Search Results - (( developing new users algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- application stemming »
- stemming algorithm »
- java application »
- users algorithm »
- developing new »
- new users »
-
1
Enhance key generation algorithm based user string identity as public key
Published 2015“…This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
Get full text
Get full text
Thesis -
2
Applying case reuse and Rule-Based Reasoning (RBR) in object-oriented application framework documentation: Analysis and design
Published 2023“…We believe that with the reuse of past cases for solving new problems, new framework users will be able to dramatically improve their software development performance. …”
Conference Paper -
3
Mobile game application development using evolutionary algorithms
Published 2014“…Hence it has opened up a whole new market with its mass among users and attracted a large number of smartphone application developers. …”
Get full text
Get full text
Get full text
Thesis -
4
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…The issue is not only to develop new algorithms, but also to evaluate them on an experimental computational grid, using synthetic and real workload traces, along with the other existing job scheduling algorithms. …”
Get full text
Get full text
Thesis -
5
Extreme learning machine for user location prediction in mobile environment
Published 2011“…Originality/value – A new computational intelligence modeling scheme, based on the ELM has been investigated, developed and implemented, as an efficient and more accurate predictive solution for determining position of mobile users based on location fingerprint data (SS and SQ).…”
Get full text
Get full text
Get full text
Article -
6
ROA-CONS: raccoon optimization job scheduling
Published 2021“…It contributes to the development of a symmetrical schedule that increases user satisfaction and performance. …”
Get full text
Get full text
Article -
7
-
8
A new classification model for online predicting users' future movements
Published 2008Get full text
Get full text
Conference or Workshop Item -
9
A Web-Based Recommendation System To Predict User Movements Through Web Usage Mining
Published 2009“…In the online phase, the longest common subsequence algorithm is used as a new approach in recommendation system for classifying current user activities to predict user next movements. …”
Get full text
Get full text
Thesis -
10
Extreme learning machine for user location prediction in mobile environment
Published 2011“…Originality/value – A new computational intelligence modeling scheme, based on the ELM has been investigated, developed and implemented, as an efficient and more accurate predictive solution for determining position of mobile users based on location fingerprint data (SS and SQ).…”
Get full text
Get full text
Get full text
Article -
11
A hybrid approach for personalized news recommendation with ordered clustering algorithm, rich user and news metadata
Published 2019“…Furthermore, new models for user profile and news metadata construction are proposed where new properties have been incorporated, namely: Reading Rate, Hotness Rate, and Hotness. …”
Get full text
Get full text
Thesis -
12
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…The aim of the proposed approach is to study the benefit of using visualization techniques to explorer Genetic Algorithm data based on gene values. The user participates in the search by proposing a new individual. …”
Get full text
Get full text
Thesis -
13
FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems
Published 2016“…According to the results obtained from the developed algorithm and implementation tools, a high number of users can be physically possible and provided with support. …”
Get full text
Get full text
Article -
14
PSAT : a pairwise test data generation tool based on simulated annealing algorithm
Published 2015“…Each parameter will have different parameter values that entering by users. In development of PSAT, a prototype of Graphics User Interface (GUI) will be designed and create for user to enter the number of parameters and number of values for each parameter. …”
Get full text
Get full text
Undergraduates Project Papers -
15
A machine learning approach to tourism recommendations system
Published 2025“…This project aims to develop a tourism attractions recommendation system by integrating machine learning recommendation algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…The purpose of this study was to design and develop new secure plug-in on Microsoft Outlook using integration of symmetric and asymmetric cryptographic algorithm. …”
Get full text
Get full text
Thesis -
17
Online Clothing Shopbots via Web Content Extraction / Nurul Syazwani Ramzi
Published 2017“…An algorithm vision based page segmentation algorithm will be implemented in this system to extract the data from multiple websites and will be displayed in new website. …”
Get full text
Get full text
Thesis -
18
An adaptive QOS scheduling algorithm in service oriented grid and cloud environment / Ang Tan Fong
Published 2011“…AQoSSA is able to maximize reliability and profit while guaranteeing the users’ QoS requirements. An experimental testbed is developed to evaluate the performances of all the proposed algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
19
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Mostly, it attacks Android due to its popularity and high usage among end users. Every day, more and more malicious mobile applications (apps) with the botnet capability have been developed to exploit end users' smartphones. …”
Proceedings Paper -
20
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper
