Search Results - (( user evaluation methods algorithm ) OR ( based information system algorithm ))

Refine Results
  1. 1

    Content-based recommender system for an academic social network / Vala Ali Rohani by Vala Ali, Rohani

    Published 2014
    “…In this study, a new algorithm is proposed to represent an enhanced version of content-based recommender systems by utilizing social networking features. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Adaptive method to improve web recommendation system for anonymous users by Almurtadha, Yahya Mohammed

    Published 2011
    “…The second is Adaptive Web page Recommendation System (AWRS) which combines the classification algorithm of iPACT in addition to the ability of adaptive recommending due to the changes of the users‟ interests and weighting methods to deal with unvisited or new added pages. …”
    Get full text
    Get full text
    Thesis
  3. 3

    An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias by Alias, Nur Farehah

    Published 2017
    “…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Evaluation of the effectiveness of clustering algorithm in retrieving Malay documents / Aminah Mahmood by Mahmood, Aminah

    Published 2004
    “…A good retrieval system should provide tools to perform searching accurately based on user requirements. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…In a fingerprint authentication system, user fingerprint information is stored in databases in an image format known as a fingerprint template. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…Four agents have been proposed as an agent based model for CPS, which are User_Agent, PAC_Agent, IPO_Agent and Algorithm_Agent. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Jogging activity recognition using k-NN algorithm by Afifah Ismail

    Published 2022
    “…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  10. 10

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Finally, the system employs a query formulation via node algorithm (QRYFv) algorithm to improve the selection of structured queries that best match user query Experiments have been conducted to evaluate the performance of the proposed enrichment method, XKQSS and RAXKQSS. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…Based on the previous report, some issues arise, such as time-consumption between the staff and the customer when ordering, lack of details and inconsistency of the manual system data. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Deep reinforcement learning approaches for multi-objective problem in Recommender Systems by Ee, Yeo Keat

    Published 2022
    “…However, collaborative filtering suffers from cold-start problem and incapable to predict rating on highly sparse user-item matrix besides difficulty to incorporate side features information such as user latent, which led to weak performance when encountering new items or users. …”
    Get full text
    Get full text
    Thesis
  13. 13

    An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization by Mizher, Manar Abduljabbar Ahmad, Ang, Mei Choo, Sheikh Abdullah, Siti Norul Huda, Kok, Weng Ng

    Published 2019
    “…Therefore, the improved AKF algorithm is a suitable technique for applications in computer vision fields such as passive object-based video authentication systems.…”
    Get full text
    Get full text
    Article
  14. 14

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
    text::Thesis
  15. 15

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…The proposed authentication method, uses an enhanced method where the credentials are encrypted through an algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Translated Al-Quran retrieval system employing Bigram using Apache / Norsharizan Muhamad by Muhamad, Norsharizan

    Published 2004
    “…This project is to broad the study on information retrieval based on Malay query words and databases. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Book recommendation system / Nur Dalila Afifah Ghazali by Ghazali, Nur Dalila Afifah

    Published 2021
    “…For this project, the user-item rating methods and the item-item rating had been implemented on the system to generate the list of recommendation books to the user. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map by Emmanuel Oluwatobi Asani, Godsfavour Biety-Nwanju, Abidemi Emmanuel Adeniyi, Salil Bharany, Ashraf Osman Ibrahim Elsayed, Anas W. Abulfaraj, Wamda Nagmeldin

    Published 2023
    “…Results showed that the algorithm was able to securely protect image data and the private information associated with them, while also making it very difficult for unauthorized users to decrypt the information. …”
    Get full text
    Get full text
    Get full text
    Article