Search Results - (( user evaluation method algorithm ) OR ( mobile information systems algorithm ))*
Search alternatives:
- mobile information »
- systems algorithm »
- method algorithm »
- user evaluation »
-
1
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…Based on the previous report, some issues arise, such as time-consumption between the staff and the customer when ordering, lack of details and inconsistency of the manual system data. The manual method often has a lack of knowledge that the menu that shows the customer does not provide any information that customers need, such as an image of the food or ingredients used in the menu. …”
Get full text
Get full text
Thesis -
2
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
Get full text
Get full text
Thesis -
3
Mobility-aware Offloading Decision For Multi-access Edge Computing In 5g Networks
Published 2024journal::journal article -
4
Performance evaluation of Location-Sensitive Handoff using positioning method / Azuwa Ali and Saiful Fadzli Salian
Published 2009“…Handoff is one of the most important processes in mobile communication system. Radio resource management planning effectiveness depends on the successfulness of handoff process in maintaining the connection. …”
Get full text
Get full text
Research Reports -
5
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…The proposed authentication method, uses an enhanced method where the credentials are encrypted through an algorithm. …”
Get full text
Get full text
Get full text
Thesis -
6
Effectiveness of mobile agent for query retrieval
Published 2002“…The Mobile Agent Search System (MaSS) has been developed to reduce the time for searching and retrieving information from the Internet. …”
Get full text
Get full text
Get full text
Article -
7
Personalized job recommender system using content-based filtering for UiTM Machang graduates
Published 2025“…The System Usability Scale (SUS) and User Acceptance Testing (UAT) are used to evaluate the system’s usability because they are well-known and trusted methods for measuring user experience. …”
Get full text
Get full text
Student Project -
8
Terrain awareness mobility model to support outdoor mobility for people with vision impairment
Published 2023“…The research design applied the exploratory mixed method, comprising qualitative research, then proposed the solution according to the findings, and finally, evaluated the solution quantitatively. …”
Get full text
Get full text
Get full text
Thesis -
9
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
10
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…A comprehensive experimental analysis was conducted to evaluate the efficiency and effectiveness of the proposed algorithms (ONF-TRS, CC-TRS). …”
Get full text
Get full text
Thesis -
11
Framework for pedestrian walking behaviour recognition to minimize road accident
Published 2021“…Fifthly, the performance of the proposed classification methods is validated and evaluated against multiple scenarios and features. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Framework for pedestrian walking behaviour recognition to minimize road accident
Published 2021“…Fifthly, the performance of the proposed classification methods is validated and evaluated against multiple scenarios and features. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…One of a critical criterion of the detection system is capable to learn fast because after the learning, the updated information needs to be passed to user to avoid the user from being deceived by the cybercriminal. …”
Get full text
Get full text
Thesis -
14
Advancing Multiband OFDM Channel Sounding: An Iterative Time Domain Estimation for Spectrally Constrained Systems
Published 2023“…The results show that the proposed SCTD method supersedes the conventional techniques for stationary and mobile frequency selective channel scenarios within ten iterations. …”
Get full text
Get full text
Article -
15
Advancing Multiband OFDM Channel Sounding: An Iterative Time Domain Estimation for Spectrally Constrained Systems
Published 2023“…The results show that the proposed SCTD method supersedes the conventional techniques for stationary and mobile frequency selective channel scenarios within ten iterations. …”
Get full text
Get full text
Article -
16
Analysis of confidentiality algorithms in different mobile generations
Published 2017“…Various sensitive information (e.g. emails, bank transactions, voice calls, ... ) was exchanged via the mobile systems. …”
Get full text
Get full text
Get full text
Proceeding Paper -
17
Mobile Map-Based Positioning System Using Segmentation Algorithm (MM-BPS)
Published 2008“…This paper reports steps to build a segmentation positioning algorithm and to implement Mobile Map-Based Positioning System prototype.…”
Get full text
Get full text
Get full text
Thesis -
18
Map navigation for mobile tourist / Rohana Abd Jalil
Published 2007“…Recent years have seen rapid growth in the area of map-based mobile application system for tourist information services. …”
Get full text
Get full text
Thesis -
19
Comparative study of some symmetric ciphers in mobile systems
Published 2014“…Symmetric cryptographic algorithms have been proposed to protect the information of the senders and receivers through mobile systems. …”
Get full text
Get full text
Get full text
Proceeding Paper -
20
Book recommender mobile application / Amir Imran Kamaludin
Published 2021Get full text
Get full text
Thesis
