Search Results - (( user evaluation ((bat algorithm) OR (_ algorithm)) ) OR ( based information based algorithm ))
Search alternatives:
- based information »
- information based »
- user evaluation »
-
1
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…This research will conduct comparison of hybrid Genetic Algorithm and Bat Algorithm (GA-BA) with Genetic Algorithm (GA) and Bat Algorithm (BA). …”
Get full text
Get full text
Get full text
Academic Exercise -
2
-
3
A new algorithm on Graphical User Authentication (GUA) based on multi-line grids
Published 2010“…Thereafter a comparative analysis of all Recall-Based algorithms based on attack patterns of graphical user authentication is tabulated. …”
Get full text
Get full text
Get full text
Article -
4
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…In addition, a prototype was developed to evaluate the proposed algorithm. Then, user satisfaction was conducted in order to evaluate this prototype using Q-SAFI instruments. …”
Get full text
Get full text
Get full text
Thesis -
5
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…This algorithm developed to allow user to receive push notification effectively based on the location of user’s smartphone that can be detected by Bluetooth Smart Ready Technology (BLE). …”
Get full text
Get full text
Thesis -
6
Movie recommendation using user-based collaborative filtering algorithm / Nur Ayuni Izlin Mat Ishor
Published 2019“…Thus, the study is to explore how the recommendation engines will work and use user-based collaborative filtering as an algorithm for the movie recommendation. …”
Get full text
Get full text
Thesis -
7
Agent-based extraction algorithm for computational problem solving
Published 2015“…Four agents have been proposed as an agent based model for CPS, which are User_Agent, PAC_Agent, IPO_Agent and Algorithm_Agent. …”
Get full text
Get full text
Thesis -
8
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…A series of simulations were conducted using MATLAB to evaluate the performance of the proposed chaotic-based encryption algorithm for FTP through different analyses covering key sensitivity, histogram, correlations, differential, information entropy, and encryption/decryption speed. …”
Get full text
Get full text
Get full text
Article -
9
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…In its formulation, the algorithm considers the interests and preferences of users’ friends and faculty mates in addition to users’ own preferences. …”
Get full text
Get full text
Thesis -
10
-
11
FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources
Published 2026“…To initialise function placement, Fitness-Based Swap (FBSW) algorithm is proposed which places functions based on pre-defined information such as function size, function maximum execution time, and storage cost. …”
Get full text
Get full text
Get full text
Article -
12
A hybrid Method Of Centroid-Based Clustering And Meta-Heuristic For Personalized Web Search
Published 2024thesis::doctoral thesis -
13
Segmentation of MRI brain images using statistical approaches
Published 2011“…In addition, two algorithms for the post-processing of clustering results using user-interaction and the re-evaluation of boundary data in each cluster are presented. …”
Get full text
Get full text
Thesis -
14
Evaluation of the effectiveness of clustering algorithm in retrieving Malay documents / Aminah Mahmood
Published 2004“…A good retrieval system should provide tools to perform searching accurately based on user requirements. Cluster analysis is a technique for multivariate analysis that assigns items to automatically created group based on a calculation of the degrees of association between items and groups. …”
Get full text
Get full text
Thesis -
15
Job position prediction based on skills and experience using machine learning algorithm / Ezaryf Hamdan
Published 2024“…The Machine Learning algorithm, comprising Random Forest, Linear Regression, XGBoost, SVM, and Stacking Ensemble, is embedded in the system for job position predictions based on the analysed data. …”
Get full text
Get full text
Thesis -
16
Adaptive method to improve web recommendation system for anonymous users
Published 2011“…This research focuses on improving the prediction of the next visited web pages and introduces them to current anonymous user. An enhanced classification algorithm is used to assign the current anonymous user to the best web navigation profile. …”
Get full text
Get full text
Thesis -
17
Multi-user beamforming, fairness and device-to-device channel state information sharing in downlink non-orthogonal multiple access systems
Published 2021“…The first algorithm is based on integrating the maximum product of effective channel gains and the maximum SIR with the PF principle (PF-MPECG-SIR) to select strong users in the first stage and weak users in the second stage. …”
Get full text
Get full text
Thesis -
18
Two-Phases QR Authentication Algorithm (2PQRA) for Digital Energy and IoT Applications
Published 2023“…Automation; Codes (symbols); Cryptography; Internet of things; Authentication algorithm; Energy; Internet-based medias; Private information; Quick response code; Quick response code code; Security level; Simple++; Smart homes; Two phase; Authentication…”
Conference Paper -
19
Performance evaluation of caching placement algorithms in named data network for video on demand service
Published 2016“…The purpose of this study is to evaluate the performance of caching placement algorithms (LCD, LCE, Prob, Pprob, Cross, Centrality, and Rand) in Named Data Network (NDN) for Video on Demand (VoD). …”
Get full text
Get full text
Get full text
Thesis -
20
Secure mobile AES encryptor (SMAE)
Published 2016“…This can be proved where the National Security Agency (NSA) in the United States to encrypt confidential data and information. This application will focus more on the user of the Android operating systems based mobile phone users. …”
Get full text
Get full text
Undergraduates Project Papers
