Search Results - (( _ distribution using algorithm ) OR ( user relation between algorithm ))
Search alternatives:
- between algorithm »
- relation between »
- using algorithm »
- user relation »
-
1
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…An experiment was carried out, and the results collected were analyzed using a nonparametric statistical test, the Mann-Whitney U test, which indicates the level of significance between the distributions of data collection. …”
Get full text
Get full text
Get full text
Thesis -
2
Polarization imaging for face spoofing detection: identification of black ethnical group
Published 2018“…The bimodality coefficient (BC) algorithm is then applied to study the distributions modality. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Improvement of a Dynamic Frequency Hopping Optical Code Division Multiple Access System Using Power Control Method
Published 2009“…The unequal power distribution among users leads to unequal performance for them. …”
Get full text
Get full text
Thesis -
4
Binary vote assignment on grid quorum replication technique with association rule
Published 2018“…First step is mining the data by using Apriori algorithm from Association Rules. It is used to discover the correlation between data. …”
Get full text
Get full text
Thesis -
5
Join query enhancement processing (jqpro) with big rdf data on a distributed system using hashing-merge join technique
Published 2021“…Both processes were sorted by algorithms on join attributes and the sorted relations was merged. …”
Get full text
Get full text
Thesis -
6
Enhancing location estimation accuracy by utilizing time difference of arrival techniques for wireless network
Published 2020“…Although Global Positioning System (GPS) is the most recognized and widely used positioning system, it has limitations to identify the user’s location, particularly to outdoor location and forest/mountain area. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
A Rule Extraction Algorithm That Scales Between Fidelity and Comprehensibility
Published 2012“…However, these two measures are found to be inverse relations of one another. Since the needs of comprehensibility or fidelity may vary depending on the user or application, this paper presented a significance based rule extraction algorithm that allows a user set parameter to scale between the desired degree of fidelity and comprehensibility of the rules extracted. …”
Get full text
Get full text
Get full text
Article -
8
A modified π rough k-means algorithm for web page recommendation system
Published 2018“…Secondly, a modified πRKM algorithm is proposed to partition the user session data. …”
Get full text
Get full text
Get full text
Thesis -
9
The shortest route of the potential companies for internship using Dijkstra’s Algorithm / Mohamad Khairul Ikhwan Mohd Radzi
Published 2017“…In other words, dijkstra algorithm used to find the best route to arrive at the every company that are related for this project. …”
Get full text
Get full text
Thesis -
10
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…Although the key generator is distributed among the authority nodes, the decision to generate user credential is based on a single decision. …”
Get full text
Get full text
Thesis -
11
Design and development of the network interface, packets scheduling and interference mitigation schemes for LTE-based femtocell networks / Sinan Ghassan Abid Ali
Published 2016“…The proposed RBP scheduling algorithm outperforms the well-known scheduling algorithms in terms of a lower PLR among users in the LTE based femtocell network. …”
Get full text
Get full text
Thesis -
12
A Theoretical Framework for Big Data Analytics Based on Computational Intelligent Algorithms with the Potential to Reduce Energy Consumption
Published 2019“…The transmission of big data between service providers, users and data centres emits carbon dioxide as a result of high power consumption. …”
Get full text
Get full text
Article -
13
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
14
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…Everyday, more contents related to social media are generated by social media users (e.g., Facebook, Twitter). …”
Get full text
Get full text
Article -
15
Energy-efficient power allocation for downlink non orthogonal multiple access networks based on game theory and genetic algorithm / Reem Mustafa Mah’d Al Debes
Published 2025“…The proposed method achieves a 75% enhancement in energy efficiency compared to conventional Orthogonal Multiple Access (OMA) and an 11% improvement over benchmark NOMA algorithms. Additionally, it reduces outage probability by 25% and 10% relative to OMA and existing NOMA algorithms, respectively. …”
Get full text
Get full text
Get full text
Thesis -
16
A theoretical framework for big data analytics based on computational intelligent algorithms with the potential to reduce energy consumption
Published 2019“…The transmission of big data between service providers, users and data centres emits carbon dioxide as a result of high power consumption. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Book Chapter -
17
Developing an intelligent user manager system for controlling smart school network resources
Published 2002“…The proposed system was modelled using Fuzzy Logic algorithms for simulation purposes in order to find the relationship between two fuzzy sets with the computed allocated time.…”
Get full text
Get full text
Get full text
Article -
18
Ensemble divide and conquer approach to solve the rating scores’ deviation in recommendation system
Published 2016“…The singular value decomposition algorithm predicts the unknown rating scores based on the relation between the implicit feedback of both users and items, but exploiting neither the user similarity nor item similarity which leads to low accuracy predictions. …”
Get full text
Get full text
Get full text
Article -
19
Optimal location and size estimation of distributed generators by employing grouping particle swarm optimization and grouping genetic algorithm
Published 2017“…These algorithms are used to obtain the optimal size of distributed generators units to be installed at optimal locations, which are obtained using loss sensitivity factor. …”
Get full text
Get full text
Thesis -
20
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…Everyday, more contents related to social media are generated by social media users (e.g., Facebook, Twitter). …”
Get full text
Get full text
Get full text
Get full text
Article
