Search Results - (( model validation tree algorithm ) OR ( user identification matching algorithm ))
Search alternatives:
- identification matching »
- user identification »
- validation tree »
- tree algorithm »
-
1
Online fingerprint recognition
Published 2010“…For minutiae matching, the matching algorithm has been developed. …”
Get full text
Get full text
Undergraduates Project Papers -
2
PERSON IDENTIFICATION BASED ON MULTIMODAL BIOMETRIC RECOGNITION
Published 2020“…In the process of fingerprint recognition, the ORB algorithm is recommended to use in feature matching. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
3
Fingerprint recognition system
Published 2005“…Fingerprint recognition is the oldest method which has been used in numerous applications for identification purpose in many social conditions such as access control and crime investigation.Now a day,in the era of technology the system is still using the password or smart card as an identity character for identification purpose.The problems happen when user forgot their password or lost their smart card. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Laptop price prediction using decision tree algorithm / Nurnazifah Abd Mokti
Published 2024“…This research project focuses on developing a laptop price prediction model using the decision tree algorithm based on laptop specifications. …”
Get full text
Get full text
Thesis -
5
-
6
Hyper-Heuristic Evolutionary Approach for Constructing Decision Tree Classifiers
Published 2021“…Classification and Regression Tree (CART) algorithm is one of the renowned decision tree induction algorithms to address the classification as well as regression problems. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
DEVELOPMENT OF IRIS RECOGNITION SYSTEM
Published 2016“…This project implements an iris recognition algorithm as a biometric identification. There is a need for reliable and security identification since typical identification methods using identity cards, passwords, and user name possess threats to the security of an organization because of human error. …”
Get full text
Get full text
Final Year Project -
8
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
9
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
Get full text
Get full text
Thesis -
10
BMTutor research design: Malay sentence parse tree visualization
Published 2014“…As a result of the lack of models and algorithms have been introduced in both parsers, the model and algorithm development phase is introduced in the design of BMTutor.Output from the development process shows that the prototype is able to provide sentence correction for all 15 invalid sentences and can produce parse tree visualizations for all 20 sentences used for prototype testing.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
State of charge estimation for lithium-ion battery based on random forests technique with gravitational search algorithm
Published 2023Conference Paper -
12
Photogrammetric unmanned aerial vehicle for digital terrain model estimation under oil palm tree canopy area / Suzanah Abdullah
Published 2021“…At this stage, this study has formulated a new methodology for estimating DTM production under tree canopy conditions based on tree crown estimation produced from the digital surface model (DSM) and subsequently, the tree height estimation was determined as the final process in the DTM implementation. …”
Get full text
Get full text
Thesis -
13
Prediction of Machine Failure by Using Machine Learning Algorithm
Published 2019“…Validation for the model is analyzed by using validation testing data and cross validation. …”
Get full text
Get full text
Final Year Project -
14
-
15
Context identification of scientific papers via agent-based model for text mining (ABM-TM)
Published 2023“…A user provides the agent with keywords and assigns a threshold value for each given keyword, the agent in turn attempts to find papers that match the keywords within a defined threshold. …”
Article -
16
-
17
A prototype for context identification of scientific papers via agent-based text mining
Published 2023Conference Paper -
18
Predicting Student Performance in Object Oriented Programming Using Decision Tree : A Case at Kolej Poly-Tech Mara, Kuantan
Published 2013“…Using 10-fold cross validation for each algorithm, it was found that decision tree was the best algorithm with 83.6944% correctness. …”
Get full text
Get full text
Conference or Workshop Item -
19
A novel ensemble decision tree-based CHi-squared Automatic Interaction Detection (CHAID) and multivariate logistic regression models in landslide susceptibility mapping
Published 2014“…Then, the inventory was randomly split into two datasets, 70 % was used for training the models, and the remaining 30 % was used for validation purpose. …”
Get full text
Get full text
Article -
20
A corrosion prediction model for oil and gas pipeline using CMARPGA
Published 2016“…This proposed prediction model named CMARGA is then enhanced by using genetic algorithm in order build an optimum decision tree. …”
Get full text
Get full text
Conference or Workshop Item
