<lpage>121145</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-8"><label>[8]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Ghaem</surname></string-name> and <string-name><given-names>M. R.</given-names> <surname>Feizi-Derakhshi</surname></string-name></person-group>, &#x201C;<article-title>Feature selection using forest optimization algorithm</article-title>,&#x201D; <source>Pattern Recognition</source>, vol. <volume>60</volume>, pp. <fpage>121</fpage>&#x2013;<lpage>129</lpage>, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-9"><label>[9]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Huda</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Abawajy</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Alazab</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Abdollalihian</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Islam</surname></string-name> <etal>et al.</etal></person-group><italic>,</italic> &#x201C;<article-title>Hybrids of support vector machine wrapper and filter-based framework for malware detection</article-title>,&#x201D; <source>Future Generation Computer Systems</source>, vol. <volume>55</volume>, pp. <fpage>376</fpage>&#x2013;<lpage>390</lpage>, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-10"><label>[10]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>R. M.</given-names> <surname>Ramadan</surname></string-name> and <string-name><given-names>R. F.</given-names> <surname>Abdel&#x2013;Kader</surname></string-name></person-group>, &#x201C;<article-title>Face recognition using particle swarm optimization-based selected features</article-title>,&#x201D; <source>International Journal of Signal Processing, Image Processing and Pattern Recognition</source>, vol. <volume>2</volume>, no. <issue>2</issue>, pp. 51&#x2013;65, <year>2009</year>.</mixed-citation></ref>
<ref id="ref-11"><label>[11]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K. K.</given-names> <surname>Patro</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Jaya Prakash</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Jayamanmadha Rao</surname></string-name> and <string-name><given-names>P.</given-names> <surname>RajeshKumar</surname></string-name></person-group>, &#x201C;<article-title>An efficient optimized feature selection with machine learning approach for ECG biometric recognition</article-title>,&#x201D; <source>IETE Journal of Research</source>, vol. <volume>372</volume>, no. <issue>1</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>12</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-12"><label>[12]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>L.</given-names> <surname>Ghoualmi</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Draa</surname></string-name> and <string-name><given-names>S.</given-names> <surname>Chikhi</surname></string-name></person-group>, &#x201C;<article-title>An efficient feature selection scheme based on genetic algorithm for ear biometrics authentication</article-title>,&#x201D; in <conf-name>12th Int. Sym. on Programming and Systems (ISPS)</conf-name>, <publisher-loc>Algiers, Algeria</publisher-loc>, pp. <fpage>1</fpage>&#x2013;<lpage>5</lpage>, <year>2015</year>. </mixed-citation></ref>
<ref id="ref-13"><label>[13]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>F. G. Silva</given-names> <surname>Teodoro</surname></string-name>, <string-name><given-names>S. M.</given-names> <surname>Peres</surname></string-name> and <string-name><given-names>C. A. M.</given-names> <surname>Lima</surname></string-name></person-group>, &#x201C;<article-title>Feature selection for biometric recognition based on electrocardiogram signals</article-title>,&#x201D; in <conf-name>Int. Joint Conf. on Neural Networks (IJCNN)</conf-name>, <publisher-loc>Anchorage, AK, USA</publisher-loc>, pp. <fpage>2911</fpage>&#x2013;<lpage>2920</lpage>, <year>2017</year>. </mixed-citation></ref>
<ref id="ref-14"><label>[14]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H. R.</given-names> <surname>Kanan</surname></string-name> and <string-name><given-names>K.</given-names> <surname>Faez</surname></string-name></person-group>, &#x201C;<article-title>An improved feature selection method based on ant colony optimization evaluated on face recognition system</article-title>,&#x201D; <source>Applied Mathematics and Computation</source>, vol. <volume>205</volume>, no. <issue>2</issue>, pp. <fpage>716</fpage>&#x2013;<lpage>725</lpage>, <year>2008</year>.</mixed-citation></ref>
<ref id="ref-15"><label>[15]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Kumar</surname></string-name></person-group>, &#x201C;<article-title>Adaptive management of multimodal biometrics fusion using ant colony optimization</article-title>,&#x201D; <source>Information Fusion</source>, vol. <volume>32</volume>, no. <issue>1</issue>, pp. <fpage>49</fpage>&#x2013;<lpage>63</lpage>, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-16"><label>[16]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>D. H.</given-names> <surname>Wolpert</surname></string-name> and <string-name><given-names>W. G.</given-names> <surname>Macready</surname></string-name></person-group>, &#x201C;<article-title>No free lunch theorems for optimization</article-title>,&#x201D; <source>IEEE Transactions on Evolutionary Computation</source>, vol. <volume>1</volume>, no. <issue>1</issue>, pp. <fpage>67</fpage>&#x2013;<lpage>82</lpage>, <year>1997</year>.</mixed-citation></ref>
<ref id="ref-17"><label>[17]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>D.</given-names> <surname>Faivre</surname></string-name> and <string-name><given-names>D.</given-names> <surname>Schuler</surname></string-name></person-group>, &#x201C;<article-title>Magnetotactic bacteria and magnetosomes</article-title>,&#x201D; <source>Chemical Reviews</source>, vol. <volume>108</volume>, no. <issue>11</issue>, pp. <fpage>4875</fpage>&#x2013;<lpage>4898</lpage>, <year>2008</year>.</mixed-citation></ref>
<ref id="ref-18"><label>[18]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H. W.</given-names> <surname>Mo</surname></string-name> and <string-name><given-names>L. F.</given-names> <surname>Xu</surname></string-name></person-group>, &#x201C;<article-title>Magnetotactic bacteria algorithm for function optimization</article-title>,&#x201D; <source>Journal of Software Engineering and Applications</source>, vol. <volume>5</volume>, no. <issue>12</issue>, pp. <fpage>66</fpage>&#x2013;<lpage>71</lpage>, <year>2012</year>.</mixed-citation></ref>
<ref id="ref-19"><label>[19]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>H. W.</given-names> <surname>Mo</surname></string-name> and <string-name><given-names>L. F.</given-names> <surname>Xu</surname></string-name></person-group>, &#x201C;<article-title>Magnetotactic bacteria optimization algorithm for multimodal optimization</article-title>,&#x201D; in <conf-name>IEEE Sym. on Swarm Intelligence (SIS)</conf-name>, <publisher-loc>Singopore</publisher-loc>, pp. <fpage>240</fpage>&#x2013;<lpage>247</lpage>, <year>2013</year>. </mixed-citation></ref>
<ref id="ref-20"><label>[20]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>H. W.</given-names> <surname>Mo</surname></string-name> and <string-name><given-names>L.</given-names> <surname>Liu</surname></string-name></person-group>, &#x201C;<article-title>Magnetotactic bacteria optimization algorithm based on best-target scheme</article-title>,&#x201D; in <conf-name>2014 10th Int. Conf. on Natural Computation (ICNC)</conf-name>, Xiamen, China, pp. <fpage>451</fpage>&#x2013;<lpage>456</lpage>, <year>2014</year>. </mixed-citation></ref>
<ref id="ref-21"><label>[21]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H.</given-names> <surname>Mo</surname></string-name>, <string-name><given-names>L.</given-names> <surname>Liu</surname></string-name> and <string-name><given-names>J.</given-names> <surname>Zhao</surname></string-name></person-group>, &#x201C;<article-title>A new magnetotactic bacteria optimization algorithm based on moment migration</article-title>,&#x201D; <source>IEEE/ACM Transactions on Computational Biology and Bioinformatics</source>, vol. <volume>14</volume>, no. <issue>1</issue>, pp. <fpage>15</fpage>&#x2013;<lpage>26</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-22"><label>[22]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A. M.</given-names> <surname>Martnez</surname></string-name> and <string-name><given-names>A. C.</given-names> <surname>Kak</surname></string-name></person-group>, &#x201C;<article-title>PCA <italic>vs</italic>. LDA</article-title>,&#x201D; <source>IEEE Transactions on Pattern Analysis and Machine Intelligence</source>, vol. <volume>23</volume>, no. <issue>2</issue>, pp. <fpage>228</fpage>&#x2013;<lpage>233</lpage>, <year>2001</year>.</mixed-citation></ref>
<ref id="ref-23"><label>[23]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Pentland</surname></string-name>, <string-name><given-names>T.</given-names> <surname>Starner</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Etco</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Masoiu</surname></string-name>, <string-name><given-names>O.</given-names> <surname>Oliyide</surname></string-name> <etal>et al.</etal></person-group><italic>,</italic> &#x201C;<chapter-title>Experiments with eigenfaces</chapter-title>,&#x201D; in <source>Looking at People, Workshop of IJCAI</source>, vol. 93, pp. 1&#x2013;6, <year>1993</year>.</mixed-citation></ref>
<ref id="ref-24"><label>[24]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H.</given-names> <surname>Moon</surname></string-name> and <string-name><given-names>P. J.</given-names> <surname>Phillips</surname></string-name></person-group>, &#x201C;<article-title>Computational and performance aspects of PCA-based face-recognition algorithms</article-title>,&#x201D; <source>Perception</source>, vol. <volume>30</volume>, no. <issue>3</issue>, pp. <fpage>303</fpage>&#x2013;<lpage>321</lpage>, <year>2001</year>.</mixed-citation></ref>
<ref id="ref-25"><label>[25]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Okada</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Steffens</surname></string-name>, <string-name><given-names>T.</given-names> <surname>Maurer</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Hong</surname></string-name>, <string-name><given-names>E.</given-names> <surname>Elagin</surname></string-name> <etal>et al.</etal></person-group><italic>,</italic> &#x201C;<chapter-title>The Bochum/USC face recognition system and how it fared in the FERET phase III test</chapter-title>,&#x201D; in <source>Face Recognition</source>. <publisher-loc>Berlin, Heidelberg</publisher-loc>: <publisher-name>Springer</publisher-name>, pp. <fpage>186</fpage>&#x2013;<lpage>205</lpage>, <year>1998</year>.</mixed-citation></ref>
<ref id="ref-26"><label>[26]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>P.</given-names> <surname>Shunmugapriya</surname></string-name> and <string-name><given-names>S.</given-names> <surname>Kanmani</surname></string-name></person-group>, &#x201C;<article-title>A hybrid algorithm using ant and bee colony optimization for feature selection and classification</article-title>,&#x201D; <source>Swarm and Evolutionary Computation</source>, vol. <volume>36</volume>, no. <issue>1</issue>, pp. <fpage>27</fpage>&#x2013;<lpage>36</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-27"><label>[27]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>L.</given-names> <surname>Brezo&#x010D;nik</surname></string-name>, <string-name><given-names>I.</given-names> <surname>Fister</surname></string-name> and <string-name><given-names>V.</given-names> <surname>Podgorelec</surname></string-name></person-group>, &#x201C;<article-title>Swarm intelligence algorithms for feature selection: A review</article-title>,&#x201D; <source>Applied Sciences</source>, vol. <volume>8</volume>, no. <issue>9</issue>, pp. <fpage>1521</fpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-28"><label>[28]</label><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Naseriparsa</surname></string-name>, <string-name><given-names>A. M.</given-names> <surname>Bidgoli</surname></string-name> and <string-name><given-names>T.</given-names> <surname>Varaee</surname></string-name></person-group>, &#x201C;<article-title>A hybrid feature selection method to improve performance of a group of classification algorithms</article-title>,&#x201D; <comment>arXiv preprint arXiv: 1403. 2372</comment>, <year>2014</year>.</mixed-citation></ref>
<ref id="ref-29"><label>[29]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Sebban</surname></string-name> and <string-name><given-names>R.</given-names> <surname>Nock</surname></string-name></person-group>, &#x201C;<article-title>A hybrid filter/wrapper approach of feature selection using information theory</article-title>,&#x201D; <source>Pattern Recognition</source>, vol. <volume>35</volume>, no. <issue>4</issue>, pp. <fpage>835</fpage>&#x2013;<lpage>846</lpage>, <year>2002</year>.</mixed-citation></ref>
<ref id="ref-30"><label>[30]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>C.</given-names> <surname>Yang</surname></string-name> and <string-name><given-names>Z.</given-names> <surname>Chen</surname></string-name></person-group>, &#x201C;<article-title>Support vector machine optimization based on magnetic bacteria optimization algorithm</article-title>,&#x201D; <source>International Journal of Hybrid Information Technology</source>, vol. <volume>8</volume>, no. <issue>9</issue>, pp. <fpage>381</fpage>&#x2013;<lpage>388</lpage>, <year>2015</year>.</mixed-citation></ref>
<ref id="ref-31"><label>[31]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S. T. E. F. A. N.</given-names> <surname>Spring</surname></string-name> and <string-name><given-names>D. A.</given-names> <surname>Bazylinski</surname></string-name></person-group>, &#x201C;<article-title>Magnetotactic bacteria</article-title>,&#x201D; <source>Prokaryotes</source>, vol. <volume>2</volume>, pp. <fpage>842</fpage>&#x2013;<lpage>862</lpage>, <year>2006</year>.</mixed-citation></ref>
<ref id="ref-32"><label>[32]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>E.</given-names> <surname>Emary</surname></string-name>, <string-name><given-names>H. M.</given-names> <surname>Zawbaa</surname></string-name> and <string-name><given-names>A. E.</given-names> <surname>Hassanien</surname></string-name></person-group>, &#x201C;<article-title>Binary grey wolf optimization approaches for feature selection</article-title>,&#x201D; <source>Neurocomputing</source>, vol. <volume>172</volume>, no. <issue>1</issue>, pp. <fpage>371</fpage>&#x2013;<lpage>381</lpage>, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-33"><label>[33]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>L. H.</given-names> <surname>Chan</surname></string-name>, <string-name><given-names>S. H.</given-names> <surname>Salleh</surname></string-name> and <string-name><given-names>C.</given-names> <surname>Ting</surname></string-name></person-group>, &#x201C;<article-title>Face biometrics based on principal component analysis and linear discriminant analysis</article-title>,&#x201D; <source>Journal of Computer Science</source>, vol. <volume>6</volume>, no. <issue>7</issue>, pp. <fpage>693</fpage>&#x2013;<lpage>699</lpage>, <year>2010</year>.</mixed-citation></ref>
<ref id="ref-34"><label>[34]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M. T.</given-names> <surname>Sadeghi</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Samiei</surname></string-name> and <string-name><given-names>J.</given-names> <surname>Kittler</surname></string-name></person-group>, &#x201C;<article-title>Fusion of PCA-based and LDA-based similarity measures for face verification</article-title>,&#x201D; <source>EURASIP Journal on Advances in Signal Processing</source>, vol. <volume>2010</volume>, no. <issue>1</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>2</lpage>, <year>2010</year>.</mixed-citation></ref>
<ref id="ref-35"><label>[35]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>O.</given-names> <surname>Nibouche</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Jiang</surname></string-name> and <string-name><given-names>P.</given-names> <surname>Trundle</surname></string-name></person-group>, &#x201C;<article-title>Analysis of performance of palmprint matching with enforced sparsity</article-title>,&#x201D; <source>Digital Signal Processing</source>, vol. <volume>22</volume>, no. <issue>2</issue>, pp. <fpage>348</fpage>&#x2013;<lpage>355</lpage>, <year>2012</year>.</mixed-citation></ref>
<ref id="ref-36"><label>[36]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>C.</given-names> <surname>Murukesh</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Parivazhagan</surname></string-name> and <string-name><given-names>K.</given-names> <surname>Thanushkodi</surname></string-name></person-group>, &#x201C;<article-title>A novel ear recognition process using appearance shape model, fisher linear discriminant analysis and contourlet transform</article-title>,&#x201D; <source>Procedia Engineering</source>, vol. <volume>38</volume>, pp. <fpage>771</fpage>&#x2013;<lpage>778</lpage>, <year>2012</year>.</mixed-citation></ref>
<ref id="ref-37"><label>[37]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Yin</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Zhou</surname></string-name>, <string-name><given-names>Z.</given-names> <surname>Jin</surname></string-name> and <string-name><given-names>J.</given-names> <surname>Yang</surname></string-name></person-group>, &#x201C;<article-title>Weighted linear embedding and its applications to finger-knuckle-print and palmprint recognition</article-title>,&#x201D; in <conf-name>2010 Int. Workshop on Emerging Techniques and Challenges for Hand-Based Biometrics</conf-name>, <publisher-loc>Istanbul, Turkey</publisher-loc>, pp. <fpage>1</fpage>&#x2013;<lpage>4</lpage>, <year>2010</year>. </mixed-citation></ref>
<ref id="ref-38"><label>[38]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J. D.</given-names> <surname>Wu</surname></string-name> and <string-name><given-names>C. T.</given-names> <surname>Liu</surname></string-name></person-group>, &#x201C;<article-title>Finger-vein pattern identification using principal component analysis and the neural network technique</article-title>,&#x201D; <source>Expert Systems with Applications</source>, vol. <volume>38</volume>, no. <issue>5</issue>, pp. <fpage>5423</fpage>&#x2013;<lpage>5427</lpage>, <year>2011</year>.</mixed-citation></ref>
<ref id="ref-39"><label>[39]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Mirjalili</surname></string-name>, <string-name><given-names>S. M.</given-names> <surname>Mirjalili</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Lewis</surname></string-name></person-group>, &#x201C;<article-title>Grey wolf optimizer</article-title>,&#x201D; <source>Advances in Engineering Software</source>, vol. <volume>69</volume>, pp. <fpage>46</fpage>&#x2013;<lpage>61</lpage>, <year>2014</year>.</mixed-citation></ref>
<ref id="ref-40"><label>[40]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Hussain</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Jibreen</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Aboalsmah</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Madkour</surname></string-name>, <string-name><given-names>G.</given-names> <surname>Bebis</surname></string-name> <etal>et al.</etal></person-group><italic>,</italic> &#x201C;<article-title>Feature selection for hand-shape based identification</article-title>,&#x201D; in <conf-name>Computational Intelligence in Security for Information Systems Conf.</conf-name>, <publisher-loc>Basel, Switzerland</publisher-loc>, <publisher-name>Springer Cham</publisher-name>, pp. <fpage>237</fpage>&#x2013;<lpage>246</lpage>, <year>2015</year>. </mixed-citation></ref>
<ref id="ref-41"><label>[41]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>R. M.</given-names> <surname>Luque</surname></string-name>, <string-name><given-names>D.</given-names> <surname>Elizondo</surname></string-name>, <string-name><given-names>E.</given-names> <surname>L&#x00F3;pez-Rubio</surname></string-name> and <string-name><given-names>E. J.</given-names> <surname>Palom</surname></string-name></person-group>, &#x201C;<article-title>GA-based feature selection approach in biometric hand systems</article-title>,&#x201D; in <conf-name>Int. Joint Conf. on Neural Networks</conf-name>, <publisher-loc>San Jose, CA, USA</publisher-loc>, pp. <fpage>246</fpage>&#x2013;<lpage>253</lpage>, <year>2011</year>. </mixed-citation></ref>
<ref id="ref-42"><label>[42]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Kumar</surname></string-name> and <string-name><given-names>Y.</given-names> <surname>Zhou</surname></string-name></person-group>, &#x201C;<article-title>Human identification using finger images</article-title>,&#x201D; <source>IEEE Transactions Image Process</source>, vol. <volume>21</volume>, no. <issue>4</issue>, pp. <fpage>2228</fpage>&#x2013;<lpage>2244</lpage>, <year>2012</year>.</mixed-citation></ref>
<ref id="ref-43"><label>[43]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Kumar</surname></string-name></person-group>, &#x201C;<article-title>Can we use minor finger knuckle images to identify humans?</article-title>,&#x201D; in <conf-name>2012 IEEE Fifth Int. Conf. on Biometrics: Theory, Applications and Systems (BTAS)</conf-name>, <publisher-loc>Arlington, VA, USA</publisher-loc>, pp. <fpage>55</fpage>&#x2013;<lpage>60</lpage>, <year>2012</year>. </mixed-citation></ref>
<ref id="ref-44"><label>[44]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>N. E.</given-names> <surname>Chalabi</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Attia</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Bouziane</surname></string-name></person-group>, &#x201C;<article-title>Multimodal finger dorsal knuckle major and minor print recognition system based on pcanet deep learning</article-title>,&#x201D; <source>ICTACT J. Image Video Process</source>, vol. <volume>10</volume>, no. <issue>3</issue>, pp. <fpage>2153</fpage>&#x2013;<lpage>2158</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-45"><label>[45]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>J. C.</given-names> <surname>Joshi</surname></string-name>, <string-name><given-names>S. A.</given-names> <surname>Nangia</surname></string-name>, <string-name><given-names>K.</given-names> <surname>Tiwari</surname></string-name> and <string-name><given-names>K. K.</given-names> <surname>Gupta</surname></string-name></person-group>, &#x201C;<article-title>Finger knuckle print based personal authentication using siamese network</article-title>,&#x201D; in <conf-name>2019 6th Int. Conf. on Signal Processing and Integrated Networks (SPIN)</conf-name>, <publisher-loc>Noida, India</publisher-loc>, pp. <fpage>282</fpage>&#x2013;<lpage>286</lpage>, <year>2019</year>. </mixed-citation></ref>
<ref id="ref-46"><label>[46]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>D.</given-names> <surname>Thapar</surname></string-name>, <string-name><given-names>G.</given-names> <surname>Jaswal</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Nigam</surname></string-name></person-group>, &#x201C;<article-title>Fkimnet: A finger dorsal image matching network comparing component (major, minor and nail) matching with holistic (finger dorsal) matching</article-title>,&#x201D; in <conf-name>2019 Int. Joint Conf. on Neural Networks (IJCNN)</conf-name>, <publisher-loc>Budapest, Hungary</publisher-loc>, pp. <fpage>1</fpage>&#x2013;<lpage>8</lpage>, <year>2019</year>. </mixed-citation></ref>
<ref id="ref-47"><label>[47]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Attia</surname></string-name>, <string-name><given-names>Z.</given-names> <surname>Akhtar</surname></string-name> and <string-name><given-names>Y.</given-names> <surname>Chahir</surname></string-name></person-group>, &#x201C;<article-title>Feature-level fusion of major and minor dorsal finger knuckle patterns for person authentication</article-title>,&#x201D; <source>Signal Image and Video Processing</source>, vol. <volume>15</volume>, no. <issue>4</issue>, pp. <fpage>851</fpage>&#x2013;<lpage>859</lpage>, <year>2021</year>.</mixed-citation></ref>
</ref-list>
</back>
</article>