Search Results - (( using verification using algorithm ) OR ( based classifications using algorithm ))

Refine Results
  1. 1

    Online handwritten signature recognition by length normalization using up-sampling and down-sampling by Malallah, Fahad Layth, Syed Ahmad, Sharifah Mumtazah, Wan Adnan, Wan Azizun, Arigbabu, Olasimbo Ayodeji, Iranmanesh, Vahab, Yussof, Salman

    Published 2015
    “…Furthermore, online signature verification system is also proposed by using both Principal Component Analysis (PCA) for feature extraction and Artificial Neural Network (ANN) for classification. …”
    Get full text
    Get full text
    Article
  2. 2

    A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition by Babiker, Elsadig Ahmed Mohamed

    Published 2002
    “…In addition to the Arabic speech data that used in the original experiments, for both speaker dependant and speaker independent tests, more verification experiments were conducted using the TI20 speech data. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Face identification and verification using PCA and LDA by Chan, Lih Heng, Shaikh Salleh, Sheikh Hussain, Ting, Chee Ming, Ariff, Ahmad Kamarul

    Published 2008
    “…Algorithms based on PCA (Principal Components Analysis) and LDA (Linear Discriminant Analysis) are among the most popular appearance-based approaches in face recognition. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    An automatic grading model for semantic complexity of english texts using bidirectional attention-based autoencoder by Chen, Ruo Han, Ng, Boon Sim, Paramasivam, Shamala, Ren, Li

    Published 2024
    “…The experimental results show that the overall accuracy of BSETG algorithm is maintained between 70% and 90%, the response speed of BSETG algorithm is relatively fast, and the success rate of BSETG algorithm is relatively stable to a large extent.…”
    Get full text
    Get full text
    Article
  7. 7

    Partial fingerprint recognition using support vector machine by Vijayaprasad, Perumal, Sulaiman, Md. Nasir, Mustapha, Norwati, O. K. Rahmat, Rahmita Wirza

    Published 2010
    “…Global minutiae-based matching algorithm is used to record the matching pairs and their feature vectors are used to generate a model file which is used for classification. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Non-fiducial based ECG biometric authentication using one-class support vector machine by Hejazi, Maryamsadat, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Hashim, Shaiful Jahari, Abdul Aziz, Ahmad Fazli, Singh, Yashwant Prasad

    Published 2017
    “…The personal identity verification in a random population using kernel-based binary and one-class Support Vector Machines (SVMs) has been considered by other biometric traits, but has been so far left aside for analysis of ECG signals. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Fingerprint feature extraction based discrete cosine transformation (DCT) by Chin Kim On, Paulraj M. Pandiyan, Sazali Yaacob, Azali Saudi

    Published 2009
    “…The proposed algorithm involved two stages, which is pre-processing of fingerprint image and feature extraction based nCT. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  10. 10

    Signal quality measures for unsupervised blood pressure measurement by Abdul Sukora, Jumadi, Redmond, S J, Chan, G S H, Lovell, N H

    Published 2012
    “…The performance of the algorithm was assessed based on the ability to: verify if a signal was contaminated with any noise; the accuracy, sensitivity and specificity of this noise classification, and the systolic and diastolic pressure differences between the result obtained from the algorithm and the RS. 90% of the actual noise contaminated signals were correctly identified, and a sample-wise accuracy, sensitivity and specificity of 97.0%, 80.61% and 98.16%, respectively, were obtained from 100 pooled signals. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    A multi-color based features from facial images for automatic ethnicity identification model by Mohd Zamri, Osman, Mohd Aizaini, Maarof, Mohd Foad, Rohani, Nilam Nur Amir, Sjarif, Nor Saradatul Akmar, Zulkifli

    Published 2019
    “…Finally, the proposed ethnicity identification was tested using several classification algorithms. From the experimental result, we achieved a better result in multi-color feature compared to individual color space model under Random Forest algorithm.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Raspberry Pi-Based Finger Vein Recognition System Using PCANet by Quek, Ee Wen

    Published 2018
    “…Factors which impact PCANet are studied to identify the limitations of PCANet. For classification, k-Nearest Neighbours (kNN) with Euclidean distance algorithm is implemented. …”
    Get full text
    Get full text
    Monograph
  14. 14

    Malaysian license plate recognition system using Convolutional Neural Network (CNN) on web application / Nur Farahana Mahmud by Mahmud, Nur Farahana

    Published 2022
    “…Nowadays, there are numerous license plate recognition systems that have been developed and analysed effectively by previous researchers using different machine learning algorithms. However, according to a recent study, ANN algorithms require a huge amount of training data while BPFFNN algorithms only have an average success rate of 70% in recognizing all the characters. …”
    Get full text
    Get full text
    Student Project
  15. 15

    Secure Access To Authorized Resources Based On Fingerprint Authentication by Elmadani, Ahmed Baba

    Published 2003
    “…The A VL tree is used to increase the compression ratio as its compression algorithm works efficiently for all types of data. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Development of biosignals-based multimodal biometric system by Osamah Sadeq Alhamdani

    Published 2014
    “…The success of any biometric system is dependent on the pre-processing, features and classification algorithms exploits. There is a need for increase in reliability and security motivated by the fact that there is no unique technology that can be applied for all possible scenarios. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Features Extraction of Arabic Calligraphy using extended Triangle Model for Digital Jawi Paleography Analysis by Mohd Sanusi, Azmi, Muda, A. K., Khadijah Wan, Mohd Ghazali

    Published 2013
    “…The features are used for classification. In this paper, new features for the Triangle Model are proposed. …”
    Get full text
    Get full text
    Article
  18. 18

    White root disease auto-detection system for rubber trees based on dynamic electro-biochemical latex properties / Mohd Suhaimi Sulaiman by Sulaiman, Mohd Suhaimi

    Published 2019
    “…These measurement input were then went through the process of classification in ANN to generate the most optimized models by using LM and SCG algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    An ensemble of neural network and modified grey wolf optimizer for stock prediction by Das, Debashish

    Published 2019
    “…The “ensemble” model selected here to achieve better predictive performance, is used to predict future market price. The proposed approachoutperforms existing available meta-heuristic algorithms. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Comparison of Landsat 8, Sentinel-2 and spectral indices combinations for Google Earth Engine-based land use mapping in the Johor River Basin, Malaysia by Ju, Zeng, Tan, Mou Leong, Narimah Samat, Chang, Chun Kiat

    Published 2021
    “…The Random Forest (RF) algorithm was used to classify the land use land cover (LULC) with 222 training samples and 78 verification samples obtained through the Google Earth Pro higher resolution satellite images and field samplings. …”
    Get full text
    Get full text
    Get full text
    Article