Search Results - (( based education method algorithm ) OR ( based information ((a algorithm) OR (_ algorithm)) ))

Refine Results
  1. 1

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…The proposed algorithm totally eliminates the need for fixed threshold values through the use of a novel formula that can easily estimate the node density and replace the fixed threshold value based on the neighbor information. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Optimizing Decentralized Exam Timetabling with a Discrete Whale Optimization Algorithm by Emily Siew, Sing Kiang, Sze, San Nah, Goh, Say Leng

    Published 2025
    “…These methods have been rigorously tested and compared against proprietary heuristic-based software and manual methods. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Optimizing decentralized exam timetabling with a discrete whale optimization algorithm by Emily Sing Kiang Siew, San nah sze, Say leng goh

    Published 2025
    “…This paper presents a novel discrete Whale Optimization Algorithm approach, integrating the strengths of population-based and local-search algorithms for addressing the examination timetabling problem, a significant challenge many educational institutions face. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Jogging activity recognition using k-NN algorithm by Afifah Ismail

    Published 2022
    “…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  7. 7

    Learning style analysis based on Felder-Silverman Index Model using Rule Base algorithm by Nurhakim, Muhammad, Ismail, Suhaila, Mohd Yusop, Nurhafizah Moziyana, Ahmad, Siti Rohaidah

    Published 2024
    “…The system is developed using the PHP and CSS programming languages, with XAMPP and MySQL serving as the database that stores the necessary information. The Rule Base algorithm is used to classify students based on their learning style characteristics. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    An adaptive HMM based approach for improving e-Learning methods by Deeb B., Hassan Z., Beseiso M.

    Published 2023
    “…The model proposed in this research is based on clustering of students using K-means algorithm and the course of content delivery is adaptively characterized for each student using Hidden Markov Models. …”
    Conference Paper
  9. 9

    Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants by M, Irfan, N, Lukman, A. A, Alfauzi, J, Jumadi

    Published 2019
    “…Chili plants are plants that are very susceptible to pests so BPS noted a decrease in chili production reaching 25%. Information about chili pests is collected so that it becomes a database that can be used to identify disease pests using the data mining method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Density based subspace clustering: a case study on perception of the required skill by Rahmat Widia, Sembiring

    Published 2014
    “…Grouping done to identify the level of data density and to identify outliers or irrelevant data that will create each to cluster exist in a separate subset. This thesis proposed subspace clustering based on density connection, named DAta MIning subspace clusteRing Approach (DAMIRA), an improve of subspace clustering algorithm based on density connection. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Density subspace clustering: a case study on perception of the required skill by Sembiring, Rahmat Widia

    Published 2014
    “…Grouping done to identify the level of data density and to identify outliers or irrelevant data that will create each to cluster exist in a separate subset. This thesis proposed subspace clustering based on density connection, named DAta MIning subspace clusteRing Approach (DAMIRA), an improve of subspace clustering algorithm based on density connection. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Determination of dengue hemorrhagic fever disease factors using neural network and genetic algorithms / Yuliant Sibaroni, Sri Suryani Prasetiyowati and Iqbal Bahari Sudrajat by Yuliant, Sibaroni, Sri Suryani, Prasetiyowati, Iqbal Bahari, Sudrajat

    Published 2020
    “…Determination of the best factor is carried out in a genetic algorithm by combining several parameters of the crossover probability (Pc) and mutation probability (Pm). …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Comparison on machine learning algorithm to fast detection of malicious web pages by Wan Nurul Safawati, Wan Manan, Mohd Nizam, Mohmad Kahar, Noorlin, Mohd Ali

    Published 2021
    “…Compared to several decision tree method, Random Forest has shown promising and higher sensitivity result towards malicious data which is 98.3% compared to other classification algorithm…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Virtual reality in algorithm programming course: practicality and implications for college students by Dewi, Ika Parma, Ambiyar, Mursyida, Lativa, Effendi, Hansi, Giatman, Muhammad, Efrizon, Hanafi, Hafizul Fahri, Ali, Siti Khadijah

    Published 2024
    “…Meanwhile, the effectiveness test shows that this VR product can improve learning outcomes better than traditional learning methods. Overall, the VR products developed have proven to be practical and effective in learning programming algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Use of web page credibility information in increasing the accuracy of web-based question answering systems / Asad Ali Shah by Asad, Ali Shah

    Published 2017
    “…This research proposes a credibility assessment algorithm for evaluating Web pages and using their credibility score for ranking answers in Web-based QA systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18
  19. 19

    Feature selection methods application towards a new dataset based on online student activities / Muhammad Hareez Mohd Zaki ... [et al.] by Mohd Zaki, Muhammad Hareez, Abdul Aziz, Mohd Azri, Sulaiman, Suhana, Hambali, Najidah

    Published 2023
    “…In addition, the availability of data from various academic information management systems in recent years had been increasing, causing classification to become a technique that is in demand by the educational institutes. …”
    Get full text
    Get full text
    Article
  20. 20

    A DNA-Inspired Symmetric Lightweight Block Cipher With Strong Randomness Properties by Nik Azura binti Nik Abdullah

    Published 2026
    “…A comprehensive set of security evaluation methods has been employed to assess the cryptographic strength and performance of the new algorithm. …”
    thesis::doctoral thesis