Search Results - (( course evaluation based algorithm ) OR ( field communication system algorithm ))
Search alternatives:
- field communication »
- course evaluation »
- evaluation based »
- system algorithm »
-
1
Grid portal technology for web based education of parallel computing courses, applications and researches
Published 2009“…This paper proposes the web service education technology for postgraduate parallel computing course, e-learning students, real-time solutions and for supervising projects related to the application of parallel computing, that focuses on the fundamental principles to parallel computer architecture, multimedia, communication cost, master-worker model, parallel algorithm, web services and performance evaluations. …”
Get full text
Get full text
Conference or Workshop Item -
2
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014Get full text
Get full text
Undergraduates Project Papers -
3
Automated study plan generator using rule-based and knapsack problem
Published 2022“…A quantitative methodology through expert’s reviews and questionnaire survey was conducted to evaluate the accuracy of the proposed algorithm. The proposed algorithm shows high accuracy. …”
Get full text
Get full text
Get full text
Article -
4
Using algorithmic taxonomy to evaluate lecturer workload
Published 2006“…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Article -
5
Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff
Published 2021“…In this thesis, the second part of chaos-based secure communication is introducing a new encryption algorithm to improve the security of modern chaos-based communication systems. …”
Get full text
Get full text
Get full text
Thesis -
6
Using web questionnaire for web-based course evaluation: advantages and disadvantages
Published 2017“…This article examines some advantages and disadvantages of conducting Web survey research especially for Web-based course evaluation at Iranian university E-learning centers. …”
Get full text
Get full text
Conference or Workshop Item -
7
Lightweight PRINCE algorithm IP core for securing GSM messaging using FPGA
Published 2023“…The system can cipher the data using PRINCE algorithm on a VIRTEX-403 FPGA evaluation board and using GSM modems to communicate over a cellular network. …”
Article -
8
Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal
Published 2006“…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Conference or Workshop Item -
9
Securing electrical substation's wireless messaging with a lightweight crypto-algorithm IP core
Published 2023“…The crypto-algorithm has been implemented within an environment of microprocessor system on a XILINX Field Programmable Logic Arrays chip. …”
Conference Paper -
10
Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal
Published 2006“…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Butterfly Triple System Algorithm Based on Graph Theory
Published 2022Get full text
Get full text
Get full text
Article -
12
Adaptive Noise Cancellation Systems using Selectable Algorithm
Published 2016“…The book targets DSP designers, researchers and postgraduate students in the field of DSP for mobile communication systems. The book provides analysis of the results obtained from subjecting the developed system to environmental noise.…”
Get full text
Get full text
Get full text
Get full text
Book -
13
An improved public key cryptography based on the elliptic curve
Published 2002“…Meanwhile, the size of the public keys are reduced by 37 to 48 percent. The improved algorithms are applied to the on-line and off-line electronic payments systems, which lead to probably the best solution to reduce the objects size and enhance the performance in both systems.…”
Get full text
Get full text
Thesis -
14
Field theory analysis for wireless infrared system's error correction
Published 2014“…This paper provides a brief account on field theory used for error correction in wireless infrared systems. …”
Get full text
Get full text
Conference or Workshop Item -
15
Design and development of elective courses recommender system (ECORS)
Published 2017“…A rule-based algorithm is chosen to use in this project. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
16
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…Such approach is highly dependable on the clustering algorithm parameterization, and is not capable to deal with the normal system’s specification changes. …”
Get full text
Get full text
Thesis -
17
Prediction of MUET result based on KNN algorithm / Siti Fatimah Azzahra Hamrizan
Published 2021“…The study aims to explore the K-Nearest Neighbour (KNN) algorithm in solving the MUET result prediction problem, to develop a prototype of MUET result prediction based on the KNN algorithm and to evaluate the accuracy of the KNN algorithm in MUET result prediction. …”
Get full text
Get full text
Thesis -
18
Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing
Published 2013“…Cloud Computing systems are widely applied in many fields such as communication data management, web application, network monitoring, financial management and so on. …”
Get full text
Thesis -
19
Evaluation of genetic algorithm based solar tracking system for photovoltaic panels
Published 2008Get full text
Get full text
Conference or Workshop Item -
20
Implementation and integration of HF messaging system with cryptographic features
Published 2006“…By using existing HF radio and modem, a software application was developed to allow people to exchange their digital information in the form of short messages, text files and images. This system is suitable for the people at remote areas and sea where the communication infrastructure does not exist. …”
Get full text
Get full text
Get full text
Thesis
