Search Results - (( content evaluation using algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- content evaluation »
- data normalization »
- evaluation using »
- using algorithm »
- java »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
2
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
3
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
4
Educational video recommender system for computer science students using content-based filtering / Walid Burhani Mohd Zamani
Published 2025“…The objective is to study the content-based algorithm, to develop the prototype of educational video recommendation system using content-based filtering algorithm and to evaluate the performance and accuracy of the content-based filtering algorithm. …”
Get full text
Get full text
Thesis -
5
A selective approach for energy-aware video content adaptation decision-taking engine in android based smartphone
Published 2019“…Subjective evaluation by selected respondents are also has been made using Absolute Category Rating method as recommended by ITU to evaluate EnVADE algorithm in term of QoE. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
A selective approach for energy-aware video content adaptation decision-taking engine in android based smartphone
Published 2019“…Subjective evaluation by selected respondents are also has been made using Absolute Category Rating method as recommended by ITU to evaluate EnVADE algorithm in term of QoE. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…The OPNET simulator and the mathematical model were used to evaluate the performance for the proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
8
-
9
-
10
-
11
Performance evaluation of caching placement algorithms in named data network for video on demand service
Published 2016“…The NS3 simulations and the Internet2 topology were used to evaluate and analyze the findings of each algorithm, and to compare the results based on cache sizes: 1GB, 10GB, 100GB, and 1TB. …”
Get full text
Get full text
Get full text
Thesis -
12
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…In this study, a new algorithm is proposed to represent an enhanced version of content-based recommender systems by utilizing social networking features. …”
Get full text
Get full text
Thesis -
13
-
14
A new algorithm to measure relevance among Web pages
Published 2006“…This paper proposes a new algorithm to measure relevance among Web pages (RWP) using a hybrid method of hyperlink analysis and content analysis. …”
Get full text
Get full text
Get full text
Article -
15
Extreme learning machine classification of file clusters for evaluating content-based feature vectors
Published 2018“…Consequently, an Extreme Learning Machine (ELM) neural network algorithm is used to evaluate the performance of the three methods in which it classifies the class label of the feature vectors to JPEG and Non-JPEG images for files in different file formats. …”
Get full text
Article -
16
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
17
-
18
The evaluation of contentoriented XML document retrieval: a case study of official letter / Hayati Abd Rahman
Published 2006Get full text
Get full text
Research Reports -
19
A Continuous Overlay Path Probing Algorithm For Overlay Networks
Published 2013“…Several experiments were carried out using the OMNeT++ simulation framework. The designed algorithm was evaluated using experimental data. …”
Get full text
Get full text
Thesis -
20
Article recommendation system using content-based filtering / Muhammad Hazrul Afiq Kamaruddin
Published 2024“…The algorithm used is able to generate relevant article recommendations based on the content of the article. …”
Get full text
Get full text
Thesis
