Search Results - (( _ distribution among algorithm ) OR ( user evaluation model algorithm ))
Search alternatives:
- distribution among »
- among algorithm »
- user evaluation »
- model algorithm »
-
1
Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio...
Published 2023“…Comparing this developed algorithm with other algorithms shows its superiority in multi-objective optimization (MOO) evaluation metrics. …”
Get full text
Get full text
Thesis -
2
Current Developments In Lte/Lte-Advanced : Adaptive-Proportional Fair Scheduling In Lte
Published 2015“…The proportional fair scheduling (PFS) algorithm is mainly focused on bandwidth allocation criterion in LTE networks for supporting high resource utilization while maintaining high fairness among network flows to each distributed User Equipment (UE). …”
Get full text
Get full text
Get full text
Article -
3
Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System
Published 2010“…In short, our main contributions are outlined new key taxonomy for the semantic-based grid RD studies; an interoperable semantic description RD component model for intergrid services metadata representation; a semantic distributed registry architecture for indexing service metadata; and an agent-based service search and selection algorithm. …”
Get full text
Get full text
Thesis -
4
Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System
Published 2010“…In short, our main contributions are outlined new key taxonomy for the semantic-based grid RD studies; an interoperable semantic description RD component model for intergrid services metadata representation; a semantic distributed registry architecture for indexing service metadata; and an agent-qased service search and selection algorithm. …”
Get full text
Get full text
Thesis -
5
Dynamic approaches for spectrum control in cognitive radio networks
Published 2015“…The second solution assumes the autonomy of secondary users where the decision to update transmiss on power is distributed among users. …”
Get full text
Get full text
Thesis -
6
Analyzing customer reviews for ARBA Travel using sentiment analysis
Published 2025“…Three machine learning algorithms which are Naive Bayes, Logistic Regression, and Support Vector Machine, were implemented and evaluated using cross-validation and performance metrics such as accuracy, precision, recall, and F1- score. …”
Get full text
Get full text
Student Project -
7
Local and global measures for measuring performance of big data analytics process
Published 2019“…Based on the feedback of the experts, the questionnaire and the model were revised. The final survey which was distributed consisted of 48 questions. …”
Get full text
Get full text
Thesis -
8
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Subsequently, an experimental evaluation of the proposed Multi-Filter Feature Selection (M2FS) method is performed by using the benchmark dataset, NSL-KDD and employed the J48 classification algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Recommendation System Model For Decision Making in the E-Commerce Application
Published 2024thesis::doctoral thesis -
10
Performance evaluation of vertical handoff in fourth generation (4G) networks model
Published 2009Get full text
Working Paper -
11
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…The OPNET simulator and the mathematical model were used to evaluate the performance for the proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
12
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…This is difTerent from existing Interactive Genetic Algorithm in which selection and evaluation of solutions is done by the users. …”
Get full text
Get full text
Thesis -
13
FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources
Published 2026“…We have evaluated the FaaSBid model and the proposed algorithms and pricing model by comparing with a number of existing models and algorithms using real-world datasets. …”
Get full text
Get full text
Get full text
Article -
14
Agent-based extraction algorithm for computational problem solving
Published 2015“…Four agents have been proposed as an agent based model for CPS, which are User_Agent, PAC_Agent, IPO_Agent and Algorithm_Agent. …”
Get full text
Get full text
Thesis -
15
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
Get full text
Get full text
Get full text
Thesis -
16
Predicting user trajectories using deep learning algorithms / Ahmad Zaki Aiman Abdul Rashid, Azita Laily Yusof and Norsuzila Ya’acob
Published 2025“…These conclude that LSTM model are the most suitable model for predicting user trajectories among DL algorithms. …”
Get full text
Get full text
Get full text
Article -
17
An improved recommender system based on normalization of matrix factorization and collaborative filtering algorithms
Published 2015“…There is a technique known as normalization which develops models like user involvement in subject matter or user likeness according to the details of item to predict ratings to user. …”
Get full text
Get full text
Thesis -
18
A conceptual model for the E-commerce application recommendation framework using exploratory search
Published 2024journal::journal article -
19
User to user topic recommendation model for student social interaction
Published 2025“…Hence, it is important to have a recommender system that suggested to solve these issues by recommending mutual topics for supporting social interactions and focusing on user-user relationship. This study focuses on developing a User to User Topic Recommendation Model for Student Social Interaction (TReSIT). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis
