Cancelable biometric authentication system based on ECG

M Hammad, G Luo, K Wang - Multimedia Tools and Applications, 2019 - Springer
Biometrics are widely deployed in various security systems; however, they have drawbacks
in the form of leakage or stealing, therefore numerous solutions have been proposed to …

Signal processing and machine learning techniques for human verification based on finger textures

RRO Al-Nima - 2017 - theses.ncl.ac.uk
In recent years, Finger Textures (FTs) have attracted considerable attention as potential
biometric characteristics. They can provide robust recognition performance as they have …

Deep fingerprint classification network

AM Ibrahim, AK Eesee… - … Electronics and Control), 2021 - telkomnika.uad.ac.id
Fingerprint is one of the most well-known biometrics that has been used for personal
recognition. However, faked fingerprints have become the major enemy where they threat …

Implementation of artificial neural network: Back propagation method on face recognition system

R Mukhaiyar, R Safitri - 2019 16th International Conference on …, 2019 - ieeexplore.ieee.org
Face recognition is commonly applied to recognize an authorized personal in accessing
secured personal information. Each personal owns a specific trait/feature on their face. Many …

Alat Pendeteksi Formalin Pada Makanan Menggunakan IoT

M Syukri, R Mukhaiyar - Ranah Research: Journal of …, 2021 - jurnal.ranahresearch.com
Sulitnya mengidentifikasi keberadaannya secara sepintas dapat membuat masyarakat
resah dan dirugikan. Untuk itu diperlukannya Alat Detektor Formalin pada bahan makanan …

Aplikasi Pengenalan Wajah dengan Metode Adaptive Resonance Theory (ART)

D Frenza, R Mukhaiyar - Ranah Research: Journal of …, 2021 - jurnal.ranahresearch.com
Image processing technology (image processing) at this time can be done using a computer.
An image that can be recognized by a computer is called a digital image. One application of …

[PDF][PDF] Analysis of Galton-Henry classification method for fingerprint database FVC 2002 and 2004

R Mukhaiyar - GEOMATE Journal, 2017 - geomatejournal.com
According to Galton-Henry, fingerprint classification varies into arch, tented arch, left loop,
right loop, whorl, and twin loop schemes. The approach is depended on the existence of a …

[PDF][PDF] The comparation of back propagation method and kohonen method for gas identification

R Mukhaiyar - GEOMATE Journal, 2017 - geomatejournal.com
THE COMPARATION OF BACK PROPAGATION METHOD AND KOHONEN METHOD FOR
GAS IDENTIFICATION Page 1 97 THE COMPARATION OF BACK PROPAGATION METHOD …

Door Security System Menggunakan Teknologi Biometric Face Recognition

FA Azhari, R Mukhaiyar - Ranah Research: Journal of …, 2021 - jurnal.ranahresearch.com
Penelitian ini bertujuan untuk merancang sistem keamanan pintu menggunakan
pengenalan wajah secara otomatis menggunakan Raspberry Pi sebagai pusat pengendali …

Pergerakan autonomous pesawat tanpa awak berdasarkan tinggi terbang pesawat

K Ilham, R Mukhaiyar - Ranah Research: Journal of …, 2021 - jurnal.ranahresearch.com
Not much different from the working principle of ordinary aircraft, Unmanned Aircraft also
uses an airfoil design on the wings to be able to manipulate aerodynamics so that the …