Search Results - (( user evaluation based algorithm ) OR ( based instruction a algorithm ))

Refine Results
  1. 1

    Selection and optimization of peak features for event-related eeg signals classification / Asrul bin Adam by Asrul, Adam

    Published 2017
    “…However, the developed algorithms only consider the selected features from a peak model based on the understanding of the EEG signals characteristics. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Augmented reality navigation using android by Akhirruddin, Mu’az Suffyan, Mohamad, Shamsul, Mohd Hanifa, Rafizah

    Published 2024
    “…Traditional navigation methods often rely on maps or GPS-based instructions, which can be cumbersome and less intuitive. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Movie recommendation using user-based collaborative filtering algorithm / Nur Ayuni Izlin Mat Ishor by Mat Ishor, Nur Ayuni Izlin

    Published 2019
    “…Thus, the study is to explore how the recommendation engines will work and use user-based collaborative filtering as an algorithm for the movie recommendation. …”
    Get full text
    Get full text
    Thesis
  5. 5

    VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS. by FAROOQ, HUMERA

    Published 2012
    “…This is difTerent from existing Interactive Genetic Algorithm in which selection and evaluation of solutions is done by the users. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A new algorithm on Graphical User Authentication (GUA) based on multi-line grids by Lashkari, Arash Habibi, Gani, Abdullah, Sabet, Leila Ghasemi, Farmand, Samaneh

    Published 2010
    “…Thereafter a comparative analysis of all Recall-Based algorithms based on attack patterns of graphical user authentication is tabulated. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…In addition, a prototype was developed to evaluate the proposed algorithm. Then, user satisfaction was conducted in order to evaluate this prototype using Q-SAFI instruments. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Menu recommendation for Restoran Jannat Saba using Market Basket analysis / Dinie Sorfina Fathanah Kamarul Ariffin by Kamarul Ariffin, Dinie Sorfina Fathanah

    Published 2025
    “…By utilising the sales data, MBA is performed to uncover frequent itemsets and generate association rules based on the confidence and lift metrics. The FP-Growth algorithm has been employed for its effectiveness in identifying frequent itemsets and association rules in transactional data. …”
    Get full text
    Get full text
    Thesis
  9. 9

    The Evaluation of Cyclostationarity-Based Spectrum Sensing in Multipath Fading Channel by Jeoti , Varun

    Published 2010
    “…These algorithms were developed in context of WRAN 802.22; the first cognitive radio standard, for TV-PAL and wireless microphone as the primary users. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    RISC-V instruction set extension on blockchain application by Cheong , Kin Seng

    Published 2024
    “…Towards the end of the project, the algorithms would be executed in a base RISC-V core and an extended RISC-V core using simulation tools to perform performance analysis. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias by Alias, Nur Farehah

    Published 2017
    “…This algorithm developed to allow user to receive push notification effectively based on the location of user’s smartphone that can be detected by Bluetooth Smart Ready Technology (BLE). …”
    Get full text
    Get full text
    Thesis
  12. 12

    Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network by Abu-Khadrah, Ahmed Ismail Mohammad

    Published 2017
    “…This separation contributes in determining the effect of access point on the network performance as well as it allows in evaluating the algorithms that based on the differentiation between the access point and stations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Cache replacement algorithm using hierarchical allocation scheduling by Mohd Sharif, Mohammad Faizal

    Published 2014
    “…There is no determination of relative important instruction in this policy. By removing this, based on the least recent, it might cause a potential delay in the future processing if the removed instruction depends on it. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Independent task scheduling algorithms in fog environments from users’ and service providers’ perspectives: a systematic review by Al-Qadhi, Abdulrahman K., Latip, Rohaya, Chiong, Raymond, Athauda, Rukshan, Hussin, Masnida

    Published 2025
    “…To assure unbiased evaluation, a benchmark to assess task scheduling algorithms is proposed based on comparison to state-or-art algorithms, applicability to real-world contexts, meeting the objectives of the study, negative impacts on other performance metrics, and sizes of datasets used for evaluation. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Evaluation of Current Music Synthesis Software for Rendering of Various Synthesis Algorithms by Tan, Julie Lee Mei

    Published 2000
    “…For experienced users, Csound is preferred over Cool Edit Pro. Conclusions drawn from this research finding is that different software approaches fulfill different kinds of user expectations depending on user experience.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…Four agents have been proposed as an agent based model for CPS, which are User_Agent, PAC_Agent, IPO_Agent and Algorithm_Agent. …”
    Get full text
    Get full text
    Thesis
  20. 20