Search Results - (( using function method algorithm ) OR ( user evaluation system algorithm ))

Refine Results
  1. 1

    DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS by MEHMOOD SHAH, SYED NASIR

    Published 2012
    “…The issue is not only to develop new algorithms, but also to evaluate them on an experimental computational grid, using synthetic and real workload traces, along with the other existing job scheduling algorithms. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Finally, the system employs a query formulation via node algorithm (QRYFv) algorithm to improve the selection of structured queries that best match user query Experiments have been conducted to evaluate the performance of the proposed enrichment method, XKQSS and RAXKQSS. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Jogging activity recognition using k-NN algorithm by Afifah Ismail

    Published 2022
    “…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  4. 4
  5. 5

    Channel-aware downlink scheduling for quality of service in long term evolution network by Najim, Alaa Omer

    Published 2018
    “…The proposed algorithm using system-level simulation experiments with performance comparison with DBWPF in terms of end-to-end delay, fairness, system throughput, Packet Loss Ratio (PLR), and spectral efficiency was evaluated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems by Shakeel Ahmed, Kamboh

    Published 2014
    “…The designed algorithms are implemented for EHD equations and their performance is evaluated by using different performance indicators. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Space allocation for examination scheduling using Genetic Algorithm / Alya Kauthar Azman by Azman, Alya Kauthar

    Published 2025
    “…The system generates and evaluates potential schedules using fitness functions, selection, crossover, and mutation operators to iteratively improve scheduling efficiency. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    The solution of 2048 puzzle game using A* algorithm / Zafhira Ismail by Ismail, Zafhira

    Published 2017
    “…This project use usability test for user testing system and functionality test to evaluate the efficiency of the game. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Smart Routing For Solid Waste Collection by Ngiam, John Tze

    Published 2023
    “…The algorithm will be evaluated through simulations and field testing in a residential area in Kuching. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  11. 11
  12. 12
  13. 13

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…To improve the users’ memorability, the upload background picture function and cued colour scheme were proposed for the BPG system; the grid line scaling function and the loose authentication method were proposed for the enhanced BPG system; and the chronological story-based cued recall technique was proposed for the VIP Pro system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Translated Al-Quran retrieval system employing Bigram using Apache / Norsharizan Muhamad by Muhamad, Norsharizan

    Published 2004
    “…This project will employ bigram algorithm that will be used to retrieve translated Al-Quran documents using Malay keywords. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    3D virtual modelling and stabilization control of triple links inverted pendulum on two-wheeled system using enhanced interval type-2 fuzzy logic control by Muhammad Firdaus, Masrom

    Published 2020
    “…This modelling technique also allow provides visualization for user to evaluate the performance of the system. The completed model system is further incorporated with Matlab/Simulink for analysis, control design and evaluation purposes. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Nonlinear Equation Solver with MATLAB Graphical User Interface / Nur Idalisa Norddin ... [et al.] by Norddin, Nur Idalisa, Fadhilah, Nurul Hafawati, Azman Shah, Muhammad Azri, Mohd Yusoff, Nurul Hajar, Ahmad, Nur Intan Syafinaz

    Published 2025
    “…The article evaluates the differences and similarities of four commonly used iterative methods: Newton, Broyden, BFGS, and Steepest Descent. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Application of Neural Network in User Authentication for Smart Home System by Joseph, A., David Bong, Boon Liang, Dayang Azra, Awang Mat

    Published 2009
    “…Password-based authentication is widely used to identify authorize users, because this method is cheap, easy and quite accurate. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Comparison of CPU damage prediction accuracy between certainty factor and forward chaining techniques by Tri Ginanjar Laksana, Ade Rahmat Iskandar, Wan Nooraishya Wan Ahmad

    Published 2024
    “…The study findings indicate that the suggested Certainty Factor method is more suited for use in embedded systems or web-based applications, however it is constrained by low processing.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    User authentication using neural network in smart home by Jee,, Tze Ling

    Published 2009
    “…The network which gives the better performance network is used to develop the user authentication system.…”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD