Search Results - (( based evaluation method algorithm ) OR ( online information system algorithm ))

Refine Results
  1. 1

    Content-based recommender system for an academic social network / Vala Ali Rohani by Vala Ali, Rohani

    Published 2014
    “…In this study, a new algorithm is proposed to represent an enhanced version of content-based recommender systems by utilizing social networking features. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    Analysis of Travellers’ Online Reviews in Social Networking Sites Using Fuzzy Logic Approach by Nilashi, Mehrbakhsh, Yadegaridehkordi, Elaheh, Ibrahim, Othman, Samad, Sarminah, Ahani, Ali, Sanzogni, Louis

    Published 2019
    “…We extend the crisp-based multi-criteria algorithms to fuzzy-based multi-criteria algorithms for finding the similarities between the travellers based on their provided ratings. …”
    Get full text
    Get full text
    Article
  6. 6

    Adaptive method to improve web recommendation system for anonymous users by Almurtadha, Yahya Mohammed

    Published 2011
    “…This research proposed two web page recommendation systems. The first is iPACT, an improved recommendation system based on PACT methodology to demonstrate the prediction accuracy of the proposed enhanced classification algorithm in this research. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Comparison on machine learning algorithm to fast detection of malicious web pages by Wan Nurul Safawati, Wan Manan, Mohd Nizam, Mohmad Kahar, Noorlin, Mohd Ali

    Published 2021
    “…Compared to several decision tree method, Random Forest has shown promising and higher sensitivity result towards malicious data which is 98.3% compared to other classification algorithm…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Evaluation of the effectiveness and efficiency of MASER and Bigram methods in retrieving Hadith documents / Mohd Yusof Mohd Zain by Mohd Zain, Mohd Yusof

    Published 2004
    “…Current technology features allow Internet users to retrieve any documents that are available from online databases. The main issue in this information age is the efficiency and effectiveness of the retrieval system that can be used by the information provider. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Framework for stream clustering of trajectories based on temporal micro clustering technique by Abdulrazzaq, Musaab Riyadh

    Published 2018
    “…The stream clustering stage consists of two phases: the online and the offline phases. In the online phase, the stream clustering algorithm for trajectories based on the lifespan of the cluster is proposed (CC_TRS) to overcome the limitations of the time window technique. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Local-based stereo matching algorithm using multi-cost pyramid fusion, hybrid random aggregation and hierarchical cluster-edge refinement by Kadmin, Ahmad Fauzan

    Published 2023
    “…In this thesis, the accuracy of the proposed algorithm was evaluated using two standard online benchmarking database systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Image and translated Al-Quran verses retrieval system using thesaurus approach based on Malay query words / Mohd Zaini Mat Abas by Mat Abas, Mohd Zaini

    Published 2001
    “…As well as Malay language, conflation methods such as string-similarity method and stemming algorithms have been applied to Malay documents retrieval system. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Online system identification development based on recursive weighted least square neural networks of nonlinear hammerstein and wiener models. by Kwad, Ayad Mahmood

    Published 2022
    “…This research introduces a developed method for online system identification based on the Hammerstein and Wiener nonlinear block-oriented structure with the artificial neural networks (NN) advantages and recursive weighted least squares algorithm for optimizing neural network learning in real-time. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Vader lexicon and support vector machine algorithm to detect customer sentiment orientation by Vivine Nurcahyawati, ., Zuriani, Mustaffa

    Published 2023
    “…To accomplish this, a dataset from the Amazon website will be analyzed and classified using the Support Vector Machine algorithm. The objective of this method is to determine the level of customer orientation present within the dataset. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    An Artificial Intelligence-Based Knowledge Management System for Outcome-Based Education Implementing in Higher Education Institutions by Gerhana, Yana Aditia

    Published 2025
    “…The Bert2Bert model is used in the multi-document summarisation of Indonesian language knowledge in the knowledge combination process. Recommendation system on learning analysis was implemented in a hybrid algorithm combines Rule-based and Content-based filtering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    From Employees to Entrepreneurs: A Qualitative Exploration of Career Transitions in Ghana by Gerhana, Yana Aditia

    Published 2025
    “…The Bert2Bert model is used in the multi-document summarisation of Indonesian-language knowledge in the knowledge combination process. Recommendation system on learning analysis was implemented in a hybrid algorithm combines Rule-based and Content-based filtering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…(iii) To evaluate the usability performance of the developed GPS-Based Physical Identity and Access Management (PIAM) System by using the System Usability Scale (SUS) approach. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  18. 18

    Depression Detection Based on Features of Depressive Behaviour Through Social Media Analytic: A Systematic Literature Review by Mat Ripah N.A., Abdul Latif A., Che Cob Z., Mohd Drus S., Md Anwar R., Mohd Radzi H.

    Published 2024
    “…This research was carried out as a Systematic Literature Review (SLR), a method of locating, evaluating, and interpreting publicly available materials to answer a set of research questions. …”
    Conference Paper
  19. 19

    Postal address handwritten recognition using convolutional neural network / Nur Hasyimah Abd Aziz by Abd Aziz, Nur Hasyimah

    Published 2020
    “…Functionality test was done in order to evaluate the system. The result of the functionality test is most of the user are satisfy with the system. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The formal verification is performed using BAN logic to prove the security and mutual authentications. The evaluation of the security of the proposed scheme is based on SVO logic to verify the security of the informal method. …”
    Get full text
    Get full text
    Thesis