Search alternatives:
recommendation » recommendations (Expand Search)
Showing 1 - 20 results of 72 for search 'recommendation algorithm', query time: 0.06s Refine Results
  1. 1
  2. 2
  3. 3

    Machine Learning Approach for the Design of an Assessment Outcomes Recommendation System by Abu Zitar, Raed

    Published 2021
    “…We research and test the design of the right neural networks that achieves our goal. A modern algorithm was improvised for this reason. For our proposed recommendation system, a database program was created to store data and include details in the analysis of course learning outcomes. …”
    Get full text
    Get full text
  4. 4

    Forecasting the nearly unforecastable: why aren’t airline bookings adhering to the prediction algorithm? by Saravanan Thirumuruganathan (11038038)

    Published 2021
    “…Research results indicate that algorithmic approaches in competitive industries must account for shifting customer preferences, changes to the travel environment, and confounding business effects rather than relying solely on historical data.…”
  5. 5

    A collaborative filtering recommendation framework utilizing social networks by Aamir Fareed (17019087)

    Published 2023
    “…The current study proposes a collaborative filtering recommendation framework that employs social networks to generate more precise and pertinent recommendations. …”
  6. 6

    Simple and effective neural-free soft-cluster embeddings for item cold-start recommendations by Shameem A. Puthiya Parambath (14150997)

    Published 2022
    “…The best available recommendation algorithms are based on using the observed preference information among collaborating entities. …”
  7. 7

    Privacy-preserving energy optimization via multi-stage federated learning for micro-moment recommendations by Md Mosarrof Hossen (21399056)

    Published 2025
    “…A comparative evaluation of three FL algorithms (FedAvg, FedProx, Mime-lite) identifies the most suitable aggregation strategy. …”
  8. 8

    Application of Red Deer Algorithm in Optimizing Complex functions by Zitar, Raed

    Published 2021
    “…The Red Deer algorithm (RDA), a recently developed population-based meta-heuristic algorithm, is examined in this paper with the optimization task of complex functions. …”
    Get full text
    Get full text
  9. 9

    Review and analysis for the Red Deer Algorithm by Zitar, Raed

    Published 2021
    “…The Red Deer algorithm (RDA), a recent population-based meta-heuristic algorithm, is thoroughly reviewed. …”
    Get full text
  10. 10

    A SIMULATED ANNEALING ALGORITHM FOR THE CLUSTERING PROBLEM by Selim, S.Z.

    Published 2020
    “…In this paper we discuss the solution of the clustering problem usually solved by the K-means algorithm. The problem is known to have local minimum solutions which are usually what the K-means algorithm obtains. …”
    Get full text
    article
  11. 11

    Tailoring motivational health messages for smoking cessation using an mHealth recommender system integrated with an electronic health record: a study protocol by Santiago Hors-Fraile (5950823)

    Published 2018
    “…Technology can provide convenient means to deliver tailored health messages. Health recommender systems are information-filtering algorithms that can choose the most relevant health-related items—for instance, motivational messages aimed at smoking cessation—for each user based on his or her profile. …”
  12. 12
  13. 13

    A comparison of data mapping algorithms for parallel iterative PDE solvers by Mansour, Nashat

    Published 1995
    “…Based on the comparison results, we recommend the use of the simplest and fastest (PQ) of the six algorithms considered for sequential compile-time mapping of 2-dimensional meshes.…”
    Get full text
    Get full text
    Get full text
    article
  14. 14

    Application of Machine Learning Algorithms to Enhance Money Laundering and Financial Crime Detection by HAMDALLAH, KHALID WAJIH TURKI

    Published 2011
    “…The research is concluded with a conclusion section which recapitulates the results obtained and observations with regards to the current detection mechanisms and the applied machine learning algorithms. The recommendation section emphasizes the steps that can be taken and improvements to the existing methodologies and tools used in the prevention and detection of financial crimes.…”
    Get full text
  15. 15

    Performance evaluation of load balancing algorithms for parallel single-phase iterative PDE solvers by Mansour, N.

    Published 1994
    “…Based on the comparison results, we recommend the use of the simplest and fastest (P/spl times/Q) of the six algorithms considered for sequential compile-time mapping of 2-dimensional meshes.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  16. 16
  17. 17

    Enhancing building sustainability: A Digital Twin approach to energy efficiency and occupancy monitoring by Aya Nabil Sayed (17317006)

    Published 2024
    “…Our data-driven occupancy detection approach utilized Machine Learning (ML) algorithms to intelligently determine room occupancy, allowing for precise energy management based on real-time usage patterns. …”
  18. 18

    Fuzzy Logic Adaptive Crow Search Algorithm for MPPT of a Partially Shaded Photovoltaic System by Mohamed Ali Zeddini (22047920)

    Published 2024
    “…<p dir="ltr">The arbitrary selection of the Crow Search Algorithm (CSA) parameters, the Awareness Probability (AP) and the Flight Length (fl) results in poor convergence performance and efficiency even if the CSA performs well when solving global optimization problems. …”
  19. 19
  20. 20

    Building power consumption datasets: Survey, taxonomy and future directions by Yassine Himeur (14158821)

    Published 2020
    “…The latter will be very useful for testing and training anomaly detection algorithms, and hence reducing wasted energy. Moving forward, a set of recommendations is derived to improve datasets collection, such as the adoption of multi-modal data collection, smart Internet of things data collection, low-cost hardware platforms and privacy and security mechanisms. …”