Search Results - (( course evaluation from algorithm ) OR ( between transformational based algorithm ))

Refine Results
  1. 1

    Image Encrytion Using Block Based Transformation Algorithm by Bani Younes, Mohammad Ali, Jantan, Aman

    Published 2008
    “…In this paper, we introduce a block-based transformation algorithm based on the combination of image transformation and a well known encryption and decryption algorithm called Blowfish. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Using algorithmic taxonomy to evaluate lecturer workload by Hashim, Ruhil Hayati, Abdul Hamid, Jamaliah, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Mohayidin, Mohd Ghazali

    Published 2006
    “…The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset. Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset. Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hassan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Analysis Of Sift And Surf Algorithms For Image Mosaicing On Embedded Platform by Ooi , Chong Wei

    Published 2015
    “…Performance comparison between SURF and SIFT is made. To obtain matching point between images, Flann Based Matcher is used. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    The Haar-Recursive transform and its consequence to the Walsh-paley spectrum and the autocorrelation function by Rafiq, Hashum M., Siddiqi, Mohammad Umar

    Published 2016
    “…The paper introduces a new Haar-based transform algorithm (Haar-Paley-Recursive Transform, HPRT) in the form of a recursive function along with its fast transform version. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    A comparison of discrete cosine transform and discrete wavelet transform algorithm in watermarking against common attacks by Said, Mohamed Abdisalan

    Published 2015
    “…Currently, there is no comparison documented done between Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Image watermarking optimization algorithms in transform domains and feature regions by Tao, Hai

    Published 2012
    “…As a result,it will first introduce the theories about the feature extraction and the basic principles on how feature points can act as locating resynchronization between watermark insertion and extraction discussed in detail.Subsequently,it will present several content-based watermark embedding and extraction methods which can be directly implemented based on the synchronization scheme.Further detailed watermarking schemes which combine feature regions extraction with counter propagation neural network-based watermarks synapses memorization are then presented.The performance of watermarking schemes based on framework of feature point shows the following advantages:a)Good imperceptibility. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Correlation immunity and resiliency of boolean functions from haar domain perspective by Rafiq, Hashum M., Siddiqi, Mohammad Umar

    Published 2015
    “…The results in this presentation are based on a simulation study of the Haar-based algorithm in comparison to its Walsh-counterpart. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A Wavelet-Based Particle Swarm Optimization Algorithm for Digital Image Watermarking by Jasni, Mohamad Zain, Tao, Hai, Ahmed, M. Masroor, Abdalla, Ahmed N., Jing, Wang

    Published 2012
    “…This paper proposes the application of Discrete Wavelet Transform (DWT) into image watermarking by using Particle Swarm Optimization (PSO) which is an evolutionary technique with the stochastic, population-based algorithm for solving this problem. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Black hole algorithm along edge detector and circular hough transform based iris projection with biometric identification systems by Tara Othman Qadir, Tara Othman Qadir, N.S.A.M Taujuddin, N.S.A.M Taujuddin

    Published 2024
    “…In this study, we presented a Black Hole Algorithm (BHA) along the Canny edge detector and circular Hough transform-based optimization technique for circular parameter identification of iris segmentation. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Spatial Clustering Algorithm for Time Series Rainfall Data Using X-Means Data Splitting by Ali, Noor Rasidah, Ku Mahamud, Ku Ruhana

    Published 2017
    “…The hierarchical clustering was used to demonstrate the similarity once the data was divided into training and testing sets. The proposed algorithm is compared with five types of data transformation techniques, namely mean and median in monthly data and the rest is in daily data such as binary, cumulative and actual values.Results indicate that data transformation using X-means data splitting in hierarchical clustering outperformed other transformation techniques and more consistent between training and testing datasets based on similarity measures.…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A PSO inspired asynchronous cooperative distributed hyper-heuristic for course timetabling problems by Joe Henry Obit, Rayner Alfred, Mansour Hassani Abdalla

    Published 2017
    “…The performances of the proposed cooperative hyper-heuristics are evaluated using the standard course timetabling benchmark problem. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Design and development of elective courses recommender system (ECORS) by Eng, Pei Wen

    Published 2017
    “…Usability testing is conducted in system evaluation process using questionnaire adapted from Recommender systems' Quality of user experience (ResQue). …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  18. 18

    Design and implementation of real data fast fourier transform processor on field programmable gates array by Ahmed, Mohammed Kassim

    Published 2015
    “…In this work, the memorybased FFT processor, based on radix-4 FFT algorithm is implemented on Cyclone II Field Programmable Gates Array (FPGA). …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Fatigue data editing algorithm for automotive applications by Shahrum Abdullah, John R. Yates, Joseph A. Giacornin

    Published 2005
    “…This paper presents a wavelet based algorithm to summa rise a long record of fatigue signal by extracting the bumps (fatigue damaging events) to produce a bump signal. …”
    Get full text
    Get full text
    Article