Search Results - (( data verification using algorithm ) OR ( variable learning based algorithm ))
Search alternatives:
- verification using »
- data verification »
- using algorithm »
- variable »
-
1
An ensemble of neural network and modified grey wolf optimizer for stock prediction
Published 2019“…Additionally, the research restricts the number of variables through feature selection to enhance the performance of the algorithm. …”
Get full text
Get full text
Thesis -
2
Stroke-to-stroke matching in on-line signature verification
Published 2010“…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
Get full text
Get full text
Thesis -
3
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Cryptographic hash functions are generally the basis of a secure network and used for data integrity verification. Cryptographic hash functions carried out processes such as identity verification, file integrity checking, secure key passing, and source code version control. …”
Get full text
Get full text
Thesis -
4
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The Speeded-Up Robust Features (SURF) Algorithms is used to determine the interest points. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Ensemble-based machine learning algorithms for classifying breast tissue based on electrical impedance spectroscopy
Published 2020“…In addition, the ranked order of the variables based on their importance differed across the ML algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Daily streamflow forecasting using simplified rule-based fuzzy logic system
Published 2011Get full text
Article -
7
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
Published 2023Conference Paper -
8
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
Get full text
Get full text
Thesis -
9
Signature verification system using support vector machine
Published 2009“…The common verification algorithm is one of the Global Feature Vector Machine called Support Vector Machine (SVM). …”
Get full text
Get full text
Conference or Workshop Item -
10
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…Two additional sites from T&C of the FiT scheme were used for the verification of the new developed FD algorithm. …”
Get full text
Get full text
Thesis -
11
Dynamic Bayesian Networks and Variable Length Genetic Algorithm for Dialogue Act Recognition
Published 2007“…The current dialogue act recognition models, namely cue-based models, are based on machine learning techniques, particularly statistical ones. …”
Get full text
Get full text
Thesis -
12
Intelligent biometric signature verification system incorporating neural network
Published 2005“…An intelligent feature of the system is made possible through the application of a multilayer feedforward neural network that is used together with suitable algorithms to complement the verification process. …”
Get full text
Get full text
Get full text
Article -
13
Daily streamflow forecasting using simplified rule-based fuzzy logic system
Published 2005“…Verifications of the calibrated models were done using the data set of the following year. …”
Get full text
Get full text
Article -
14
Dose verification procedures in radiotherapy
Published 1999Get full text
Get full text
Conference or Workshop Item -
15
Modeling and validation of base pressure for aerodynamic vehicles based on machine learning models
Published 2023“…Based on the identical dataset, the GA-BP and PSO-BP algorithms are also compared to the PCA-BAS-ENN algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
16
One day ahead daily peak hour load forecasting by using invasive weed optimization learning algorithm based Artificial Neural Network
Published 2012“…By using 'seen' and 'unseen' of electrical energy demand data were used to test the performance of the proposed algorithm. Based on result obtained, it shows that IWO learning algorithm is capable to produce accurate prediction load demand. …”
Get full text
Get full text
Student Project -
17
Enhanced Adaptive Confidence-Based Q Routing Algorithms For Network Traffic
Published 2004“…These two adaptive routing algorithms enhance the existing Confidence-based Q (CQ) and Confidence-based Dual Reinforcement Q (CDRQ) Routing Algorithms. …”
Get full text
Get full text
Thesis -
18
Dynamic Bayesian networks and variable length genetic algorithm for designing cue-based model for dialogue act recognition
Published 2010“…The model is, essentially, a dynamic Bayesian network induced from manually annotated dialogue corpus via dynamic Bayesian machine learning algorithms. Furthermore, the dynamic Bayesian network's random variables are constituted from sets of lexical cues selected automatically by means of a variable length genetic algorithm, developed specifically for this purpose. …”
Get full text
Get full text
Article -
19
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
Get full text
Get full text
Monograph -
20
Weather prediction in Kota Kinabalu using linear regressions with multiple variables
Published 2021“…Numerical weather prediction is the process of using existing numerical data on weather conditions to forecast the weather using machine learning algorithms. This study employs machine learning algorithms, a linear regression model using statistics, and two optimization approaches, the normal equation approach, and gradient descent approach to predict the weather based on a few variables. …”
Get full text
Get full text
Get full text
Get full text
Proceedings
