Search Results - (( intelligence based user algorithm ) OR ( intelligence based bas algorithm ))
Search alternatives:
- intelligence based »
- user algorithm »
- bas algorithm »
- based bas »
-
1
Tag cloud algorithm with the inclusion of personality traits
Published 2014“…Since there is no study has tried to create an algorithm that can customize tag cloud visual properties based on personality traits. …”
Get full text
Get full text
Get full text
Article -
2
Healthy Lifestyle Management System
Published 2011“…The intelligent algorithm that used in this application is Rule-Based algorithm. …”
Get full text
Get full text
Final Year Project -
3
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023“…The main objective of this paper is to propose and implement an intelligent framework documentation approach that integrates case-based learning (CBL) with genetic algorithm (GA) and Knuth-Morris-Pratt (KMP) pattern matching algorithm with the intention of making learning a framework more effective. …”
Conference paper -
4
User song preferences using preference learning in artificial intelligence
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…In proposed research work, the user is aided by a visualization based on the representation of multidimensional Genetic Algorithm data on 2-0 space. …”
Get full text
Get full text
Thesis -
6
-
7
Malaysia Constitutional Law System, Study On The Use Advanced Searching Algorithm (Rule-Based And Horspool Algorithm)
Published 2017“…We hope after build the intelligent web based system can solved the problem that user's faced.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
-
9
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In order to develop an intelligent agent, various programming techniques are used in achieving the property of self learning, information retrieval and searching algorithm. …”
Get full text
Get full text
Thesis -
10
The Evaluation of Cyclostationarity-Based Spectrum Sensing in Multipath Fading Channel
Published 2010Get full text
Get full text
Conference or Workshop Item -
11
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis -
12
Robust multi-user detection based on hybrid grey wolf optimization
Published 2020Get full text
Get full text
Get full text
Get full text
Get full text
Book Chapter -
13
Developing an intelligent user manager system for controlling smart school network resources
Published 2002“…This paper presents an Intelligent User Manager System (UMAS) for controlling access to network resources in a Smart School network. …”
Get full text
Get full text
Get full text
Article -
14
Intelligent muslim prayer counter with programmable interface controller (PIC)
Published 2014“…By using PIC algorithm, there are more improvement can be made in future based on further value added requirement request by user or manufacturer.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
PSAT : a pairwise test data generation tool based on simulated annealing algorithm
Published 2015“…In this research, the test case will be generated based on the SA algorithm to show that the test case can be generated with sufficient.…”
Get full text
Get full text
Undergraduates Project Papers -
16
Extreme learning machine for user location prediction in mobile environment
Published 2011“…Originality/value – A new computational intelligence modeling scheme, based on the ELM has been investigated, developed and implemented, as an efficient and more accurate predictive solution for determining position of mobile users based on location fingerprint data (SS and SQ).…”
Get full text
Get full text
Get full text
Article -
17
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023“…In this thesis, the research gap related to the accuracy of authenticating a legitimate user is brought to light. The problem is in multi-factor authentication with public cloud computing, the performance of user authentication in password-based authentication needs to move from traditional security processes to intelligent security processes. …”
text::Thesis -
18
Expectation maximization clustering algorithm for user modeling in web usage mining system
Published 2009“…To provide intelligent personalized online services such as web recommender systems, it is usually necessary to model users’ web access behavior. …”
Get full text
Get full text
Article -
19
-
20
Distributed learning based energy-efficient operations in small cell networks
Published 2023“…Additionally, an intelligent distributed cooperative power allocation learning algorithm is proposed to enhance energy efficiency in small cell networks while satisfying the scalability, power constraint, user association requirements, and QoS constraints. …”
Get full text
Get full text
Thesis
