International Journal of Interactive Mobile Technologies (iJIM) – eISSN: 1865-7923 – Vol. 15, No. 10, 2021 Paper—Face Recognition Using the Convolutional Neural Network for Barrier Gate System Face Recognition Using the Convolutional Neural Network for Barrier Gate System https://doi.org/10.3991/ijim.v15i10.20175 Mochammad Langgeng Prasetyo, Achmad Teguh Wibowo (), Mujib Ridwan, Mohammad Khusnu Milad, Sirajul Arifin, Muhammad Andik Izzuddin, Rr Diah Nugraheni Setyowati UIN Sunan Ampel, Surabaya, Indonesia atw@uinsby.ac.id Ferda Ernawan Universiti Malaysia Pahang, Pekan, Malaysia Abstract—The implementation of face recognition technique using CCTV is able to prevent unauthorized person enter the gate. Face recognition can be used for authentication, which can be implemented for preventing of criminal incidents. This re-search proposed a face recognition system using convolution- al neural network to open and close the real-time barrier gate. The process con- sists of a convolutional layer, pooling layer, max pooling, flattening, and fully connected layer for detecting a face. The information was sent to the microcon- troller using Internet of Thing (IoT) for controlling the barrier gate. The face recognition results are used to open or close the gate in the real time. The exper- imental results obtained average error rate of 0.320 and the accuracy of success rate is about 93.3%. The average response time required by microcontroller is about 0.562ms. The simulation result show that the face recognition technique using CNN is highly recommended to be implemented in barrier gate system. Keywords—Barrier gate system, convolutional neural network, face recogni- tion, IoT 1 Introduction Nowadays, the development of technology has been well integrated, like a face recognition based application to detect an object and perform data scanning based on image [1], like face recognition or fingerprint on digital devices to security, identifica- tion, etc., [2]. Digital components use to identify and classify an object is the camera. This component functions to take images or objects to be identified [3]. The binary data from the image could be parameter input to the classification process using CNN. This research using CNN algorithm. This algorithm is a network of a group of small processing units that are modelled based on human neural networks and in- spired by the natural visual perception mechanism [1]. CNN is the basic form of Neu- ral Networks. Some of CNN's application areas of interest include Face recognition, 138 http://www.i-jim.org https://doi.org/10.3991/ijim.v15i10.20175 mailto:atw@uinsby.ac.id Paper—Face Recognition Using the Convolutional Neural Network for Barrier Gate System Image classification and segmentation, object detection, video processing, natural language processing, and speech recognition. CNN's ability to carry out the feature extraction process and perform large data calculations can be used as a reference in developing a face recognition-based biometric authentication system [2]. Develop- ment of a face recognition system using CNN could be applied to various models [2]. The integrated system has been developed with IoT can be innovation to authentica- tion systems with high security and ease of usage. Face recognition currently active research areas regarding biometric authentication systems. It was emphasized by the development of a detection system for the preven- tion of crime using CCTV. According to several types of research, this system's de- velopment is on an increasing trend. The implementation of this system can be ap- plied in car and motorcycle parking lots. However, continuous and careless monitor- ing of people events does not render the CCTV function useless for crime incident prevention [4]. Several years ago this development provided good capabilities supported by an al- gorithm that was able to identify data when recognition of multiple persons and clut- tered backgrounds, etc., [3]. The biometric authentication system, it is classified into two parts, psychological biometrics, and behavioral biometrics. Physiological bio- metric traits such as face, iris, fingerprint, DNA, etc., have constant characteristics. Behavioral biometric traits such as signature, gait, voice, keystroke etc. The biometric system model used in this study is the face recognition model because face recogni- tion is one of the better physiological biometric traits to recognize a person for several activities [5]. Face recognition focus select who this person is in the existing data set [6]. The process of combining biometric authentication based on facial recognition and IoT, can be connected as a biometric authentication system using the CNN algorithm to implement a barrier gate system. The example technology that operates in parking facilities and entrances to restricted areas that require specific permits is the automatic parking barrier [7]. Barrier gate is an automatically controlled parking control system computed by computers in parking facilities to the entrance to restricted areas that require certain permits [5]. Many technology development of the barrier gate system such as icarus automatic barrier for both residential and intensive use, falcon is the barrier plate using recognition system, and centurion is a real automatic bollards with security barrier consisting of automatic rising bollards operations. The main components datasheet in this research are NodeMCU ESP 8266, microcontroller board, motors, camera, and internet. This research emphasize to implement a prototype automatic barrier gate system controlled by a biometric-based authentication face recognition using the CNN algo- rithm, False Acceptance Ratio (FAR), False Rejection Ratio (FRR), and Equal Error Rate (EER) using Receive Operating Characteristic (ROC) testing [8]. This testing technique is analysis focused on the system's accuracy in recognizing all facial image data. In the ROC testing process, there is a presentation value of True positive rate (TPR), True negative rate (TNR), False Positive Rate (FPR), and False Negative Rate (FNR). TPR is true; if the result of the testing is the same as the actual condition. iJIM ‒ Vol. 15, No. 10, 2021 139 Paper—Face Recognition Using the Convolutional Neural Network for Barrier Gate System TNR is true; if the result is wrong, and the real condition is false. FPR is true; the result is correct, and the real situation is incorrect, FNR is true; the result is wrong, and the actual is true [9]. This research is arranged as the follows. Section I regarding visualization related to authentication, face recognition, CNN, barrier gate system, and IoT. Section II, de- scribe the CNN algorithm process, the face recognition analysis process, and the deep learning calculation process, the results and evaluation are shown in sections III, and the conclusions we show in section IV. 2 Material and Method This section describes a literature review of relevant previous research and explains the CNN algorithm in the biometric authentication classification process based on face recognition. 2.1 Related research Scientific proponent of this research refer to research about CNN for face recogni- tion focusing on application development using CNN algorithm and evaluate from the results of systems that have been developed using different light intensity [10]. Then a literature review that supports the control system using a barrier gate which is imple- mented in the IoT model is research focuses on developing a light traffic system using barrier gates and GSM, which models the traffic light system by combining cameras, motor, buzzers, traffic lights, and microcontrollers to produce a vehicle control simu- lation that can help the police at a relatively low cost [11]. Literature review regarding face recognition based on CNN is research that focuses on the development of the deep learning algorithm based on CNN and the research On the identification of face image-based CNN algorithm that has the result that the algo- rithm is part of the face recognition process used for training data and for optimizing system performance [12]. In implementing face recognition based on CNN, which uses a mobile application to control it by sending signal data visualized in research focuses on developing control parking using a mobile device combined with a wire- less remote. This study's results are a prototype parking gate control that can be ac- cessed using a smartphone by sending data using the internet of things [7]. Research about CNN for efficient face recognition this research is more likely to prove that CNN's algorithms are instrumental in the performance efficiency of the face image detection system, results gained by integrated of a HOG with SVM and getting results can detect even in a blurry state, can detect even in expressions and still produce high accuracy [13]. Developments that can be done to increase the level of accuracy of the face recognition-based biometric authentication system are shown in research about authentication using face verification and ID image recognition focus- es on the development authentication on mobile devices using face recognition that has the result ID recognition and face recognition procedure MTFM provides an accu- rate information extraction result to improve identity verification accuracy [6]. 140 http://www.i-jim.org Paper—Face Recognition Using the Convolutional Neural Network for Barrier Gate System Nowadays development of a biometric authentication system with the highest ac- curacy in the image classification process is research about iris recognition for image authentication. The development iris recognition for image authentication using IWT and getting result that authentication can be implement and get the accuracy of 98.9% with the average execution time of 1.03 sec that is better than DWT and previous reported algorithms. FAR, FRR and EER have also improved [14]. The development of iris recognition-based biometric authentication systems can increase the level of accuracy and security by combing with machine learning, artificial intelligence, and blockchain technology described in the research focuses on using the internet of things and getting results by combining can improve security quality [15]. Based on the literature review, the research that has been done can be a reference for this research to develop a face recognition-based biometric authentication system using the CNN algorithm to control the barrier gate system. 2.2 Convolutional layer This process involves the convolution process in the input feature map by combin- ing the convolutional kernel to create a different feature map [16]. Fig 1 show the binary equation process. Fig. 1. Binary equation process [17] Where N is the length and width of digital image input, F is the process of filtering. How to take binary by way of (N-F)/Stride + 1, where the technique of taking matrix F, total amount N=7 and total amount F=3, for the depiction of Stride+1, if the pro- cess of matrix 3x3 is finished it will be shifted on 1 pixel next to it [18]. The equation of convolution layer as follow: 𝐹𝑀1(𝑖1,𝑗1) (𝑚1) = 𝑡𝑎𝑛ℎ (𝑏1(𝑚1) + ∑ ∑ 𝐶1(𝑟1,𝑐1) (𝑚1)4 𝑐1=0 4 𝑟1=0 ∗ 𝐼((𝑟1+𝑖1)(𝑐1+𝑗1))) (1) Where 𝐹𝑀1 is feature map-1, 𝑚1 is index number of feature pattern 1, 𝑖1 is line in- dex feature of 1st layer map, 𝑗1 is index line feature map layer 𝑏1 is 1st layer convolu- tion bias, 𝑟1 is1 line of convolution layer filter length Index, 𝑐1 is column length Index of the convolution layer 1, 𝐶1 is 1st convolution filter, and 𝐼 is input. iJIM ‒ Vol. 15, No. 10, 2021 141 Paper—Face Recognition Using the Convolutional Neural Network for Barrier Gate System Convolutional layer has parameters. The parameters are the size of the maps fea- ture, skipping factors, kernel size, and the layer layout at the time of the process. The description of the equation convolutional layer as follows: 𝑀 𝑛 𝑥 = 𝑀 𝑛−1 𝑥 − 𝐾 𝑛 𝑥 𝑆 𝑛 𝑥 +1 + 1; 𝑀 𝑛 𝑦 = 𝑀 𝑛−1 𝑦 − 𝐾 𝑛 𝑦 𝑆 𝑛 𝑦 +1 + 1 (2) Where𝑀𝑥 , 𝑀𝑦 is feature size map, 𝑆𝑥 , 𝑆𝑦 is skipping factors, 𝐾𝑥 , 𝐾𝑦 is kernel size, and 𝑛 is location of layers in a process. 2.3 Pooling layer The pooling layer is the process of filling out the calculations and reducing the di- mensions of each image input from the identifying process using the matrix filter [19]. Descriptions of the equation pooling layer as follows: 𝐹𝑀2(𝑖2,𝑗2) (𝑚1) = 𝑡𝑎𝑛ℎ (𝑏2(𝑚1) + ∑ ∑ 𝑃2(𝑚1) 3𝑛𝑖2+2 𝑗1=3𝑗2 3𝑛𝑖1+2 𝑖1=3𝑖2 ∗ 𝐹𝑀1(𝑖1,𝑗1) (𝑚1) ) (3) Where 𝐹𝑀2 is feature map-2, 𝑚1 is index number of feature pattern 1, 𝑖2 is line in- dex feature of 2st layer map, 𝑗2 is index line feature map layer 2, 𝑏2 is 1st layer con- volution bias 2, 𝑃2 is filter pooling layer 2, 𝑛𝑖2 is feature line length map 2, and 𝑛𝑗2 is column length feature map 2. 2.4 Max pooling Max pooling is an advanced process of the matrix binary 3x3 that through the fil- tering process, which takes the value with the highest number of variables. The meth- od of making binary results by finding the highest number of variable results. And the equation of max pooling show in equation (3). 2.5 Flattening Flattening in this research is the process by which the command to change from the results of max pooling starting from 2 dimensions (2D), is aligned into one- dimensional form (1D) which aims to transfer data, into a linear form to facilitate the classification process [20]. 2.6 Fully connected layer Fully connected layer is an advanced process of flatten result, in this research used for data transformation into linear form, then linking between neurons using forward propagation and backpropagation in doing classification [21]. Forward propagation For the first stage will determine with the process of forward propagation calculation with the equation model as follows [22] [23]. 142 http://www.i-jim.org Paper—Face Recognition Using the Convolutional Neural Network for Barrier Gate System 𝑦𝑗 = 𝜎(∑ 𝑊𝑖𝑗 𝑋𝑖 + 𝑏𝑗 4 𝑖=1 ) (4) Where 𝑦𝑗 is output, 𝜎 is sigma, 𝑊𝑖𝑗 is weight, 𝑋𝑖 is input, and 𝑏𝑗 is bias. The next process is to activate the activation of each result using one of the activation calcula- tions named softmax. The softmax equation below [24]. 𝑠𝑜𝑓𝑡𝑚𝑎𝑥 (𝜎) = 𝑒𝑎𝑖 ∑ 𝑒 𝑎𝑗 𝑗 (5) Where 𝑒 is constant (2.7), 𝑎𝑖 is output results from 𝑦𝑛 , and ∑ 𝑒 𝑎𝑗 𝑗 is the summation result of 𝑒 𝑎𝑖 . The softmax activation function in the forward propagation process, find the error value with the equation as follows: 𝑒𝑟𝑟𝑜𝑟 = 1 3 ∑ (𝑡𝑎𝑟𝑔𝑒𝑡𝑖 − 𝑝𝑟𝑒𝑑𝑖𝑐𝑡𝑖𝑜𝑛𝑖 ) 23 𝑖=1 (6) Where 𝑡𝑎𝑟𝑔𝑒𝑡𝑖 is the main target of binary determination, and 𝑝𝑟𝑒𝑑𝑖𝑘𝑡𝑖𝑜𝑛𝑖 is the results of the fully connected layer process. Backpropagation is second stage to opti- mize NN processes on fully connected layers. In the algorithm’s research specifies the weighted and the bias based on the error value. The equation process as the follow: 𝑤𝑛𝑒𝑤 = 𝑤𝑜𝑙𝑑 − 𝛼 𝜕𝐸 𝜕𝑤 (7) And optimize the process as the follow: 𝑏𝑛𝑒𝑤 = 𝑏𝑜𝑙𝑑 − 𝛼 𝜕𝐸 𝜕𝑏 (8) Where 𝛼 is constat (0.5), 𝜕𝐸/𝜕𝑏 is partial derivative 𝐸 of 𝑤, 𝑤 is weight, and 𝑏 is bias. The process in determining the 𝜕𝐸/𝜕𝑏 value in the calculation process in deter- mining the weight and bias value uses the equation as follows: 𝜕𝐸 𝜕𝑤11 = 𝜕𝐸 𝜕𝑦11 𝜕𝑦1 𝜕𝑧1 𝜕𝑧1 𝜕𝑤11 (9) 𝜕𝐸 𝜕𝑤11 = − 2 3 (𝑡1 − 𝑦1) . 𝑦1(1 − 𝑦1) . 𝑥1 (10) Where 𝜕 is partial derivative, 𝐸 is error, 𝑤 is weight, 𝑦𝑛 is predicted value, 𝑧𝑛 is to- tal ∑(𝑤𝑛. 𝑥1 + ⋯ 𝑛 + 𝑏), and 𝑥𝑛 is input flattening matrix. In the process of back- propagation has the main goal is to do all the updates weight and bias that will be forwarded to do the next calculation. 3 Result The results of this research, tested 100 training data and random data. Data collec- tion to be used must meet the criteria according to the system development design contained table1. iJIM ‒ Vol. 15, No. 10, 2021 143 Paper—Face Recognition Using the Convolutional Neural Network for Barrier Gate System Table 1. Collectioning data Image Expression Description Neutral Photo facing straight the camera with a neutral expression Smile Photo facing straight the camera with a smile expression Neutral Photo slightly to the right and with a flat expression. Smile Photo slightly to the right and with a smiling expression. Neutral Photo slightly to the left and with a flat expression. Smile Photo slightly to the left and with a smiling expression. Neutral Photo slightly upwards and with a flat expression. Smile Photo slightly upwards and with a smiling expression. Neutral Photo slightly downward and with a flat expression. Smile Photo down slightly and with a smiling expression. The table describes the data collection technique using the researcher's image based on an application designed using two expressions, namely neutral and happy with each face facing forward, right tilt, left tilt, up leaning, and down leaning. a visualiza- tion of the system diagram is shown in the image below: 144 http://www.i-jim.org Paper—Face Recognition Using the Convolutional Neural Network for Barrier Gate System Fig. 2. Process of a face recognition based biometric authentication system Fig. 3. Process signal that will be received by the microcontroller The technology used in this research is to develop a biometric authentication sys- tem based on face recognition using face-API.js. face-API.js is a module of Javascript that is built on top of tensorflow.js. Tensorflow.js is a library developed from the deeplearn.js platform. Focused on creating modules that are integrated with deep learning, which is part of artificial intelligence. In this research, tensorflow.js is used to implement CNN for the classifi- cation process. The results of the face recognition-based biometric authentication system using the CNN algorithm are as follows: iJIM ‒ Vol. 15, No. 10, 2021 145 Paper—Face Recognition Using the Convolutional Neural Network for Barrier Gate System Fig. 4. Result face recognition The results obtained are that this system can detect objects in real-time even though the face position is not frontal facing the camera. This much advantage of this algo- rithm which can’t implementation using other face recognition algorithms such as Viola-Jones, which only able to detect if the face has to look frontally at the camera [25]. This research, to exchange data from face recognition output to the NodeMCU ESP8266 microcontroller using XmlHttpRequest, which is a part of AJAX technology that works asynchronously. To perform the process of simulation barrier gate system that integrated with IoT will be simulated using datasheet components that are assembled following basic electronics. Fig.5 how datasheet model of the barrier gate system simulation. Fig. 5. Datasheet model The circuit's work process is the initial input received by NodeMCU ESP8266 of 5 Volt DC, which is obtained through the charger adapter output. The output from NodeMCU ESP8266 is 3.3 volt DC on each pinout 3v3 / VCC. Servo motors can 146 http://www.i-jim.org Paper—Face Recognition Using the Convolutional Neural Network for Barrier Gate System operate if get a voltage of 4.8 Volt DC, then it takes MT3608 2A to increase the volt- age from the 3.3 Volt DC to 6 Volt DC. Pinout Vout (-) on the MT3608 2A compo- nent is connected to the SG90 micro servo motor as input (+). Pinout Vout (-) of MT3608 2A DC Step Up Boost, and input (-) of micro servo motor SG90 connected to ground (GND) of NodeMCU ESP8266 pinout. After assembling the datasheet, perform the barrier gate simulation process as follow. Fig. 6. The simulation of barrier gate system (a) close, (b) open The describe of the image, (a) is a condition where the SG90 servo motor does not receive waves from GPIO2 TXD1 / D4 or the results equal as false, (b) is a condition where the SG90 servo motor receives waves from GPIO2 TXD1 / D4 when the face recognition result is true. The testing process in this research using static math models, receiver operating characteristic, and confusion matrix. Math static test aims to determine the speed performance of the application face recognition in recognizing an input image by identifying the time second and error rate generated from the fully connected layer process, Fig.7 shows the static math test results presented using a line chart. Fig. 7. Result static math testing In the line diagram, get the conclusion that the fastest time gained in the face recognition is 0.11 second, and the value of the lowest error rate is 0.26. For the oldest time gained is 0.18 second, and the highest error value is 0.38 Receive operating characteristic testing technique where the analysis focusing on the accuracy of the system in recognizing all facial image data that has been carried out the process of training or training process. Fig.8 show the ROC test results on the true value model as follow: iJIM ‒ Vol. 15, No. 10, 2021 147 Paper—Face Recognition Using the Convolutional Neural Network for Barrier Gate System Fig. 8. Result ROC true value The diagram illustrates the results of a ROC test in an actual value, which means testing with already trained data. The TPR model has a total number value of 95 data that is predicted to be correct on face identification and a total of 96 data that is said to be accurate on the face expression. The test is divided into face identification and face expression, the conclusions in the following table. Table 2. Result ROC true value face recognition Actual condition positive Actual condition negative Predicted condition positive 95 1 Predicted condition positive 4 0 Accuracy 95% Error rate 5% Table 3. Result ROC true value face expression Actual condition positive Actual condition negative Predicted condition positive 96 0 Predicted condition positive 4 0 Accuracy 96% Error rate 4% The results of ROC accuracy on face identification are 95% with an error rate of 5%, and face expression is 96% with an error rate of 4%. Fig.9 show the ROC test results on the true false model as follow: 148 http://www.i-jim.org Paper—Face Recognition Using the Convolutional Neural Network for Barrier Gate System Fig. 9. Result ROC false value Testing with untrained data on FNR models has the highest level that shows the number 98 data is mispredicted on face identification and 100 The data is said to be wrong on the face expression. Table 4 show results from ROC testing in false value for face recognition and Table 5 show results from ROC testing in false value for face expression. The test is divided into face identification and face expression, the conclu- sions in the following table. Table 4. Result ROC false value face recognition Measurement Actual condition positive Actual condition negative Predicted condition positive 0 2 Predicted condition positive 0 98 Accuracy 98% Error rate 2% Table 5. Result ROC false value face expression Measurement Actual condition positive Actual condition negative Predicted condition positive 0 0 Predicted condition positive 0 0 Accuracy 100% Error rate 0% The test is divided into face identification and face expression, the conclusions in the following table. iJIM ‒ Vol. 15, No. 10, 2021 149 Paper—Face Recognition Using the Convolutional Neural Network for Barrier Gate System Table 6. Grouping accuracy results Train data Testing data Description Accuracy 100% 100% Evaluation of results using trained data 95 70% 100% Evaluation of results using trained data 97 30% 100% Evaluation of results using trained data 84 100% 100% Evaluation of results using untrained data 98 70% 100% Evaluation of results using untrained data 94 30% 100% Evaluation of results using untrained data 92 Average 93.4% From the test results based on 6 model scenarios using the confusion matrix get an average accuracy of 93.4%. If with these results and categorized according to the grouping of accuracy results, It can be said that the face recognition-based biometric authentication system using the CNN algorithm can carry out the identification and classification process, which has a high level of accuracy, efficiency, and security in the predicted result according to the actual result [26] however, the results generated from the testing process affect several factors such as light intensity, camera quality, and the type of device used. 4 Conclusion This research implements a face recognition-based biometric authentication system using the CNN algorithm combined with the barrier gate control system by sending data in signals and utilizing IoT technology. The average overall experimental result is 0.1327 s, and the error rate obtained is 0.3031. The resulting test results were ob- tained from using the CNN algorithm and got better results than using a similar algo- rithm. The implementation of the CNN algorithm, which is supported by video streams in real-time, and uses a high-resolution camera and bright light intensity, can detect images with the face not facing the camera, can detect moving or blurry images, and be able to detect images at a distance of up to 2 meters. The test results from combining the output of a facial recognition-based biometric authentication system with the CNN algorithm and a microcontroller for the barrier gate system using a confusion matrix to measure the system's accuracy value using 6 test scenario models an average accuracy of 93.4%. With these results prove that the CNN algorithm can carry out the identification and classification process, which has a high level of accuracy, efficiency, and security in the predicted result according to the actual result. Future research is better to develop the CNN algorithm and other algorithms and combine face recognition, iris recognition, and fingerprint to get optimal results for the biometric authentication process. 150 http://www.i-jim.org Paper—Face Recognition Using the Convolutional Neural Network for Barrier Gate System 5 References [1] Q. Zhang, M. Zhang, T. Chen, Z. Sun, Y. Ma, and B. Yu, “Recent advances in convolu- tional neural network acceleration,” Neurocomputing, vol. 323, pp. 37–51, 2019. https://doi.org/10.1016/j.neucom.2018.09.038 [2] A. Khan, A. Sohail, U. Zahoora, and A. S. Qureshi, “A survey of the recent architectures of deep convolutional neural networks,” Artif. Intell. Rev., pp. 1–70, 2020, https://doi. org/10.1007/s10462-020-09825-6 [3] U. Jayaraman, P. Gupta, S. Gupta, G. Arora, and K. Tiwari, “Recent development in face recognition,” Neurocomputing, no. xxxx, 2020, https://doi.org/10.1016/j.neucom.2019.08. 110 [4] L. Halawa, W. Adi, and F. Ernawan, “Face recognition using faster R-CNN with Incep- tion-V2 Architecture for CCTV Camera,” 2019, pp. 1–6, https://doi.org/10.1109/icicos48119.2019.8982383 [5] I. Alsaadi, “Physiological Biometric Authentication Systems Advantages Disadvantages and Future Development A Review,” Int. J. Sci. Technol. Res., vol. 4, no. 8, pp. 285–289, 2015. [6] X. Wu, J. Xu, J. Wang, Y. Li, W. Li, and Y. Guo, “Identity authentication on mobile de- vices using face verification and ID image recognition,” Procedia Comput. Sci., vol. 162, no. Itqm 2019, pp. 932–939, 2019, https://doi.org/10.1016/j.procs.2019.12.070 [7] K. Kasym, A. Sarsenen, Z. Segizbayev, D. Junuskaliyeva, and M. H. Ali, “Parking gate control based on mobile application,” 2018 Jt. 7th Int. Conf. Informatics, Electron. Vis. 2nd Int. Conf. Imaging, Vis. Pattern Recognition, ICIEV-IVPR 2018, no. June, pp. 399– 402, 2019, https://doi.org/10.1109/iciev.2018.8640954 [8] K. A. Toh, J. Kim, and S. Lee, “Maximizing area under ROC curve for biometric scores fusion,” Pattern Recognit., vol. 41, no. 11, pp. 3373–3392, 2008, https://doi.org/10.1016/ j.patcog.2008.04.002 [9] A. S. Jadhav, “A novel weighted TPR-TNR measure to assess performance of the classifi- ers,” Expert Syst. Appl., vol. 152, p. 113391, 2020, https://doi.org/10.1016/j.eswa.2020. 113391 [10] M. Zufar and B. Setiyono, “Convolutional Neural Networks Untuk Pengenalan Wajah Secara Real-Time,” J. Sains dan Seni ITS, vol. 5, no. 2, pp. 72–77, 2016, doi: 10.12962/j23373520.v5i2.18854. [11] M. A. Kumaar, G. A. Kumar, and S. M. Shyni, “Advanced traffic light control system us- ing barrier gate and GSM,” 2016 Int. Conf. Comput. Power, Energy, Inf. Commun. ICCPEIC 2016, no. April 2016, pp. 291–294, 2016, https://doi.org/10.1109/iccpeic.2016. 7557213 [12] Y. Feng, X. An, and S. Li, “Research on Face Recognition Based on Ensemble Learning,” Chinese Control Conf. CCC, vol. 2018-Janua, pp. 9078–9082, 2018, https://doi.org/10. 23919/chicc.2018.8484211 [13] R. Angeline, K. Kavithvajen, T. Balaji, M. Saji, and S. R. Sushmitha, “CNN integrated with HOG for efficient face recognition,” Int. J. Recent Technol. Eng., vol. 7, no. 6, pp. 1657–1661, 2019. [14] G. Singh, R. K. Singh, R. Saha, and N. Agarwal, “IWT Based Iris Recognition for Image Authentication,” Procedia Comput. Sci., vol. 171, no. 2019, pp. 1868–1876, 2020, https:// doi.org/10.1016/j.procs.2020.04.200 [15] B. K. Mohanta, D. Jena, U. Satapathy, and S. Patnaik, “Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and block-chain technology,” Internet of Things, vol. 11, p. 100227, 2020, https://doi.org/10.1016/j.iot.2020.100227 iJIM ‒ Vol. 15, No. 10, 2021 151 https://doi.org/10.1016/j.neucom.2018.09.038 https://doi.org/10.1007/s10462-020-09825-6 https://doi.org/10.1007/s10462-020-09825-6 https://doi.org/10.1016/j.neucom.2019.08.110 https://doi.org/10.1016/j.neucom.2019.08.110 https://doi.org/10.1109/icicos48119.2019.8982383 https://doi.org/10.1016/j.procs.2019.12.070 https://doi.org/10.1109/iciev.2018.8640954 https://doi.org/10.1016/j.patcog.2008.04.002 https://doi.org/10.1016/j.patcog.2008.04.002 https://doi.org/10.1016/j.eswa.2020.113391 https://doi.org/10.1016/j.eswa.2020.113391 https://doi.org/10.1109/iccpeic.2016.7557213 https://doi.org/10.1109/iccpeic.2016.7557213 https://doi.org/10.23919/chicc.2018.8484211 https://doi.org/10.23919/chicc.2018.8484211 https://doi.org/10.1016/j.procs.2020.04.200 https://doi.org/10.1016/j.procs.2020.04.200 https://doi.org/10.1016/j.iot.2020.100227 Paper—Face Recognition Using the Convolutional Neural Network for Barrier Gate System [16] A. Santoso and G. Ariyanto, “Implementasi Deep Learning Berbasis Keras Untuk Pengenalan Wajah,” Emit. J. Tek. Elektro, vol. 18, no. 01, pp. 15–21, 2018, https://doi. org/10.23917/emitor.v18i01.6235 [17] L. D. S. Araujo, “Artificial Inteligence Convolutional Neural Network,” 2019. [18] H. Abhirawan, Jondri, and A. Arifianto, “Pengenalan Wajah Menggunakan Con-volutional Neural Networks (CNN),” Univ. Telkom, vol. 4, no. 3, pp. 4907–4916, 2017. [19] M. Coskun, A. Ucar, O. Yildirim, and Y. Demir, “Face recognition based on convo- lutional neural network,” Proc. Int. Conf. Mod. Electr. Energy Syst. MEES 2017, vol. 2018-Janua, no. November, pp. 376–379, 2017, https://doi.org/10.1109/mees.2017.8248 937 [20] J. Jin, A. Dundar, and E. Culurciello, “Flattened convolutional neural networks for feed- forward acceleration,” 3rd Int. Conf. Learn. Represent. ICLR 2015 - Work. Track Proc., no. December, 2015. [21] W. S. Eka Putra, “Klasifikasi Citra Menggunakan Convolutional Neural Network (CNN) pada Caltech 101,” J. Tek. ITS, vol. 5, no. 1, 2016, https://doi.org/10.12962/ j23373539.v5i1.15696 [22] P. Y. Kow et al., “Seamless integration of convolutional and back-propagation neural net- works for regional multi-step-ahead PM2.5 forecasting,” J. Clean. Prod., vol. 261, p. 121285, 2020, https://doi.org/10.1016/j.jclepro.2020.121285 [23] S. H. S. Basha, S. R. Dubey, V. Pulabaigari, and S. Mukherjee, “Impact of fully connected layers on performance of convolutional neural networks for image classification,” Neuro- computing, vol. 378, pp. 112–119, 2020, https://doi.org/10.1016/j.neucom.2019.10.008 [24] L. Chen, M. Zhou, W. Su, M. Wu, J. She, and K. Hirota, “Softmax regression based deep sparse autoencoder network for facial emotion recognition in human-robot interaction,” Inf. Sci. (Ny)., vol. 428, pp. 49–61, 2018, https://doi.org/10.1016/j.ins.2017.10.044 [25] D. Suprianto, “Sistem Pengenalan Wajah Secara Real-Time,” Sist. Pengenalan Wajah Secara Real-Time dengan Adab. Eig. PCA MySQL, vol. 7, no. 2, pp. 179–184, 2013. https://doi.org/10.20895/inista.v2i2.117 [26] F. Gorunescu, Data Mining, 1st ed. Springer-Verlag Berlin Heidelberg: Springer-Verlag Berlin Heidelberg, 2011. https://doi.org/10.1007/978-3-540-30670-2_18 6 Authors Mochammad Langgeng Prasetyo is a bachelor's degree from the Islamic State University of Sunan Ampel Surabaya, Indonesia. His current interests in Computer Science and Technology with a concentrate on Deep Learning, IoT, and Database Management System. Achmad Teguh Wibowo received a bachelor's degree in Information systems from STIKOM, Surabaya, Indonesia, in 2010. He received his Master of Electrical Engineering from Brawijaya University, Malang, Indonesia, in 2013. He joined the Information System Department as a lecturer at the Islamic State University of Sunan Ampel, Surabaya. Indonesia since 2014. His current interests are Blockchain and Intelligent System. He is currently pursuing a Ph.D. degree at Institut Teknologi Sepuluh Nopember (ITS), Surabaya, Indonesia, since 2019. Mujib Ridwan received a bachelor's degree in Information Technology from Is- lamic State University of Maulana Malik Ibrahim, Malang, Indonesia, in 2009. He received his Master of Electrical Engineering from Brawijaya University, Malang, 152 http://www.i-jim.org https://doi.org/10.23917/emitor.v18i01.6235 https://doi.org/10.23917/emitor.v18i01.6235 https://doi.org/10.1109/mees.2017.8248937 https://doi.org/10.1109/mees.2017.8248937 https://doi.org/10.12962/j23373539.v5i1.15696 https://doi.org/10.12962/j23373539.v5i1.15696 https://doi.org/10.1016/j.jclepro.2020.121285 https://doi.org/10.1016/j.neucom.2019.10.008 https://doi.org/10.1016/j.ins.2017.10.044 https://doi.org/10.20895/inista.v2i2.117 https://doi.org/10.1007/978-3-540-30670-2_18 Paper—Face Recognition Using the Convolutional Neural Network for Barrier Gate System Indonesia in 2013. He joined the Information System Department as a lecturer at the Islamic State University of Sunan Ampel, Surabaya. Indonesia since 2014. His current interest in Data Mining and Deep Learning. Mohammad Khusnu Milad received a bachelor's degree in Electrical Engineer- ing, Institut Teknologi Sepuluh Nopember (ITS), Surabaya, Indonesia, in 2003. He received his Master of Industrial Managament from Institut Teknologi Sepuluh Nopember (ITS), Surabaya, Indonesia, in 2006. He joined the Information System Department as a lecturer at the Islamic State University of Sunan Ampel, Surabaya. Indonesia since 2014. His current interests are Organization and Management. He is currently pursuing a Ph.D. degree at Management Science Sekolah Tinggi Ilmu Ma- najemen Indonesia (STIESIA), since 2020. Sirajul Arifin is an Associate Professor in the Faculty of Islamic Economics and Business UIN Sunan Ampel Surabaya. He completed both bachelor's degrees at IAI Ibrahimy Situbondo and the University of Indonesia Jakarta. The first degree is in Islamic Economic Law, whereas the second is Information Sciences. In 2002 he ob- tained a Master of Islamic Economics from IAIN Sunan Ampel Surabaya. Six years later he pursued a Ph.D. degree in Islamic Economics at UIN Sunan Kalijaga Yogya- karta and completed in 2014. Now he serves as Vice Dean for Academic and Institu- tional Affairs at the Faculty of Islamic Economics and Business UIN Sunan Ampel Surabaya. Muhammad Andik Izzuddin received a bachelor's degree in Information and Technology Education from Universitas Negeri Malang (UM), Malang, Indonesia in 2011. He received his Master of Electrical Engineering from Institute of Technology Bandung (ITC), Bandung, Indonesia in 2013. He joined the Information System De- partment as a lecturer at the Islamic State University of Sunan Ampel, Surabaya. In- donesia since 2014. His current interests are Computer Networks, and Internet of Things. Rr Diah Nugraheni Setyowati received a bachelor's degree in Civil Engineering from Diponegoro University, Semarang, Indonesia, in 2006. She received her Master of Civil Engineering from Diponegoro University, Semarang, Indonesia, in 2012. She joined the Environmental Engineering Department as a lecturer at the Islamic State University of Sunan Ampel, Surabaya. Indonesia since 2014. Her current interests are Water Resources. Ferda Ernawan is currently a Senior Lecturer at the Faculty of Computing, Col- lege of Computing and Applied Sciences, Universiti Malaysia Pahang 26600 Pekan, Pahang Darul Makmur, Malaysia. He received his Master in Software Engineering and Intelligent and Ph.D in image processing from the Faculty of Information and Communication Technology, Universiti Teknikal Malaysia Melaka in 2011 and 2014 respectively. His research interests include image com-pression, digital watermarking and steganography. Article submitted 2020-12-01. Resubmitted 2021-03-18. Final acceptance 2021-03-18. Final version published as submitted by the authors. iJIM ‒ Vol. 15, No. 10, 2021 153