Search Results - (( process verification using algorithm ) OR ( data classification using algorithm ))
Search alternatives:
- process verification »
- classification using »
- data classification »
- verification using »
- using algorithm »
-
1
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
Get full text
Get full text
Thesis -
2
Data Mining Analysis Of Chronic Kidney Disease (CKD) Level
Published 2022“…Data mining analysis takes place in four stages: data pre-processing, data classification, classification of attributes by stages of CKD, and classification model verification using Microsoft Excel and Waikato Environmental for Knowledge Analysis (WEKA) version 3.8.5 software. …”
Get full text
Get full text
Monograph -
3
Fake news detection: A machine learning approach
Published 2021“…The final model chosen to be deployed was a model trained using a Multinomial Naïve Bayes algorithm.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
An automatic grading model for semantic complexity of english texts using bidirectional attention-based autoencoder
Published 2024“…With the advent of the information age, the massive increase of English text data puts forward higher requirements for text analysis and processing. …”
Get full text
Get full text
Article -
5
Non-fiducial based ECG biometric authentication using one-class support vector machine
Published 2017“…This paper investigates the effect of different parameters of data set size, labeling data, configuration of training and testing data sets, feature extraction, different recording sessions, and random partition methods on accuracy and error rates of these SVM classifiers. …”
Get full text
Get full text
Conference or Workshop Item -
6
Malaysian license plate recognition system using Convolutional Neural Network (CNN) on web application / Nur Farahana Mahmud
Published 2022“…Nowadays, there are numerous license plate recognition systems that have been developed and analysed effectively by previous researchers using different machine learning algorithms. However, according to a recent study, ANN algorithms require a huge amount of training data while BPFFNN algorithms only have an average success rate of 70% in recognizing all the characters. …”
Get full text
Get full text
Student Project -
7
Raspberry Pi-Based Finger Vein Recognition System Using PCANet
Published 2018“…The original FVRS developed only provides verification instead of identification. For identification, the image processing involves process of image pre-processing, feature extraction and classification. …”
Get full text
Get full text
Monograph -
8
Fingerprint feature extraction based discrete cosine transformation (DCT)
Published 2009“…The extracted nCT data is used as input for the backpropagation neural network training for personal identification.…”
Get full text
Get full text
Get full text
Get full text
Proceedings -
9
Estimating cabbage production in Cameron Highlands, Malaysia using IKONOS data.
Published 2009“…Using a supervised and unsupervised classification, less than and above 1.5 month-old cabbages were mapped and quantified. …”
Get full text
Get full text
Article -
10
An ensemble of neural network and modified grey wolf optimizer for stock prediction
Published 2019“…The “ensemble” model selected here to achieve better predictive performance, is used to predict future market price. The proposed approachoutperforms existing available meta-heuristic algorithms. …”
Get full text
Get full text
Thesis -
11
White root disease auto-detection system for rubber trees based on dynamic electro-biochemical latex properties / Mohd Suhaimi Sulaiman
Published 2019“…These measurement input were then went through the process of classification in ANN to generate the most optimized models by using LM and SCG algorithm. …”
Get full text
Get full text
Thesis -
12
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…The A VL tree is used to increase the compression ratio as its compression algorithm works efficiently for all types of data. …”
Get full text
Get full text
Thesis -
13
A Hybrid Evaluation Metric for Optimizing Classifier
Published 2011“…However, the use of accuracy metric leads the searching process to the sub-optimal solutions due to its limited capability of discriminating values. …”
Get full text
Get full text
Get full text
Proceeding -
14
A hybrid evaluation metric for optimizing classifier
Published 2011“…However, the use of accuracy metric leads the searching process to the sub-optimal solutions due to its limited capability of discriminating values. …”
Get full text
Get full text
Conference or Workshop Item -
15
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
16
Comparison of Landsat 8, Sentinel-2 and spectral indices combinations for Google Earth Engine-based land use mapping in the Johor River Basin, Malaysia
Published 2021“…The Random Forest (RF) algorithm was used to classify the land use land cover (LULC) with 222 training samples and 78 verification samples obtained through the Google Earth Pro higher resolution satellite images and field samplings. …”
Get full text
Get full text
Get full text
Article -
17
E-voting system with physical verification using OTP algorithm / Badrul Amin Mohd Kassim
Published 2021Get full text
Get full text
Student Project -
18
Implementation of Hybrid Indexing, Clustering and Classification Methods to Enhance Rural Development Programme in South Sulawesi
Published 2024“…Using the cosine similarity algorithm for knowledge recommendation is village identified, utilizing community feedback as the foundation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The Speeded-Up Robust Features (SURF) Algorithms is used to determine the interest points. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms
Published 2005“…In cluster generating process, the developed BBSI algorithm was used to select the best band combination for generating cluster by using Iterative self- Organizing Data Analysis (ISODATA) technique. …”
Get full text
Get full text
Thesis
