Search Results - (( user evaluation study algorithm ) OR ( writer classification system algorithm ))
Search alternatives:
- writer classification »
- classification system »
- evaluation study »
- system algorithm »
- user evaluation »
-
1
Arabic Calligraphy Classification using Triangle Model for Digital Jawi Paleography Analysis
Published 2011Get full text
Get full text
Conference or Workshop Item -
2
Arabic Calligraphy Classification using Triangle Model for Digital Jawi Paleography Analysis
Published 2011Get full text
Get full text
Conference or Workshop Item -
3
-
4
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…In addition, a prototype was developed to evaluate the proposed algorithm. Then, user satisfaction was conducted in order to evaluate this prototype using Q-SAFI instruments. …”
Get full text
Get full text
Get full text
Thesis -
5
Movie recommendation using user-based collaborative filtering algorithm / Nur Ayuni Izlin Mat Ishor
Published 2019“…Evaluation for this study is to evaluate the of reliability result of recommendation engine by using the approach algorithm. …”
Get full text
Get full text
Thesis -
6
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…This is difTerent from existing Interactive Genetic Algorithm in which selection and evaluation of solutions is done by the users. …”
Get full text
Get full text
Thesis -
7
Performance evaluation of vertical handoff in fourth generation (4G) networks model
Published 2009Get full text
Working Paper -
8
Recommendation System Model For Decision Making in the E-Commerce Application
Published 2024thesis::doctoral thesis -
9
Detection and analysis of fake reviews on online service portal
Published 2022“…In this paper, a framework of a Machine Learning based fake review detection model has been proposed to identify which classification algorithm is the most effective with the proposed framework.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Ensemble based categorization and adaptive model for malware detection
Published 2011“…Malware is a software, which works as any other benigh software, but was designed to accomplish the goal of its writers. It was written to exploit the vulnerability of the target victim’s operating system or application. …”
Get full text
Get full text
Get full text
Article -
11
Independent task scheduling algorithms in fog environments from users’ and service providers’ perspectives: a systematic review
Published 2025“…To assure unbiased evaluation, a benchmark to assess task scheduling algorithms is proposed based on comparison to state-or-art algorithms, applicability to real-world contexts, meeting the objectives of the study, negative impacts on other performance metrics, and sizes of datasets used for evaluation. …”
Get full text
Get full text
Get full text
Article -
12
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…The OPNET simulator and the mathematical model were used to evaluate the performance for the proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
13
-
14
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…In its formulation, the algorithm considers the interests and preferences of users’ friends and faculty mates in addition to users’ own preferences. …”
Get full text
Get full text
Thesis -
15
Performance evaluation of caching placement algorithms in named data network for video on demand service
Published 2016“…The purpose of this study is to evaluate the performance of caching placement algorithms (LCD, LCE, Prob, Pprob, Cross, Centrality, and Rand) in Named Data Network (NDN) for Video on Demand (VoD). …”
Get full text
Get full text
Get full text
Thesis -
16
Performance analysis of resource allocation downlink for MIMO-OFDMA system using Greedy algorithm. / Azrinawati Samaon
Published 2014“…The proposed algorithm shows comparison between the noise to sub-channel ratio and power allocation in the midst of data sub-channel for 25, 75 and 100 users. …”
Get full text
Get full text
Article -
17
A comparative study of interactive segmentation with different number of strokes on complex images
Published 2020“…Therefore, the input from the user as well as the understanding of the algorithms based on the user input has an essential role in the success of interactive segmentation. …”
Get full text
Get full text
Get full text
Article -
18
A study on personalized recommender system using social media
Published 2020“…These machine learning algorithm processes the data set obtained. The evaluation on these algorithm is done to evaluate accuracy of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
A Comparative Study of Interactive Segmentation with Different Number of Strokes on Complex Images
Published 2020“…Therefore, the input from the user as well as the understanding of the algorithms based on the user input has an essential role in the success of interactive segmentation. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…Fingerprint is a reliable user authentication method as it is unique to individual users that makes it efficient for authenticating users. …”
Get full text
Get full text
Get full text
Article
