Search Results - (( course evaluation from algorithm ) OR ( between transformational system algorithm ))

Refine Results
  1. 1

    Using algorithmic taxonomy to evaluate lecturer workload by Hashim, Ruhil Hayati, Abdul Hamid, Jamaliah, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Mohayidin, Mohd Ghazali

    Published 2006
    “…The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset. Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Artificial neural networks and genetic algorithm for transformer winding/insulation faults by K.S.R., Rao, K.N., Nashruladin

    Published 2008
    “…The results are compared between the real and predicted faults to observe the accuracy rate of the system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4

    Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset. Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hassan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Transformer T-joint optimization using particle swarm optimization and hemisphere-shape design of the core by Yehya, Omar Sharaf Al-Deen

    Published 2017
    “…The electrical power engineering and transformer experts seek to achieve the best economic and practical operation of electrical power system transformers, which include minimizing losses that are generated inside the transformers. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Black hole algorithm along edge detector and circular hough transform based iris projection with biometric identification systems by Tara Othman Qadir, Tara Othman Qadir, N.S.A.M Taujuddin, N.S.A.M Taujuddin

    Published 2024
    “…In this study, we presented a Black Hole Algorithm (BHA) along the Canny edge detector and circular Hough transform-based optimization technique for circular parameter identification of iris segmentation. …”
    Get full text
    Get full text
    Article
  8. 8

    APPLICATION OF ANN AND GA FOR TRANSFORMER WINDING/ INSULATION FAULTS by NASHRULADIN, KHAIRUN NISA'

    Published 2007
    “…The project outcome is analyzed using Neural Network and Genetic Algorithm MATLAB Toolbox. Comparison between the real fault and predicted fault is made as to observe the accuracy rate of the system. …”
    Get full text
    Get full text
    Final Year Project
  9. 9
  10. 10
  11. 11

    An FPGA implementation and performance analysis between radix-2 and radix-4 of 4096 point FFT by Abbas, Zaid Ali, Sulaiman, Nasri, Md Yunus, Nurul Amziah, Wan Hasan, Wan Zuha, Ahmed, Mohammed K.

    Published 2018
    “…The main block in any OFDM transceiver is the Fast Fourier Transform (FFT). FFT consider the transformation bridge between the time and frequency domains. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Correlation immunity and resiliency of boolean functions from haar domain perspective by Rafiq, Hashum M., Siddiqi, Mohammad Umar

    Published 2015
    “…The paper exploits the analogy between the two transforms to derive the Haar general representation of the correlation-immunity and the resiliency security criteria. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Analysis Of Sift And Surf Algorithms For Image Mosaicing On Embedded Platform by Ooi , Chong Wei

    Published 2015
    “…Next homography estimation is performed by using RANSAC algorithm. Perspective transform is applied to obtain a transformation for mapping a two dimensional quadrilateral into another. …”
    Get full text
    Get full text
    Thesis
  15. 15

    COMPUTER AIDED SYSTEM FOR BREAST CANCER DIAGNOSIS USING CURVELET TRANSFORM by MOHAMED ELTOUKHY, MOHAMED MESELHY

    Published 2011
    “…In this thesis we developed a computer aided system for the diagnosis and detection of breast cancer using curvelet transform. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A PSO inspired asynchronous cooperative distributed hyper-heuristic for course timetabling problems by Joe Henry Obit, Rayner Alfred, Mansour Hassani Abdalla

    Published 2017
    “…The performances of the proposed cooperative hyper-heuristics are evaluated using the standard course timetabling benchmark problem. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Design and development of elective courses recommender system (ECORS) by Eng, Pei Wen

    Published 2017
    “…Usability testing is conducted in system evaluation process using questionnaire adapted from Recommender systems' Quality of user experience (ResQue). …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  18. 18

    Verification of correctness properties for aggregation behavior of swarm robotics system using spin model checker / Siti Shafinaz Ali by Ali, Siti Shafinaz

    Published 2015
    “…This algorithm is based on PFSA only relies on local interactions between individuals, the extensibility of the algorithm is very weak. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Verification correctness properties for aggregation behavior of swarm robotics system using SPIN model checker / Siti Shafinaz Ali by Ali, Siti Shafinaz

    Published 2015
    “…This algorithm is based on PFSA only relies on local interactions between individuals, the extensibility of the algorithm is very weak. …”
    Get full text
    Get full text
    Thesis
  20. 20

    The haar analysis of nonlinearity cryptographic security criterion by Rafiq, Hashum M., Siddiqi, Mohammad Umar

    Published 2016
    “…This paper presents an analysis of the nonlinearity criterion from the Haar transform domain perspective. The paper proceeds by utilizing the connection between the Haar and the Walsh transforms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper