Development of a lock biometric authentication system for a battery powered locking device
This paper describes the development of a biometric authentication system in a battery-powered locking device. It differs from the conventional locking system, which connected to an external power supply. The system focuses on a fingerprint-based identification with single button operation. A finger...
| Main Authors: | Ismail, Iman Fitri, Mas Fawzi, Mas Fawzi, Wan Jamaludin, Wan Akashah, Madon, Rais Hanizam, Abdullah, Ahmad Fauzan, Abdullah, Mohamad Ashik |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Penerbit UTHM
2021
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/1765/ http://eprints.uthm.edu.my/1765/1/J12153_0688f03fc18602c168973a05902f30c0.pdf |
Similar Items
Multilevel authentication for social network
by: Wu, Zhia Sheng, et al.
Published: (2018)
by: Wu, Zhia Sheng, et al.
Published: (2018)
Fast-Lock Low -Jitter Delay Locked Loop
by: Soh, Lip Kai
Published: (2007)
by: Soh, Lip Kai
Published: (2007)
Text Categorization Using Naive Bayes Algorithm
by: Wan Hazimah, Wan Ismail
Published: (2005)
by: Wan Hazimah, Wan Ismail
Published: (2005)
Business Intelligence Model for a Student Data Warehouse in UUM Environment
by: Abdullah, Harith Azam
Published: (2010)
by: Abdullah, Harith Azam
Published: (2010)
A study of requirements engineering practices among software developers at UUM Information Technology (UUMIT)
by: Lafta, Inam Abdullah
Published: (2015)
by: Lafta, Inam Abdullah
Published: (2015)
Development of egg incubator monitoring system using thingspeak as database
by: Azamir, Irwan Mazwan, et al.
Published: (2021)
by: Azamir, Irwan Mazwan, et al.
Published: (2021)
Time series analysis on Indian Mackerel Retail Price in Peninsular Malaysia
by: Mat Ali, Nur Farhana, et al.
Published: (2021)
by: Mat Ali, Nur Farhana, et al.
Published: (2021)
Biometric authentication using fingerprint and keypad for door lock securtiy system
by: Al-Azam, Sharaf Ahmed, et al.
Published: (2021)
by: Al-Azam, Sharaf Ahmed, et al.
Published: (2021)
Human machine interface design analysis of defect detection prototype by wonderware intouch software
by: Tatang, Mulyana, et al.
Published: (2019)
by: Tatang, Mulyana, et al.
Published: (2019)
Query expansion based on explicit-relevant feedback and synonyms for english quran translation information retrieval
by: Yusuf, Nuhu, et al.
Published: (2019)
by: Yusuf, Nuhu, et al.
Published: (2019)
Real-time simulation and control of spatio-temporal cardiac excitation using an analog-digital hybrid circuit model
by: Mahmud, Farhanahani
Published: (2011)
by: Mahmud, Farhanahani
Published: (2011)
Binary logistic regression on cafeteria satisfaction services
by: Che Him, Norziha, et al.
Published: (2020)
by: Che Him, Norziha, et al.
Published: (2020)
Time series predictive analysis based on hybridization
of meta-heuristic algorithms
by: Mustaffa, Zuriani, et al.
Published: (2018)
by: Mustaffa, Zuriani, et al.
Published: (2018)
Interval type-2 fuzzy automata and Interval type-2 fuzzy
grammar
by: Sharan, S., et al.
Published: (2021)
by: Sharan, S., et al.
Published: (2021)
Fractional electro-magneto transport of blood modeled with magnetic
particles in cylindrical tube without singular kernel
by: Uddin, S., et al.
Published: (2020)
by: Uddin, S., et al.
Published: (2020)
A modified weight optimisation for higher-order neural network in time series prediction
by: Husaini, Noor Aida
Published: (2020)
by: Husaini, Noor Aida
Published: (2020)
Developing a hybrid hidden MARKOV model using fusion of ARMA model and artificial neural network for crude oil price forecasting
by: Isah, Nuhu
Published: (2020)
by: Isah, Nuhu
Published: (2020)
An improved directed random walk framework for cancer classification using gene expression data
by: Seah, Choon Sen
Published: (2020)
by: Seah, Choon Sen
Published: (2020)
A new multiperspective framework for standardization and benchmarking of image dehazing algorithms
by: Abdulkareem, Karrar Hameed
Published: (2021)
by: Abdulkareem, Karrar Hameed
Published: (2021)
Interval type‑2 fuzzy aggregation operator in decision making and its
application
by: Lathamaheswari, M., et al.
Published: (2021)
by: Lathamaheswari, M., et al.
Published: (2021)
Flu diagnosis system using jaccard index and rough set approaches
by: Efend, Riswan, et al.
Published: (2018)
by: Efend, Riswan, et al.
Published: (2018)
An optimized attack tree model for security test case planning and generation
by: Omotunde, Habeeb, et al.
Published: (2018)
by: Omotunde, Habeeb, et al.
Published: (2018)
A review of semantic similarity approach for multiple ontologies
by: Omar, Nurul Aswa, et al.
Published: (2018)
by: Omar, Nurul Aswa, et al.
Published: (2018)
Terms interrelationship query expansion to improve accuracy of Quran search
by: Yusuf, Nuhu
Published: (2021)
by: Yusuf, Nuhu
Published: (2021)
Video moving surveillance yang terintegrasi youtube menggunakan raspberry PI 3
by: Utami, Pipit, et al.
Published: (2018)
by: Utami, Pipit, et al.
Published: (2018)
Organization support for cloud computing implementation success in education system: scale development and validity in Delphi
by: Kassim, Rahimah, et al.
Published: (2018)
by: Kassim, Rahimah, et al.
Published: (2018)
A comparative study of watermarking techniques in spatial and frequency domains
by: Ali Alamari, Abduladhim Mohamad
Published: (2014)
by: Ali Alamari, Abduladhim Mohamad
Published: (2014)
Comparative evaluation of two peripheral information systems using motion sickness subjective rating
by: Mustaffa, Norrizal, et al.
Published: (2020)
by: Mustaffa, Norrizal, et al.
Published: (2020)
An improved artificial dendrite cell algorithm for abnormal signal detection
by: Mohamad Mohsin, Mohamad Farhan, et al.
Published: (2018)
by: Mohamad Mohsin, Mohamad Farhan, et al.
Published: (2018)
Evolution of precision agriculture computing towards sustainable oil palm industry
by: Goh, K.C., et al.
Published: (2018)
by: Goh, K.C., et al.
Published: (2018)
An improved diagnostic algorithm based on deep learning for ischemic stroke detection in posterior fossa
by: Muhd Suberi, Anis Azwani
Published: (2020)
by: Muhd Suberi, Anis Azwani
Published: (2020)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
Mathematical approach for serving nutritious menu for secondary school student using “delete-reshuffle-reoptimize algorithm”
by: M. Sudin, Azila, et al.
Published: (2017)
by: M. Sudin, Azila, et al.
Published: (2017)
Penghasilan modul bahasa pengatucaraan C untuk pelajar-pelajar BTI 2133 Kolej Universiti Teknologi Tun Hussein Onn
by: Masrom, Nor Ratna
Published: (2002)
by: Masrom, Nor Ratna
Published: (2002)
Pembangunan rekabentuk modul multimedia bagi proses pembinaan jalan
by: Mohammed, Seti Suhadaini
Published: (2003)
by: Mohammed, Seti Suhadaini
Published: (2003)
Implementation of ACR and AVR controls for high voltage gain DC-DC Converter
by: Jawher Al-Janabi, Omar Hameed
Published: (2019)
by: Jawher Al-Janabi, Omar Hameed
Published: (2019)
Pembelajaran berasaskan aplikasi android menggunakan kaedah permainan bagi kursus asas grafik
by: Zainal, Masturah
Published: (2019)
by: Zainal, Masturah
Published: (2019)
Kesedaran kognitif dalam aplikasi reka bentuk antara muka bagi pemantauan penyelenggaraan
by: Rosli, Muhammad Mujahid
Published: (2019)
by: Rosli, Muhammad Mujahid
Published: (2019)
Comparative study on data searching in linked list & B-tree and B+tree techniques
by: S Giuma, Ahmed Eshtewi
Published: (2015)
by: S Giuma, Ahmed Eshtewi
Published: (2015)
A Goal and Ontology Based Approach for Generating ETL Process Specifications
by: Azman, Ta'a
Published: (2012)
by: Azman, Ta'a
Published: (2012)
Similar Items
-
Multilevel authentication for social network
by: Wu, Zhia Sheng, et al.
Published: (2018) -
Fast-Lock Low -Jitter Delay Locked Loop
by: Soh, Lip Kai
Published: (2007) -
Text Categorization Using Naive Bayes Algorithm
by: Wan Hazimah, Wan Ismail
Published: (2005) -
Business Intelligence Model for a Student Data Warehouse in UUM Environment
by: Abdullah, Harith Azam
Published: (2010) -
A study of requirements engineering practices among software developers at UUM Information Technology (UUMIT)
by: Lafta, Inam Abdullah
Published: (2015)