Search Results - (( user evaluation a algorithm ) OR ( early identification mining algorithm ))*
Search alternatives:
- identification mining »
- early identification »
- mining algorithm »
- user evaluation »
- evaluation a »
- a algorithm »
-
1
-
2
Outlier Detection Technique in Data Mining: A Research Perspective
Published 2005“…Finding ,removing and detecting outliers is very important in data mining, for example error in large databases can be extremely common, so an important property of a data mining algorithm is robustness with respect to outliers in the database. …”
Get full text
Get full text
Conference or Workshop Item -
3
-
4
A Machine Learning Classification Application to Identify Inefficient Novice Programmers
Published 2023Conference Paper -
5
-
6
Movie recommendation using user-based collaborative filtering algorithm / Nur Ayuni Izlin Mat Ishor
Published 2019“…Evaluation for this study is to evaluate the of reliability result of recommendation engine by using the approach algorithm. …”
Get full text
Get full text
Thesis -
7
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…In addition, a prototype was developed to evaluate the proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
8
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…This is difTerent from existing Interactive Genetic Algorithm in which selection and evaluation of solutions is done by the users. …”
Get full text
Get full text
Thesis -
9
Recommendation System Model For Decision Making in the E-Commerce Application
Published 2024thesis::doctoral thesis -
10
A new algorithm on Graphical User Authentication (GUA) based on multi-line grids
Published 2010“…Finally, a comparison of the newly proposed algorithm and previous algorithms will be evaluated in a table.…”
Get full text
Get full text
Get full text
Article -
11
The Evaluation of Cyclostationarity-Based Spectrum Sensing in Multipath Fading Channel
Published 2010“…In this approach , which is opposite of the current spectrum allocation, a secondary user (unlicensed) shares a frequency band with designated primary users (licensed) without causing interference or performance degradation to the primary users. …”
Get full text
Get full text
Conference or Workshop Item -
12
Performance evaluation of vertical handoff in fourth generation (4G) networks model
Published 2009Get full text
Working Paper -
13
Evaluation of Current Music Synthesis Software for Rendering of Various Synthesis Algorithms
Published 2000“…Thus, in this project, a Music Software Evaluation (MSE) metrics table with exact definition and criteria in determining the usefulness of music synthesis software was designed and used to evaluate the usefulness of these softwares. …”
Get full text
Get full text
Thesis -
14
QoS evaluation of different TCPs congestion control algorithm using NS2
Published 2006Get full text
Get full text
Get full text
Proceeding Paper -
15
Evaluation of cloud brokering algorithms in cloud based data center
Published 2015“…In this paper, two new cloud brokering algorithms, and their initial evaluation, are proposed.…”
Get full text
Get full text
Get full text
Article -
16
-
17
Independent task scheduling algorithms in fog environments from users’ and service providers’ perspectives: a systematic review
Published 2025“…To assure unbiased evaluation, a benchmark to assess task scheduling algorithms is proposed based on comparison to state-or-art algorithms, applicability to real-world contexts, meeting the objectives of the study, negative impacts on other performance metrics, and sizes of datasets used for evaluation. …”
Get full text
Get full text
Get full text
Article -
18
Performance evaluation of multi-user detection in Cdma using micro-genetic algorithm
Published 2005Get full text
Get full text
Get full text
Proceeding Paper -
19
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…Therefore, in this research work a new algorithm was proposed to enhance the capacity of the EDCA protocol and increase the number of the active voice users. …”
Get full text
Get full text
Get full text
Thesis -
20
A new dynamic code assignment algorithm for joint CDMA and SDMA system
Published 2008“…The probability of blocking is calculated to evaluate the system performance for different number of users and available codes. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
