Search Results - (( _ valuation ((a algorithm) OR (based algorithm)) ) OR ( based verification system algorithm ))*
Search alternatives:
- verification system »
- based verification »
- system algorithm »
- a algorithm »
-
1
Green building valuation based on machine learning algorithms / Thuraiya Mohd ... [et al.]
Published 2021“…This experiment used five common machine learning algorithms namely 1) Linear Regressor, 2) Decision Tree Regressor, 3) Random Forest Regressor, 4) Ridge Regressor and 5) Lasso Regressor tested on a real estate data-set of covering Kuala Lumpur District, Malaysia. 3 set of experiments was conducted based on the different feature selections and purposes The results show that the implementation of 16 variables based on Experiment 2 has given a promising effect on the model compare the other experiment, and the Random Forest Regressor by using the Split approach for training and validating data-set outperformed other algorithms compared to Cross-Validation approach. …”
Get full text
Get full text
Conference or Workshop Item -
2
An enhanced metaheuristic approach to solve quadratic assignment problem using hybrid technique
Published 2021“…The valuate of performance HDDETS algorithm comparison to existing hybrid-based algorithms, namely: Biogeography-Based Optimization Tabu Search (BBOTS), Whale Algorithm with Tabu Search (WAITS), Hybrid Ant System (HAS), Lexisearch and Genetic Algorithms (LSGA), and Golden Ball Simulated Annealing (GBSA) algorithms. …”
Get full text
Get full text
Get full text
Thesis -
3
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
4
Integration Of Fingerprint Centre Point Location And Principal Component Analysis For Fingerprint Verification
Published 2005“…Principal Component Analysis (Pca) Is Utilized In This System. The Proposed Cp Estimation Algorithm Is Based On The Alteration Tracking (At) Followed By An Estimation Algorithm. …”
Get full text
Get full text
Get full text
Article -
5
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…It involves development of Max-Min Rule-Based Classification Algorithm. The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
Get full text
Get full text
Thesis -
6
Intelligent biometric signature verification system incorporating neural network
Published 2005“…An intelligent feature of the system is made possible through the application of a multilayer feedforward neural network that is used together with suitable algorithms to complement the verification process. …”
Get full text
Get full text
Get full text
Article -
7
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…Therefore, the aim for this project is to develop a new approach in the fingerprint verification system by applying Clonal Selection Algorithm (CSA) that is known to be good in pattern matching and optimization of problems. …”
Get full text
Get full text
Thesis -
8
-
9
Stroke-to-stroke matching in on-line signature verification
Published 2010Get full text
Get full text
Thesis -
10
-
11
Visualisasi pohon sintaksis berasaskan model dan algoritma sintaks ayat bahasa Melayu
Published 2018“…User evaluation on the prototype was also performed yielding in the average subjective satisfaction of 87.9% and a mean score of 6.157, based on semantic differential scales of 1 to 7. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
-
13
Person Verification Based on Multimodal Biometric Recognition
Published 2022“…First, the multimodal biometric person recognition system is developed based on Convolutional Neural Network (CNN) and ORB (Oriented FAST and Rotated BRIEF) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Offline signature verification using artificial neural network / Mohd Hafiz Hilmi Abdul Ghani
Published 2012“…As a result of this project, the system successfully verifies the signature based on the Neural Network algorithm. …”
Get full text
Get full text
Thesis -
15
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
Get full text
Get full text
Thesis -
16
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
Published 2023“…A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. …”
Book Chapter -
17
-
18
Security factors based evaluation of verification algorithm for an IoT access system
Published 2023Conference Paper -
19
Daily streamflow forecasting using simplified rule-based fuzzy logic system
Published 2011Get full text
Article -
20
