Search Results - (( user evaluation method algorithm ) OR ( using function method algorithm ))

Refine Results
  1. 1

    A firefly algorithm based hybrid method for structural topology optimization by Gebremedhen, H.S., Woldemichael, D.E., Hashim, F.M.

    Published 2020
    “…Since the direct application of the firefly algorithm cannot generate connected topologies, outputs from the firefly algorithm were used as an initial input material distribution for the OC method. …”
    Get full text
    Get full text
    Article
  2. 2

    DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS by MEHMOOD SHAH, SYED NASIR

    Published 2012
    “…The issue is not only to develop new algorithms, but also to evaluate them on an experimental computational grid, using synthetic and real workload traces, along with the other existing job scheduling algorithms. …”
    Get full text
    Get full text
    Thesis
  3. 3

    FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources by Al-Qadhi, Abdulrahman K., Athauda, Rukshan, Latip, Rohaya, Hussin, Masnida

    Published 2026
    “…We have evaluated the FaaSBid model and the proposed algorithms and pricing model by comparing with a number of existing models and algorithms using real-world datasets. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Comparison and evaluation of multiple sequence alignment tools in bininformatics by Sedaghatinia, Asieh, Atan, Rodziah, Tajul Arifin, Khairina, Azmi Murad, Masrah Azrifah

    Published 2009
    “…This study addresses this critical issue in relation to MSA algorithms by systematically comparing and evaluating the functionality, usability and the algorithms of three famous multiple sequence alignment tools. …”
    Get full text
    Article
  5. 5

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Finally, the system employs a query formulation via node algorithm (QRYFv) algorithm to improve the selection of structured queries that best match user query Experiments have been conducted to evaluate the performance of the proposed enrichment method, XKQSS and RAXKQSS. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Jogging activity recognition using k-NN algorithm by Afifah Ismail

    Published 2022
    “…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  7. 7
  8. 8

    Channel-aware downlink scheduling for quality of service in long term evolution network by Najim, Alaa Omer

    Published 2018
    “…These constraints comprise the use of an inefficient method to determine delay by the buffer size. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems by Shakeel Ahmed, Kamboh

    Published 2014
    “…The designed algorithms are implemented for EHD equations and their performance is evaluated by using different performance indicators. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Optimal demand response of solar energy generation using Genetic Algorithm / Muhammad Asyraaf Adlan by Adlan, Muhammad Asyraaf

    Published 2025
    “…The objective function of the algorithm minimizes the daily losses due to load shedding while ensuring a balanced and stable energy distribution to the end users. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A Mobile Application For Stock Price Prediction by Choy, Yi Tou

    Published 2021
    “…These prediction algorithms were evaluated using 6 sectors of Bursa Malaysia stocks which are in total 216 stocks. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13
  14. 14

    Space allocation for examination scheduling using Genetic Algorithm / Alya Kauthar Azman by Azman, Alya Kauthar

    Published 2025
    “…The system generates and evaluates potential schedules using fitness functions, selection, crossover, and mutation operators to iteratively improve scheduling efficiency. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…This research was undertaken to develop methods to mitigate shoulder-surfing attack. Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Multiple and solid data background scheme for testing static single cell faults on SRAM memories by Zakaria, Nor Azura

    Published 2013
    “…This method is evaluated in terms of function and performance differences between the proposed MTA and existing MTA using the User Defined Algorithm (UDA) available in the MBISTArchitect tool. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Comparative study of nonlinear root finding using improvised Secant methods / Nurul Nabilah Rosli … [et al.] by Rosli, Nurul Nabilah, Shahari, Nor Azni, Mohamad Azraei, Farah Atikah, Izaham, Siti Najwa

    Published 2023
    “…Therefore, in this study, two algorithms based on the Secant method which are the exponential method, and three-point Secant method were used to compare with the Secant method to evaluate the roots for nonlinear equations. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Document ranking using information quality criteria in weblog search engine by Azimzadeh, Fatemeh

    Published 2013
    “…A major problem is that a weblog includes nontraditional features of the Web pages such as Weblog post, links, tags, and comments. Thus, the use of traditional rank algorithms like PageRank and HITS in general search engines are not appropriate to evaluate the Weblog posts because such algorithms do not consider the blog specific features. …”
    Get full text
    Get full text
    Thesis