Search Results - (( user evaluation method algorithm ) OR ( online information system algorithm ))
Search alternatives:
- online information »
- information system »
- method algorithm »
- system algorithm »
- user evaluation »
-
1
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…By using MyExpert, the online study was carried out to collect real feedback from live interactions between iv users and the system. …”
Get full text
Get full text
Thesis -
2
Recommendation System Model For Decision Making in the E-Commerce Application
Published 2024thesis::doctoral thesis -
3
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. …”
Get full text
Get full text
Thesis -
4
Adaptive method to improve web recommendation system for anonymous users
Published 2011“…The second is Adaptive Web page Recommendation System (AWRS) which combines the classification algorithm of iPACT in addition to the ability of adaptive recommending due to the changes of the users‟ interests and weighting methods to deal with unvisited or new added pages. …”
Get full text
Get full text
Thesis -
5
Mobility-aware Offloading Decision For Multi-access Edge Computing In 5g Networks
Published 2024journal::journal article -
6
Comparison on machine learning algorithm to fast detection of malicious web pages
Published 2021“…However, this has exposed to the malicious activities and online threat to the users which will disrupt the method of every system and performance. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Evaluation of the effectiveness and efficiency of MASER and Bigram methods in retrieving Hadith documents / Mohd Yusof Mohd Zain
Published 2004“…Current technology features allow Internet users to retrieve any documents that are available from online databases. The main issue in this information age is the efficiency and effectiveness of the retrieval system that can be used by the information provider. …”
Get full text
Get full text
Thesis -
8
Image and translated Al-Quran verses retrieval system using thesaurus approach based on Malay query words / Mohd Zaini Mat Abas
Published 2001“…As well as Malay language, conflation methods such as string-similarity method and stemming algorithms have been applied to Malay documents retrieval system. …”
Get full text
Get full text
Thesis -
9
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…A comprehensive experimental analysis was conducted to evaluate the efficiency and effectiveness of the proposed algorithms (ONF-TRS, CC-TRS). …”
Get full text
Get full text
Thesis -
10
Postal address handwritten recognition using convolutional neural network / Nur Hasyimah Abd Aziz
Published 2020“…Functionality test was done in order to evaluate the system. The result of the functionality test is most of the user are satisfy with the system. …”
Get full text
Get full text
Thesis -
11
From Employees to Entrepreneurs: A Qualitative Exploration of Career Transitions in Ghana
Published 2025“…KMS validation was carried out through expert assessment, and the user acceptance of the KMS was evaluated using a survey method, which adopted a questionnaire from the Technology Acceptance Model (TAM) framework. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
13
An Artificial Intelligence-Based Knowledge Management System for Outcome-Based Education Implementing in Higher Education Institutions
Published 2025“…KMS validation was carried out through expert assessment, and the user acceptance of the KMS was evaluated using a survey method, which adopted a questionnaire from the Technology Acceptance Model (TAM) framework. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…One of a critical criterion of the detection system is capable to learn fast because after the learning, the updated information needs to be passed to user to avoid the user from being deceived by the cybercriminal. …”
Get full text
Get full text
Thesis -
15
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
Get full text
Get full text
Thesis -
16
-
17
CleverSecure ONLINE System
Published 2008“…CleverSecure Online System (COS) implements on the use of popular algorithm which is Blowfish algorithm to encrypt and decrypt the data that can be save in directory or send through email. …”
Get full text
Get full text
Final Year Project -
18
Job online scheduling within dynamic grid environment
Published 2008“…ACO is used to minimize the average completion time of jobs through optimal job allocation on each node as well. While, Tabu algorithm is used to adjust performance of grid system because online jobs are submitted to grid system from time to time. …”
Get full text
Get full text
Article -
19
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…This system is achieved using the Genetic Algorithm which is capable of performing information retrieval and learning algorithm. …”
Get full text
Get full text
Thesis -
20
