You are on page 1of 5

TAKE HOME EXAM

FINAL EXAM
ENGLISH 1

By:
Ahmad Taufiq Hidayat (361855401003)
Verdy Bagus Satria (361855401006)
Muhammad Iqbal Rizaldi (361855401008)
Ndaru Langit (361855401024)
Bambang Setya Budi (361855401027)
Dhika Syaiful Bahri (361855401028)
Husnl Alfaini (361855401030)

ASSOCIATE DEGREE III (D3)


COMPUTER SCIENCE
POLITEKNIK NEGERI BANYUWANGI
JANUARY 2019
2

GROUP ORGANIZATION

TEAM LEADER : Verdy Bagus Satria

PRODUSER : Husnul Alfaini

TRANSCRIBE : Muhammad Iqbal Rizaldi

VIDEO EDITOR : Bambang Setya Budi

TEAM MEMBERS : 1. Ahmad Taufiq Hidayat

2. Ndaru Langit

3. Dhika Syaiful Bahri

VIDEO TITTLE : Face Recognition

LENGTH DURATION : 8 minute

LOCATION : Blambangan Park


3

TRANSCRIBE

A. Muhammad Iqbal R :
Assalamualaikum. Good morning everyone.
First of all. Let me introduce myself. My name is .... and my team there are ...
We are from poliwangi. ASSOCIATE DEGREE. Department of Computer Science.
Class A Family
So today we are gonna be talking about face recognition. Basically face
recognition is a security that is used to maintain data security. But it is different
from usual security. Because on this face biometric we use face media as a
security password. For more details. Will be explained by my team later.
Before starting the discussion. I will explain what will be discussed. First, what is
biometric system. Second, face biometric. Third, mechanism for facial biometric
systems. Fourth, facial detection feature. The fifth, about good biometric
characteristics. And the last is advantages and disadvantages of this facial
biometric system.

B. Dhika Syaiful B :
Here I will explain what a biometric system is. Biometrics Authentification in security is
very important for maintaining data security. However, there are many problems in its
application and still not providing safe protection. Biometric technology offers biological
authentication allowing the system to recognize users more precisely. Biometrics can
theoretically be more effective for identify someone personally because when we used it
for personal identification, biometrics technology measures and analyzes human behavior
and physiological characteristics. Identifies one's physiological characteristics based on
direct measurements of parts of body-fingertips, hand geometry, facial geometry and eye
retinas and irises.

C. Ahmad Taufiq H :
Then, what is facial biometrics? Biometric face is a security system that uses faces as the
main media. Face Recognition is a face identification and facial recognition solution. This
system can be applied both in the web environment and in desktop applications that use
faces as authentication or automatic face recognition and identification
This system can work with the face as a whole face, can recognize faces in pictures or
photos and real-time video streams. The application can be:
The first, Real-time biometric authentication system
Second, Automatic red-eye removal tool optimized with the introduction of facial
features.
Third, Facial animation effects for the entertainment industry.
Fourth, Image enhancement application and graphic editor.
Fifth, Tools and plugins for images and video effects.
and the simplest example is face unlock.

D. Verdy Bagus S :
4

Then in biometric identification can identify individuals based on differences in


psychological characteristics. the mechanism for using facial biometrics can be described
in several phases:
• Enrollment phase.
In this phase the input will be scanned by a biometric sensor, which is a representation of
digital characteristics.
• Matching Phase.
In this phase database input will be matched with data identification. There can be a
reduction, so that a digital representation is produced.
• Introduction phase.
Individual characteristics are read by biometric readers. Then converted into digital
format, to be processed as a template extractor. The results of this template are then
matched with individual identification

E. Bambang Setya B :
This system uses and applies algorithms to reliably detect facial features. Process images,
detect human faces in the image, and then provide coordinates of 66 points of facial
features, including eyes, eye shape, eyebrows, mouth shape, nose tip and etc.
Authentification
- Face photos are stored in a computer database.
- The computer makes the photo into small boxes.
- Details of the points in each piece are processed by the algorithm method into
mathematical data.
- The analysis system distinguishes actual lines, pores, and facial textures, to distinguish
identical twins.
- Data is saved to be confirmed by inputting data that you want to match.

F. Husnul Alfaini :
(Biometric systems are not perfect yet, because a moment can still make mistakes by
accepting the impostor as the people who are also valid (an error occurred matching),
otherwise there is rejection of the individual is valid (mismatch error). The biometric
systems are designed, are expected to have the following characteristics:
The universal aspect, that this characteristic can apply in general (that every human being
has the characteristics).
Aspects unique (no two humans have the same characteristics),
The third must be of a permanent nature (the characteristics of the personal who is not
capricious) and the last can be collected (collectable), this characteristic is easily
presented by the sensor and easy dikuantisasikan and quantified.
In addition to some things to be aware of these mechanisms is a matter of performance.,)

G. Ndaru Langit :
The last discussion on this video is the advantages and disadvantages of facial biometrics
Advantages
- Fast and precise recognition and identification of faces
- Stable recognition, not too influential lighting conditions
- Can be used by all types of webcam on the market
- Supports images with small, large pixels or mega pixels.
- Operation with images or with video streams.
5

Weakness
- Can not identify if the face changes shape (injury, accident, etc.).
- Can not be used continuously because age affects the shape of the face.
- No other object should cover the face.
- It's quite difficult to identify twin faces.
From the explanation above, it can be concluded that this technology will run well and
run optimally if we as students can reduce the errors of this application.

okay well thats all for this video. Anw if you enjoy this video, make sure you give thumbs
up. And yeah, i think that's it. Thankyou guys for watching this video.
Hopefully we will see you next time.

You might also like