Search Results - (( processes verification method algorithm ) OR ( process classification using algorithm ))
Search alternatives:
- processes verification »
- process classification »
- classification using »
- verification method »
- method algorithm »
- using algorithm »
-
1
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…This thesis considers all the inherent processes to an ECG biometric system involving pre-processing, feature extraction and classification. …”
Get full text
Get full text
Thesis -
2
An image-based children age range verification and classification based on facial features angle distribution and face shape elliptical ratio
Published 2017“…The angle that forms on human face images has been calculated based on selected facial features landmark points. The method was tested on FG-NET aging database. The classification of children from adults and the verification of children age range are implemented using SVM and Multi-SVM classification process. …”
Get full text
Get full text
Get full text
Article -
3
Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri
Published 2018“…Face recognition system is part of facial image processing applications, which is one of the biometric methods to identify people by the features of the face. …”
Get full text
Get full text
Get full text
Thesis -
4
An automatic grading model for semantic complexity of english texts using bidirectional attention-based autoencoder
Published 2024“…The experimental results show that the overall accuracy of BSETG algorithm is maintained between 70% and 90%, the response speed of BSETG algorithm is relatively fast, and the success rate of BSETG algorithm is relatively stable to a large extent.…”
Get full text
Get full text
Article -
5
Non-fiducial based ECG biometric authentication using one-class support vector machine
Published 2017Get full text
Get full text
Conference or Workshop Item -
6
Fingerprint feature extraction based discrete cosine transformation (DCT)
Published 2009“…The proposed algorithm involved two stages, which is pre-processing of fingerprint image and feature extraction based nCT. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
7
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…The A VL tree is used to increase the compression ratio as its compression algorithm works efficiently for all types of data. …”
Get full text
Get full text
Thesis -
8
Coastal Priority Ranking in Oil Spill Response Decision Support Mechanism
Published 2008“…Results were verified to present the inclusiveness, accuracy, and system algorithm. The verification activity involved exploring the knowledge base, coding of reasoning processes / inference engine, technical performance, ability for development, and interface. …”
Get full text
Get full text
Thesis -
9
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
10
Implementation of Hybrid Indexing, Clustering and Classification Methods to Enhance Rural Development Programme in South Sulawesi
Published 2024“…Using the cosine similarity algorithm for knowledge recommendation is village identified, utilizing community feedback as the foundation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Enhancing Classification Algorithms with Metaheuristic Technique
Published 2024“…Implementing this process uses classification algorithms such asNaïve Bayes, Support Vector Machine,and Random Forest. …”
Get full text
Get full text
Get full text
Article -
12
Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms
Published 2005“…In cluster generating process, the developed BBSI algorithm was used to select the best band combination for generating cluster by using Iterative self- Organizing Data Analysis (ISODATA) technique. …”
Get full text
Get full text
Thesis -
13
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…This paper will compare the performance of finger vein verification system with PCA and without PCA. There is no acquisition process in this paper as we used an open source finger-vein database called SDMULA-HMT. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Development of a fingerprint gender classification algorithm using fingerprint global features
Published 2016“…This algorithm is highly recommended in extracting a fingerprint global feature for gender classification process.…”
Get full text
Get full text
Get full text
Article -
15
An efficient technique for human verification using finger stripes geometry
Published 2007“…Finger stripe geometry is a new biometric type in verification process. This finger stripe based verification consists of two main attributes, feature extraction by image processing and feature learning by ANN (Artificial Neural Network). …”
Get full text
Get full text
Get full text
Article -
16
Knowledge base processing method based on text classification algorithm
Published 2023“…The text classification algorithm's knowledge base processing method utilizes existing data from the knowledge base to guide the construction and training of the classification model. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
-
18
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…In order to solve it, Bat Algorithm method is implement in to optimization method in fuzzy modeling for classification. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
19
An improved pixel-based and region-based approach for urban growth classification algorithms / Nur Laila Ab Ghani
Published 2015“…The urban growth images obtained are analysed to improve existing classification algorithms. The improved algorithm is constructed by adding new parameter and classification rule to existing algorithm. …”
Get full text
Get full text
Thesis -
20
