scholarly journals Fingerprints Image Recognition by Using Perceptron Artificial Neural Network

2020 ◽  
Vol 21 (2) ◽  
pp. 37
Author(s):  
Muhammad Arif Budiman ◽  
I Gusti Agung Widagda

Security systems that use passwords or identity cards can be hacked and misused. One of alternative security system is to use biometric identification. The biometric system that is popularly used is fingerprints, because the system is safe and comfortable. Fingerprints have a distinctive pattern for each individual and this makes fingerprints relatively difficult to fake, so the system is safe. Comfortable because the verification process is easily done. The problem that often occurs on the system of fingerprint scanner is found an error and the user has difficulty when accessing. To handle with these problems has developed an artificial intelligence system. One of arificial intelligence in pattern identification is artificial neural networks (ANN). From some of the results of previous research showed that the ANN method is reliable in pattern identification. Based on these facts, the method used in this research is the perceptron ANN method with values learning rate varying. In the research the program conducted by testing 20 samples showed that the performance of the perceptron ANN method is relatively good method in fingerprint image recognition. This can be indicated from the value of accuracy (0.95), precision (0.83), TP rate (1), and FP rate (0.07)). In addition, the location of the point coordinate (FP rate; TP rate) is (0.07; 1) in ROC graphs is located on the upper left (perfect classifier region).

Author(s):  
Pankaj Mishra ◽  
Dev Ratna Singh

Nowadays, progress in technology have made life simple by giving us higher levels of knowledge through the innovation of various devices. However, all technical invention harbours the potential of invisible threats to its users. One leading danger is theft of private information and data. As digital database get more prevailing, user’s attempt to prevent their data with extremely encrypted Identity cards and passwords. However, the abuse and theft of these security measures are on the rise. Taking benefit of security fault in Identity cards result in the cards gets duplicated and get misused. This increasing conflict of the cyber safety has lead to the start of biometric security method. Defining the main variation between the methods of biometric system used to verify user identity will focus on the benefits and limitations of personal data security systems.


Author(s):  
Pankaj Mishra ◽  
Dev Ratna Singh

Nowadays, progress in technology have made life simple by giving us higher levels of knowledge through the innovation of various devices. However, all technical invention harbours the potential of invisible threats to its users. One leading danger is theft of private information and data. As digital database get more prevailing, user’s attempt to prevent their data with extremely encrypted Identity cards and passwords. However, the abuse and theft of these security measures are on the rise. Taking benefit of security fault in Identity cards result in the cards gets duplicated and get misused. This increasing conflict of the cyber safety has lead to the start of biometric security method. Defining the main variation between the methods of biometric system used to verify user identity will focus on the benefits and limitations of personal data security systems.


2014 ◽  
Vol 9 (2) ◽  
pp. 107
Author(s):  
Muhammad Ilyas Sikki ◽  
Sugi Guritman ◽  
Hendra Rahmawan

The e-voting system which developed using two central facilities protokol consist of three component that is voting machine as client for interaction with voter, central legitimization agency (CLA) as server voter authentication, and central tabulating facility (CTF) as server for result recapitulation voter vote count. Research in this paper just focused to voter authentication process on voting machine toward database of voter that stored in CLA with using fingerprint biometric technology. Fingerprint biometric technology used for voter registration process, voter verification process, and voter authentication process who will doing election. Registration process for acquiring voter fingerprint image database, verification process to be sure voter database can be verificated or not, and authentication process for voter authorization who can be permitted or not by system give of vote in election.


Author(s):  
Muzhir Shaban Al-Ani

The terms biometrics and biometry have been used to refer to the field of development of statistical and mathematical methods applicable to data analysis problems in the biological sciences. Recently biometrics refers to technologies and applications applied for personal identification using physical and behavioral parameters. Biometric security systems ensuring that only the authorized persons are permitted to access a certain data, because it is difficult to copy the biometric features pattern for a specific person. Biometrics is playing an important role in applications that are centric on identification, verification and classification. This chapter focuses on biometric security in their types, specifications, technologies and algorithms. Some algorithms of biometric security are also included in this chapter. Finally latest and future aspects of biometric system and merging technologies are also mentioned, including more details of system structures and specifications and what constitution will shape biometric security of in the future.


2018 ◽  
Vol 178 ◽  
pp. 07002 ◽  
Author(s):  
Stanisław Duer ◽  
Konrad Zajkowski ◽  
Serghei Scaticailov ◽  
Paweł Wrzesień

The present article covers the use of an artificial intelligence system in the organization of the prevention of technical objects. For this purpose, the composition of this system including an intelligent diagnostic system and an intelligent maintenance system was characterized and described. An artificial neural network and an expert system, which work among others on the basis of the information developed by the neural network, perform a special function in these systems. It was mentioned in the article that the mathematical model of the regeneration process of the functional properties (prevention) of an object forms the basis of the organization of the prevention activities of technical devices and objects with the use of intelligent systems. This model demonstrated the possibilities and directions for the use of maintenance intelligent systems.


2018 ◽  
Vol 16 (5) ◽  
Author(s):  
Feng Liang ◽  
Hanhu Liu ◽  
Xiao Wang ◽  
Yanyan Liu

Sign in / Sign up

Export Citation Format

Share Document