Search Results - (( based evaluation method algorithm ) OR ( online information system algorithm ))
Search alternatives:
- online information »
- information system »
- based evaluation »
- method algorithm »
- system algorithm »
-
1
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…In this study, a new algorithm is proposed to represent an enhanced version of content-based recommender systems by utilizing social networking features. …”
Get full text
Get full text
Thesis -
2
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. …”
Get full text
Get full text
Thesis -
3
Recommendation System Model For Decision Making in the E-Commerce Application
Published 2024thesis::doctoral thesis -
4
Feature selection methods application towards a new dataset based on online student activities / Muhammad Hareez Mohd Zaki ... [et al.]
Published 2023“…The dataset's features are based on online students’ activities during e-learning. …”
Get full text
Get full text
Article -
5
Analysis of Travellers’ Online Reviews in Social Networking Sites Using Fuzzy Logic Approach
Published 2019“…We extend the crisp-based multi-criteria algorithms to fuzzy-based multi-criteria algorithms for finding the similarities between the travellers based on their provided ratings. …”
Get full text
Get full text
Article -
6
Adaptive method to improve web recommendation system for anonymous users
Published 2011“…This research proposed two web page recommendation systems. The first is iPACT, an improved recommendation system based on PACT methodology to demonstrate the prediction accuracy of the proposed enhanced classification algorithm in this research. …”
Get full text
Get full text
Thesis -
7
Comparison on machine learning algorithm to fast detection of malicious web pages
Published 2021“…Compared to several decision tree method, Random Forest has shown promising and higher sensitivity result towards malicious data which is 98.3% compared to other classification algorithm…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Evaluation of the effectiveness and efficiency of MASER and Bigram methods in retrieving Hadith documents / Mohd Yusof Mohd Zain
Published 2004“…Current technology features allow Internet users to retrieve any documents that are available from online databases. The main issue in this information age is the efficiency and effectiveness of the retrieval system that can be used by the information provider. …”
Get full text
Get full text
Thesis -
9
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…The stream clustering stage consists of two phases: the online and the offline phases. In the online phase, the stream clustering algorithm for trajectories based on the lifespan of the cluster is proposed (CC_TRS) to overcome the limitations of the time window technique. …”
Get full text
Get full text
Thesis -
10
Mobility-aware Offloading Decision For Multi-access Edge Computing In 5g Networks
Published 2024journal::journal article -
11
Local-based stereo matching algorithm using multi-cost pyramid fusion, hybrid random aggregation and hierarchical cluster-edge refinement
Published 2023“…In this thesis, the accuracy of the proposed algorithm was evaluated using two standard online benchmarking database systems. …”
Get full text
Get full text
Get full text
Thesis -
12
Image and translated Al-Quran verses retrieval system using thesaurus approach based on Malay query words / Mohd Zaini Mat Abas
Published 2001“…As well as Malay language, conflation methods such as string-similarity method and stemming algorithms have been applied to Malay documents retrieval system. …”
Get full text
Get full text
Thesis -
13
Online system identification development based on recursive weighted least square neural networks of nonlinear hammerstein and wiener models.
Published 2022“…This research introduces a developed method for online system identification based on the Hammerstein and Wiener nonlinear block-oriented structure with the artificial neural networks (NN) advantages and recursive weighted least squares algorithm for optimizing neural network learning in real-time. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Vader lexicon and support vector machine algorithm to detect customer sentiment orientation
Published 2023“…To accomplish this, a dataset from the Amazon website will be analyzed and classified using the Support Vector Machine algorithm. The objective of this method is to determine the level of customer orientation present within the dataset. …”
Get full text
Get full text
Get full text
Article -
15
An Artificial Intelligence-Based Knowledge Management System for Outcome-Based Education Implementing in Higher Education Institutions
Published 2025“…The Bert2Bert model is used in the multi-document summarisation of Indonesian language knowledge in the knowledge combination process. Recommendation system on learning analysis was implemented in a hybrid algorithm combines Rule-based and Content-based filtering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
From Employees to Entrepreneurs: A Qualitative Exploration of Career Transitions in Ghana
Published 2025“…The Bert2Bert model is used in the multi-document summarisation of Indonesian-language knowledge in the knowledge combination process. Recommendation system on learning analysis was implemented in a hybrid algorithm combines Rule-based and Content-based filtering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…(iii) To evaluate the usability performance of the developed GPS-Based Physical Identity and Access Management (PIAM) System by using the System Usability Scale (SUS) approach. …”
Get full text
Get full text
Get full text
Academic Exercise -
18
Depression Detection Based on Features of Depressive Behaviour Through Social Media Analytic: A Systematic Literature Review
Published 2024“…This research was carried out as a Systematic Literature Review (SLR), a method of locating, evaluating, and interpreting publicly available materials to answer a set of research questions. …”
Conference Paper -
19
Postal address handwritten recognition using convolutional neural network / Nur Hasyimah Abd Aziz
Published 2020“…Functionality test was done in order to evaluate the system. The result of the functionality test is most of the user are satisfy with the system. …”
Get full text
Get full text
Thesis -
20
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The formal verification is performed using BAN logic to prove the security and mutual authentications. The evaluation of the security of the proposed scheme is based on SVO logic to verify the security of the informal method. …”
Get full text
Get full text
Thesis
