Search Results - (( user evaluation study algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- evaluation study »
- java application »
- user evaluation »
-
1
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…In addition, a prototype was developed to evaluate the proposed algorithm. Then, user satisfaction was conducted in order to evaluate this prototype using Q-SAFI instruments. …”
Get full text
Get full text
Get full text
Thesis -
2
Movie recommendation using user-based collaborative filtering algorithm / Nur Ayuni Izlin Mat Ishor
Published 2019“…Evaluation for this study is to evaluate the of reliability result of recommendation engine by using the approach algorithm. …”
Get full text
Get full text
Thesis -
3
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…This is difTerent from existing Interactive Genetic Algorithm in which selection and evaluation of solutions is done by the users. …”
Get full text
Get full text
Thesis -
4
Performance evaluation of vertical handoff in fourth generation (4G) networks model
Published 2009Get full text
Working Paper -
5
Recommendation System Model For Decision Making in the E-Commerce Application
Published 2024thesis::doctoral thesis -
6
Independent task scheduling algorithms in fog environments from users’ and service providers’ perspectives: a systematic review
Published 2025“…To assure unbiased evaluation, a benchmark to assess task scheduling algorithms is proposed based on comparison to state-or-art algorithms, applicability to real-world contexts, meeting the objectives of the study, negative impacts on other performance metrics, and sizes of datasets used for evaluation. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…The OPNET simulator and the mathematical model were used to evaluate the performance for the proposed algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…In its formulation, the algorithm considers the interests and preferences of users’ friends and faculty mates in addition to users’ own preferences. …”
Get full text
Get full text
Thesis -
10
Performance evaluation of caching placement algorithms in named data network for video on demand service
Published 2016“…The purpose of this study is to evaluate the performance of caching placement algorithms (LCD, LCE, Prob, Pprob, Cross, Centrality, and Rand) in Named Data Network (NDN) for Video on Demand (VoD). …”
Get full text
Get full text
Get full text
Thesis -
11
A comparative study of interactive segmentation with different number of strokes on complex images
Published 2020“…Therefore, the input from the user as well as the understanding of the algorithms based on the user input has an essential role in the success of interactive segmentation. …”
Get full text
Get full text
Get full text
Article -
12
Performance analysis of resource allocation downlink for MIMO-OFDMA system using Greedy algorithm. / Azrinawati Samaon
Published 2014“…The proposed algorithm shows comparison between the noise to sub-channel ratio and power allocation in the midst of data sub-channel for 25, 75 and 100 users. …”
Get full text
Get full text
Article -
13
Classification of Google Play application using decision tree algorithm on sentiment analysis of text reviews / Aqil Khairy Hamsani, Ummu Fatihah Mohd Bahrin and Wan Dorishah Wan A...
Published 2023“…The study begins with a comprehensive background, examining the significance of classifying Google Play Store applications using user reviews. …”
Get full text
Get full text
Article -
14
A study on personalized recommender system using social media
Published 2020“…These machine learning algorithm processes the data set obtained. The evaluation on these algorithm is done to evaluate accuracy of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
A Comparative Study of Interactive Segmentation with Different Number of Strokes on Complex Images
Published 2020“…Therefore, the input from the user as well as the understanding of the algorithms based on the user input has an essential role in the success of interactive segmentation. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…Fingerprint is a reliable user authentication method as it is unique to individual users that makes it efficient for authenticating users. …”
Get full text
Get full text
Get full text
Article -
17
-
18
Jogging activity recognition using k-NN algorithm
Published 2022“…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
Get full text
Get full text
Get full text
Academic Exercise -
19
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
20
Performance analysis of resource allocation downlink for MIMO-OFDMA system using greedy algorithm / Azrinawati Samaon
Published 2016“…The proposed algorithm shows comparison between the noise to sub-channel ratio and power allocation among of data sub-channel for 25, 75 and 100 users. …”
Get full text
Get full text
Thesis
