Search Results - (( user evaluation method algorithm ) OR ( rate information system algorithm ))*

Refine Results
  1. 1

    Deep reinforcement learning approaches for multi-objective problem in Recommender Systems by Ee, Yeo Keat

    Published 2022
    “…The current major existing multi-objective recommendation approaches utilize collaborative filtering method as rating predictor to replenish the missing ratings and combined with evolutionary algorithm for only bi-objective optimization. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Paper Survey And Example Of Collaborative Filtering Implementation In Recommender System by Hanafi, Suryana, Nanna, Hasan Basari, Abd Samad

    Published 2017
    “…The relation to the database query, it needs suitable query algorithm web search and user profiling strategy. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Book recommendation system / Nur Dalila Afifah Ghazali by Ghazali, Nur Dalila Afifah

    Published 2021
    “…For this project, the user-item rating methods and the item-item rating had been implemented on the system to generate the list of recommendation books to the user. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Personalized job recommender system using content-based filtering for UiTM Machang graduates by Rosli, Norhalili

    Published 2025
    “…The System Usability Scale (SUS) and User Acceptance Testing (UAT) are used to evaluate the system’s usability because they are well-known and trusted methods for measuring user experience. …”
    Get full text
    Get full text
    Student Project
  6. 6
  7. 7

    Improving Channel Assignment for Vehicular Ad-hoc Sensor Network in Disaster Management System by Chiu Shoon, Sia

    Published 2024
    “…This research shows that packet loss has a more significant influence when measured over the proposed methods and algorithms, as well as delay and energy consumption during the evaluation stage. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Postal address handwritten recognition using convolutional neural network / Nur Hasyimah Abd Aziz by Abd Aziz, Nur Hasyimah

    Published 2020
    “…Functionality test was done in order to evaluate the system. The result of the functionality test is most of the user are satisfy with the system. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Durian species recognition system based on global shape representations and k-nearest neighbors by Nyon, Xin Yi, Mustaffa, Mas Rina, Abdullah, Lili Nurliyana, Nasharuddin, Nurul Amelina

    Published 2018
    “…Few global contour-based and region-based shape descriptors such as area, perimeter, and circularity are computed as feature vectors and K-Nearest Neighbors algorithm is used to classify the durian based on the extracted features. 10-fold cross-validation is used to evaluate the proposed system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Evaluation of cracks and disintegrations using close-range digital photogrammetry and image processing technique by Ling, Tung Chai

    Published 2005
    “…Results obtained by this technique are compared with the Jabatan Kerja Raya manual using conventional method to check accuracy. The algorithms developed in this study are capable of identifying type of cracking and its severity level at the accuracy about 90%. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Framework for stream clustering of trajectories based on temporal micro clustering technique by Abdulrazzaq, Musaab Riyadh

    Published 2018
    “…The results shows that the algorithm ONF-TRS has low computational cost and high compression rate as compared with the existing works. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Network coding schemes with efficient LDPC coded MIMO–NOMA in two-way relay networks by Ngu War Hlaing, Ali Farzamnia, Muralindran Mariappan, Manas Kumar Haldar

    Published 2020
    “…Redundancy with randomly interleaved differential encoding (R-RIDE) is proposed and applied to LDPC encoded messages by two users. LDPC decoding is done using the sum-product algorithm (SPA), which has two types of decoding methods, hard-decision and soft-decision. …”
    Get full text
    Get full text
    Article
  13. 13

    Coastal Priority Ranking in Oil Spill Response Decision Support Mechanism by Pourvakhshouri, Seyedeh Zahra

    Published 2008
    “…General rates given to the mechanism by two groups of users were 82 and 85 percent with a + 3.66 percent of uncertainty that was issued a high verification value. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Hierarchical fuzzy logic ranking function for Malay translated hadith information retrieval system / Shaiful Bakhtiar Rodzman by Rodzman, Shaiful Bakhtiar

    Published 2022
    “…Hence, it is widely used as a baseline model for new ranking method evaluation in substitution to the vector model. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…One of a critical criterion of the detection system is capable to learn fast because after the learning, the updated information needs to be passed to user to avoid the user from being deceived by the cybercriminal. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Network coding schemes with efficient LDPC coded MIMO–NOMA in two-way relay networks by Takashi Kamada1,2 ·, Mary Lyn Johanis2 ·, Ng, Shean Yeaw, Phan, Chin Soon, Monica Suleiman, Charles Santhanaraju Vairappan

    Published 2020
    “…Redundancy with randomly interleaved differential encoding (R-RIDE) is proposed and applied to LDPC encoded messages by two users. LDPC decoding is done using the sum-product algorithm (SPA), which has two types of decoding methods, hard-decision and soft-decision. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Advancing Multiband OFDM Channel Sounding: An Iterative Time Domain Estimation for Spectrally Constrained Systems by Iqbal, A., Drieberg, M., Jeoti, V., Aziz, A.B.A., Stojanovic, G.M., Simic, M., Hussain, N.

    Published 2023
    “…The performance of the newly developed technique is evaluated through extensive numerical experiments, where the Mean Squared Error (MSE) and Bit Error Rate (BER) are computed for various scenarios. …”
    Get full text
    Get full text
    Article
  18. 18

    Advancing Multiband OFDM Channel Sounding: An Iterative Time Domain Estimation for Spectrally Constrained Systems by Iqbal, A., Drieberg, M., Jeoti, V., Aziz, A.A., Stojanovic, G.M., Simic, M., Hussain, N.

    Published 2023
    “…The performance of the newly developed technique is evaluated through extensive numerical experiments, where the Mean Squared Error (MSE) and Bit Error Rate (BER) are computed for various scenarios. …”
    Get full text
    Get full text
    Article
  19. 19

    The improvement of Item-based collaborative filtering algorithm in recommendation system using similarity index by Yao, Ma

    Published 2022
    “…A collaborative filtering algorithm is one of the algorithms applied in the recommendation system. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Crypt Edge Detection Using PSO,Label Matrix And BI-Cubic Interpolation For Better Iris Recognition(PSOLB) by Hashim, Nurul Akmal

    Published 2017
    “…Recently,there has been renewed interest in iris features detection.Gabor filter,cross entrophy, upport vector,and canny edge detection are methods which produce iris codes in binary codes representation.However,problems have occurred in iris recognition since low quality iris images are created due to blurriness,indoor or outdoor settings, and camera specifications.Failure was detected in 21% of the intra-class comparisons cases which were taken between intervals of three and six months intervals.However,the mismatch or False Rejection Rate (FRR) in iris recognition is still alarmingly high.Higher FRR also causes the value of Equal Error Rate (EER) to be high.The main reason for high values of FRR and EER is that there are changes in the iris due to the amount of light entering into the iris that changes the size of the unique features in the iris.One of the solutions to this problem is by finding any technique or algorithm to automatically detect the unique features.Therefore a new model is introduced which is called Crypt Edge Detection which combines PSO,Label Matrix,and Bi-Cubic Interpolation for Iris Recognition (PSOLB) to solve the problem of detection in iris features.In this research, the unique feature known as crypts has been chosen due to its accessibility and sustainability.Feature detection is performed using particle swarm optimisation (PSO) as an algorithm to select the best iris texture among the unique iris features by finding the pixel values according to the range of selected features.Meanwhile, label matrix will detect the edge of the crypt and the bi-cubic interpolation technique creates sharp and refined crypt images.In order to evaluate the proposed approach,FAR and FRR are measured using Chinese Academy of Sciences' Institute of Automation (CASIA) database for high quality images.For CASIA version 3 image databases, the crypt feature shows that the result of FRR is 21.83% and FAR is 78.17%.The finding from the experiment indicates that by using the PSOLB,the intersection between FAR and FRR produces the Equal Error Rate (EER) with 0.28%,which indicated that equal error rate is lower than previous value, which is 0.38%.Thus,there are advantages from using PSOLB as it has the ability to adapt with unique iris features and use information in iris template features to determine the user.The outcome of this new approach is to reduce the EER rates since lower EER rates can produce accurate detection of unique features.In conclusion,the contribution of PSOLB brings an innovation to the extraction process in the biometric technology and is beneficial to the communities.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis