<?xml version="1.0" encoding="UTF-8"?>
<item xmlns="http://omeka.org/schemas/omeka-xml/v5" itemId="20262" public="1" featured="0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://omeka.org/schemas/omeka-xml/v5 http://omeka.org/schemas/omeka-xml/v5/omeka-xml-5-0.xsd" uri="https://archives.christuniversity.in/items/show/20262?output=omeka-xml" accessDate="2026-04-17T11:19:57+00:00">
  <collection collectionId="16">
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="51377">
                <text>Conference Papers</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </collection>
  <itemType itemTypeId="28">
    <name>Conference Paper</name>
    <description>Faculty Publications- Conference Papers</description>
  </itemType>
  <elementSetContainer>
    <elementSet elementSetId="1">
      <name>Dublin Core</name>
      <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
      <elementContainer>
        <element elementId="50">
          <name>Title</name>
          <description>A name given to the resource</description>
          <elementTextContainer>
            <elementText elementTextId="179256">
              <text>A Comparative Investigation on the use of Machine Learning Techniques for Currency Authentication</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="49">
          <name>Subject</name>
          <description>The topic of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="179257">
              <text>Currency Authentication; Data mining; K-means clustering; Random Forest; Support Vector Machine; unsupervised learning. Supervised Learning</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="41">
          <name>Description</name>
          <description>An account of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="179258">
              <text>In the present banking sector, identifying the real and the fake note is a very challenging task because if we do it manually, it takes a long time to check which is real and which is fake. This research study article aims to authenticate the money between real and fake by using different machine algorithms facilitating learning, such as K-means Clustering, Random Forest Classification, Support Vector Machines, and logistics Regression. Specifically, we consider the banknote dataset. The data of money is extracted from various banknote images by using the wavelet transform tool, which is primarily used to remove elements from the images. However, we are mainly concerned with the different machine learning algorithms, so we take the two variables, where the first variable indicates image variance and the second indicates image skewness. We use these two variables to train our machine learning algorithms. So, majorly, by applying the different machine learning algorithms, which are supervised and unsupervised, we find the accuracy for the respective machine learning algorithms and then visualize and classify the real and fake notes separately. Finally, the prediction is based on integrity, which means the efficiency value is based on how much the mechanism system can uncover the fake notes. Then, after calculating the accuracy of currency authentication, there is a high possibility that the accuracy of the particular algorithm is the best algorithm, so the application of currency authentication will be very useful for the bank to easily find duplicate notes.   2022 IEEE.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="39">
          <name>Creator</name>
          <description>An entity primarily responsible for making the resource</description>
          <elementTextContainer>
            <elementText elementTextId="179259">
              <text>Sharma A.; Prathap B.R.; Hussain J.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="48">
          <name>Source</name>
          <description>A related resource from which the described resource is derived</description>
          <elementTextContainer>
            <elementText elementTextId="179260">
              <text>2022 1st International Conference on Artificial Intelligence Trends and Pattern Recognition, ICAITPR 2022</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="45">
          <name>Publisher</name>
          <description>An entity responsible for making the resource available</description>
          <elementTextContainer>
            <elementText elementTextId="179261">
              <text>Institute of Electrical and Electronics Engineers Inc.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="40">
          <name>Date</name>
          <description>A point or period of time associated with an event in the lifecycle of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="179262">
              <text>2022-01-01</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="43">
          <name>Identifier</name>
          <description>An unambiguous reference to the resource within a given context</description>
          <elementTextContainer>
            <elementText elementTextId="179263">
              <text>&lt;a href="https://doi.org/10.1109/ICAITPR51569.2022.9844207" target="_blank" rel="noreferrer noopener"&gt;https://doi.org/10.1109/ICAITPR51569.2022.9844207&lt;/a&gt;
&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.scopus.com/inward/record.uri?eid=2-s2.0-85136824363&amp;amp;doi=10.1109%2FICAITPR51569.2022.9844207&amp;amp;partnerID=40&amp;amp;md5=ffe960edb89ad4b8cf47f920e915bdc8" target="_blank" rel="noreferrer noopener"&gt;https://www.scopus.com/inward/record.uri?eid=2-s2.0-85136824363&amp;amp;doi=10.1109%2fICAITPR51569.2022.9844207&amp;amp;partnerID=40&amp;amp;md5=ffe960edb89ad4b8cf47f920e915bdc8&lt;/a&gt;</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="47">
          <name>Rights</name>
          <description>Information about rights held in and over the resource</description>
          <elementTextContainer>
            <elementText elementTextId="179264">
              <text>Restricted Access</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="46">
          <name>Relation</name>
          <description>A related resource</description>
          <elementTextContainer>
            <elementText elementTextId="179265">
              <text>ISBN: 978-166542521-6</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="42">
          <name>Format</name>
          <description>The file format, physical medium, or dimensions of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="179266">
              <text>Online</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="44">
          <name>Language</name>
          <description>A language of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="179267">
              <text>English</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="51">
          <name>Type</name>
          <description>The nature or genre of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="179268">
              <text>Conference paper</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="38">
          <name>Coverage</name>
          <description>The spatial or temporal topic of the resource, the spatial applicability of the resource, or the jurisdiction under which the resource is relevant</description>
          <elementTextContainer>
            <elementText elementTextId="179269">
              <text>Sharma A., CHRIST(Deemed to Be University), Computer Science and Engineering, Bangalore, India; Prathap B.R., CHRIST(Deemed to Be University), Computer Science and Engineering, Bangalore, India; Hussain J., CHRIST(Deemed to Be University), Computer Science and Engineering, Bangalore, India</text>
            </elementText>
          </elementTextContainer>
        </element>
      </elementContainer>
    </elementSet>
  </elementSetContainer>
</item>
