• LATEST
    • A PHP Error was encountered

      Severity: Notice

      Message: Undefined variable: latest

      Filename: views/_header.php

      Line Number: 48

      A PHP Error was encountered

      Severity: Warning

      Message: Invalid argument supplied for foreach()

      Filename: views/_header.php

      Line Number: 48


Komputer Mampu Baca ‘Sidik-Otak’

Kini sistem komputer dapat mengenali ‘sidik-otak’ (brainprint) otak seseorang dengan akurasi 100%. Begitu hasil riset tim ahli pada Binghamton University di New York, Amerika Serikat. Riset itu dipimpin oleh Asisten Profesor Psikologi, Sarah Laszlo, dan Asisten Profesor Electrical and Computer Engineering, Zhanpeng Jin (Science Daily, 18/4/2016).

Tim peneliti itu merekam aktivitas otak 50 partisipan yang mengenakan alat  electroencephalogram headset saat mereka memperhatikan serial 500 imej khusus guna mendapatkan respons unik tiap peserta terhadap misalnya sepotong pizza, satu kapal, Anne Hathaway, atau kata “conundrum”.  Hasilnya, sistem komputer mampu mengidentifikasi  ‘sidik-otak’ (brainprint) peserta secara akurat 100 persen (Science Daily, 18/4/2016).

“When you take hundreds of these images, where every person is going to feel differently about each individual one, then you can be really accurate in identifying which person it was who looked at them just by their brain activity. It's a big deal going from 97 to 100 percent because we imagine the applications for this technology being for high-security situations, like ensuring the person going into the Pentagon or the nuclear launch bay is the right person. You don't want to be 97 percent accurate for that, you want to be 100 percent accurate,” ungkap Asisten Profesor Sarah Laszlo (Binghamton University, 18/4/2016).

Hasil riset itu dirilis oleh jurnal IEEE Transactions on Information Forensics and Security, edisi 2016 (Maria V. Ruiz-Blondet, Zhanpeng Jin, Sarah Laszlo, “CEREBRE: A Novel Method for Very High Accuracy Event-Related Potential Biometric Identification”,  IEEE Transactions on Information Forensics and Security, 2016).

“We tend to see the applications of this system as being more along the lines of high-security physical locations, like the Pentagon or Air Force Labs, where there aren't that many users that are authorized to enter, and those users don't need to constantly be authorizing the way that a consumer might need to authorize into their phone or computer,” papar Zhanpeng Jin (Binghamton University, 18/4/2016). 

Oleh: Servas Pandur