Search Results - (( user evaluation method algorithm ) OR ( using function method algorithm ))
Search alternatives:
- evaluation method »
- method algorithm »
- user evaluation »
- function method »
- using function »
-
1
A firefly algorithm based hybrid method for structural topology optimization
Published 2020“…Since the direct application of the firefly algorithm cannot generate connected topologies, outputs from the firefly algorithm were used as an initial input material distribution for the OC method. …”
Get full text
Get full text
Article -
2
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…The issue is not only to develop new algorithms, but also to evaluate them on an experimental computational grid, using synthetic and real workload traces, along with the other existing job scheduling algorithms. …”
Get full text
Get full text
Thesis -
3
FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources
Published 2026“…We have evaluated the FaaSBid model and the proposed algorithms and pricing model by comparing with a number of existing models and algorithms using real-world datasets. …”
Get full text
Get full text
Get full text
Article -
4
Comparison and evaluation of multiple sequence alignment tools in bininformatics
Published 2009“…This study addresses this critical issue in relation to MSA algorithms by systematically comparing and evaluating the functionality, usability and the algorithms of three famous multiple sequence alignment tools. …”
Get full text
Article -
5
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Finally, the system employs a query formulation via node algorithm (QRYFv) algorithm to improve the selection of structured queries that best match user query Experiments have been conducted to evaluate the performance of the proposed enrichment method, XKQSS and RAXKQSS. …”
Get full text
Get full text
Get full text
Thesis -
6
Jogging activity recognition using k-NN algorithm
Published 2022“…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
Get full text
Get full text
Get full text
Academic Exercise -
7
Recommendation System Model For Decision Making in the E-Commerce Application
Published 2024thesis::doctoral thesis -
8
Channel-aware downlink scheduling for quality of service in long term evolution network
Published 2018“…These constraints comprise the use of an inefficient method to determine delay by the buffer size. …”
Get full text
Get full text
Get full text
Thesis -
9
Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems
Published 2014“…The designed algorithms are implemented for EHD equations and their performance is evaluated by using different performance indicators. …”
Get full text
Get full text
Thesis -
10
Optimal demand response of solar energy generation using Genetic Algorithm / Muhammad Asyraaf Adlan
Published 2025“…The objective function of the algorithm minimizes the daily losses due to load shedding while ensuring a balanced and stable energy distribution to the end users. …”
Get full text
Get full text
Thesis -
11
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. …”
Get full text
Get full text
Thesis -
12
A Mobile Application For Stock Price Prediction
Published 2021“…These prediction algorithms were evaluated using 6 sectors of Bursa Malaysia stocks which are in total 216 stocks. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
The solution of 2048 puzzle game using A* algorithm / Zafhira Ismail
Published 2017Get full text
Get full text
Thesis -
14
Space allocation for examination scheduling using Genetic Algorithm / Alya Kauthar Azman
Published 2025“…The system generates and evaluates potential schedules using fitness functions, selection, crossover, and mutation operators to iteratively improve scheduling efficiency. …”
Get full text
Get full text
Thesis -
15
-
16
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…This research was undertaken to develop methods to mitigate shoulder-surfing attack. Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Multiple and solid data background scheme for testing static single cell faults on SRAM memories
Published 2013“…This method is evaluated in terms of function and performance differences between the proposed MTA and existing MTA using the User Defined Algorithm (UDA) available in the MBISTArchitect tool. …”
Get full text
Get full text
Thesis -
18
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
19
Comparative study of nonlinear root finding using improvised Secant methods / Nurul Nabilah Rosli … [et al.]
Published 2023“…Therefore, in this study, two algorithms based on the Secant method which are the exponential method, and three-point Secant method were used to compare with the Secant method to evaluate the roots for nonlinear equations. …”
Get full text
Get full text
Get full text
Article -
20
Document ranking using information quality criteria in weblog search engine
Published 2013“…A major problem is that a weblog includes nontraditional features of the Web pages such as Weblog post, links, tags, and comments. Thus, the use of traditional rank algorithms like PageRank and HITS in general search engines are not appropriate to evaluate the Weblog posts because such algorithms do not consider the blog specific features. …”
Get full text
Get full text
Thesis
