Search Results - (( user evaluation method algorithm ) OR ( using solution using algorithm ))
Search alternatives:
- evaluation method »
- method algorithm »
- user evaluation »
- using algorithm »
- using solution »
- solution using »
-
1
School teacher-subject allocation management system
Published 2024“…The STSAMS in this project is evaluated by using user acceptance test and unit test. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…In addition, a prototype was developed to evaluate the proposed algorithm. Then, user satisfaction was conducted in order to evaluate this prototype using Q-SAFI instruments. …”
Get full text
Get full text
Get full text
Thesis -
3
The solution of 2048 puzzle game using A* algorithm / Zafhira Ismail
Published 2017“…The input data of this project is retrieved from the game’s rule itself and implemented with the proposed algorithm which is A* algorithm. The output of this project is the best solution to achieve the goal using A* algorithm. …”
Get full text
Get full text
Thesis -
4
MYMealPal: Malaysian healthy meal planner using artificial bee colony approach / Wan Muhamad Amirul Hakimi Wan Mohd Zaki
Published 2017Subjects: Get full text
Get full text
Student Project -
5
Independent task scheduling algorithms in fog environments from users’ and service providers’ perspectives: a systematic review
Published 2025“…To address these issues, a substantial amount of work has been done to determine optimal methods to improve QoS using task scheduling algorithms. …”
Get full text
Get full text
Get full text
Article -
6
Block based low complexity iterative QR precoder structure for Massive MIMO
Published 2021“…The number of flops required in the proposed solution is much less than the regular BD algorithm. …”
Get full text
Get full text
Thesis -
7
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
Get full text
Get full text
Thesis -
8
Agent-based extraction algorithm for computational problem solving
Published 2015“…The tool is used to evaluate the accuracy of the proposed extraction algorithm to extract the appropriate information which are needed. …”
Get full text
Get full text
Thesis -
9
Performance Comparison of Nature-inspired Optimization Algorithms Applied to MVDR Technique for Canceling Multiple Access Interference Signals
Published 2018“…Heuristic optimization algorithms are broadly used to solve many engineering problems. …”
Get full text
Get full text
Get full text
Article -
10
Sequential and parallel multiple tabu search algorithm for multiobjective urban transit scheduling problems
Published 2018“…Additionally, the MTS algorithm is also implemented in parallel computing to produce parallel MTS for generating comparable solutions in shorter computational times. …”
Get full text
Get full text
Thesis -
11
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…The proposed authentication method, uses an enhanced method where the credentials are encrypted through an algorithm. …”
Get full text
Get full text
Get full text
Thesis -
12
-
13
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
14
Energy-efficient power allocation and joint user association in multiuser-downlink massive MIMO system
Published 2019“…The study aims to maximize the non-convex EE in a downlink (DL) massive MIMO system using a proposed energy-efficient low-complexity algorithm (EELCA) that guarantees optimal power allocation solution based on Newton’s methods and joint user’s association based on the Lagrange’s decomposition method. …”
Get full text
Get full text
Get full text
Article -
15
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…For algorithm performance evaluation, the ML-IDS is compared with ML-CICIDS-59 and ML-CICIDS-45, which are IDS trained using the CICIDS-2018 dataset after performing feature engineering. …”
text::Thesis -
16
Smart Routing For Solid Waste Collection
Published 2023“…The algorithm will be evaluated through simulations and field testing in a residential area in Kuching. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
17
Dynamic approaches for spectrum control in cognitive radio networks
Published 2015“…This is done by allowing secondary users (unlicensed users) to access licensed spectrum if the primary user (licensed user) is not using it. …”
Get full text
Get full text
Thesis -
18
Sub-route reversal repair mechanism and differential evolution for urban transit network design problem
Published 2017“…The main goal is to develop solution methods that can be used to determine optimal transit route configuration for urban public transportation systems, specifically for system based on buses. …”
Get full text
Get full text
Thesis -
19
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. …”
Get full text
Get full text
Thesis -
20
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise
