Search Results - (( course evaluation focus algorithm ) OR ( between information system algorithm ))

Refine Results
  1. 1

    Optimization Algorithms: A Comparison Study for Scheduling Problem at UIN Raden Fatah's Sharia and Law Faculty by Mustakim, ., Tri Basuki, Kurniawan, Misinem, ., Edi Surya, Negara, Izman, Herdiansyah

    Published 2024
    “…The rapid advancement of information and communication technology significantly impacts various sectors, including education, by enhancing administrative and academic processes through sophisticated algorithms and systems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Evaluate the performance of university course timetabling problem with different combinations of genetic algorithm by Foo, Yao Heng

    Published 2025
    “…University course timetabling problem (UCTP) is a scheduling problem that requires courses to be assigned to the limited time slots, classrooms, and lecturers, while adhering to a set of predefined constraints. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7

    Grid portal technology for web based education of parallel computing courses, applications and researches by Alias, Norma, Islam, Md. Rajibul, Mydin, Suhaimi, Hamzah, Norhafiza, Safiza Abd. Ghaffar, Zarith, Satam, Noriza, Darwis, Roziha

    Published 2009
    “…This paper proposes the web service education technology for postgraduate parallel computing course, e-learning students, real-time solutions and for supervising projects related to the application of parallel computing, that focuses on the fundamental principles to parallel computer architecture, multimedia, communication cost, master-worker model, parallel algorithm, web services and performance evaluations. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Obstacle Avoidance System in Underwater Glider by KHYE YEE, YONG

    Published 2017
    “…This thesis aims to assess the efficiency between two algorithm of A* algorithm and Bug Algorithm. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Adaptive intelligence job online scheduling within dynamic grid environment based on gridsim by Lorpunmanee, Siriluck, Md. Sap, Mohd. Noor, Abdullah, Abdul Hanan

    Published 2008
    “…In the results, this paper shows the comparison results between the adaptive job scheduling algorithms and the traditional algorithms.…”
    Get full text
    Get full text
    Article
  10. 10

    CSC649 - Special Topics in Computer Science / College of Computing, Informatics and Media by UiTM, College of Computing, Informatics and Media

    Published 2022
    “…The course will cover specialized technology and described in terms of frameworks and problem formulations, standard models, methods, computational tools, algorithms, as well as methodologies to evaluate the system and select optimal models. …”
    Get full text
    Get full text
    Get full text
    Teaching Resource
  11. 11

    CSC649: Special Topics in Computer Science / College of Computing, Informatics and Mathematics by UiTM, College of Computing, Informatics and Mathematics

    Published 2018
    “…The course will cover specialized technology and described in terms of frameworks and problem formulations, standard models, methods, computational tools, algorithms, as well as methodologies to evaluate the system and select optimal models. …”
    Get full text
    Get full text
    Get full text
    Teaching Resource
  12. 12

    Space allocation for examination scheduling using Genetic Algorithm / Alya Kauthar Azman by Azman, Alya Kauthar

    Published 2025
    “…The research adopts a Genetic Algorithm-based approach, where examination scheduling details such as date, time, course code, program code, student group, student numbers, and available spaces are encoded as chromosomes. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Privacy in medical emergency system: cryptographic and security aspects by Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2010
    “…Multilevel security is very important in Medical Emergency System MES since a database contained information with a variety of secret data. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14
  15. 15

    Discrete-Time System Identification Based On Novel Information Criterion Using Genetic Algorithm by Abd Samad, Md Fahmi, Mohd Nasir, Abdul Rahman

    Published 2017
    “…Model structure selection is a problem in system identification which addresses selecting an adequate model i.e. a model that has a good balance between parsimony and accuracy in approximating a dynamic system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18
  19. 19

    New heuristic function in ant colony system algorithm by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza, Yusof, Yuhanif, Mahmuddin, Massudi, Alobaedy, Mustafa Muwafak

    Published 2012
    “…NP-hard problem can be solved by Ant Colony System (ACS) algorithm.However, ACS suffers from pheromone stagnation problem, a situation when all ants converge quickly to one sub-optimal solution.ACS algorithm utilizes the value between nodes as heuristic value to calculate the probability of choosing the next node.However, the heuristic value is not updated throughout the process to reflect new information discovered by the ants.This paper proposes a new heuristic function for the Ant Colony System algorithm that can reflect new information discovered by ants.The credibility of the new function was tested on travelling salesman and grid computing problems.Promising results were obtained when compared to classical ACS algorithm in terms of best tour length for the travelling sales-man problem. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM) by Shuwandy, Moceheb Lazam

    Published 2012
    “…The system depends on the base "If you enter a true key, you obtain to the truth information, but if you enter the false key; you obtains to the false information."…”
    Get full text
    Get full text
    Get full text
    Thesis