Search Results - (( user evaluation from algorithm ) OR ( based simulation model algorithm ))
Search alternatives:
- based simulation »
- user evaluation »
- evaluation from »
- model algorithm »
- from algorithm »
-
1
Agent-based extraction algorithm for computational problem solving
Published 2015“…User_Agent is responsible for receiving the problem from user and sending it to PAC_ Agent. …”
Get full text
Get full text
Thesis -
2
A simulation tool to evaluate the usability of agent centric Resource-Event-Agent (REA) database modeling methodology: The development of revenue cycle in accounting information sy...
Published 2023“…The author has implemented quantitative analysis by generating mathematical algorithms to compare efficiency between conventional and Agent Centric REA Modeling. …”
Conference paper -
3
Locust- inspired meta-heuristic algorithm for optimising cloud computing performance
Published 2023“…The proposed algorithm is evaluated using the WorkflowSim simulation with a real dataset. …”
Get full text
Get full text
Thesis -
4
Predicting user trajectories using deep learning algorithms / Ahmad Zaki Aiman Abdul Rashid, Azita Laily Yusof and Norsuzila Ya’acob
Published 2025“…These conclude that LSTM model are the most suitable model for predicting user trajectories among DL algorithms. …”
Get full text
Get full text
Get full text
Article -
5
Quality of service management algorithms in WiMAX networks
Published 2015“…Simulation have been extensively used to evaluate the proposed algorithm. …”
Get full text
Get full text
Thesis -
6
Modeling And Control Of V-Groove Rotary Impact Driver
Published 2020“…Finally, prototype was built based on the software simulation model for actual human test and validation. …”
Get full text
Get full text
Thesis -
7
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…The dataset development for both algorithms is carried out via simulations in Graphical Network Simulator 3 (GNS3). …”
text::Thesis -
8
Selection and optimization of peak features for event-related eeg signals classification / Asrul bin Adam
Published 2017“…However, the developed algorithms only consider the selected features from a peak model based on the understanding of the EEG signals characteristics. …”
Get full text
Get full text
Get full text
Thesis -
9
A comparative study for parameter selection in online auctions
Published 2009“…Self adaptation genetic algorithm is the last model that will be used to evolve the bidding strategy. …”
Get full text
Get full text
Get full text
Thesis -
10
A firefly algorithm based hybrid method for structural topology optimization
Published 2020“…Since the direct application of the firefly algorithm cannot generate connected topologies, outputs from the firefly algorithm were used as an initial input material distribution for the OC method. …”
Get full text
Get full text
Article -
11
Context-Aware Recommender System based on machine learning in tourist mobile application / Nor Liza Saad … [et al.]
Published 2022“…From the machine learning evaluation, Random Forest algorithm has generated the most accurate prediction compared to Decision Tree, Logistic Regression and Generalized Linear Model. …”
Get full text
Get full text
Get full text
Article -
12
Q-learning based vertical handover decision algorithm in LTE-A two-tier macrocell-femtocell systems / Ammar Bathich
Published 2019“…The proposed handover algorithms are validated using the LTE-Sim simulator under an urban environment. …”
Get full text
Get full text
Thesis -
13
Multi-source data fusion framework for remote triaging and prioritization in telemedicine
Published 2015“…As telemedicine consists of three tiers (Sensors/ sources, Base station and Server), the simulation of the proposed frameworks as fusion algorithm in the base station and as healthcare services algorithm in the server was demonstrated. …”
Get full text
Get full text
Thesis -
14
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023“…In this thesis, the research gap related to the accuracy of authenticating a legitimate user is brought to light. The problem is in multi-factor authentication with public cloud computing, the performance of user authentication in password-based authentication needs to move from traditional security processes to intelligent security processes. …”
text::Thesis -
15
Resource allocation techniques for interference mitigation in macro and femtocell heterogeneous network-based LTE system
Published 2017“…The first proposed hybrid approach consists of two combined schemes, termed as Resource Allocation based Fractional Frequency Reuse and Graph Connectivity algorithm (RAFFRGC). …”
Get full text
Get full text
Get full text
Thesis -
16
Simulation model to improve QoS performance over fixed WiMAX using OPNET
Published 2013“…The design has been evaluated using the simulation tool OPNET modeler 16.0. …”
Get full text
Get full text
Article -
17
Block based low complexity iterative QR precoder structure for Massive MIMO
Published 2021“…The simulation of quasi-static is used. We generate the model and evaluate the performance in MATLAB. …”
Get full text
Get full text
Thesis -
18
Impatient job scheduling under cloud computing
Published 2012“…The proposed algorithm is tested via simulation and real datasets. …”
Get full text
Get full text
Thesis -
19
Furniture form innovation and human–machine comfort evaluation model based on genetic algorithm
Published 2024“…This research explores the Pareto-primarily based Genetic Algorithm (PGA) inside this framework, with the goal of fostering innovation in product layout and the generation of novel ideas. …”
Get full text
Get full text
Get full text
Article -
20
Computerized simulation system for ECM radar system
Published 2007“…Next sequence diagrams were used to view the internal process within the simulation system. Finally before code generation, the flow chart of the simulation algorithm was used. …”
Get full text
Get full text
Get full text
Thesis
