Search Results - (( data selection methods algorithm ) OR ( user evaluation method algorithm ))
Search alternatives:
- selection methods »
- methods algorithm »
- method algorithm »
- user evaluation »
- data selection »
-
1
Sentiment classification for malay newspaper using clonal selection algorithm / Nur Fitri Nabila Mohamad Nasir
Published 2013“…The experimental results show that our method can achieve better performance in clonal selection algorithm sentiment classification and the data collected cannot be used at once in this model because training data is very time-consuming if using all the data. …”
Get full text
Get full text
Thesis -
2
An ensemble feature selection method to detect web spam
Published 2018“…Web spam is an illegal method to increase mendacious rank of internet pages by deceiving the algorithms of search engines, so it is essential to use an efficient method. …”
Get full text
Get full text
Get full text
Article -
3
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Finally, the system employs a query formulation via node algorithm (QRYFv) algorithm to improve the selection of structured queries that best match user query Experiments have been conducted to evaluate the performance of the proposed enrichment method, XKQSS and RAXKQSS. …”
Get full text
Get full text
Get full text
Thesis -
4
Weighted Sum-Dijkstra’s Algorithm in Best Path Identification based on Multiple Criteria
Published 2018“…In order to achieve the objective, Weighted Sum-Dijkstra’s Algorithm (WSDA), a combination method between WSM and Dijkstra’s Algorithm is applied to solve multiple criteria network problems. …”
Get full text
Get full text
Get full text
Article -
5
Recommendation System Model For Decision Making in the E-Commerce Application
Published 2024thesis::doctoral thesis -
6
Extended multiple models selection algorithms based on iterative feasible generalized least squares (IFGLS) and expectation-maximization (EM) algorithm
Published 2019“…The empirical results for both algorithms performed well as compared to other models selection procedures, particularly using WQI data where the sample size is bigger and has good quality data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems
Published 2014“…The present study aims to formulate EHD ion-drag pumping model using Finite Difference Method (FDM) which can be easily implemented and provide more control to the user. …”
Get full text
Get full text
Thesis -
8
Space allocation for examination scheduling using Genetic Algorithm / Alya Kauthar Azman
Published 2025“…Data for the study was collected from university records, and algorithm performance was tested against predefined scheduling criteria. …”
Get full text
Get full text
Thesis -
9
Comparison on machine learning algorithm to fast detection of malicious web pages
Published 2021“…Compared to several decision tree method, Random Forest has shown promising and higher sensitivity result towards malicious data which is 98.3% compared to other classification algorithm…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Channel-aware downlink scheduling for quality of service in long term evolution network
Published 2018“…These constraints comprise the use of an inefficient method to determine delay by the buffer size. In the proposed algorithm we, utilize Head of Line delay with channel-related parameters such as user data rate in addition to several pre-defined QoS tunable parameters to formulate a rule that prioritizes different user flows assigned with channel resources in order to improve delay. …”
Get full text
Get full text
Get full text
Thesis -
11
Evaluating keyphrase extraction algorithms for finding similar news articles using lexical similarity calculation and semantic relatedness measurement by word embedding
Published 2022“…However, selecting the most appropriate algorithm is also a problem. …”
Get full text
Get full text
Get full text
Article -
12
Multiple and solid data background scheme for testing static single cell faults on SRAM memories
Published 2013“…This method is evaluated in terms of function and performance differences between the proposed MTA and existing MTA using the User Defined Algorithm (UDA) available in the MBISTArchitect tool. …”
Get full text
Get full text
Thesis -
13
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…Plus, to analyse the efficiency of a detection model on keylogger dataset by evaluating a selection of attributes. Besides, to test the accuracy of detection models on keylogger dataset comparing two machine learning algorithms. …”
Get full text
Get full text
Student Project -
14
On iterative low-complexity algorithm for optimal antenna selection and joint transmit power allocation under impact pilot contamination in downlink 5g massive MIMO systems
Published 2020“…The optimization of the antenna selection and optimal transmission power with impact of pilot reuse sequences were achieved, by applying Newton’s method and the Lagrange multiplier. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Influence maximisation towards target users and minimal diffusion of information based on information needs
Published 2020“…This study proposes the Information Diffusion towards Target Users (IDTU) algorithm to enhance influencer selection while minimizing the DC. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Tag cloud algorithm with the inclusion of personality traits
Published 2014“…Therefore, the main objective of this study is to make tag cloud algorithm with the inclusion of personality traits by adjusting two prominent visual features (color and shape) as an integration of layout.In addition, the utilization of RBS (rule bas e system) approach as artificial intelligent method is also taken into account to make knowledge base that stores the relationship between the proper personality elements and particular layout.This paper also discusses findings from satisfaction evaluation of prototyping, which comprises three dimensions facet: overall layout, color, and shape .The findings showed that the majority mean value for each dimension is categorized in agree scale (6-point), which indicates that respondents are satisfied with the tag cloud layout display generated by proposed algorithm.The findings suggest interface designers to be careful in selecting the appropriate tag clouds layout to be displayed for users with varying personality differences.…”
Get full text
Get full text
Get full text
Article -
17
Enhancement Of Cover Selection – Based Audio Steganography (CAS) Using Block-Based Chaotic Multi – Level Lsb (BCM– LSB) For Balanced Performance
Published 2024thesis::doctoral thesis -
18
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
19
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
20
