Search Results - (( java application testing algorithm ) OR ( user solution learning algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Distributed learning based energy-efficient operations in small cell networks by Mughees, Amna

    Published 2023
    “…Simulation results demonstrate improved performance in power consumption, load, sum rate, utility, learning rate, convergence, and energy efficiency for small base stations (SBSs) and user equipment (UEs) compared to four benchmarked algorithms, including WMMSE, game theory, Q-learning, and DRL. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Extreme learning machine for user location prediction in mobile environment by Mantoro, Teddy, Olowolayemo, Akeem, Olatunji, Sunday O., Ayu, Media A., Abu Osman, Md. Tap

    Published 2011
    “…Findings – WiFi’s SS contributes more in accuracy to the prediction of user location than WiFi’s SQ. Moreover, the new framework based on ELM has been compared with the k-Nearest Neighbor and the results have shown that the proposed model based on the extreme learning algorithm outperforms the k-Nearest Neighbor approach. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Extreme learning machine for user location prediction in mobile environment by Mantoro, Teddy, Olowolayemo, Akeem, Olatunji, Sunday O., Ayu, Media Anugerah, Md. Tap, Abu Osman

    Published 2011
    “…Findings – WiFi's SS contributes more in accuracy to the prediction of user location than WiFi's SQ. Moreover, the new framework based on ELM has been compared with the k-Nearest Neighbor and the results have shown that the proposed model based on the extreme learning algorithm outperforms the k-Nearest Neighbor approach. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  6. 6

    User-centric learning for multiple access selections by Dzulkifli, Sumayyah, Hashim, Wahidah, Ismail, Ahmad Fadzil, Dohler, Mischa

    Published 2019
    “…The second stage involved utilizing a reinforcement learning algorithm known as q-learning, to learn from feedbacks to identify optimal decision in reaching user-centric requirement goal. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    An energy-efficient spectrum-aware reinforcement learning-based clustering algorithm for cognitive radio sensor networks by Mustapha, Ibrahim, Mohd Ali, Borhanuddin, A. Rasid, Mohd Fadlee, Sali, Aduwati, Mohamad, Hafizal

    Published 2015
    “…In this paper, we propose a reinforcement learning-based spectrum-aware clustering algorithm that allows a member node to learn the energy and cooperative sensing costs for neighboring clusters to achieve an optimal solution. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki by Mohd Zaki, Sofea Najihah

    Published 2024
    “…Convolutional Neural Network (CNN) algorithm was chosen as one of the possible solutions after a thorough analysis of many algorithms for dyslexic handwriting identification. …”
    Get full text
    Get full text
    Thesis
  9. 9

    User-centric learning for multiple access selections by Dzulkifly S., Hashim W., Ismail A.F., Dohler M.

    Published 2023
    “…The second stage involved utilizing a reinforcement learning algorithm known as q-learning, to learn from feedbacks to identify optimal decision in reaching user-centric requirement goal. …”
    Article
  10. 10
  11. 11
  12. 12

    A hybrid approach for personalized news recommendation with ordered clustering algorithm, rich user and news metadata by Darvishy, Asghar

    Published 2019
    “…On the other hand, the existing personalized news recommendation systems do not make an attempt to filter the number of news items to recommend based on the reading rate behavior of a user. Moreover, early researches only consider explicit profile, short-term profile, and long-term profile of a user but none of them use all of the above user profiles in a single solution. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A Multi-Criteria Recommendation Technique for Personalized Tourism Experiences by Mustafa, Payandenick, Yin Chai, Wang

    Published 2025
    “…The proposed method also provided more relevant recommendations to users compared to all other tested algorithms. Overall, the proposed method offers a novel and effective solution to the information overload challenge in the tourism industry.…”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim by Ibrahim, Mohd Faisal

    Published 2017
    “…Besides reducing the processing overhead it also achieves better results in terms of accuracy compared to the user agent approach. Second, network aware applications architecture for E-Learning system was also proposed to dynamically adjust the users' demand based on network resources. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Using the evolutionary mating algorithm for optimizing the user comfort and energy consumption in smart building by Mohd Herwan, Sulaiman, Zuriani, Mustaffa

    Published 2023
    “…To address the optimization problem, the Evolutionary Mating Algorithm (EMA) is proposed. EMA belongs to the evolutionary computation group of nature-inspired metaheuristic algorithms and offers a promising solution. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Bot detection using machine learning algorithms on social media platforms by Gannarapu, Sainath, Dawoud, Ahmed, Ali, Rasha S., Alwan, Ali Amer

    Published 2021
    “…Also, It will improve the level of privacy and authenticity of these platforms and related users. The research uses the bot detection technique based on machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Applying case reuse and Rule-Based Reasoning (RBR) in object-oriented application framework documentation: Analysis and design by Jani H.M., Lee S.P.

    Published 2023
    “…In order to come up with new solutions to new problems posed by the framework users, our proposed documentation approach will reuse previously documented cases, which have solved similar framework usage problems in the past. …”
    Conference Paper
  19. 19
  20. 20

    Security alert framework using dynamic tweet-based features for phishing detection on twitter by Liew, Seow Wooi

    Published 2019
    “…However, it is observed that there are only a few machine learning solutions to detect phishing attacks on OSNs are being proposed and implemented. …”
    Get full text
    Get full text
    Thesis