Search Results - (( based verification using algorithm ) OR ( code classification mining algorithm ))

Refine Results
  1. 1

    Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer by Tuerxun, Adilijiang

    Published 2017
    “…Furthermore, the Lazy-IBK algorithm have been validated to produce the best classifier model, with the machine learning algorithm performance of 65.26%, recall of 65.3%, and 65.4% F-measured as compared to other evaluated machine learning classifier algorithms proposed within the WEKA data mining algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Comparative analysis for topic classification in juz Al-Baqarah by Rahman, Mohamad Izzuddin, Samsudin, Noor Azah, Mustapha, Aida, Abdullahi Oyekunle, Adeleke

    Published 2018
    “…The SVM performance is then compared against other classification algorithms such as Naive Bayes, J48 Decision Tree and K-Nearest Neighbours. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Learner’s emotion prediction using production rules classification algorithm through brain computer interface tool by Nurshafiqa Saffah, Mohd Sharif

    Published 2018
    “…No EEG studies in Malaysia has been done on school children to study their emotional behaviour while learning. Classification and prediction are the functions provided by the data mining techniques that suit in EEG signal processing. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Stroke-to-stroke matching in on-line signature verification by Ahmad Jaini, Azhar

    Published 2010
    “…Current methods make use of the DTW algorithm and its variant to segment them before comparing each of its data dimension. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Integration Of Fingerprint Centre Point Location And Principal Component Analysis For Fingerprint Verification by Chan, Ying Hui, Abu Bakar, Syed Abdul Rahman

    Published 2005
    “…The Proposed Cp Estimation Algorithm Is Based On The Alteration Tracking (At) Followed By An Estimation Algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    An efficient technique for human verification using finger stripes geometry by Rahman, Md. Arafatur, Azad, Md. Saiful, Anwar, Farhat

    Published 2007
    “…The Distance Based Nearest Neighbor Algorithm, which shows greater accuracy than NN is also applied here. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Offline signature verification using artificial neural network / Mohd Hafiz Hilmi Abdul Ghani by Abdul Ghani, Mohd Hafiz Hilmi

    Published 2012
    “…This project focuses on signature verification using Artificial Neural Network algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Intelligent biometric signature verification system incorporating neural network by Lim, Boon Han, Mailah, Musa

    Published 2005
    “…An intelligent feature of the system is made possible through the application of a multilayer feedforward neural network that is used together with suitable algorithms to complement the verification process. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Face identification and verification using PCA and LDA by Chan, Lih Heng, Shaikh Salleh, Sheikh Hussain, Ting, Chee Ming, Ariff, Ahmad Kamarul

    Published 2008
    “…Algorithms based on PCA (Principal Components Analysis) and LDA (Linear Discriminant Analysis) are among the most popular appearance-based approaches in face recognition. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems by Al-Ghaili A.M., Kasim H., Othman M., Hassan Z.

    Published 2023
    “…A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. …”
    Book Chapter
  17. 17
  18. 18
  19. 19
  20. 20

    Development of efficient iris identification algorithm using wavelet packets for smartphone application by Gunawan, Teddy Surya, Solihin, Nurul Shaieda, Morshidi, Malik Arman, Kartiwi, Mira

    Published 2017
    “…Nowadays, iris recognition is widely used for personal identification and verification based on biometrical technology, especially in the smartphone arena. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article