Search Results - (( model evaluation drops algorithm ) OR ( _ identification task algorithm ))
Search alternatives:
- identification task »
- model evaluation »
- evaluation drops »
- _ identification »
- task algorithm »
-
1
Musical instrument identification using Convolutional Neural Network (CNN) algorithm / Muhammad Nur Azri Irfan Abdul Rahman
Published 2025“…Finally, the rigor of evaluation phase is carried out to evaluate the model utilizing precision, recall, F1 score, and the overall accuracy metrics which ascertained robustness and reliability for the model.…”
Get full text
Get full text
Thesis -
2
Machine learning methods for herschel-bulkley fluids in annulus: Pressure drop predictions and algorithm performance evaluation
Published 2020“…This study emphasizes on the performance evaluation of given algorithms and their pitfalls in predicting accurate pressure drop. …”
Get full text
Get full text
Article -
3
-
4
Markov-modulated Bernoulli-based performance analysis for BLUE algorithm under bursty and correlated traffics
Published 2024Conference Paper -
5
A Comparative of Two-Dimensional Statistical Moment Invariants Features in Formulating an Automated Probabilistic Machine Learning Identification Algorithm for Forensic Application
Published 2023“…Theseempiricalresults also conveyed that the superior proposed identification algorithm in this research could be developed as a mobile application for ballistics identification that can significantly reduce the time taken and conveniently perform the ballistics identification tasks.…”
Get full text
Get full text
Get full text
Article -
6
-
7
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Empirical cumulative distribution function (CDF) model is presented in evaluating the real traffic distribution. …”
Get full text
Get full text
Article -
8
Markov-modulated Bernoulli-based Performance Analysis for BLUE Algorithm under Bursty and Correlated Traffics
Published 2024“…The MMBP is used to replace the conventional and widely-used Bernoulli process (BP) in evaluating and proposing analytical models based on the BLUE algorithm. …”
Proceedings Paper -
9
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Empirical cumulative distribution function (CDF) model is presented in evaluating the real traffic distribution. …”
Get full text
Get full text
Thesis -
10
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…The algorithm simulates two important tasks that are frequently used by the human experts to identify summarizing strategies used to produce the summary sentences: 1) sentences relevance identification; and 2) summarizing strategies identification. …”
Get full text
Get full text
Thesis -
11
Benchmark simulator with dynamic environment for job scheduling in grid computing
Published 2014“…Characteristics of jobs and resources to be used in evaluating the performance of the scheduling algorithm must reflect the dynamic nature of real grid environment.Static models of jobs and resources cannot be used to generate jobs and resources in simulating the grid environment because of the dynamic nature of the grid.This paper presents a new graph representation of jobs and resources which is practical for hybrid metaheuristic model implementation such as ant colony optimization and genetic algorithm.A dynamic model that can generate jobs and resources similar to the jobs and resources in the real grid environment is also proposed.Jobs and resources may join in or drop out from the grid.Stochastic analysis is performed on the characteristics of jobs and resources.A simulator based on the dynamic expected time to compute, has been developed and can be used as a benchmark.The simulator can generate jobs and resources with the characteristics of jobs and resources in the real grid environment.This will facilitates the evaluation of dynamic job scheduling algorithm.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
A Robust Firearm Identification Algorithm of Forensic Ballistics Specimens
Published 2017“…There are several inherent difficulties in the existing firearm identification algorithms, include requiring the physical interpretation and time consuming. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Author Identification : Performance Comparison using English and Under-Resourced Languages
Published 2020“…This paper presents Author Identification (AI) task using different language which are English and Under-Resourced Languages (U-RL) (i.e. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Development of a Universal Artificial Neural Network Model for Pressure Loss Estimation in Pipeline Systems; A comparative Study
Published 2010“…This study aims to develop a universal artificial neural network model for estimating pressure drop at pipelines under multiphase flow conditions. …”
Get full text
Get full text
Conference or Workshop Item -
16
Identification of power poles based on satellite stereo images using graph-cut algorithm
Published 2015“…We incorporated the ordering constrain with Graph-Cut on stereo images to detect occlusion on stereo matching algorithm. This will increase the accuracy of the disparity map which is required task for identification of power poles near vegetation based on satellite stereo images. …”
Get full text
Get full text
Conference or Workshop Item -
17
Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm
Published 2020“…Recently, several studies showed that the brain electrical activity or electroencephalogram (EEG) signals provide unique features that can be considered as user identification techniques. But, it is a challenging task where there are three important things must be addressed carefully in any EEG-based person identification. …”
Get full text
Get full text
Thesis -
18
Author identification for under-resourced language Kadazandusun
Published 2020“…This paper presents the task of Author Identification for KadazanDusun language by using tweets as the source of data to perform Author Identification task of short text on KadazanDusun, which is considered as one the under-resourced language in Malaysia. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Complex word identification model for lexical simplification in the Malay language for non-native speakers
Published 2023“…Lexical Simplification (LS), a method in TS, is the task of converting words into simpler words. Past studies have shown weaknesses in the LS first task, called Complex Word Identification (CWI), where simple and complex words have been misidentified in previous CWI model. …”
Get full text
Get full text
Get full text
Thesis -
20
Identification of power poles based on satellite stereo images using graph-cut algorithm
Published 2015“…We incorporated the ordering constrain with Graph-Cut on stereo images to detect occlusion on stereo matching algorithm. This will increase the accuracy of the disparity map which is required task for identification of power poles near vegetation based on satellite stereo images. …”
Get full text
Get full text
Conference or Workshop Item
