Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mohd Rizal Mohd Isa is active.

Publication


Featured researches published by Mohd Rizal Mohd Isa.


international conference on computer and electrical engineering | 2009

Fingerprint Biometrics Authentication on Smart Card

Yuhanim Hani Yahaya; Mohd Rizal Mohd Isa; Mohammad Indera Aziz

Fingerprint matching for user authentication is becoming widely used in many applications. Smart cards are also being used heavily in identification applications. It is now required to combine both technologies so fingerprints can be matched on the smart card. This paper presents combination on two security components which are the fingerprint recognition and smart card. The smart card plays a data storage for storing the cardholder’s fingerprint data. The card holder is required to scan his/her fingerprint on a the card for matching. This research proposes a framework for user identification and authentication using fingerprints and smart cards.


international symposium on information technology | 2010

The design of fingerprint biometric authentication on smart card for PULAPOT main entrance system

Mohd Rizal Mohd Isa; Yuhanim Hani Yahaya; Mohd Hazali Mohamed Halip; Mohammad Adib Khairuddin; Kamaruzaman Maskat

Biometrics personal authentication utilizing fingerprints have been thoroughly studied and applied. Exploiting the unique features of a fingerprint and the pleasant way of capturing the required information permits it to be used in numerous applications. Smart card is also being widely adopted in many applications and refers as an essential platform to hold biometrics information. This paper presents a fingerprint verification that can be embedded in a smart card. The smart card plays a data storage for storing the cardholders fingerprint data. The card holder is required to scan his/her fingerprint on a sensor. The scanned fingerprint image is then sent to the card for matching.


international conference on information and communication technology | 2016

A watermarking technique to improve the security level in face recognition systems: An experiment with Principal Component Analysis (PCA) for face recognition and Discrete Cosine Transform (DCT) for watermarking

Mohd Rizal Mohd Isa; Zaharin Yusoff; Salem Aljareh

This paper presents a proposal for a suitable and viable combination of a face recognition system and a watermarking system, with a watermarking technique that will ensure the authenticity of the data being transmitted in the face recognition system, which will then enhance its level of security. The proposed combination is a PCA—DCT system.


IOP Conference Series: Materials Science and Engineering | 2017

Designing Intelligent Secure Android Application for Effective Chemical Inventory

Mohd Afizi Mohd Shukran; Muhammad Naim Abdullah; Mohd Nazri Ismail; Kamaruzaman Maskat; Mohd Rizal Mohd Isa; Muhammad Shahfee Ishak; Muhamad Adib Khairuddin

Mobile services support various situations in everyday life and with the increasing sophistication of phone functions, the daily life is much more easier and better especially in term of managing tools and apparatus. Since chemical inventory management system has been experiencing a new revolution from antiquated to an automated inventory management system, some additional features should be added in current chemical inventory system. Parallel with the modern technologies, chemical inventory application using smart phone has been developed. Several studies about current related chemical inventory management using smart phone application has been done in this paper in order to obtain an overview on recent studies in smartphone application for chemical inventory system which are needed in schools, universities or other education institutions. This paper also discuss about designing the proposed secure mobile chemical inventory system. The study of this paper can provide forceful review analysis support for the chemical inventory management system related research.


IOP Conference Series: Materials Science and Engineering | 2017

Study of Intelligent Secure Chemical Inventory Management System

Mohd Afizi Mohd Shukran; Muhammad Naim Abdullah; Mohd Nazri Ismail; Kamaruzaman Maskat; Mohd Rizal Mohd Isa; Muhammad Shahfee Ishak; Muhamad Adib Khairuddin

Chemical inventory management system has been experiencing a new revolution from traditional inventory system which is manual to an automated inventory management system. In this paper, some review of the classic and modern approaches to chemical inventory management system has been discussed. This paper also describe about both type of inventory management. After a comparative analysis of the traditional method and automated method, it can be said that both methods have some distinctive characteristics. Moreover, the automated inventory management method has higher accuracy of calculation because the calculations are handled by software, eliminating possible errors and saving time. The automated inventory system also allows users and administrators to track the availability, location and consumption of chemicals. The study of this paper can provide forceful review analysis support for the chemical inventory management related research.


international conference on information and communication technology | 2016

Identification of Student's Bag using QR Tag Scanner

Mohd Afizi Mohd Shukran; Mohd Nazri Ismail; Kamaruzaman Maskat; Mohd Rizal Mohd Isa

Detection System for Mobile Identity Bag Owners Students Using QR Codes (Quick Response) was developed to create a system of safety features in a briefcase National Defence University of Malaysia (NDUM) used by students. QR code technology is the best technology to solve the problems faced by the current system. The system is capable of decod QR, information display and transmission of information through short messaging system (SMS) is the best solution to replace the current system. Results from observational studies on the new system, the implementation of QR code tag on the briefcase with QR Tag Scanner application was able to overcome the difficulties encountered in identifying the true owner of the briefcase found. However, improvements to the Identity Detection System Owner Phone Bags Students Using QR Codes to do from time to time in order to create a more efficient system.


international conference on intelligent systems, modelling and simulation | 2012

Watermarked Face Recognition Scheme to Enhance Security

Suzaimah Ramli; Mohd Rizal Mohd Isa

The aim of this paper is to contribute to the solutions of face recognition security problem by deploying an appropriate watermarking scheme to a modified face recognition algorithm. The significance of the proposed work is therefore manifold. The suitability of the face recognition for authentication purposes has already been studied in the security community but the constant emergence of new techniques for face recognition calls for re-evaluation and reconsideration of some of those findings. Finally, this work might open up new avenues for further research in combining the biometric and watermarking techniques as other physiological or behavioral characteristic might be considered.


International Journal of Advancements in Computing Technology | 2012

The Design of Fingerprint Biometric Authentication on Smart Card for PULAPOT Main Entrance System

Mohd Rizal Mohd Isa; Mohd Afizi Mohd Shukran; Mohammad Adib Khairuddin

Biometrics personal authentication utilizing fingerprints have been thoroughly studied and applied. Exploiting the unique features of a fingerprint and the pleasant way of capturing the required information permits it to be used in numerous applications. Smart card is also being widely adopted in many applications and refers as an essential platform to hold biometrics information. This paper presents a fingerprint verification that can be embedded in a smart card. The smart card plays a data storage for storing the cardholders fingerprint data. The card holder is required to scan his/her fingerprint on a sensor. The scanned fingerprint image is then sent to the card for matching.


Mathematical Models and Methods in Applied Sciences | 2011

Mobile Agents in Intrusion Detection System: Review and Analysis

Kamaruzaman Maskat; Mohd Afizi Mohd Shukran; Mohammad Adib Khairuddin; Mohd Rizal Mohd Isa


Mathematical Models and Methods in Applied Sciences | 2011

Consumers Perception on Prepaid Cards: Survey and Analysis

Mohammad Adib Khairuddin; Mohd Afizi Mohd Shukran; Kamaruzaman Maskat; Mohd Rizal Mohd Isa

Collaboration


Dive into the Mohd Rizal Mohd Isa's collaboration.

Top Co-Authors

Avatar

Mohd Afizi Mohd Shukran

National Defence University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Kamaruzaman Maskat

National Defence University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Mohd Nazri Ismail

National Defence University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Mohammad Adib Khairuddin

National Defence University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Yuhanim Hani Yahaya

National Defence University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Ahmad Mujahid Ahmad Zaidi

National Defence University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

M. N. Abdullah

National Defence University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

M. S. Ishak

National Defence University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Mohammad Indera Aziz

National Defence University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Mohd Hazali Mohamed Halip

National Defence University of Malaysia

View shared research outputs
Researchain Logo
Decentralizing Knowledge