Search Results - (( course evaluation max algorithm ) OR ( among information system algorithm ))
Search alternatives:
- information system »
- course evaluation »
- among information »
- system algorithm »
- evaluation max »
- max algorithm »
-
1
Performance analysis of resource allocation downlink for MIMO-OFDMA system using greedy algorithm / Azrinawati Samaon
Published 2016“…The proposed algorithm shows comparison between the noise to sub-channel ratio and power allocation among of data sub-channel for 25, 75 and 100 users. …”
Get full text
Get full text
Thesis -
2
Comparison of hidden Markov Model and Naïve Bayes algorithms among events in smart home environment
Published 2014“…The implementation has been carried out in such a way that quality information is acquired among the systems to demonstrate the effectiveness of decision making among events in the smart home environment.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Talent classification using support vector machine technique / Hamidah Jantan, Norazmah Mat Yusof and Mohd Hanapi Abdul Latif
Published 2014“…Besides, classification and prediction are among the popular tasks in machine learning especially for information elicitation. …”
Get full text
Get full text
Research Reports -
4
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
5
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The situation, however, leads to a great challenge in terms of information overload among social network users. Recommender systems (RSs) alleviate this problem with a technique that suggests relevant information from the abundance of Web data by considering the user’s previous preference. …”
Get full text
Get full text
Thesis -
6
Revisit of statistical selection algorithm for peer-to-peer system
Published 2008Get full text
Get full text
Conference or Workshop Item -
7
Reconstruction Algorithm In Ofdm System
Published 2017“…Channel estimation (CE) in OFDM system is compulsory to obtain the channel state information (CSI) at the receiver. …”
Get full text
Get full text
Monograph -
8
Ant colony optimization algorithm for dynamic scheduling of jobs in computational grid
Published 2012“…Job scheduling problem is classified as an NP-hard problem.Such a problem can be solved only by using approximate algorithms such as heuristic and meta-heuristic algorithms.Among different optimization algorithms for job scheduling, ant colony system algorithm is a popular meta-heuristic algorithm which has the ability to solve different types of NP-hard problems.However, ant colony system algorithm has a deficiency in its heuristic function which affects the algorithm behavior in terms of finding the shortest connection between edges.This research focuses on a new heuristic function where information about recent ants’ discoveries has been considered.The new heuristic function has been integrated into the classical ant colony system algorithm.Furthermore, the enhanced algorithm has been implemented to solve the travelling salesman problem as well as in scheduling of jobs in computational grid.A simulator with dynamic environment feature to mimic real life application has been development to validate the proposed enhanced ant colony system algorithm. …”
Get full text
Get full text
Monograph -
9
Exam timetable for unimas-enhancement of sistem jadual waktu UNIMAS
Published 2005“…A proper searching method and algorithm is not applied for that system. Hence, the Unimas Examination Timetabling System is developed. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
10
Quality-driven scheduling for long-term evolution system
Published 2011“…The proposed algorithm utilises Channel Quality Information (CQI), average throughput, type of services, packet delay and buffer information when allocating and assigning the available Radio Resource Units (RRUs) among the users. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
11
Comparison of PPO and SAC Algorithms towards decision making strategies for collision avoidance among multiple autonomous vehicles
Published 2021Get full text
Get full text
Get full text
Conference or Workshop Item -
12
-
13
-
14
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…The objective of this paper is to study and make a comparison among the available intrusion detections algorithms and methods in the intrusion detections. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Development Of Human Skin Detection Algorithm Using Multilayer Perceptron Neural Network And Clustering Method
Published 2017“…The Differential Evolution Algorithm (DE) is used in this work to select the optimum color and texture information to achieve the optimum response. …”
Get full text
Get full text
Thesis -
16
An expanded square pattern technique in swarm of quadcopters for exploration algorithm
Published 2017“…In robotics field, the exploration algorithm deals with the implementation of the robot to enlarge the information over a particular environment. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
A study on personalized recommender system using social media
Published 2020“…At this moment advancement, the Recommendation system is an application that isolated altered information and gives the best way to deal with understand a user's taste and to propose reasonable things to them by considering the models among their inclinations and research studies of various things. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
-
19
-
20
Consensus algorithms blockchain: a comparative study
Published 2019“…The consensus algorithm refers to the process of attaining an unified agreement on the state of the network in a decentralized way and to facilitate the verification and validation of information being added to the blockchain. …”
Get full text
Get full text
Get full text
Get full text
Article
