Search Results - (( intelligence based user algorithm ) OR ( intelligence based bas algorithm ))

Refine Results
  1. 1

    Tag cloud algorithm with the inclusion of personality traits by Supli, Ahmad Affandi, Shiratuddin, Norshuhada, Ab. Aziz, Azizi

    Published 2014
    “…Since there is no study has tried to create an algorithm that can customize tag cloud visual properties based on personality traits. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Healthy Lifestyle Management System by Abu Bakar, Muhammad Syazwan

    Published 2011
    “…The intelligent algorithm that used in this application is Rule-Based algorithm. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation by Mat Jani H., Lee S.P.

    Published 2023
    “…The main objective of this paper is to propose and implement an intelligent framework documentation approach that integrates case-based learning (CBL) with genetic algorithm (GA) and Knuth-Morris-Pratt (KMP) pattern matching algorithm with the intention of making learning a framework more effective. …”
    Conference paper
  4. 4
  5. 5

    VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS. by FAROOQ, HUMERA

    Published 2012
    “…In proposed research work, the user is aided by a visualization based on the representation of multidimensional Genetic Algorithm data on 2-0 space. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…In order to develop an intelligent agent, various programming techniques are used in achieving the property of self learning, information retrieval and searching algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12
  13. 13

    Developing an intelligent user manager system for controlling smart school network resources by Gani, Abdullah, Mouratidis, H., Abouzakhar, N.S., Manson, G.A.

    Published 2002
    “…This paper presents an Intelligent User Manager System (UMAS) for controlling access to network resources in a Smart School network. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Intelligent muslim prayer counter with programmable interface controller (PIC) by Hassim, Hasniza

    Published 2014
    “…By using PIC algorithm, there are more improvement can be made in future based on further value added requirement request by user or manufacturer.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    PSAT : a pairwise test data generation tool based on simulated annealing algorithm by Goh, Ghee Hau

    Published 2015
    “…In this research, the test case will be generated based on the SA algorithm to show that the test case can be generated with sufficient.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16

    Extreme learning machine for user location prediction in mobile environment by Mantoro, Teddy, Olowolayemo, Akeem, Olatunji, Sunday O., Ayu, Media A., Abu Osman, Md. Tap

    Published 2011
    “…Originality/value – A new computational intelligence modeling scheme, based on the ELM has been investigated, developed and implemented, as an efficient and more accurate predictive solution for determining position of mobile users based on location fingerprint data (SS and SQ).…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…In this thesis, the research gap related to the accuracy of authenticating a legitimate user is brought to light. The problem is in multi-factor authentication with public cloud computing, the performance of user authentication in password-based authentication needs to move from traditional security processes to intelligent security processes. …”
    text::Thesis
  18. 18

    Expectation maximization clustering algorithm for user modeling in web usage mining system by Mustapha, Norwati, Jalali, Manijeh, Jalali, Mehrdad

    Published 2009
    “…To provide intelligent personalized online services such as web recommender systems, it is usually necessary to model users’ web access behavior. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Distributed learning based energy-efficient operations in small cell networks by Mughees, Amna

    Published 2023
    “…Additionally, an intelligent distributed cooperative power allocation learning algorithm is proposed to enhance energy efficiency in small cell networks while satisfying the scalability, power constraint, user association requirements, and QoS constraints. …”
    Get full text
    Get full text
    Thesis