Search Results - (( process verification method algorithm ) OR ( based classification using algorithm ))
Search alternatives:
- process verification »
- based classification »
- classification using »
- verification method »
- method algorithm »
- using algorithm »
-
1
An image-based children age range verification and classification based on facial features angle distribution and face shape elliptical ratio
Published 2017“…The classification and verification algorithm was based on face shape elliptical ratio and facial features angle distribution. …”
Get full text
Get full text
Get full text
Article -
2
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…The thesis proposes a novel ECG verification technique based on non-fiducial approach which explores waveform itself using kernel methods for feature extraction and classification after preprocessing (denoising ECG signals) one lead ECG signals of 52 subjects. …”
Get full text
Get full text
Thesis -
3
An automatic grading model for semantic complexity of english texts using bidirectional attention-based autoencoder
Published 2024“…This study conducted experimental verification based on semantic Evaluation (SemEval) dataset, convolutional neural network (CNN)/Daily Mail dataset and Penn Treebank dataset, and conducted a comparative analysis with existing semantic complexity evaluation methods. …”
Get full text
Get full text
Article -
4
Non-fiducial based ECG biometric authentication using one-class support vector machine
Published 2017“…The personal identity verification in a random population using kernel-based binary and one-class Support Vector Machines (SVMs) has been considered by other biometric traits, but has been so far left aside for analysis of ECG signals. …”
Get full text
Get full text
Conference or Workshop Item -
5
Fingerprint feature extraction based discrete cosine transformation (DCT)
Published 2009“…The proposed algorithm involved two stages, which is pre-processing of fingerprint image and feature extraction based nCT. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
6
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…The A VL tree is used to increase the compression ratio as its compression algorithm works efficiently for all types of data. …”
Get full text
Get full text
Thesis -
7
Coastal Priority Ranking in Oil Spill Response Decision Support Mechanism
Published 2008“…Results were verified to present the inclusiveness, accuracy, and system algorithm. The verification activity involved exploring the knowledge base, coding of reasoning processes / inference engine, technical performance, ability for development, and interface. …”
Get full text
Get full text
Thesis -
8
Implementation of Hybrid Indexing, Clustering and Classification Methods to Enhance Rural Development Programme in South Sulawesi
Published 2024“…Using the cosine similarity algorithm for knowledge recommendation is village identified, utilizing community feedback as the foundation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
10
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…This paper will compare the performance of finger vein verification system with PCA and without PCA. There is no acquisition process in this paper as we used an open source finger-vein database called SDMULA-HMT. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
Case Slicing Technique for Feature Selection
Published 2004“…CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
Get full text
Get full text
Thesis -
13
An efficient technique for human verification using finger stripes geometry
Published 2007“…Finger stripe geometry is a new biometric type in verification process. This finger stripe based verification consists of two main attributes, feature extraction by image processing and feature learning by ANN (Artificial Neural Network). …”
Get full text
Get full text
Get full text
Article -
14
An adaptive ant colony optimization algorithm for rule-based classification
Published 2020“…Ant-Miner is a variant of ant colony optimisation and a prominent intelligent algorithm widely use in rules-based classification. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Classification of tropical rainforest using different classification algorithm based on remote sensing imagery: A study of Gunung Basor
Published 2019“…Thehighest accuracy for classification map of Gunung Basor is by using maximum likelihood algorithm with an accuracy of 82.90%. …”
Get full text
Get full text
Undergraduate Final Project Report -
16
Real-time Traffic Classification Algorithm Based on Hybrid of Signature Statistical and Port to Identify Internet Applications
Published 2014“…In addition, as demonstrated in the real time online experiments done, SSPC algorithm uses a short time to classify traffic and thus it is suitable to be used for online classification.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Daisy species classification based on image using Convolutional Neural Network algorithm / Haris Hidayatullah Khaimuza
Published 2024“…Second objective is to develop the prototype of daisy species classification based on image using CNN algorithm. The last objective is to evaluate the accuracy of CNN model in the daisy species classification based on image. …”
Get full text
Get full text
Thesis -
18
-
19
Enhanced ontology-based text classification algorithm for structurally organized documents
Published 2015“…The third algorithm is the Ontology Based Text Classification (OBTC) and is designed to reduce the dimensionality of training sets. …”
Get full text
Get full text
Get full text
Thesis -
20
Feature extraction and selection algorithm based on self adaptive ant colony system for sky image classification
Published 2023“…The performance of FESSIC was evaluated against ten benchmark image classification algorithms and six classifiers on four ground-based sky image datasets. …”
Get full text
Get full text
Get full text
Thesis
