Search Results - (( based verification method algorithm ) OR ( data classification using algorithm ))

Refine Results
  1. 1

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…This thesis considers all the inherent processes to an ECG biometric system involving pre-processing, feature extraction and classification. The thesis proposes a novel ECG verification technique based on non-fiducial approach which explores waveform itself using kernel methods for feature extraction and classification after preprocessing (denoising ECG signals) one lead ECG signals of 52 subjects. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Non-fiducial based ECG biometric authentication using one-class support vector machine by Hejazi, Maryamsadat, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Hashim, Shaiful Jahari, Abdul Aziz, Ahmad Fazli, Singh, Yashwant Prasad

    Published 2017
    “…The personal identity verification in a random population using kernel-based binary and one-class Support Vector Machines (SVMs) has been considered by other biometric traits, but has been so far left aside for analysis of ECG signals. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    An automatic grading model for semantic complexity of english texts using bidirectional attention-based autoencoder by Chen, Ruo Han, Ng, Boon Sim, Paramasivam, Shamala, Ren, Li

    Published 2024
    “…This study conducted experimental verification based on semantic Evaluation (SemEval) dataset, convolutional neural network (CNN)/Daily Mail dataset and Penn Treebank dataset, and conducted a comparative analysis with existing semantic complexity evaluation methods. …”
    Get full text
    Get full text
    Article
  4. 4

    Fingerprint feature extraction based discrete cosine transformation (DCT) by Chin Kim On, Paulraj M. Pandiyan, Sazali Yaacob, Azali Saudi

    Published 2009
    “…The proposed algorithm involved two stages, which is pre-processing of fingerprint image and feature extraction based nCT. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  5. 5

    Secure Access To Authorized Resources Based On Fingerprint Authentication by Elmadani, Ahmed Baba

    Published 2003
    “…The A VL tree is used to increase the compression ratio as its compression algorithm works efficiently for all types of data. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Implementation of Hybrid Indexing, Clustering and Classification Methods to Enhance Rural Development Programme in South Sulawesi by Muhammad, Faisal

    Published 2024
    “…Using the cosine similarity algorithm for knowledge recommendation is village identified, utilizing community feedback as the foundation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Stroke-to-stroke matching in on-line signature verification by Ahmad Jaini, Azhar

    Published 2010
    “…Current methods make use of the DTW algorithm and its variant to segment them before comparing each of its data dimension. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms by Teoh, Chin Chuang

    Published 2005
    “…In cluster generating process, the developed BBSI algorithm was used to select the best band combination for generating cluster by using Iterative self- Organizing Data Analysis (ISODATA) technique. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…Since the 1960s, many algorithms for data classification have been proposed. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Dengue classification system using clonal selection algorithm / Karimah Mohd by Mohd, Karimah

    Published 2012
    “…Some of the dengue data are used to test the dengue classification system to produce the classification accuracy. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Enhancing Classification Algorithms with Metaheuristic Technique by Cokro, Nurwinto, Tri Basuki, Kurniawan, Misinem, ., Tata, Sutabri, Yesi Novaria, Kunang

    Published 2024
    “…Implementing this process uses classification algorithms such asNaïve Bayes, Support Vector Machine,and Random Forest. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Classification of breast cancer disease using bagging fuzzy-id3 algorithm based on fuzzydbd by Nur Farahaina, Idris

    Published 2022
    “…Classification is a data mining technique used to classify varied data types according to a specific criterion. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Attribute related methods for improvement of ID3 Algorithm in classification of data: A review by Nur Farahaina, Idris, Mohd Arfian, Ismail

    Published 2020
    “…Nevertheless, there are some limitations in ID3 algorithm that can affect the performance in the classification of data. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Integration Of Unsupervised Clustering Algorithm And Supervised Classifier For Pattern Recognition by Leong, Shi Xiang

    Published 2017
    “…Phase 1 is mainly to evaluate the performance of clustering algorithm (K-Means and FCM). Phase 2 is to study the performance of proposed integration system which using the data clustered to be used as train data for Naïve Bayes classifier. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Comparison of expectation maximization and K-means clustering algorithms with ensemble classifier model by Sulaiman, Md. Nasir, Mohamed, Raihani, Mustapha, Norwati, Zainudin, Muhammad Noorazlan Shah

    Published 2018
    “…Expectation maximization (EM) is one of the representatives clustering algorithms which have broadly applied in solving classification problems by improving the density of data using the probability density function. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Development of classification algorithms of human gait by Koh, Chee Hong

    Published 2022
    “…Thus, this study aims to develop a classification algorithm that can effectively classify subjects with relatively simplified input data. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18
  19. 19

    Text Extraction Algorithm for Web Text Classification by Theab, Mustafa Muwafak

    Published 2010
    “…In this study, the experiment was conducted on five English educational websites. The created data sets are then classified using Naive-Bayes and C4.5 algorithms provided in WEKA application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    An improve unsupervised discretization using optimization algorithms for classification problems by Mohamed, Rozlini, Samsudin, Noor Azah

    Published 2024
    “…According to the experimental findings, the suggested EB has a major effect on the accuracy, recall, and F-measure of data classification. The classification performance using EB outperforms other existing approaches for all datasets.…”
    Get full text
    Get full text
    Get full text
    Article