Search Results - (( user validation matching algorithm ) OR ( java application optimization algorithm ))

Refine Results
  1. 1

    Applying empirical thresholding algorithm for a keystroke dynamics based authentication system by Venugopal, Priya Chaliyath, Viji, Kamalan Saroja Angel

    Published 2019
    “…In this paper, a novel algorithm is proposed to authenticate the legal users based on the empirical threshold values. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    New filtering framework for web personalization search / Anitawati Mohd Lokman and Aishah Ahmad by Mohd Lokman, Anitawati, Ahmad, Aishah

    Published 2012
    “…Currently, results suggested by search engine don't match user's expectations, which cause frustration to users. …”
    Get full text
    Get full text
    Research Reports
  3. 3
  4. 4

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    An automatic domain independent schema matching in integrating schemas of heterogeneous relational databases by Ibrahim, Hamidah, Karasneh, Yaser Mohammad Ali, Mirabi, Meghdad, Yaakob, Razali, Othman, Mohamed

    Published 2014
    “…There are several semi-automatic schema matching algorithms, however these algorithms do not exploit most of the available information related to schemas during the process of schema matching which affects on the accuracy of schema matching result. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Wifi4U: Broadband recommendation system by using rule-based and cosine similarity / Putri Nur Syarfa Maizan by Maizan, Putri Nur Syarfa

    Published 2020
    “…Meanwhile, based on usability testing, it is validated by 10 users that the system works smoothly and meet their needs. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Automatic generation of user-defined test algorithm description file for memory BIST implementation by Hussin, Razaidi, Jidin, Aiman Zakwan, Loh, Wan Ying, Mispan, Mohd Syafiq, Lee, Weng Fook

    Published 2022
    “…It can be used by implementing a standard testing algorithm available in the EDA tool library or a user-defined algorithm (UDA). …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT by Abdullah, Amran

    Published 2006
    “…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Automated tournament management system with dynamic matchmaking using genetic algorithm / Wan Muhammad Aqil Wan Harun by Wan Harun, Wan Muhammad Aqil

    Published 2016
    “…CTMS are embedded with dynamic match making using genetic algorithm that can pairs players based on variation combination of criteria such as player’s gender, points and nation. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Examination timetabling using genetic algorithm case study: KUiTTHO by Mohd Salikon, Mohd Zaki

    Published 2005
    “…Genetic Algorithm (GA) is one of the most popular optimization solutions. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Collision probability of one-to-many reversible mapping for IPV6 address generation by Nashrul Hakiem, Nashrul Hakiem, Siddiqi, Mohammad Umar, Jarot, Sigit Puspito Wigati

    Published 2012
    “…Checksum has been used for validation of probability of coincidental match of randomly generated Interface Id or generated by some other mechanism. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Characterization of oil palm fruitlets using artificial neural network by Olukayode, Ojo Adedayo

    Published 2014
    “…The results also showed that contrary to the widely reported gap between the accuracy of the LM algorithm and other feed forward neural network training algorithms, the RP trained network performed as good as that of the LM algorithm for the range of data considered. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Privacy-preserving multi-keyword hybrid search over encrypted data in cloud by Singh, N., Kumar, J., Singh, A.K., Mohan, A.

    Published 2022
    “…To validate the opposed approach, simulation analysis has been performed to preserve user-oriented privacy in a cloud environment. …”
    Get full text
    Get full text
    Article