Search Results - (( affecting recommendation based algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- affecting recommendation »
- customization algorithm »
- recommendation based »
- java application »
-
1
A network aware based recommender system for VOIP application service in eLearning environment / Nazdiana Ab. Wahab
Published 2009“…This paper showed the integration of VOIP in a simple eLearning prototype system. A network aware based algorithm is used to recommend users the best VOIP services available at that point of time (whether audio, video or data) based on the real time data obtained from bandwidth measurement tool. …”
Get full text
Get full text
Thesis -
2
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
3
UiTM research supervisor recommendation system / Ahmad Adam Ahmad Muzzlini
Published 2022“…The system was tested based on several factors that can affect the accuracy of the recommendation results using the dataset of research papers titles and abstracts. …”
Get full text
Get full text
Thesis -
4
Warpage analysis on thick shell part using response surface methodology (RSM) and bat algorithm (BA) to optimize parameter setting in injection molding process
Published 2018“…The recommended setting based on AMI shows that the warpage at X-axis is 0.6546 mm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Personalized Recommendation Classification Model of Students’ Social Well-being Based on Personality Trait Determinants Using Machine Learning Algorithms
Published 2023“…This article will discuss the development of an adaptive personalized recommendation classification model for students’ social well-being based on personality trait determinants. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Development of soft computing prediction model for the influent physicochemical characteristics of sewage treatment plants / Mozafar Ansari
Published 2021“…Sugeno fuzzy inference system (FIS) algorithm was used to model influent parameter, and the FIS parameters were adjusted by ANFIS, integrated Genetic algorithms, GA-FIS, and integrated particle swarm optimisation, PSO-FIS, algorithms. …”
Get full text
Get full text
Get full text
Thesis -
7
Prediction models of heritage building based on machine learning / Nur Shahirah Ja'afar
Published 2021“…This algorithms were selected based on previous literature review in price prediction. …”
Get full text
Get full text
Thesis -
8
Sentiment analysis of restaurant reviews in Kuala Terengganu based on K-Nearest Neighbor/ Siti Syazwana Jafri
Published 2021“…In the future, it is very recommended to experiment with different algorithm. …”
Get full text
Get full text
Thesis -
9
-
10
Rabbit breed classification using CNN / Aishah Nabila Mohd Zaid
Published 2024“…This project aims to study the CNN algorithm's efficacy in rabbit breed classification, develop a CNN-based prototype, and evaluate its accuracy. …”
Get full text
Get full text
Thesis -
11
Early autism spectrum disorder detection using machine learning / Muhammad Shahmi Shahron Nizan
Published 2023“…This project aims to develop a web-based application utilizing the Random Forest Classification Algorithm to aid concerned parents in detecting potential Autism Spectrum Disorder (ASD) symptoms in their children aged 1-6 years in Malaysia. …”
Get full text
Get full text
Thesis -
12
-
13
Standardizing and weighting the evaluation criteria of many-objective optimization competition algorithms based on fuzzy delphi and fuzzy-weighted zero-inconsistency methods
Published 2021“…The evaluation criteria of Many Objective Optimization algorithm (MaOO) play a critical role in evaluating the competition MaOO algorithms. …”
Get full text
Get full text
Thesis -
14
Top-Oil Thermal Model for Power Transformers that Reflects Ambient Temperature Profile in Malaysia
Published 2024“…The ambient temperature profile which is based on a few of the world continents' profiles and also specifically the ambient temperature profile in Malaysia are studied and presented by varying ambient temperatures in the IEC Standard mathematical algorithm. …”
Conference Paper -
15
Improving Patient Rehabilitation Performance In Exercise Games Using Collaborative Filtering Approach
Published 2024journal::journal article -
16
The multiple outliers detection for circular univariate data using different agglomerative clustering algorithms
Published 2024“…In univariate circular data, the presence of outliers is acclaimed will affect the parameter estimates and inferences. This study proposes the procedure of detecting multiple outliers, particularly for univariate circular data based on agglomerative clustering algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Some Metaheuristics for Tourist Trip Design Problem
Published 2023“…The results show that CP-based algorithms are superior to NSGA-II in finding a Pareto frontier. …”
Get full text
Get full text
Conference or Workshop Item -
19
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…Furthermore, the proposed KSA algorithm has been validated using the randomness test proposed and recommended by NIST, avalanche test and has achieved remarkable result of 94%, brute force and correlation assessment test with -0.000449 correlations. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Effects of Authentication of Users in Mobile Internet Protocol Version 6
Published 2004“…The conclusions made above are based purely on simulation results. The password system is also recommended as a viable solution for this authentication as its implementation is most convenient for mobile users. …”
Get full text
Get full text
Thesis
