**1. Introduction**

Clinical specialists, through tracking, recording, comparison, induction, and also professional trials showed that fingerprints deliver the exact evaluation of a character's innate talents. The evaluation gadget opinions the distribution of mind's understanding ability and also allotment of cerebral characteristic of a selected and additionally elements suitable statistical document of person's innate intelligence. Thus, it permits increase of the man or woman in international of leading information.

This can help the guide/mentor to recognize the inherent qualities and powerful conversation mode of the man or woman. It will provide the maximum right discovering behaviors from the young age, which would be over and above to finding out capabilities. It can likewise help the guide/mentor to recognize the development of

more than one intelligence and also uncover the opportunity of the man or woman. Therefore, it will be very easy to decorate their vulnerable factor through the proposed method in a good way to accomplish ordinary development.

Last but not least we would really like to carry the message to all guides/mentors in addition to people that the aim of this test is to permit you to absolutely recognize and also appreciate precise differences of anyone and additionally provide education and mastering and/or schooling for this reason.

Our thoughts are separated into hemispheres, left and right. Each hemisphere of the mind has its very own resilience. Fingers of right hand constitute the features of left mind as well as arms of left hand represent the features of right brain. Each intelligence has its very own weight age. Overall distribution of intelligences' portion can be 100%.

In this chapter, authors applied bifurcation, termination, and neural network for feature extraction and got 90.06% accuracy for identifying an authorized person with the help of a proposed figureprint recognition method [1]. For human face recognition from side view of face, authors used Manhattan distance and support vector machine of artificial neural network, along with front view analysis and achieved up to 95.3528% accuracy in their work [2]. In the chapter, authors compared the performance of different biometric technologies like fingerprint, hand geometry, key stroke, etc. on the basis of EER, FAR, and FRP. The chapter is based on standardized fingerprint model for fingerprint matching. The author used mean images and genetic algorithm. Transformation is also used for synthesizing a fingerprint [3].

In this chapter, authors had thrown the light on the many preexisting methods and techniques of fingerprint recognition system. All four stages of fingerprint recognition system were elaborated briefly. Database related to fingerprint recognition had shown with characteristics [4]. For fingerprint recognition, the popular technique is "Euclidean distance" and "neural network classifier", whereas for preprocessing of images, "histogram equalization" and "fast Fourier transformation" are used. The result of this work was significantly better than the previous work [5].

In the chapter, authors first developed a CNN framework for more hygiene and accurate contactless fingerprint recognition and this work also helped to alleviate spoofing of fingerprint and shown much greater security than the preexisting methods [6]. In the chapter, authors used color coding scheme, Sobel and Canny method, HSV histogram, edge detector method, and Corel-1 K dataset for detection of color object [7]. In this chapter, authors gave a thorough knowledge of fingerprint recognition and also proposed a secured fingerprint recognition payment system [8].

This chapter defined many aspects, methods, and techniques like Gabor filter, FFT, minimum distance classifier, histogram equalization, fusion and context switching framework, etc. for fingerprint-based identification system [9].

In this chapter, authors applied LGXP and ANN techniques for face recognition to handle variation in human face due to change in pose, illumination condition, viewing direction, and expression of different ages [10]. In this fingerprint-based biometric review paper, authors briefly discussed different attacks, and compared different existing methods of biometric cryptosystem, cancellable biometrics, etc. for fingerprint template protection [11]. The most widely used biometrics is fingerprint technology. The fingerprint is a pattern of ridges and valleys present on the surface of a fingertip [12]. The finger ridge configurations do not change throughout the life of an individual, except in case of accidents such as burns or cuts on the fingertips. The fingerprints are so unique that two identical twins have different fingerprints [13]. Matching accuracy using fingerprint is very high as compared to other biometrical traits. Initially the fingerprint technology of biometric identification is used for forensics and criminal investigation (**Figure 1**) [14].

**97**

*Assessment Methods of Cognitive Ability of Human Brains for Inborn Intelligence Potential…*

Various pattern kinds will definitely display the flow of different worth. In ordinary situations for the general public of people, the worth will truly range from 8 to 30. If the worth is high, it indicates that the function of the thoughts cortex assignment stage is high. Everybody has the capability for selected natural pinnacle traits. With boosting and locating out, it is easy to turn out to be being a better human. Support the thought that every of us can absolutely stimulate our viable and might

*Examples of body traits that can be used for biometric recognition (courtesy: http://images.google.co.in).*

Analytical mind is more likely to exhibit self-awareness, logical thinking, language & grammar, curiosity, and love [15]. They individuals are usually desirable in teachers. They have convergent reasoning and can deliver their power and also emphasis at one factor. They prefer to respond to Spoken guidelines. They want to fix the issues by searching at the parts of points [16]. They are in a position situate the difference transgression comparable points speedy. They are an awful lot more supposed and also based. Prefer more than one option checks. They have

*DOI: http://dx.doi.org/10.5772/intechopen.93268*

**2. Proposed methodology**

**Figure 1.**

Low potential Average potential Good potential Very good potential Excellent potential Hyper active

**2.1 Left brain**

accomplish first-rate future (**Figures 2–4**). **Inborn intelligence potential:**

*Assessment Methods of Cognitive Ability of Human Brains for Inborn Intelligence Potential… DOI: http://dx.doi.org/10.5772/intechopen.93268*

**Figure 1.**

*Biometric Systems*

tion can be 100%.

more than one intelligence and also uncover the opportunity of the man or woman. Therefore, it will be very easy to decorate their vulnerable factor through the proposed method in a good way to accomplish ordinary development.

tion and mastering and/or schooling for this reason.

Last but not least we would really like to carry the message to all guides/mentors in addition to people that the aim of this test is to permit you to absolutely recognize and also appreciate precise differences of anyone and additionally provide educa-

Our thoughts are separated into hemispheres, left and right. Each hemisphere of the mind has its very own resilience. Fingers of right hand constitute the features of left mind as well as arms of left hand represent the features of right brain. Each intelligence has its very own weight age. Overall distribution of intelligences' por-

In this chapter, authors applied bifurcation, termination, and neural network for feature extraction and got 90.06% accuracy for identifying an authorized person with the help of a proposed figureprint recognition method [1]. For human face recognition from side view of face, authors used Manhattan distance and support vector machine of artificial neural network, along with front view analysis and achieved up to 95.3528% accuracy in their work [2]. In the chapter, authors compared the performance of different biometric technologies like fingerprint, hand geometry, key stroke, etc. on the basis of EER, FAR, and FRP. The chapter is based on standardized fingerprint model for fingerprint matching. The author used mean images and genetic algorithm. Transformation is also used for synthesizing a fingerprint [3]. In this chapter, authors had thrown the light on the many preexisting methods and techniques of fingerprint recognition system. All four stages of fingerprint recognition system were elaborated briefly. Database related to fingerprint recognition had shown with characteristics [4]. For fingerprint recognition, the popular technique is "Euclidean distance" and "neural network classifier", whereas for preprocessing of images, "histogram equalization" and "fast Fourier transformation" are used. The result of this work was significantly better than the previous work [5]. In the chapter, authors first developed a CNN framework for more hygiene and accurate contactless fingerprint recognition and this work also helped to alleviate spoofing of fingerprint and shown much greater security than the preexisting methods [6]. In the chapter, authors used color coding scheme, Sobel and Canny method, HSV histogram, edge detector method, and Corel-1 K dataset for detection of color object [7]. In this chapter, authors gave a thorough knowledge of fingerprint recogni-

tion and also proposed a secured fingerprint recognition payment system [8].

tion is used for forensics and criminal investigation (**Figure 1**) [14].

This chapter defined many aspects, methods, and techniques like Gabor filter, FFT, minimum distance classifier, histogram equalization, fusion and context switching framework, etc. for fingerprint-based identification system [9].

In this chapter, authors applied LGXP and ANN techniques for face recognition to handle variation in human face due to change in pose, illumination condition, viewing direction, and expression of different ages [10]. In this fingerprint-based biometric review paper, authors briefly discussed different attacks, and compared different existing methods of biometric cryptosystem, cancellable biometrics, etc. for fingerprint template protection [11]. The most widely used biometrics is fingerprint technology. The fingerprint is a pattern of ridges and valleys present on the surface of a fingertip [12]. The finger ridge configurations do not change throughout the life of an individual, except in case of accidents such as burns or cuts on the fingertips. The fingerprints are so unique that two identical twins have different fingerprints [13]. Matching accuracy using fingerprint is very high as compared to other biometrical traits. Initially the fingerprint technology of biometric identifica-

**96**

*Examples of body traits that can be used for biometric recognition (courtesy: http://images.google.co.in).*
