Mohd Rizal Mohd Isa
National Defence University of Malaysia
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Mohd Rizal Mohd Isa.
international conference on computer and electrical engineering | 2009
Yuhanim Hani Yahaya; Mohd Rizal Mohd Isa; Mohammad Indera Aziz
Fingerprint matching for user authentication is becoming widely used in many applications. Smart cards are also being used heavily in identification applications. It is now required to combine both technologies so fingerprints can be matched on the smart card. This paper presents combination on two security components which are the fingerprint recognition and smart card. The smart card plays a data storage for storing the cardholder’s fingerprint data. The card holder is required to scan his/her fingerprint on a the card for matching. This research proposes a framework for user identification and authentication using fingerprints and smart cards.
international symposium on information technology | 2010
Mohd Rizal Mohd Isa; Yuhanim Hani Yahaya; Mohd Hazali Mohamed Halip; Mohammad Adib Khairuddin; Kamaruzaman Maskat
Biometrics personal authentication utilizing fingerprints have been thoroughly studied and applied. Exploiting the unique features of a fingerprint and the pleasant way of capturing the required information permits it to be used in numerous applications. Smart card is also being widely adopted in many applications and refers as an essential platform to hold biometrics information. This paper presents a fingerprint verification that can be embedded in a smart card. The smart card plays a data storage for storing the cardholders fingerprint data. The card holder is required to scan his/her fingerprint on a sensor. The scanned fingerprint image is then sent to the card for matching.
international conference on information and communication technology | 2016
Mohd Rizal Mohd Isa; Zaharin Yusoff; Salem Aljareh
This paper presents a proposal for a suitable and viable combination of a face recognition system and a watermarking system, with a watermarking technique that will ensure the authenticity of the data being transmitted in the face recognition system, which will then enhance its level of security. The proposed combination is a PCA—DCT system.
IOP Conference Series: Materials Science and Engineering | 2017
Mohd Afizi Mohd Shukran; Muhammad Naim Abdullah; Mohd Nazri Ismail; Kamaruzaman Maskat; Mohd Rizal Mohd Isa; Muhammad Shahfee Ishak; Muhamad Adib Khairuddin
Mobile services support various situations in everyday life and with the increasing sophistication of phone functions, the daily life is much more easier and better especially in term of managing tools and apparatus. Since chemical inventory management system has been experiencing a new revolution from antiquated to an automated inventory management system, some additional features should be added in current chemical inventory system. Parallel with the modern technologies, chemical inventory application using smart phone has been developed. Several studies about current related chemical inventory management using smart phone application has been done in this paper in order to obtain an overview on recent studies in smartphone application for chemical inventory system which are needed in schools, universities or other education institutions. This paper also discuss about designing the proposed secure mobile chemical inventory system. The study of this paper can provide forceful review analysis support for the chemical inventory management system related research.
IOP Conference Series: Materials Science and Engineering | 2017
Mohd Afizi Mohd Shukran; Muhammad Naim Abdullah; Mohd Nazri Ismail; Kamaruzaman Maskat; Mohd Rizal Mohd Isa; Muhammad Shahfee Ishak; Muhamad Adib Khairuddin
Chemical inventory management system has been experiencing a new revolution from traditional inventory system which is manual to an automated inventory management system. In this paper, some review of the classic and modern approaches to chemical inventory management system has been discussed. This paper also describe about both type of inventory management. After a comparative analysis of the traditional method and automated method, it can be said that both methods have some distinctive characteristics. Moreover, the automated inventory management method has higher accuracy of calculation because the calculations are handled by software, eliminating possible errors and saving time. The automated inventory system also allows users and administrators to track the availability, location and consumption of chemicals. The study of this paper can provide forceful review analysis support for the chemical inventory management related research.
international conference on information and communication technology | 2016
Mohd Afizi Mohd Shukran; Mohd Nazri Ismail; Kamaruzaman Maskat; Mohd Rizal Mohd Isa
Detection System for Mobile Identity Bag Owners Students Using QR Codes (Quick Response) was developed to create a system of safety features in a briefcase National Defence University of Malaysia (NDUM) used by students. QR code technology is the best technology to solve the problems faced by the current system. The system is capable of decod QR, information display and transmission of information through short messaging system (SMS) is the best solution to replace the current system. Results from observational studies on the new system, the implementation of QR code tag on the briefcase with QR Tag Scanner application was able to overcome the difficulties encountered in identifying the true owner of the briefcase found. However, improvements to the Identity Detection System Owner Phone Bags Students Using QR Codes to do from time to time in order to create a more efficient system.
international conference on intelligent systems, modelling and simulation | 2012
Suzaimah Ramli; Mohd Rizal Mohd Isa
The aim of this paper is to contribute to the solutions of face recognition security problem by deploying an appropriate watermarking scheme to a modified face recognition algorithm. The significance of the proposed work is therefore manifold. The suitability of the face recognition for authentication purposes has already been studied in the security community but the constant emergence of new techniques for face recognition calls for re-evaluation and reconsideration of some of those findings. Finally, this work might open up new avenues for further research in combining the biometric and watermarking techniques as other physiological or behavioral characteristic might be considered.
International Journal of Advancements in Computing Technology | 2012
Mohd Rizal Mohd Isa; Mohd Afizi Mohd Shukran; Mohammad Adib Khairuddin
Biometrics personal authentication utilizing fingerprints have been thoroughly studied and applied. Exploiting the unique features of a fingerprint and the pleasant way of capturing the required information permits it to be used in numerous applications. Smart card is also being widely adopted in many applications and refers as an essential platform to hold biometrics information. This paper presents a fingerprint verification that can be embedded in a smart card. The smart card plays a data storage for storing the cardholders fingerprint data. The card holder is required to scan his/her fingerprint on a sensor. The scanned fingerprint image is then sent to the card for matching.
Mathematical Models and Methods in Applied Sciences | 2011
Kamaruzaman Maskat; Mohd Afizi Mohd Shukran; Mohammad Adib Khairuddin; Mohd Rizal Mohd Isa
Mathematical Models and Methods in Applied Sciences | 2011
Mohammad Adib Khairuddin; Mohd Afizi Mohd Shukran; Kamaruzaman Maskat; Mohd Rizal Mohd Isa