Parallel score fusion of ECG and fingerprint for human authentication based on convolution neural network

M Hammad, K Wang - Computers & Security, 2019 - Elsevier
Biometrics have been extensively used in the past decades in various security systems and
have been deployed around the world. However, all unimodal biometrics have their own …

Deep fingerprint classification network

AM Ibrahim, AK Eesee… - … Electronics and Control), 2021 - telkomnika.uad.ac.id
Fingerprint is one of the most well-known biometrics that has been used for personal
recognition. However, faked fingerprints have become the major enemy where they threat …

Implementation of artificial neural network: Back propagation method on face recognition system

R Mukhaiyar, R Safitri - 2019 16th International Conference on …, 2019 - ieeexplore.ieee.org
Face recognition is commonly applied to recognize an authorized personal in accessing
secured personal information. Each personal owns a specific trait/feature on their face. Many …

Alat Pendeteksi Formalin Pada Makanan Menggunakan IoT

M Syukri, R Mukhaiyar - Ranah Research: Journal of …, 2021 - jurnal.ranahresearch.com
Sulitnya mengidentifikasi keberadaannya secara sepintas dapat membuat masyarakat
resah dan dirugikan. Untuk itu diperlukannya Alat Detektor Formalin pada bahan makanan …

Aplikasi Pengenalan Wajah dengan Metode Adaptive Resonance Theory (ART)

D Frenza, R Mukhaiyar - Ranah Research: Journal of …, 2021 - jurnal.ranahresearch.com
Image processing technology (image processing) at this time can be done using a computer.
An image that can be recognized by a computer is called a digital image. One application of …

[PDF][PDF] Analysis of Galton-Henry classification method for fingerprint database FVC 2002 and 2004

R Mukhaiyar - GEOMATE Journal, 2017 - geomatejournal.com
According to Galton-Henry, fingerprint classification varies into arch, tented arch, left loop,
right loop, whorl, and twin loop schemes. The approach is depended on the existence of a …

Generating a Cancellable Fingerprint using Matrices Operations and Its Fingerprint Processing Requirements

R Mukhaiyar - Asian Social Science, 2018 - eprint.subtopublish.com
Cancellable fingerprint uses transformed or intentionally distorted biometric data instead of
the original biometric data for identifying person. When a set of biometric data is found to be …

[PDF][PDF] The comparation of back propagation method and kohonen method for gas identification

R Mukhaiyar - GEOMATE Journal, 2017 - geomatejournal.com
THE COMPARATION OF BACK PROPAGATION METHOD AND KOHONEN METHOD FOR
GAS IDENTIFICATION Page 1 97 THE COMPARATION OF BACK PROPAGATION METHOD …

Door Security System Menggunakan Teknologi Biometric Face Recognition

FA Azhari, R Mukhaiyar - Ranah Research: Journal of …, 2021 - jurnal.ranahresearch.com
Penelitian ini bertujuan untuk merancang sistem keamanan pintu menggunakan
pengenalan wajah secara otomatis menggunakan Raspberry Pi sebagai pusat pengendali …

[引用][C] Monitoring Daya Listrik Secara Real Time

DA Putra, R Mukhaiyar - Voteteknika (Vocational Teknik Elektronika dan …, 2020