Search Results - (( program implementation based algorithm ) OR ( user evaluation method algorithm ))

Refine Results
  1. 1

    Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi by Rahimi, Ahmad Faris

    Published 2017
    “…The second one is to develop prototype for classification of credit cardholder behavior based on k Nearest Neighbors Algorithm. The third one is to evaluate the accuracy of the k Nearest Neighbors algorithm in the classification credit card holder behavior. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Book recommendation system / Nur Dalila Afifah Ghazali by Ghazali, Nur Dalila Afifah

    Published 2021
    “…For this project, the user-item rating methods and the item-item rating had been implemented on the system to generate the list of recommendation books to the user. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Virtual reality in algorithm programming course: practicality and implications for college students by Dewi, Ika Parma, Ambiyar, Mursyida, Lativa, Effendi, Hansi, Giatman, Muhammad, Efrizon, Hanafi, Hafizul Fahri, Ali, Siti Khadijah

    Published 2024
    “…The reliability of VR supports various variations in learning, including learning programming algorithms. This research aims to design and develop VR in learning programming algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Space allocation for examination scheduling using Genetic Algorithm / Alya Kauthar Azman by Azman, Alya Kauthar

    Published 2025
    “…The research adopts a Genetic Algorithm-based approach, where examination scheduling details such as date, time, course code, program code, student group, student numbers, and available spaces are encoded as chromosomes. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Optimal demand response of solar energy generation using Genetic Algorithm / Muhammad Asyraaf Adlan by Adlan, Muhammad Asyraaf

    Published 2025
    “…The objective function of the algorithm minimizes the daily losses due to load shedding while ensuring a balanced and stable energy distribution to the end users. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Modular motor driver with torque control for gripping mechanism by How D.N.T., Baharuddin M.Z., Mohideen S.S.K., Sahari K.S.M., Anuar A.

    Published 2023
    “…This is possible by taking in the magnitude of the current drawn by the load as the feedback to the system and set appropriate action to protect the system from damage when a certain setpoint of current is reached. In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
    Conference paper
  7. 7

    Sequential and parallel multiple tabu search algorithm for multiobjective urban transit scheduling problems by Uvaraja, Vikneswary

    Published 2018
    “…Additionally, the MTS algorithm is also implemented in parallel computing to produce parallel MTS for generating comparable solutions in shorter computational times. …”
    Get full text
    Get full text
    Thesis
  8. 8

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…Finally, the implemented algorithm tested by comparing the accuracy of the current authentication framework with and without an EPSB algorithm. …”
    text::Thesis
  9. 9
  10. 10

    Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh by Rawaa Dawoud Hassan, Al-Dabbagh

    Published 2015
    “…Hence, the process of choosing a suitable DE strategy and setting its control parameters is difficult and requires much user experience. In this thesis, the fundamental contributions include the analysis, design, and evaluation of the adaptive DE algorithms. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Sub-route reversal repair mechanism and differential evolution for urban transit network design problem by Tarajo, Buba Ahmed

    Published 2017
    “…All proposed algorithms are executed using Python programming language, and the computational results show that the proposed algorithms improve the best-so-far results from the literature in most cases.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Implementation of Autonomous Vehicle Navigation Algorithms Using Event-Driven Programming by Saman, Abu Bakar Sayuti, Sebastian , Patrick, Malek, Nadhira, Hasidin, Nurul Zahidah

    Published 2012
    “…The objective of this paper is to describe the implementation of autonomous navigation through the use of event-driven programming technique which was based on finite state machines (FSM). …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    Implementation of autonomous vehicle navigation algorithms using event-driven programming by Saman, Abu Bakar Sayuti, Sebastian , Patrick, Malek, Nadhira, Hasidin, Nurul Zahidah

    Published 2012
    “…The objective of this paper is to describe the implementation of autonomous navigation through the use of event-driven programming technique which was based on finite state machines (FSM). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…In addition, a prototype was developed to evaluate the proposed algorithm. Then, user satisfaction was conducted in order to evaluate this prototype using Q-SAFI instruments. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20