Search Results - (( user evaluation method algorithm ) OR ( mobile information systems algorithm ))*

Refine Results
  1. 1

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…Based on the previous report, some issues arise, such as time-consumption between the staff and the customer when ordering, lack of details and inconsistency of the manual system data. The manual method often has a lack of knowledge that the menu that shows the customer does not provide any information that customers need, such as an image of the food or ingredients used in the menu. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias by Alias, Nur Farehah

    Published 2017
    “…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Performance evaluation of Location-Sensitive Handoff using positioning method / Azuwa Ali and Saiful Fadzli Salian by Ali, Azuwa, Salian, Saiful Fadzli

    Published 2009
    “…Handoff is one of the most important processes in mobile communication system. Radio resource management planning effectiveness depends on the successfulness of handoff process in maintaining the connection. …”
    Get full text
    Get full text
    Research Reports
  5. 5

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…The proposed authentication method, uses an enhanced method where the credentials are encrypted through an algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Effectiveness of mobile agent for query retrieval by Selamat, Ali, Omatu, Sigeru, Yanagimoto, Hidekazu, Fujinaka, Toru, Yoshioka, Michifumi

    Published 2002
    “…The Mobile Agent Search System (MaSS) has been developed to reduce the time for searching and retrieving information from the Internet. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Personalized job recommender system using content-based filtering for UiTM Machang graduates by Rosli, Norhalili

    Published 2025
    “…The System Usability Scale (SUS) and User Acceptance Testing (UAT) are used to evaluate the system’s usability because they are well-known and trusted methods for measuring user experience. …”
    Get full text
    Get full text
    Student Project
  8. 8

    Terrain awareness mobility model to support outdoor mobility for people with vision impairment by Yousef, Malkawi Abeer Dirar

    Published 2023
    “…The research design applied the exploratory mixed method, comprising qualitative research, then proposed the solution according to the findings, and finally, evaluated the solution quantitatively. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  10. 10

    Framework for stream clustering of trajectories based on temporal micro clustering technique by Abdulrazzaq, Musaab Riyadh

    Published 2018
    “…A comprehensive experimental analysis was conducted to evaluate the efficiency and effectiveness of the proposed algorithms (ONF-TRS, CC-TRS). …”
    Get full text
    Get full text
    Thesis
  11. 11

    Framework for pedestrian walking behaviour recognition to minimize road accident by Hashim Kareem, Zahraa

    Published 2021
    “…Fifthly, the performance of the proposed classification methods is validated and evaluated against multiple scenarios and features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Framework for pedestrian walking behaviour recognition to minimize road accident by Hashim Kareem, Zahraa

    Published 2021
    “…Fifthly, the performance of the proposed classification methods is validated and evaluated against multiple scenarios and features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…One of a critical criterion of the detection system is capable to learn fast because after the learning, the updated information needs to be passed to user to avoid the user from being deceived by the cybercriminal. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Advancing Multiband OFDM Channel Sounding: An Iterative Time Domain Estimation for Spectrally Constrained Systems by Iqbal, A., Drieberg, M., Jeoti, V., Aziz, A.B.A., Stojanovic, G.M., Simic, M., Hussain, N.

    Published 2023
    “…The results show that the proposed SCTD method supersedes the conventional techniques for stationary and mobile frequency selective channel scenarios within ten iterations. …”
    Get full text
    Get full text
    Article
  15. 15

    Advancing Multiband OFDM Channel Sounding: An Iterative Time Domain Estimation for Spectrally Constrained Systems by Iqbal, A., Drieberg, M., Jeoti, V., Aziz, A.A., Stojanovic, G.M., Simic, M., Hussain, N.

    Published 2023
    “…The results show that the proposed SCTD method supersedes the conventional techniques for stationary and mobile frequency selective channel scenarios within ten iterations. …”
    Get full text
    Get full text
    Article
  16. 16

    Analysis of confidentiality algorithms in different mobile generations by Jassim, Khalid Fadhil, Alshaikhli, Imad Fakhri Taha

    Published 2017
    “…Various sensitive information (e.g. emails, bank transactions, voice calls, ... ) was exchanged via the mobile systems. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    Mobile Map-Based Positioning System Using Segmentation Algorithm (MM-BPS) by Migdady, Hazem Moh'd Ali

    Published 2008
    “…This paper reports steps to build a segmentation positioning algorithm and to implement Mobile Map-Based Positioning System prototype.…”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Map navigation for mobile tourist / Rohana Abd Jalil by Abd Jalil, Rohana

    Published 2007
    “…Recent years have seen rapid growth in the area of map-based mobile application system for tourist information services. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Comparative study of some symmetric ciphers in mobile systems by Jassim, Khalid Fadhil, Alshaikhli, Imad Fakhri Taha

    Published 2014
    “…Symmetric cryptographic algorithms have been proposed to protect the information of the senders and receivers through mobile systems. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20