Search Results - (( affecting recommendation based algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    A network aware based recommender system for VOIP application service in eLearning environment / Nazdiana Ab. Wahab by Ab. Wahab, Nazdiana

    Published 2009
    “…This paper showed the integration of VOIP in a simple eLearning prototype system. A network aware based algorithm is used to recommend users the best VOIP services available at that point of time (whether audio, video or data) based on the real time data obtained from bandwidth measurement tool. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  3. 3

    UiTM research supervisor recommendation system / Ahmad Adam Ahmad Muzzlini by Ahmad Muzzlini, Ahmad Adam

    Published 2022
    “…The system was tested based on several factors that can affect the accuracy of the recommendation results using the dataset of research papers titles and abstracts. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Personalized Recommendation Classification Model of Students’ Social Well-being Based on Personality Trait Determinants Using Machine Learning Algorithms by Rochin Demong, Nur Atiqah, Shahrom, Melissa, Abdul Rahim, Ramita, Omar, Emi Normalina, Yahya, Mornizan

    Published 2023
    “…This article will discuss the development of an adaptive personalized recommendation classification model for students’ social well-being based on personality trait determinants. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Development of soft computing prediction model for the influent physicochemical characteristics of sewage treatment plants / Mozafar Ansari by Mozafar , Ansari

    Published 2021
    “…Sugeno fuzzy inference system (FIS) algorithm was used to model influent parameter, and the FIS parameters were adjusted by ANFIS, integrated Genetic algorithms, GA-FIS, and integrated particle swarm optimisation, PSO-FIS, algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Prediction models of heritage building based on machine learning / Nur Shahirah Ja'afar by Ja'afar, Nur Shahirah

    Published 2021
    “…This algorithms were selected based on previous literature review in price prediction. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Sentiment analysis of restaurant reviews in Kuala Terengganu based on K-Nearest Neighbor/ Siti Syazwana Jafri by Jafri, Siti Syazwana

    Published 2021
    “…In the future, it is very recommended to experiment with different algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Rabbit breed classification using CNN / Aishah Nabila Mohd Zaid by Mohd Zaid, Aishah Nabila

    Published 2024
    “…This project aims to study the CNN algorithm's efficacy in rabbit breed classification, develop a CNN-based prototype, and evaluate its accuracy. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Early autism spectrum disorder detection using machine learning / Muhammad Shahmi Shahron Nizan by Shahron Nizan, Muhammad Shahmi

    Published 2023
    “…This project aims to develop a web-based application utilizing the Random Forest Classification Algorithm to aid concerned parents in detecting potential Autism Spectrum Disorder (ASD) symptoms in their children aged 1-6 years in Malaysia. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Standardizing and weighting the evaluation criteria of many-objective optimization competition algorithms based on fuzzy delphi and fuzzy-weighted zero-inconsistency methods by Salih, Rawia Tahrir

    Published 2021
    “…The evaluation criteria of Many Objective Optimization algorithm (MaOO) play a critical role in evaluating the competition MaOO algorithms. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Top-Oil Thermal Model for Power Transformers that Reflects Ambient Temperature Profile in Malaysia by Azman S.N.A.B., Nik Ali N.H., Doolgindachbaporn A., Ariffin A.M., Azis N., Aminudin N.

    Published 2024
    “…The ambient temperature profile which is based on a few of the world continents' profiles and also specifically the ambient temperature profile in Malaysia are studied and presented by varying ambient temperatures in the IEC Standard mathematical algorithm. …”
    Conference Paper
  15. 15
  16. 16

    The multiple outliers detection for circular univariate data using different agglomerative clustering algorithms by Nur Syahirah, Zulkipli, Siti Zanariah, Satari, Wan Nur Syahidah, Wan Yusoff

    Published 2024
    “…In univariate circular data, the presence of outliers is acclaimed will affect the parameter estimates and inferences. This study proposes the procedure of detecting multiple outliers, particularly for univariate circular data based on agglomerative clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Some Metaheuristics for Tourist Trip Design Problem by Son, N.T., Nguyet Ha, T.T., Jaafar, J.B., Anh, B.N., Giang, T.T.

    Published 2023
    “…The results show that CP-based algorithms are superior to NSGA-II in finding a Pareto frontier. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation by Hassan Disina, Abdulkadir

    Published 2018
    “…Furthermore, the proposed KSA algorithm has been validated using the randomness test proposed and recommended by NIST, avalanche test and has achieved remarkable result of 94%, brute force and correlation assessment test with -0.000449 correlations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Effects of Authentication of Users in Mobile Internet Protocol Version 6 by Obenofunde, Simon Tabi

    Published 2004
    “…The conclusions made above are based purely on simulation results. The password system is also recommended as a viable solution for this authentication as its implementation is most convenient for mobile users. …”
    Get full text
    Get full text
    Thesis