Analysis and Implementation Scale Invariant Feature Transform (SIFT) for Authentication System Using Palm Vein

Analysis and Implementation Scale Invariant Feature Transform (SIFT) for Authentication System Using Palm Vein   Author : GHOFINKA PUTRI; TJOKORDA AGUNG BUDI WIRAYUDA; SITI SAADAH, ST. Published on : International Conference on Information and Communication Technology 2015   Abstract Data increasing every day become trigger to theft of personal data by those who don’t responsible […]

By ppm | Info Publikasi
DETAIL

Vomma:Android Application Launcher Using Voice Command

Vomma:Android Application Launcher Using Voice Command   Author : MUSLIM SIDIQ; TJOKORDA AGUNG BUDI WIRAYUDA; SITI SAADAH, ST. Published on : International Conference on Information and Communication Technology 2015   Abstract Nowadays, the development of mobile devices, especially android showed increased very rapidly. These developments can be seen in the year 2014, where the android […]

By ppm | Info Publikasi
DETAIL

Speaker Recognition Implementation for Authentication Using Filtered MFCC ??? VQ and a Thresholding Method

Speaker Recognition Implementation for Authentication Using Filtered MFCC ??? VQ and a Thresholding Method   Author : REZA AULIA SADEWA; TJOKORDA AGUNG BUDI WIRAYUDA; SITI SAADAH, ST. Published on : International Conference on Information and Communication Technology 2015   Abstract This paper explains about authentication mechanism using one of the unique biometric component, the human […]

By ppm | Info Publikasi
DETAIL

Design and Implementation of Voice Command Using MFCC and HMMs Method

Design and Implementation of Voice Command Using MFCC and HMMs Method   Author : MUSLIM SIDIQ; TJOKORDA AGUNG BUDI WIRAYUDA; SITI SAADAH, ST. Published on : International Conference on Information and Communication Technology 2015   Abstract The more frequent human interaction to technology demands the development of methods of interaction with the machine to a […]

By ppm | Info Publikasi
DETAIL

Implementation Classification And Regression Tree (CART) and Fuzzy Logic Algorithm for Intrusion Detection System

Implementation Classification And Regression Tree (CART) and Fuzzy Logic Algorithm for Intrusion Detection System   Author : ASRY FAIDHUL ASHAARI PINEM; ERWIN BUDI SETIAWAN Published on : ICOICT 2015   Abstract Intrusion detection system is a system that can detect the presence intrusion or attack in a computer network. There are 2 type of intrusion […]

By ppm | Info Publikasi
DETAIL