2021
DOI: 10.12928/telkomnika.v19i1.16418
|View full text |Cite
|
Sign up to set email alerts
|

Measuring memetic algorithm performance on image fingerprints dataset

Abstract: Personal identification has become one of the most important terms in our society regarding access control, crime and forensic identification, banking and also computer system. The fingerprint is the most used biometric feature caused by its unique, universality and stability. The fingerprint is widely used as a security feature for forensic recognition, building access, automatic teller machine (ATM) authentication or payment. Fingerprint recognition could be grouped in two various forms, verification and ide… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 28 publications
0
4
0
Order By: Relevance
“…Afterwards, using the density-based spatial clustering of applications with noise (DBSCAN), the existing elements in the picture are classified, and the biggest one with the round outline is chosen as the target. In the end, the part of the image matrix which includes the target is added [21], [22]. Erosion (minkowsky subtraction) works based on two processes of eliminating and shrinking boundary points and is mainly used for binary images but can also be applied to grayscale images [12], [19], [22], [23].…”
Section: Methodsmentioning
confidence: 99%
“…Afterwards, using the density-based spatial clustering of applications with noise (DBSCAN), the existing elements in the picture are classified, and the biggest one with the round outline is chosen as the target. In the end, the part of the image matrix which includes the target is added [21], [22]. Erosion (minkowsky subtraction) works based on two processes of eliminating and shrinking boundary points and is mainly used for binary images but can also be applied to grayscale images [12], [19], [22], [23].…”
Section: Methodsmentioning
confidence: 99%
“…The testing process between Single Thread Loop and Multiple Thread Loop whose testing process uses the test logic architecture that has been illustrated in Figure 3, as well as the flow of the testing process which has also been illustrated in Figure 6. From the test results based on a predetermined scenario, it was found that the specimen number two shows the test results which are quite significantly high [14], In contrast specimen one shows the lowest test results in terms of access speed. Roughly speaking, these conditions show the weight and complexity level of the file to be one indicator of speed or slowness processing data from each of these specimens; it can be seen in the illustration of the comparison of results in figure 12 and also table of test results in table 3.…”
Section: Figure 8 Sample Groups Of Fingerprint Images Randomlymentioning
confidence: 99%
“…To design a memetic algorithm, the considered problem is optimization as a specific problem [20]. Assiroj et al [21], use the original memetic algorithm to process the fingerprint dataset and this algorithm works properly. This algorithm is also could be parallelized, Mirsoleimani et al [22], implements parallel type on the graphics processing unit (GPU).…”
Section: Reslated Researchmentioning
confidence: 99%