Search Results - (( process verification method algorithm ) OR ( based classification using algorithm ))

Refine Results
  1. 1
  2. 2

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…The thesis proposes a novel ECG verification technique based on non-fiducial approach which explores waveform itself using kernel methods for feature extraction and classification after preprocessing (denoising ECG signals) one lead ECG signals of 52 subjects. …”
    Get full text
    Get full text
    Thesis
  3. 3

    An automatic grading model for semantic complexity of english texts using bidirectional attention-based autoencoder by Chen, Ruo Han, Ng, Boon Sim, Paramasivam, Shamala, Ren, Li

    Published 2024
    “…This study conducted experimental verification based on semantic Evaluation (SemEval) dataset, convolutional neural network (CNN)/Daily Mail dataset and Penn Treebank dataset, and conducted a comparative analysis with existing semantic complexity evaluation methods. …”
    Get full text
    Get full text
    Article
  4. 4

    Non-fiducial based ECG biometric authentication using one-class support vector machine by Hejazi, Maryamsadat, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Hashim, Shaiful Jahari, Abdul Aziz, Ahmad Fazli, Singh, Yashwant Prasad

    Published 2017
    “…The personal identity verification in a random population using kernel-based binary and one-class Support Vector Machines (SVMs) has been considered by other biometric traits, but has been so far left aside for analysis of ECG signals. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Fingerprint feature extraction based discrete cosine transformation (DCT) by Chin Kim On, Paulraj M. Pandiyan, Sazali Yaacob, Azali Saudi

    Published 2009
    “…The proposed algorithm involved two stages, which is pre-processing of fingerprint image and feature extraction based nCT. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  6. 6

    Secure Access To Authorized Resources Based On Fingerprint Authentication by Elmadani, Ahmed Baba

    Published 2003
    “…The A VL tree is used to increase the compression ratio as its compression algorithm works efficiently for all types of data. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Coastal Priority Ranking in Oil Spill Response Decision Support Mechanism by Pourvakhshouri, Seyedeh Zahra

    Published 2008
    “…Results were verified to present the inclusiveness, accuracy, and system algorithm. The verification activity involved exploring the knowledge base, coding of reasoning processes / inference engine, technical performance, ability for development, and interface. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Implementation of Hybrid Indexing, Clustering and Classification Methods to Enhance Rural Development Programme in South Sulawesi by Muhammad, Faisal

    Published 2024
    “…Using the cosine similarity algorithm for knowledge recommendation is village identified, utilizing community feedback as the foundation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching by Ei Wei., Ting, M. Z., Ibrahim, D.J., Mulvaney

    Published 2017
    “…This paper will compare the performance of finger vein verification system with PCA and without PCA. There is no acquisition process in this paper as we used an open source finger-vein database called SDMULA-HMT. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
    Get full text
    Get full text
    Thesis
  13. 13

    An efficient technique for human verification using finger stripes geometry by Rahman, Md. Arafatur, Azad, Md. Saiful, Anwar, Farhat

    Published 2007
    “…Finger stripe geometry is a new biometric type in verification process. This finger stripe based verification consists of two main attributes, feature extraction by image processing and feature learning by ANN (Artificial Neural Network). …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    An adaptive ant colony optimization algorithm for rule-based classification by Al-Behadili, Hayder Naser Khraibet

    Published 2020
    “…Ant-Miner is a variant of ant colony optimisation and a prominent intelligent algorithm widely use in rules-based classification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Classification of tropical rainforest using different classification algorithm based on remote sensing imagery: A study of Gunung Basor by Intan Noradybah Md Rodi

    Published 2019
    “…Thehighest accuracy for classification map of Gunung Basor is by using maximum likelihood algorithm with an accuracy of 82.90%. …”
    Get full text
    Get full text
    Undergraduate Final Project Report
  16. 16

    Real-time Traffic Classification Algorithm Based on Hybrid of Signature Statistical and Port to Identify Internet Applications by Hamza Awad, Hamza Ibrahim, Sulaiman, Mohd Nor, Izzeldin, I. Mohd, Mohamed Saad, Mahoub, Haitham, A. Jamil

    Published 2014
    “…In addition, as demonstrated in the real time online experiments done, SSPC algorithm uses a short time to classify traffic and thus it is suitable to be used for online classification.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Daisy species classification based on image using Convolutional Neural Network algorithm / Haris Hidayatullah Khaimuza by Khaimuza, Haris Hidayatullah

    Published 2024
    “…Second objective is to develop the prototype of daisy species classification based on image using CNN algorithm. The last objective is to evaluate the accuracy of CNN model in the daisy species classification based on image. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Enhanced ontology-based text classification algorithm for structurally organized documents by Oleiwi, Suha Sahib

    Published 2015
    “…The third algorithm is the Ontology Based Text Classification (OBTC) and is designed to reduce the dimensionality of training sets. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Feature extraction and selection algorithm based on self adaptive ant colony system for sky image classification by Petwan, Montha

    Published 2023
    “…The performance of FESSIC was evaluated against ten benchmark image classification algorithms and six classifiers on four ground-based sky image datasets. …”
    Get full text
    Get full text
    Get full text
    Thesis