Search Results - (( user evaluation methods algorithm ) OR ( based information system algorithm ))
Search alternatives:
- evaluation methods »
- information system »
- methods algorithm »
- based information »
- system algorithm »
- user evaluation »
-
1
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…In this study, a new algorithm is proposed to represent an enhanced version of content-based recommender systems by utilizing social networking features. …”
Get full text
Get full text
Thesis -
2
Adaptive method to improve web recommendation system for anonymous users
Published 2011“…The second is Adaptive Web page Recommendation System (AWRS) which combines the classification algorithm of iPACT in addition to the ability of adaptive recommending due to the changes of the users‟ interests and weighting methods to deal with unvisited or new added pages. …”
Get full text
Get full text
Thesis -
3
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
Get full text
Get full text
Thesis -
4
Evaluation of the effectiveness of clustering algorithm in retrieving Malay documents / Aminah Mahmood
Published 2004“…A good retrieval system should provide tools to perform searching accurately based on user requirements. …”
Get full text
Get full text
Thesis -
5
Recommendation System Model For Decision Making in the E-Commerce Application
Published 2024thesis::doctoral thesis -
6
-
7
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…In a fingerprint authentication system, user fingerprint information is stored in databases in an image format known as a fingerprint template. …”
Get full text
Get full text
Get full text
Article -
8
Agent-based extraction algorithm for computational problem solving
Published 2015“…Four agents have been proposed as an agent based model for CPS, which are User_Agent, PAC_Agent, IPO_Agent and Algorithm_Agent. …”
Get full text
Get full text
Thesis -
9
Jogging activity recognition using k-NN algorithm
Published 2022“…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
Get full text
Get full text
Get full text
Academic Exercise -
10
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Finally, the system employs a query formulation via node algorithm (QRYFv) algorithm to improve the selection of structured queries that best match user query Experiments have been conducted to evaluate the performance of the proposed enrichment method, XKQSS and RAXKQSS. …”
Get full text
Get full text
Get full text
Thesis -
11
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…Based on the previous report, some issues arise, such as time-consumption between the staff and the customer when ordering, lack of details and inconsistency of the manual system data. …”
Get full text
Get full text
Thesis -
12
Deep reinforcement learning approaches for multi-objective problem in Recommender Systems
Published 2022“…However, collaborative filtering suffers from cold-start problem and incapable to predict rating on highly sparse user-item matrix besides difficulty to incorporate side features information such as user latent, which led to weak performance when encountering new items or users. …”
Get full text
Get full text
Thesis -
13
An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization
Published 2019“…Therefore, the improved AKF algorithm is a suitable technique for applications in computer vision fields such as passive object-based video authentication systems.…”
Get full text
Get full text
Article -
14
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
text::Thesis -
15
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…The proposed authentication method, uses an enhanced method where the credentials are encrypted through an algorithm. …”
Get full text
Get full text
Get full text
Thesis -
16
Influence maximisation towards target users and minimal diffusion of information based on information needs
Published 2020“…Evaluation on IDTU was performed against 3 greedy and 6 heuristics benchmark algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Mobility-aware Offloading Decision For Multi-access Edge Computing In 5g Networks
Published 2024journal::journal article -
18
Translated Al-Quran retrieval system employing Bigram using Apache / Norsharizan Muhamad
Published 2004“…This project is to broad the study on information retrieval based on Malay query words and databases. …”
Get full text
Get full text
Thesis -
19
Book recommendation system / Nur Dalila Afifah Ghazali
Published 2021“…For this project, the user-item rating methods and the item-item rating had been implemented on the system to generate the list of recommendation books to the user. …”
Get full text
Get full text
Thesis -
20
Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map
Published 2023“…Results showed that the algorithm was able to securely protect image data and the private information associated with them, while also making it very difficult for unauthorized users to decrypt the information. …”
Get full text
Get full text
Get full text
Article
