Search Results - (( user validation study algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- application stemming »
- stemming algorithm »
- java application »
- user validation »
-
1
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…In the implementation phase, Bubble Sort, Euclidean Distance, 10-Fold Cross validation, and K Nearest Neighbor algorithm are developed. …”
Get full text
Get full text
Thesis -
2
Text Extraction Algorithm for Web Text Classification
Published 2010“…This study provides a text extraction algorithm for web text classification. …”
Get full text
Get full text
Get full text
Thesis -
3
Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model
Published 2001“…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
Get full text
Get full text
Get full text
Article -
4
Influence maximisation towards target users on social networks for information diffusion
Published 2018“…Influence maximisation has been an area of active research in recent years.This study aims to extend the fundamental influence maximisation problem (IMP) with respect to a set of target users on a social network.It is important to aim at the target users to speed up the rate of information diffusion and reduce the information diffusion cost.In doing so, the MITU algorithm was formulated and compared with state of the art algorithms.Publicly available datasets were used in validating the proposed algorithm.It was found that the MITU identified all target nodes while significantly lowering the information diffusion cost function (IDCF) by up to 79%.The influence overlap problem was equally identified in the heuristic algorithm where the seed set size was reduced by an average of six times.Furthermore, the random influencer selection identifies target nodes better than the betweenness and PageRank centralities.The findings could help organisations to reach target users on social media in the shortest cycle.…”
Get full text
Get full text
Get full text
Article -
5
Influence maximization towards target users on social networks for information diffusion
Published 2018“…In doing so, the MITU algorithm was formulated and compared with state of the art algorithms. …”
Get full text
Get full text
Get full text
Article -
6
User interface and interactivity design guidelines of algorithm visualization on mobile platform
Published 2019“…In terms of artifact, this study yields AVOMP design guidelines that are comprised of UI design and interactivity aspects as well as AVOMP prototype of sorting algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
A graphical user interface application for continuous-time identification of dynamical system
Published 2002“…A validation process had been implemented using cross validation process. …”
Get full text
Get full text
Get full text
Article -
8
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
9
Development of web-based GIS for traffic management system with obstacle avoidance technique using open source software
Published 2014“…In order to calculate the shortest path between two nodes, Dijkstra algorithm was utilized. Obstacle avoidance technique was implemented in this algorithm to avoid the congested areas. …”
Get full text
Get full text
Thesis -
10
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
11
A pilot study on the validation of vis-screen mobile application for vision test
Published 2020“…This pilot study revealed the application is highly potential to be a valid and reliable tool for vision screening in the community.…”
Get full text
Get full text
Article -
12
Interactive framework for dynamic modelling and active vibration control of flexible structures
Published 2008“…This paper presents the implementation of an interactive learning environment for dynamic simulation and active vibration control of flexible structures. The study attempts to facilitate the learning process of the subject area through the development of an interactive environment that can help users to simulate and visualise the behaviour of flexible structures with given physical characteristics, and to test and validate controller designs. …”
Get full text
Get full text
Article -
13
Trend analysis of software engineering scientific publications
Published 2019“…The estimation of the future trend is done by development of the algorithm linear regression algorithm in Matlab. With data collected from the main Science Direct database with of Software Engineering keywords, validation of the proposed algorithms on the case study was done. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
14
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The system will automatically check for the nearest vacant bay and reserve it for the current user allowing a different bay reservation for the next user. …”
Get full text
Get full text
Thesis -
15
Energy-efficient power allocation for downlink non orthogonal multiple access networks based on game theory and genetic algorithm / Reem Mustafa Mah’d Al Debes
Published 2025“…Additionally, it reduces outage probability by 25% and 10% relative to OMA and existing NOMA algorithms, respectively. These results validate the algorithm's robustness, particularly under imperfect CSI conditions, where traditional methods often fail. …”
Get full text
Get full text
Get full text
Thesis -
16
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
17
Development and validation of promoter prediction system for recombinant lipase expression in Pichia pastoris
Published 2017“…A user interface was provided for LipExPS. ARM lipase was used to validate the LipExPS. …”
Get full text
Get full text
Thesis -
18
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…The main problem in traditional cryptosystem is a public key in determining validity, but this problem can be solved by identity based cryptography, where the public key can be obtained from users of public information known users. …”
Get full text
Get full text
Conference or Workshop Item -
19
Locust- inspired meta-heuristic algorithm for optimising cloud computing performance
Published 2023“…To validate the effectiveness of the pro posed algorithm, it was tested via simulation using real datasets. …”
Get full text
Get full text
Thesis -
20
Grammarcheck: a dynamic LL (1) grammar checker using recursive descent parsing with chatbot assistance
Published 2025“…The application includes an automated checking feature to assist users in verifying their steps and answers. It provides solutions for valid LL (1) grammars through a structured, step-by-step process, offering feedback on correct, incomplete, or incorrect answers. …”
Get full text
Get full text
Get full text
Article
