Search Results - (( course evaluation from algorithm ) OR ( between transformational system algorithm ))
Search alternatives:
- transformational system »
- course evaluation »
- system algorithm »
- evaluation from »
- from algorithm »
-
1
Using algorithmic taxonomy to evaluate lecturer workload
Published 2006“…The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset. Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Article -
2
Artificial neural networks and genetic algorithm for transformer winding/insulation faults
Published 2008“…The results are compared between the real and predicted faults to observe the accuracy rate of the system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
-
4
Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal
Published 2006“…The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset. Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Conference or Workshop Item -
5
Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal
Published 2006“…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Transformer T-joint optimization using particle swarm optimization and hemisphere-shape design of the core
Published 2017“…The electrical power engineering and transformer experts seek to achieve the best economic and practical operation of electrical power system transformers, which include minimizing losses that are generated inside the transformers. …”
Get full text
Get full text
Thesis -
7
Black hole algorithm along edge detector and circular hough transform based iris projection with biometric identification systems
Published 2024“…In this study, we presented a Black Hole Algorithm (BHA) along the Canny edge detector and circular Hough transform-based optimization technique for circular parameter identification of iris segmentation. …”
Get full text
Get full text
Article -
8
APPLICATION OF ANN AND GA FOR TRANSFORMER WINDING/ INSULATION FAULTS
Published 2007“…The project outcome is analyzed using Neural Network and Genetic Algorithm MATLAB Toolbox. Comparison between the real fault and predicted fault is made as to observe the accuracy rate of the system. …”
Get full text
Get full text
Final Year Project -
9
Data mining techniques for transformer failure prediction model: A systematic literature review
Published 2023Conference Paper -
10
Shape matching and object recognition using dissimilarity measures with Hungarian algorithm
Published 2009Get full text
Working Paper -
11
An FPGA implementation and performance analysis between radix-2 and radix-4 of 4096 point FFT
Published 2018“…The main block in any OFDM transceiver is the Fast Fourier Transform (FFT). FFT consider the transformation bridge between the time and frequency domains. …”
Get full text
Get full text
Conference or Workshop Item -
12
Correlation immunity and resiliency of boolean functions from haar domain perspective
Published 2015“…The paper exploits the analogy between the two transforms to derive the Haar general representation of the correlation-immunity and the resiliency security criteria. …”
Get full text
Get full text
Get full text
Article -
13
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
14
Analysis Of Sift And Surf Algorithms For Image Mosaicing On Embedded Platform
Published 2015“…Next homography estimation is performed by using RANSAC algorithm. Perspective transform is applied to obtain a transformation for mapping a two dimensional quadrilateral into another. …”
Get full text
Get full text
Thesis -
15
COMPUTER AIDED SYSTEM FOR BREAST CANCER DIAGNOSIS USING CURVELET TRANSFORM
Published 2011“…In this thesis we developed a computer aided system for the diagnosis and detection of breast cancer using curvelet transform. …”
Get full text
Get full text
Thesis -
16
A PSO inspired asynchronous cooperative distributed hyper-heuristic for course timetabling problems
Published 2017“…The performances of the proposed cooperative hyper-heuristics are evaluated using the standard course timetabling benchmark problem. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
17
Design and development of elective courses recommender system (ECORS)
Published 2017“…Usability testing is conducted in system evaluation process using questionnaire adapted from Recommender systems' Quality of user experience (ResQue). …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
18
Verification of correctness properties for aggregation behavior of swarm robotics system using spin model checker / Siti Shafinaz Ali
Published 2015“…This algorithm is based on PFSA only relies on local interactions between individuals, the extensibility of the algorithm is very weak. …”
Get full text
Get full text
Thesis -
19
Verification correctness properties for aggregation behavior of swarm robotics system using SPIN model checker / Siti Shafinaz Ali
Published 2015“…This algorithm is based on PFSA only relies on local interactions between individuals, the extensibility of the algorithm is very weak. …”
Get full text
Get full text
Thesis -
20
The haar analysis of nonlinearity cryptographic security criterion
Published 2016“…This paper presents an analysis of the nonlinearity criterion from the Haar transform domain perspective. The paper proceeds by utilizing the connection between the Haar and the Walsh transforms. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
