Detection of Ovarian Follicle for Polycystic Ovary Syndrome in Ultrasound Images of Ovaries
Detection of Ovarian Follicle for Polycystic Ovary Syndrome in Ultrasound Images of Ovaries Author : BEDY PURNAMA; ADIWIJAYA; UNTARI NOVIA WISESTY; fhira nitha Published on : ICoICT 2015 Abstract In the female in their reproductive cycle, Polycystic Ovary Syndrome (PCOS) is endocrine disorders that occurred on the adult female. In this paper, an […]
Performance Improvement of Palm Vein Identity Recognition Using Adaptive Filtering and Retinex Method
Performance Improvement of Palm Vein Identity Recognition Using Adaptive Filtering and Retinex Method Author : MUHAMMAD SHAFHI KASYFILLAH; TJOKORDA AGUNG BUDI WIRAYUDA Published on : International Conference on Information and Communication Technology 2015 Abstract Biometric is identification technology system based on feature from specific physiological or behavioral characteristic as authentication, one of it […]
Analysis and Implementation Scale Invariant Feature Transform (SIFT) for Authentication System Using Palm Vein
Analysis and Implementation Scale Invariant Feature Transform (SIFT) for Authentication System Using Palm Vein Author : GHOFINKA PUTRI; TJOKORDA AGUNG BUDI WIRAYUDA; SITI SAADAH, ST. Published on : International Conference on Information and Communication Technology 2015 Abstract Data increasing every day become trigger to theft of personal data by those who don’t responsible […]
Vomma:Android Application Launcher Using Voice Command
Vomma:Android Application Launcher Using Voice Command Author : MUSLIM SIDIQ; TJOKORDA AGUNG BUDI WIRAYUDA; SITI SAADAH, ST. Published on : International Conference on Information and Communication Technology 2015 Abstract Nowadays, the development of mobile devices, especially android showed increased very rapidly. These developments can be seen in the year 2014, where the android […]
Speaker Recognition Implementation for Authentication Using Filtered MFCC ??? VQ and a Thresholding Method
Speaker Recognition Implementation for Authentication Using Filtered MFCC ??? VQ and a Thresholding Method Author : REZA AULIA SADEWA; TJOKORDA AGUNG BUDI WIRAYUDA; SITI SAADAH, ST. Published on : International Conference on Information and Communication Technology 2015 Abstract This paper explains about authentication mechanism using one of the unique biometric component, the human […]