Search Results - (( data application testing algorithm ) OR ( based verification learning algorithm ))
Search alternatives:
- verification learning »
- application testing »
- based verification »
- learning algorithm »
- testing algorithm »
- data application »
-
1
A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition
Published 2002“…In addition to the Arabic speech data that used in the original experiments, for both speaker dependant and speaker independent tests, more verification experiments were conducted using the TI20 speech data. …”
Get full text
Get full text
Thesis -
2
Features Extraction of Arabic Calligraphy using extended Triangle Model for Digital Jawi Paleography Analysis
Published 2013“…For further verification, two Supervised Machine Learning (SML) and three Unsupervised Machine Learning (UML) algorithms were experimented. …”
Get full text
Get full text
Article -
3
Malaysian license plate recognition system using Convolutional Neural Network (CNN) on web application / Nur Farahana Mahmud
Published 2022“…Nowadays, there are numerous license plate recognition systems that have been developed and analysed effectively by previous researchers using different machine learning algorithms. However, according to a recent study, ANN algorithms require a huge amount of training data while BPFFNN algorithms only have an average success rate of 70% in recognizing all the characters. …”
Get full text
Get full text
Student Project -
4
-
5
An efficient technique for human verification using finger stripes geometry
Published 2007“…Finger stripe geometry is a new biometric type in verification process. This finger stripe based verification consists of two main attributes, feature extraction by image processing and feature learning by ANN (Artificial Neural Network). …”
Get full text
Get full text
Get full text
Article -
6
Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman
Published 2016“…The critical factors of complexity at application level include data size and data rate of continuously streaming data, the selection of data fusion and data preprocessing methods, the choice of learning models, learning rates and learning modes, and the adoption of data mining algorithms. …”
Get full text
Get full text
Get full text
Thesis -
7
Person Verification Based on Multimodal Biometric Recognition
Published 2022“…The algorithm is extensively evaluated on UCI Machine Learning Repository Database datasets, including one real dataset with state-of-the-art approaches. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Efficient ML technique in blockchain-based solution in carbon credit for mitigating greenwashing
Published 2025“…This literature review explores the integration of blockchain technology and machine learning (ML) to enhance verification processes and reduce fraudulent practices in forest carbon credits. …”
Get full text
Get full text
Get full text
Article -
9
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…The results are used to develop the hybrid learning algorithm based on the AdaBoost, Bagging, and RUSBoost methods to predict the damage in the tower based on dynamic frequency domain. …”
Get full text
Get full text
Thesis -
10
-
11
An intelligent framework for modelling and active vibration control of flexible structures
Published 2004“…The simulation algorithm and interactive environment thus developed and validated form suitable test and verification platforms for the development of AVC strategies for flexible structures as well as for learning and research purposes.…”
Get full text
Get full text
Get full text
Thesis -
12
Raspberry Pi-Based Finger Vein Recognition System Using PCANet
Published 2018“…For classification, k-Nearest Neighbours (kNN) with Euclidean distance algorithm is implemented. An enhancement version for kNN algorithm, k-General Nearest Neighbours (kGNN) have been proposed at initial stage. …”
Get full text
Get full text
Monograph -
13
-
14
-
15
Fsm-Based Enhanced March C- Algorithm For Memory Built-In Self-Test
Published 2017Get full text
Get full text
Thesis -
16
A Location-Based Fraud Detection in Shipping Industry Using Machine Learning Comparison Techniques
Published 2025Book chapter -
17
-
18
Enhancement of bearing defect diagnosis via genetic algorithm optimized feature selection
Published 2015“…However the average classification accuracy of 84.74% on the unseen test data did not achieve the acceptable average success rate of 90% in this application. …”
Get full text
Get full text
Get full text
Thesis -
19
ANALYSIS AND INTERPRETATION OF PRESSURE TRANSIENT TEST DATA BY RECENT ROBUST DECONVOLUTION METHODS
Published 2013Get full text
Get full text
Final Year Project -
20
Fault detection with optimum March test algorithm
Published 2013Get full text
Get full text
Get full text
Article
