Search Results - (( user evaluation method algorithm ) OR ( rate information system algorithm ))*
Search alternatives:
- information system »
- method algorithm »
- rate information »
- system algorithm »
- user evaluation »
-
1
Deep reinforcement learning approaches for multi-objective problem in Recommender Systems
Published 2022“…The current major existing multi-objective recommendation approaches utilize collaborative filtering method as rating predictor to replenish the missing ratings and combined with evolutionary algorithm for only bi-objective optimization. …”
Get full text
Get full text
Thesis -
2
Paper Survey And Example Of Collaborative Filtering Implementation In Recommender System
Published 2017“…The relation to the database query, it needs suitable query algorithm web search and user profiling strategy. …”
Get full text
Get full text
Get full text
Article -
3
Book recommendation system / Nur Dalila Afifah Ghazali
Published 2021“…For this project, the user-item rating methods and the item-item rating had been implemented on the system to generate the list of recommendation books to the user. …”
Get full text
Get full text
Thesis -
4
On iterative low-complexity algorithm for optimal antenna selection and joint transmit power allocation under impact pilot contamination in downlink 5g massive MIMO systems
Published 2020“…Massive MIMO systems are affected by pilot contamination, which influences the data rate of the system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Personalized job recommender system using content-based filtering for UiTM Machang graduates
Published 2025“…The System Usability Scale (SUS) and User Acceptance Testing (UAT) are used to evaluate the system’s usability because they are well-known and trusted methods for measuring user experience. …”
Get full text
Get full text
Student Project -
6
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
7
Improving Channel Assignment for Vehicular Ad-hoc Sensor Network in Disaster Management System
Published 2024“…This research shows that packet loss has a more significant influence when measured over the proposed methods and algorithms, as well as delay and energy consumption during the evaluation stage. …”
Get full text
Get full text
Get full text
Thesis -
8
Postal address handwritten recognition using convolutional neural network / Nur Hasyimah Abd Aziz
Published 2020“…Functionality test was done in order to evaluate the system. The result of the functionality test is most of the user are satisfy with the system. …”
Get full text
Get full text
Thesis -
9
Durian species recognition system based on global shape representations and k-nearest neighbors
Published 2018“…Few global contour-based and region-based shape descriptors such as area, perimeter, and circularity are computed as feature vectors and K-Nearest Neighbors algorithm is used to classify the durian based on the extracted features. 10-fold cross-validation is used to evaluate the proposed system. …”
Get full text
Get full text
Conference or Workshop Item -
10
Evaluation of cracks and disintegrations using close-range digital photogrammetry and image processing technique
Published 2005“…Results obtained by this technique are compared with the Jabatan Kerja Raya manual using conventional method to check accuracy. The algorithms developed in this study are capable of identifying type of cracking and its severity level at the accuracy about 90%. …”
Get full text
Get full text
Thesis -
11
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…The results shows that the algorithm ONF-TRS has low computational cost and high compression rate as compared with the existing works. …”
Get full text
Get full text
Thesis -
12
Network coding schemes with efficient LDPC coded MIMO–NOMA in two-way relay networks
Published 2020“…Redundancy with randomly interleaved differential encoding (R-RIDE) is proposed and applied to LDPC encoded messages by two users. LDPC decoding is done using the sum-product algorithm (SPA), which has two types of decoding methods, hard-decision and soft-decision. …”
Get full text
Get full text
Article -
13
Coastal Priority Ranking in Oil Spill Response Decision Support Mechanism
Published 2008“…General rates given to the mechanism by two groups of users were 82 and 85 percent with a + 3.66 percent of uncertainty that was issued a high verification value. …”
Get full text
Get full text
Thesis -
14
Hierarchical fuzzy logic ranking function for Malay translated hadith information retrieval system / Shaiful Bakhtiar Rodzman
Published 2022“…Hence, it is widely used as a baseline model for new ranking method evaluation in substitution to the vector model. …”
Get full text
Get full text
Thesis -
15
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…One of a critical criterion of the detection system is capable to learn fast because after the learning, the updated information needs to be passed to user to avoid the user from being deceived by the cybercriminal. …”
Get full text
Get full text
Thesis -
16
Network coding schemes with efficient LDPC coded MIMO–NOMA in two-way relay networks
Published 2020“…Redundancy with randomly interleaved differential encoding (R-RIDE) is proposed and applied to LDPC encoded messages by two users. LDPC decoding is done using the sum-product algorithm (SPA), which has two types of decoding methods, hard-decision and soft-decision. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Advancing Multiband OFDM Channel Sounding: An Iterative Time Domain Estimation for Spectrally Constrained Systems
Published 2023“…The performance of the newly developed technique is evaluated through extensive numerical experiments, where the Mean Squared Error (MSE) and Bit Error Rate (BER) are computed for various scenarios. …”
Get full text
Get full text
Article -
18
Advancing Multiband OFDM Channel Sounding: An Iterative Time Domain Estimation for Spectrally Constrained Systems
Published 2023“…The performance of the newly developed technique is evaluated through extensive numerical experiments, where the Mean Squared Error (MSE) and Bit Error Rate (BER) are computed for various scenarios. …”
Get full text
Get full text
Article -
19
The improvement of Item-based collaborative filtering algorithm in recommendation system using similarity index
Published 2022“…A collaborative filtering algorithm is one of the algorithms applied in the recommendation system. …”
Get full text
Get full text
Get full text
Thesis -
20
Crypt Edge Detection Using PSO,Label Matrix And BI-Cubic Interpolation For Better Iris Recognition(PSOLB)
Published 2017“…Recently,there has been renewed interest in iris features detection.Gabor filter,cross entrophy, upport vector,and canny edge detection are methods which produce iris codes in binary codes representation.However,problems have occurred in iris recognition since low quality iris images are created due to blurriness,indoor or outdoor settings, and camera specifications.Failure was detected in 21% of the intra-class comparisons cases which were taken between intervals of three and six months intervals.However,the mismatch or False Rejection Rate (FRR) in iris recognition is still alarmingly high.Higher FRR also causes the value of Equal Error Rate (EER) to be high.The main reason for high values of FRR and EER is that there are changes in the iris due to the amount of light entering into the iris that changes the size of the unique features in the iris.One of the solutions to this problem is by finding any technique or algorithm to automatically detect the unique features.Therefore a new model is introduced which is called Crypt Edge Detection which combines PSO,Label Matrix,and Bi-Cubic Interpolation for Iris Recognition (PSOLB) to solve the problem of detection in iris features.In this research, the unique feature known as crypts has been chosen due to its accessibility and sustainability.Feature detection is performed using particle swarm optimisation (PSO) as an algorithm to select the best iris texture among the unique iris features by finding the pixel values according to the range of selected features.Meanwhile, label matrix will detect the edge of the crypt and the bi-cubic interpolation technique creates sharp and refined crypt images.In order to evaluate the proposed approach,FAR and FRR are measured using Chinese Academy of Sciences' Institute of Automation (CASIA) database for high quality images.For CASIA version 3 image databases, the crypt feature shows that the result of FRR is 21.83% and FAR is 78.17%.The finding from the experiment indicates that by using the PSOLB,the intersection between FAR and FRR produces the Equal Error Rate (EER) with 0.28%,which indicated that equal error rate is lower than previous value, which is 0.38%.Thus,there are advantages from using PSOLB as it has the ability to adapt with unique iris features and use information in iris template features to determine the user.The outcome of this new approach is to reduce the EER rates since lower EER rates can produce accurate detection of unique features.In conclusion,the contribution of PSOLB brings an innovation to the extraction process in the biometric technology and is beneficial to the communities.…”
Get full text
Get full text
Get full text
Get full text
Thesis
