Search Results - (( process verification using algorithm ) OR ( data classification using algorithm ))

Refine Results
  1. 1

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Data Mining Analysis Of Chronic Kidney Disease (CKD) Level by Mohd Harizi, Muhammad Hafizam Afiq

    Published 2022
    “…Data mining analysis takes place in four stages: data pre-processing, data classification, classification of attributes by stages of CKD, and classification model verification using Microsoft Excel and Waikato Environmental for Knowledge Analysis (WEKA) version 3.8.5 software. …”
    Get full text
    Get full text
    Monograph
  3. 3

    Fake news detection: A machine learning approach by Yeoh, Dennis Guan Lee

    Published 2021
    “…The final model chosen to be deployed was a model trained using a Multinomial Naïve Bayes algorithm.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    An automatic grading model for semantic complexity of english texts using bidirectional attention-based autoencoder by Chen, Ruo Han, Ng, Boon Sim, Paramasivam, Shamala, Ren, Li

    Published 2024
    “…With the advent of the information age, the massive increase of English text data puts forward higher requirements for text analysis and processing. …”
    Get full text
    Get full text
    Article
  5. 5

    Non-fiducial based ECG biometric authentication using one-class support vector machine by Hejazi, Maryamsadat, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Hashim, Shaiful Jahari, Abdul Aziz, Ahmad Fazli, Singh, Yashwant Prasad

    Published 2017
    “…This paper investigates the effect of different parameters of data set size, labeling data, configuration of training and testing data sets, feature extraction, different recording sessions, and random partition methods on accuracy and error rates of these SVM classifiers. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Malaysian license plate recognition system using Convolutional Neural Network (CNN) on web application / Nur Farahana Mahmud by Mahmud, Nur Farahana

    Published 2022
    “…Nowadays, there are numerous license plate recognition systems that have been developed and analysed effectively by previous researchers using different machine learning algorithms. However, according to a recent study, ANN algorithms require a huge amount of training data while BPFFNN algorithms only have an average success rate of 70% in recognizing all the characters. …”
    Get full text
    Get full text
    Student Project
  7. 7

    Raspberry Pi-Based Finger Vein Recognition System Using PCANet by Quek, Ee Wen

    Published 2018
    “…The original FVRS developed only provides verification instead of identification. For identification, the image processing involves process of image pre-processing, feature extraction and classification. …”
    Get full text
    Get full text
    Monograph
  8. 8

    Fingerprint feature extraction based discrete cosine transformation (DCT) by Chin Kim On, Paulraj M. Pandiyan, Sazali Yaacob, Azali Saudi

    Published 2009
    “…The extracted nCT data is used as input for the backpropagation neural network training for personal identification.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  9. 9

    Estimating cabbage production in Cameron Highlands, Malaysia using IKONOS data. by Jusoff, Kamaruzaman

    Published 2009
    “…Using a supervised and unsupervised classification, less than and above 1.5 month-old cabbages were mapped and quantified. …”
    Get full text
    Get full text
    Article
  10. 10

    An ensemble of neural network and modified grey wolf optimizer for stock prediction by Das, Debashish

    Published 2019
    “…The “ensemble” model selected here to achieve better predictive performance, is used to predict future market price. The proposed approachoutperforms existing available meta-heuristic algorithms. …”
    Get full text
    Get full text
    Thesis
  11. 11

    White root disease auto-detection system for rubber trees based on dynamic electro-biochemical latex properties / Mohd Suhaimi Sulaiman by Sulaiman, Mohd Suhaimi

    Published 2019
    “…These measurement input were then went through the process of classification in ANN to generate the most optimized models by using LM and SCG algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Secure Access To Authorized Resources Based On Fingerprint Authentication by Elmadani, Ahmed Baba

    Published 2003
    “…The A VL tree is used to increase the compression ratio as its compression algorithm works efficiently for all types of data. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A Hybrid Evaluation Metric for Optimizing Classifier by Hossin, M., Sulaiman, M.N, Mustapha, A., Mustapha, N., Rahmat, R.W

    Published 2011
    “…However, the use of accuracy metric leads the searching process to the sub-optimal solutions due to its limited capability of discriminating values. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  14. 14

    A hybrid evaluation metric for optimizing classifier by Hossin, Mohammad, Sulaiman, Md. Nasir, Mustapha, Aida, Mustapha, Norwati, O. K. Rahmat, Rahmita Wirza

    Published 2011
    “…However, the use of accuracy metric leads the searching process to the sub-optimal solutions due to its limited capability of discriminating values. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Comparison of Landsat 8, Sentinel-2 and spectral indices combinations for Google Earth Engine-based land use mapping in the Johor River Basin, Malaysia by Ju, Zeng, Tan, Mou Leong, Narimah Samat, Chang, Chun Kiat

    Published 2021
    “…The Random Forest (RF) algorithm was used to classify the land use land cover (LULC) with 222 training samples and 78 verification samples obtained through the Google Earth Pro higher resolution satellite images and field samplings. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Implementation of Hybrid Indexing, Clustering and Classification Methods to Enhance Rural Development Programme in South Sulawesi by Muhammad, Faisal

    Published 2024
    “…Using the cosine similarity algorithm for knowledge recommendation is village identified, utilizing community feedback as the foundation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching by Ei Wei., Ting, M. Z., Ibrahim, D.J., Mulvaney

    Published 2017
    “…The Speeded-Up Robust Features (SURF) Algorithms is used to determine the interest points. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms by Teoh, Chin Chuang

    Published 2005
    “…In cluster generating process, the developed BBSI algorithm was used to select the best band combination for generating cluster by using Iterative self- Organizing Data Analysis (ISODATA) technique. …”
    Get full text
    Get full text
    Thesis