Search Results - (( based education model algorithm ) OR ( based information needs algorithm ))*
Search alternatives:
- based information »
- education model »
- model algorithm »
- needs algorithm »
-
1
Learning style analysis based on Felder-Silverman Index Model using Rule Base algorithm
Published 2024“…The system is developed using the PHP and CSS programming languages, with XAMPP and MySQL serving as the database that stores the necessary information. The Rule Base algorithm is used to classify students based on their learning style characteristics. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Clustering autism spectrum disorder student’s system based on intelligence, skills and behavior using agglomerative clustering algortihm / Daarin Nadia Nordin
Published 2020“…Hence, based on the model in the system developed, all objectives are achieved. …”
Get full text
Get full text
Thesis -
3
Determination of dengue hemorrhagic fever disease factors using neural network and genetic algorithms / Yuliant Sibaroni, Sri Suryani Prasetiyowati and Iqbal Bahari Sudrajat
Published 2020“…In this study, the problem of determination dengue disease factors was modeled using a neural network. The activation function in this neural network model then estimated using genetic algorithms. …”
Get full text
Get full text
Get full text
Article -
4
Jogging activity recognition using k-NN algorithm
Published 2022“…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
Get full text
Get full text
Get full text
Academic Exercise -
5
ScholarsAid: a personalized scholarship web application based on web scraping/ Muhammad Nur Haqeem Sulaiman and Norhasliza Ahmad
Published 2023“…The web application offers functionality for students to search and filter scholarships to suit their preferences or needs and the most relevant scholarships are provided based on matching algorithm. …”
Get full text
Get full text
Get full text
Article -
6
Predicting students’ STEM academic performance in Malaysian secondary schools using educational data mining
Published 2023“…It proceeds through three phases of Need Analysis, Development of the Model and Evaluation of the Model. …”
Get full text
Get full text
Thesis -
7
An Artificial Intelligence-Based Knowledge Management System for Outcome-Based Education Implementing in Higher Education Institutions
Published 2025“…Recommendation system on learning analysis was implemented in a hybrid algorithm combines Rule-based and Content-based filtering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
An architecture design for smart E-waste management system / Siti Feirusz Ahmad Fesol, Mohd Norikhmal Hishyam Makimin and Raihah Aminuddin
Published 2023“…Based on this urgency, this study aims to propose a model of an architecture design for designing a Smart E-waste Management System using the Haversine algorithm. …”
Get full text
Get full text
Get full text
Book Section -
9
-
10
From Employees to Entrepreneurs: A Qualitative Exploration of Career Transitions in Ghana
Published 2025“…Recommendation system on learning analysis was implemented in a hybrid algorithm combines Rule-based and Content-based filtering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Cognitive processes in problem solving: bridging the intersection of cognition and management science problems
Published 2011“…The first part of the paper is to present a review on the cognitive processes in problem solving based on Polya's 4-phase framework of problem solving, Schoenfeld's six problem solving strategies, the Constructivist Theory and the Information Processing Model (IPM). …”
Get full text
Get full text
Journal -
12
Why coding? Why now? From coding to computational thinking through computational mathematics problem based learning (CM-PBL)
Published 2019“…This conceptual framework is aimed at two goals: (1) development of deep learning, connected computational thinking through the mathematical curriculum instructional model which able to enhance students’ problem solving abilities and (2) implementation of the designed model to assist teacher in education who has practicing difficulty in elementary classrooms after adopting teacher enactment of problem-based curriculum resources. …”
Get full text
Get full text
Conference or Workshop Item -
13
Network security risk assessment based on fuzzy logic approach / Nurulhidayah Abdul Latif
Published 2012“…Due to this condition, the security mechanism of an institution needs to determine that all the assets and information are preserving safely. …”
Get full text
Get full text
Thesis -
14
Technical efficiency performance of Malaysian public research universities: Fuzzy data envelopment analysis / Saber Abdelall Mohamed Ahmed
Published 2023“…By utilizing Fuzzy DEA (FDEA) model with algorithm, this study observes the PRUMs efficiency status during the study period and the expected average efficiency for the next 2021/2022 academic year. …”
Get full text
Get full text
Get full text
Thesis -
15
Determining gender differential item functioning for mathematics in coeducational school culture
Published 2018“…By employing the software WINSTEPS version 3.67.0 that is based on the Rasch Model for dichotomous responses, Differential Item Functioning analysis was conducted by using Mantel-Haenszel Chi-square method. …”
Get full text
Get full text
Get full text
Article -
16
A review on security and privacy issues in E-learning and the MapReduce aproach
Published 2019“…MapReduce is a promising parallel programming model for processing large data. Then, we proposed e-Learning using MapReduce algorithm in protecting the security and privacy of eLearning. …”
Get full text
Get full text
Get full text
Article -
17
Implementation of AES algorithm into information investigation autopsy (IIA) / Ahmad Wafiy Hamad Zaki
Published 2013“…Information Investigation Autopsy (IIA) is the tools that can captured the information needed on the Local Area Network environment and later needed to be secured, the IIA need a module that can to secure the evidence captured from any harm. …”
Get full text
Get full text
Student Project -
18
-
19
Agent-based extraction algorithm for computational problem solving
Published 2015“…The tool is used to evaluate the accuracy of the proposed extraction algorithm to extract the appropriate information which are needed. …”
Get full text
Get full text
Thesis -
20
Enhancing teaching and learning through data-driven optimization of servicing code demand and lecturer allocation using WEKA analysis
Published 2025“…Attribute selection through Information Gain Attrite Evaluation model highlighted Program Code, Course Code and Type of Course as the strongest predictors of course approval and demand levels. …”
Get full text
Get full text
Get full text
Article
