Search Results - (( course evaluation from algorithm ) OR ( between transformational issues algorithm ))
Search alternatives:
- transformational issues »
- course evaluation »
- issues algorithm »
- evaluation from »
- from algorithm »
-
1
Image Encrytion Using Block Based Transformation Algorithm
Published 2008Get full text
Get full text
Get full text
Article -
2
Using algorithmic taxonomy to evaluate lecturer workload
Published 2006“…The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset. Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Article -
3
Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal
Published 2006“…The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset. Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Conference or Workshop Item -
4
Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal
Published 2006“…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Data Transformation Model For Addressing Incomplete And Inconsistent Quality Issues Of Big Data
Published 2024“…A new algorithm using ontology and clustering methods is used to identify and correct incomplete and inconsistent data, which resolves the availability and comprehensiveness of data, similarity between data items, and missing specific attributes of data. …”
Get full text
Get full text
Get full text
Thesis -
6
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
7
A PSO inspired asynchronous cooperative distributed hyper-heuristic for course timetabling problems
Published 2017“…The performances of the proposed cooperative hyper-heuristics are evaluated using the standard course timetabling benchmark problem. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
8
Black hole algorithm along edge detector and circular hough transform based iris projection with biometric identification systems
Published 2024“…The circular parameters between the pupil and the iris are found using current iris identification techniques but the accuracy creates an issue for the detection process during image processing. …”
Get full text
Get full text
Article -
9
Design and development of elective courses recommender system (ECORS)
Published 2017“…Usability testing is conducted in system evaluation process using questionnaire adapted from Recommender systems' Quality of user experience (ResQue). …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
10
Denoising of digital images using second generation wavelet transforms-hidden markov model
Published 2016“…In this issue, a newly developed algorithm based on second-generation wavelet transformation using semi-soft thresholding is introduced. …”
Get full text
Get full text
Thesis -
11
Prediction of MUET result based on KNN algorithm / Siti Fatimah Azzahra Hamrizan
Published 2021“…The study aims to explore the K-Nearest Neighbour (KNN) algorithm in solving the MUET result prediction problem, to develop a prototype of MUET result prediction based on the KNN algorithm and to evaluate the accuracy of the KNN algorithm in MUET result prediction. …”
Get full text
Get full text
Thesis -
12
An artificial intelligence approach to monitor student performance and devise preventive measures
Published 2023“…This research evaluates the effectiveness of machine learning algorithms to monitor students� academic progress and informs the instructor about the students at the risk of ending up with unsatisfactory result in a course. …”
Article -
13
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…In the field of Data Communication, security issues are the top priority.Cryptography and steganography address the necessary elements for secure communication namely privacy, confidentiality,key exchange,authentication,and non-repudiation but reveals the fact that communication is happening.This study proposes a combination of Steganography and Cryptography to enhance security of the transmitted information.Hence this work is composed of two parts:cryptographic and steganographic.In the cryptographic part,an improvement has been proposed to the Hill cipher algorithm to be more secured by using a large and random key with large data block,and also extending it by including the special characters and digits.For the steganographic part,a new method has been proposed by combining Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT),to take the advantageous of both algorithms.The original image is decomposed into four bands using the Haar wavelet LL,HL,LH and HH.Three of these sub-bands have been selected to hiding data (LH,HL and HH)which are less effect to the image than LL sub-band.Then,DCT transform is applied to the selected DWT sub-band,the process of hiding will be in the least significant bit of the DCT coefficients to each sub-band. …”
Get full text
Get full text
Thesis -
14
-
15
The Development of Synthetic Algorithm of Fluid Flow Through Particle Image Velocimetry (PIV)
Published 2017“…The most common PIV cross-correlation algorithm, the standard Fast-Fourier Transform (FFT) is evaluated by measuring the displacement of particles in synthetically generated PIV images. …”
Get full text
Get full text
Final Year Project -
16
Space allocation for examination scheduling using Genetic Algorithm / Alya Kauthar Azman
Published 2025“…Data for the study was collected from university records, and algorithm performance was tested against predefined scheduling criteria. …”
Get full text
Get full text
Thesis -
17
Recommendation system in selecting course of public university in Malaysia using K-nearest neighbour
Published 2018“…The objectives of this project are to study the current algorithm and technique in recommendation systems for selecting courses; to implement k-Nearest Neighbour in the recommendation system; and to evaluate the application of the recommendation system. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
18
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…In the field of Data Communication, security issues are the top priority.Cryptography and steganography address the necessary elements for secure communication namely privacy, confidentiality,key exchange,authentication,and non-repudiation but reveals the fact that communication is happening.This study proposes a combination of Steganography and Cryptography to enhance security of the transmitted information.Hence this work is composed of two parts:cryptographic and steganographic.In the cryptographic part,an improvement has been proposed to the Hill cipher algorithm to be more secured by using a large and random key with large data block,and also extending it by including the special characters and digits.For the steganographic part,a new method has been proposed by combining Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT),to take the advantageous of both algorithms.The original image is decomposed into four bands using the Haar wavelet LL,HL,LH and HH.Three of these sub-bands have been selected to hiding data (LH,HL and HH)which are less effect to the image than LL sub-band.Then,DCT transform is applied to the selected DWT sub-band,the process of hiding will be in the least significant bit of the DCT coefficients to each sub-band. …”
Get full text
Get full text
Undergraduates Project Papers -
19
Waste management using machine learning and deep learning algorithms
Published 2020“…For our research we did the comparisons between three Machine Learning algorithms, namely Support Vector Machine (SVM), Random Forest, and Decision Tree, and one Deep Learning algorithm called Convolutional Neural Network (CNN), to find the optimal algorithm that best fits for the waste classification solution. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
20
Sentiment analysis regarding childcare issues using Naive Bayes Algorithm / Alis Farhana Zulkipeli
Published 2025“…This study applies the Naive Bayes algorithm for sentiment analysis to assess public perceptions of childcare issues, particularly child abandonment and accidents. …”
Get full text
Get full text
Thesis
