Search Results - (( model evaluation _ algorithm ) OR ( shape identification task algorithm ))*
Search alternatives:
- shape identification »
- identification task »
- model evaluation »
- task algorithm »
-
1
Text independent speaker identification using gaussian mixture model
Published 2007“…In this work, the GMM is evaluated on TI Speaker ID task via series of experiments (model convergence, effect of feature set, number of Gaussian components, and training utterance length on identification rate). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning
Published 2016“…Most of the existing plant identification methods are based on both the global shape features and the intact plant leaves. …”
Get full text
Get full text
Thesis -
3
Zero distortion-based steganography for handwritten signature
Published 2018“…Thus, developing a steganographic algorithm to use cover media (c) without raising attention is the most challenging task in data hiding. …”
Get full text
Get full text
Get full text
Thesis -
4
Classification of Citrus (Rutaceae) by Using Image Processing
Published 2019“…A machine learning algorithms, SVM have been used to build species identification models. …”
Get full text
Get full text
Undergraduate Final Project Report -
5
Comparison of fully automated and semi-automated methods for species identification
Published 2018“…The process of manual species identification is a daunting task, so much so that the number of taxonomists is seen to be declining. …”
Get full text
Get full text
Article -
6
A New Swarm-Based Framework for Handwritten Authorship Identification in Forensic Document Analysis
Published 2014“…This chapter instead focuses on identifying the unique individual significant features of word shape by using feature selection method prior the identification task. …”
Get full text
Get full text
Book Chapter -
7
A new swarm-based framework for handwritten authorship identification in forensic document analysis
Published 2014“…This chapter instead focuses on identifying the unique individual significant features of word shape by using feature selection method prior the identification task. …”
Get full text
Get full text
Book Chapter -
8
Evaluation of MLP-ANN Training Algorithms for Modeling Soil Pore-Water Pressure Responses to Rainfall
Published 2013“…The performance of four artificial neural network (ANN) training algorithms was evaluated to identify the training algorithm appropriate for modeling the dynamics of soil pore-water pressure responses to rainfall patterns using multilayer perceptron (MLP) ANN. …”
Get full text
Get full text
Citation Index Journal -
9
Image segmentation method for boundary detection of breast thermography using random walkers
Published 2013“…In breast thermography the lack of defined edges on the upper boundaries of the breast and the fact that breasts have different shape, size and characteristics even between breasts of a single individual, makes segmentation of breasts a difficult task for most segmentation methods. …”
Get full text
Get full text
Thesis -
10
Neural Networks Ensemble: Evaluation of Aggregation Algorithms for Forecasting
Published 2013“…The outputs from the individual NN models were combined by four different aggregation algorithms in NNs ensemble. …”
Get full text
Get full text
Thesis -
11
Diagnosis and recommender system for diabetes patient using decision tree / Nurul Aida Mohd Zamary
Published 2024“…To evaluate the model, the model accuracy, precision, recall, F1- score, and confusion matrix were used. …”
Get full text
Get full text
Thesis -
12
Analytical Study Of Machine Learning Models For Stock Trading In Malaysian Market
Published 2024“…Therefore, this study focused to contribute on evaluating different algorithm models such as traditional ML and deep learning models with big stock data of multiple parameters from selected companies in Bursa Malaysia. …”
thesis::master thesis -
13
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
Get full text
Get full text
Get full text
Thesis -
14
Unifying the evaluation criteria of many objectives optimization using fuzzy Delphi method
Published 2021“…Lastly, the most suitable criteria outcomes are formulated in the unifying model and evaluate by experts to verify the appropriateness and suitability of the model in assessing the MaOO algorithms fairly and effectively.…”
Get full text
Get full text
Article -
15
-
16
Evaluation of the Transfer Learning Models in Wafer Defects Classification
Published 2022Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Neural network ensemble: Evaluation of aggregation algorithms in electricity demand forecasting
Published 2013“…These algorithms include equal-weights combination of Best NN models, combination of trimmed forecasts, and Bayesian Model Averaging (BMA). …”
Get full text
Get full text
Conference or Workshop Item -
18
Neural network ensemble: Evaluation of aggregation algorithms in electricity demand forecasting
Published 2013“…These algorithms include equal-weights combination of Best NN models, combination of trimmed forecasts, and Bayesian Model Averaging (BMA). …”
Get full text
Get full text
Conference or Workshop Item -
19
Neural network ensemble: Evaluation of aggregation algorithms in electricity demand forecasting
Published 2013“…These algorithms include equal-weights combination of Best NN models, combination of trimmed forecasts, and Bayesian Model Averaging (BMA). …”
Get full text
Get full text
Conference or Workshop Item -
20
Multistep forecasting for highly volatile data using new algorithm of Box-Jenkins and GARCH
Published 2018“…The study of the multistep ahead forecast is significant for practical application purposes using the proposed statistical model. This study is proposing a new algorithm of Box-Jenkins and GARCH (or BJ-G) in evaluating the multistep forecasting performance of the BJ-G model for highly volatile time series data. …”
Get full text
Get full text
Conference or Workshop Item
