Search Results - (( java application matching algorithm ) OR ( data verification learning algorithm ))
Search alternatives:
- verification learning »
- application matching »
- learning algorithm »
- data verification »
- java application »
-
1
-
2
Fake news detection: A machine learning approach
Published 2021“…Once the dataset was created, several machine learning algorithms were used to train several different models. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition
Published 2002“…Rough sets theory represents a mathematical approach to vagueness and uncertainty. Data analysis, data reduction, approxi mate classification, machine learning, and discovery of pattern in data are functions performed by a rough sets analysis. …”
Get full text
Get full text
Thesis -
4
Efficient ML technique in blockchain-based solution in carbon credit for mitigating greenwashing
Published 2025“…This literature review explores the integration of blockchain technology and machine learning (ML) to enhance verification processes and reduce fraudulent practices in forest carbon credits. …”
Get full text
Get full text
Get full text
Article -
5
Person Verification Based on Multimodal Biometric Recognition
Published 2022“…The algorithm is extensively evaluated on UCI Machine Learning Repository Database datasets, including one real dataset with state-of-the-art approaches. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
-
7
-
8
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
9
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
Get full text
Get full text
Thesis -
11
Data Mining Analysis Of Chronic Kidney Disease (CKD) Level
Published 2022“…The CKD case study consists of clinical data records extracted from the UCI Machine Learning Repository domain. …”
Get full text
Get full text
Monograph -
12
Fuzzy Mixed Assembly Line Sequencing and Scheduling Optimization Model Using Multiobjective Dynamic Fuzzy GA
Published 2014“…Trapezoidal fuzzy numbers are implemented for variables such as operation and travelling time in order to generate results with higher accuracy and representative of real-case data. An improved genetic algorithm called fuzzy adaptive genetic algorithm (FAGA) is proposed in order to solve this optimization model. …”
Get full text
Get full text
Get full text
Article -
13
Features Extraction of Arabic Calligraphy using extended Triangle Model for Digital Jawi Paleography Analysis
Published 2013“…For further verification, two Supervised Machine Learning (SML) and three Unsupervised Machine Learning (UML) algorithms were experimented. …”
Get full text
Get full text
Article -
14
A Location-Based Fraud Detection in Shipping Industry Using Machine Learning Comparison Techniques
Published 2025Book chapter -
15
Malaysian license plate recognition system using Convolutional Neural Network (CNN) on web application / Nur Farahana Mahmud
Published 2022“…Nowadays, there are numerous license plate recognition systems that have been developed and analysed effectively by previous researchers using different machine learning algorithms. However, according to a recent study, ANN algorithms require a huge amount of training data while BPFFNN algorithms only have an average success rate of 70% in recognizing all the characters. …”
Get full text
Get full text
Student Project -
16
A comparative evaluation on data transformation approach for artificial speech detection
Published 2024“…Despite these advancements, Automatic Speaker Verification (ASV) systems remain vulnerable to spoofing, particularly with artificial speech generated swiftly using advanced speech synthesis and voice conversion algorithms. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
17
Raspberry Pi-Based Finger Vein Recognition System Using PCANet
Published 2018“…For classification, k-Nearest Neighbours (kNN) with Euclidean distance algorithm is implemented. An enhancement version for kNN algorithm, k-General Nearest Neighbours (kGNN) have been proposed at initial stage. …”
Get full text
Get full text
Monograph -
18
An ensemble of neural network and modified grey wolf optimizer for stock prediction
Published 2019“…Widespread models like Particle Swarm Optimization (PSO), Genetic Algorithm (GA), Ant Colony Optimization (ACO), Evolutionary Strategy (ES) and Population-Based Incremental Learning (PBIL) dealing with the specified problems are also explored and compared. …”
Get full text
Get full text
Thesis -
19
-
20
