Analysis and Implementation Scale Invariant Feature Transform (SIFT) for Authentication System Using Palm Vein
Analysis and Implementation Scale Invariant Feature Transform (SIFT) for Authentication System Using Palm Vein Author : GHOFINKA PUTRI; TJOKORDA AGUNG BUDI WIRAYUDA; SITI SAADAH, ST. Published on : International Conference on Information and Communication Technology 2015 Abstract Data increasing every day become trigger to theft of personal data by those who don’t responsible […]
Vomma:Android Application Launcher Using Voice Command
Vomma:Android Application Launcher Using Voice Command Author : MUSLIM SIDIQ; TJOKORDA AGUNG BUDI WIRAYUDA; SITI SAADAH, ST. Published on : International Conference on Information and Communication Technology 2015 Abstract Nowadays, the development of mobile devices, especially android showed increased very rapidly. These developments can be seen in the year 2014, where the android […]
Speaker Recognition Implementation for Authentication Using Filtered MFCC ??? VQ and a Thresholding Method
Speaker Recognition Implementation for Authentication Using Filtered MFCC ??? VQ and a Thresholding Method Author : REZA AULIA SADEWA; TJOKORDA AGUNG BUDI WIRAYUDA; SITI SAADAH, ST. Published on : International Conference on Information and Communication Technology 2015 Abstract This paper explains about authentication mechanism using one of the unique biometric component, the human […]
Design and Implementation of Voice Command Using MFCC and HMMs Method
Design and Implementation of Voice Command Using MFCC and HMMs Method Author : MUSLIM SIDIQ; TJOKORDA AGUNG BUDI WIRAYUDA; SITI SAADAH, ST. Published on : International Conference on Information and Communication Technology 2015 Abstract The more frequent human interaction to technology demands the development of methods of interaction with the machine to a […]
Implementation Classification And Regression Tree (CART) and Fuzzy Logic Algorithm for Intrusion Detection System
Implementation Classification And Regression Tree (CART) and Fuzzy Logic Algorithm for Intrusion Detection System Author : ASRY FAIDHUL ASHAARI PINEM; ERWIN BUDI SETIAWAN Published on : ICOICT 2015 Abstract Intrusion detection system is a system that can detect the presence intrusion or attack in a computer network. There are 2 type of intrusion […]