Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Foundation of identification authentication

Supervised methods rely on some prior training of the system with objects known to belong to the class they define. Such methods can be of the discriminant or modeling types.11 Discriminant methods split the pattern space into as many regions as the classes encompassed by the training set and establish bounds that are shared by the spaces. These methods always classify an unknown sample as a specific class. The most common discriminant methods include discriminant analysis (DA),12 the K-nearest neighbor [Pg.366]

Not every PRM is suitable for constructing spectral identification libraries. These are usually compiled by using supervised modeling methods, and unknown samples are identified with those classes they resemble most. [Pg.367]


See other pages where Foundation of identification authentication is mentioned: [Pg.366]   


SEARCH



Authenticity

Foundations

© 2024 chempedia.info