Search Results - (( software evaluation method algorithm ) OR ( user evaluation method algorithm ))
Search alternatives:
-
1
Comparison and evaluation of multiple sequence alignment tools in bininformatics
Published 2009“…This study addresses this critical issue in relation to MSA algorithms by systematically comparing and evaluating the functionality, usability and the algorithms of three famous multiple sequence alignment tools. …”
Get full text
Article -
2
A hybrid Method Of Centroid-Based Clustering And Meta-Heuristic For Personalized Web Search
Published 2024thesis::doctoral thesis -
3
Recommendation System Model For Decision Making in the E-Commerce Application
Published 2024thesis::doctoral thesis -
4
Weighted Sum-Dijkstra’s Algorithm in Best Path Identification based on Multiple Criteria
Published 2018“…In order to achieve the objective, Weighted Sum-Dijkstra’s Algorithm (WSDA), a combination method between WSM and Dijkstra’s Algorithm is applied to solve multiple criteria network problems. …”
Get full text
Get full text
Get full text
Article -
5
Jogging activity recognition using k-NN algorithm
Published 2022“…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
A Mobile Application For Stock Price Prediction
Published 2021“…The evaluation methods were Root Mean Square Error and Mean Absolute Error. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
The solution of 2048 puzzle game using A* algorithm / Zafhira Ismail
Published 2017Get full text
Get full text
Thesis -
8
Multi-perspective usability evaluation with multi-criteria decision analysis for optimal selection of open-source software
Published 2021“…A generally accepted multi-perspective usability evaluation method for the selection of OSS is unavailable in the existing literature. …”
Get full text
Get full text
Thesis -
9
-
10
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…The second one is to develop prototype for classification of credit cardholder behavior based on k Nearest Neighbors Algorithm. The third one is to evaluate the accuracy of the k Nearest Neighbors algorithm in the classification credit card holder behavior. …”
Get full text
Get full text
Thesis -
11
Paper Survey And Example Of Collaborative Filtering Implementation In Recommender System
Published 2017“…The relation to the database query, it needs suitable query algorithm web search and user profiling strategy. …”
Get full text
Get full text
Get full text
Article -
12
Comparison on machine learning algorithm to fast detection of malicious web pages
Published 2021“…However, this has exposed to the malicious activities and online threat to the users which will disrupt the method of every system and performance. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Task scheduling in cloud computing environment using hybrid genetic algorithm and artificial bee colony
Published 2022“…In this project, a comparative evaluation of selected algorithms is done to ascertain their applicability, practicality, and adaptability in a cloud scenario. …”
Get full text
Get full text
Get full text
Academic Exercise -
14
Book recommendation system / Nur Dalila Afifah Ghazali
Published 2021“…For this project, the user-item rating methods and the item-item rating had been implemented on the system to generate the list of recommendation books to the user. …”
Get full text
Get full text
Thesis -
15
Novel multi-perspective usability evaluation framework for selection of open source software based on BWM and group VIKOR techniques
Published 2021“…Most large and complex software packages partitioned across multiple portals and involve many users — each with their role in the software package; those users have different perspectives on the software package, defined by their knowledge, responsibilities, and commitments. …”
Get full text
Get full text
Article -
16
Tag cloud algorithm with the inclusion of personality traits
Published 2014“…Therefore, the main objective of this study is to make tag cloud algorithm with the inclusion of personality traits by adjusting two prominent visual features (color and shape) as an integration of layout.In addition, the utilization of RBS (rule bas e system) approach as artificial intelligent method is also taken into account to make knowledge base that stores the relationship between the proper personality elements and particular layout.This paper also discusses findings from satisfaction evaluation of prototyping, which comprises three dimensions facet: overall layout, color, and shape .The findings showed that the majority mean value for each dimension is categorized in agree scale (6-point), which indicates that respondents are satisfied with the tag cloud layout display generated by proposed algorithm.The findings suggest interface designers to be careful in selecting the appropriate tag clouds layout to be displayed for users with varying personality differences.…”
Get full text
Get full text
Get full text
Article -
17
Modular motor driver with torque control for gripping mechanism
Published 2023“…These graphical outputs of the controller was evaluated based on the response time, degree of overshooting, and steady-state error to determine the most optimal method of control to be implemented in torque control scheme. …”
Conference paper -
18
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Case studies were conducted to evaluate the capability of the proposed methods in mitigating shoulder-surfing attack. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…Plus, to analyse the efficiency of a detection model on keylogger dataset by evaluating a selection of attributes. Besides, to test the accuracy of detection models on keylogger dataset comparing two machine learning algorithms. …”
Get full text
Get full text
Student Project -
20
Student Luggage Storage System (SLSS) / Sofea Aida Sallehan
Published 2020Get full text
Get full text
Thesis
