Search Results - (( user evaluation based algorithm ) OR ( based instruction ((a algorithm) OR (new algorithm)) ))

Refine Results
  1. 1

    Selection and optimization of peak features for event-related eeg signals classification / Asrul bin Adam by Asrul, Adam

    Published 2017
    “…However, the developed algorithms only consider the selected features from a peak model based on the understanding of the EEG signals characteristics. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    RISC-V instruction set extension on blockchain application by Cheong , Kin Seng

    Published 2024
    “…Towards the end of the project, the algorithms would be executed in a base RISC-V core and an extended RISC-V core using simulation tools to perform performance analysis. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3
  4. 4
  5. 5

    Smart and energy aware routing for the internet of mobile things by Beh, Zi Xuan

    Published 2021
    “…This project is to design a smart and energy aware routing algorithm for the Internet of Mobile Things. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Augmented reality navigation using android by Akhirruddin, Mu’az Suffyan, Mohamad, Shamsul, Mohd Hanifa, Rafizah

    Published 2024
    “…Traditional navigation methods often rely on maps or GPS-based instructions, which can be cumbersome and less intuitive. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Mismatch losses minimization in photovoltaic arrays by arranging modules applying a genetic algorithm by Shirzadi, Samad, Hizam, Hashim, Abdul Wahab, Noor Izzri

    Published 2014
    “…This work introduces a new method that employs genetic algorithm (GA) to find an arrangement of modules in an array which minimizes mismatch losses more effectively than conventional methods do. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Efficient and secured compression and steganography technique in wireless sensor network by Tuama, Ammar Yaseen

    Published 2016
    “…We analyse the solution and compare with a range of well-known algorithms in terms of compression ratio, memory usage, the number of instructions, compression speed and energy consumption. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Identifying football conflict using soft-set theory in Indonesia super league / Kukuh Wahyudin Pratama by Kukuh Wahyudin , Pratama

    Published 2021
    “…We then delineated the proposed algorithm for an instructional example of Indonesian football conflict situation concerning the Indonesia Football Super League. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Semantic analysis system by using latent semantic analysis (LSA) algorithm on khutbah texts / Ammar Zuber by Zuber, Ammar

    Published 2019
    “…As nowadays, some muslims attend the Friday Prayers just to obey God instruction instead of willingly come to gain new knowledge. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Movie recommendation using user-based collaborative filtering algorithm / Nur Ayuni Izlin Mat Ishor by Mat Ishor, Nur Ayuni Izlin

    Published 2019
    “…Thus, the study is to explore how the recommendation engines will work and use user-based collaborative filtering as an algorithm for the movie recommendation. …”
    Get full text
    Get full text
    Thesis
  13. 13

    VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS. by FAROOQ, HUMERA

    Published 2012
    “…This is difTerent from existing Interactive Genetic Algorithm in which selection and evaluation of solutions is done by the users. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    A new algorithm on Graphical User Authentication (GUA) based on multi-line grids by Lashkari, Arash Habibi, Gani, Abdullah, Sabet, Leila Ghasemi, Farmand, Samaneh

    Published 2010
    “…Thereafter a comparative analysis of all Recall-Based algorithms based on attack patterns of graphical user authentication is tabulated. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…In addition, a prototype was developed to evaluate the proposed algorithm. Then, user satisfaction was conducted in order to evaluate this prototype using Q-SAFI instruments. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Menu recommendation for Restoran Jannat Saba using Market Basket analysis / Dinie Sorfina Fathanah Kamarul Ariffin by Kamarul Ariffin, Dinie Sorfina Fathanah

    Published 2025
    “…By utilising the sales data, MBA is performed to uncover frequent itemsets and generate association rules based on the confidence and lift metrics. The FP-Growth algorithm has been employed for its effectiveness in identifying frequent itemsets and association rules in transactional data. …”
    Get full text
    Get full text
    Thesis
  18. 18

    The Evaluation of Cyclostationarity-Based Spectrum Sensing in Multipath Fading Channel by Jeoti , Varun

    Published 2010
    “…These algorithms were developed in context of WRAN 802.22; the first cognitive radio standard, for TV-PAL and wireless microphone as the primary users. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias by Alias, Nur Farehah

    Published 2017
    “…This algorithm developed to allow user to receive push notification effectively based on the location of user’s smartphone that can be detected by Bluetooth Smart Ready Technology (BLE). …”
    Get full text
    Get full text
    Thesis
  20. 20

    Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network by Abu-Khadrah, Ahmed Ismail Mohammad

    Published 2017
    “…This separation contributes in determining the effect of access point on the network performance as well as it allows in evaluating the algorithms that based on the differentiation between the access point and stations. …”
    Get full text
    Get full text
    Get full text
    Thesis