Search Results - (( course evaluation methods algorithm ) OR ( based information ((a algorithm) OR (_ algorithm)) ))
Search alternatives:
- evaluation methods »
- course evaluation »
- methods algorithm »
- based information »
- a algorithm »
-
1
Using algorithmic taxonomy to evaluate lecturer workload
Published 2006“…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Article -
2
Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal
Published 2006“…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Conference or Workshop Item -
3
Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal
Published 2006“…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Virtual reality in algorithm programming course: practicality and implications for college students
Published 2024“…Audiovisual displays are presented in a VR environment, while kinesthetic interactions are obtained through user movements, and material information and readings are presented in a VR environment. …”
Get full text
Get full text
Get full text
Article -
5
An evolutionary based features construction methods for data summarization approach
Published 2015“…In the process of summarizing relational data, a genetic algorithm is also applied and several feature scoring measures are evaluated in order to find the best set of relevant constructed features. …”
Get full text
Get full text
Research Report -
6
Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension
Published 2015“…This model is then to be used in the prototype tool development that is called 3De-ALPROV (Design Development Debug – Algorithm Program Visualization). The efficacy evaluation of the prototype is based on pre- and post- test of the students’ programming performance. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Evaluation of cracks and disintegrations using close-range digital photogrammetry and image processing technique
Published 2005“…Serviceability of road pavements is continuously deteriorating due to traffic loading and poor qualities of the sub grade, sub base, base, or wearing course. To keep road pavements in good condition, maintenance and repair strategies must be based on an informed knowledge of current pavement condition. …”
Get full text
Get full text
Thesis -
8
Channel quality information (CQI) reporting algorithms in LTE-A
Published 2016“…The simulation results show that the average CQI reporting algorithm produced more compromising results than the automated CQI reporting algorithm and the average RB-based CQI reporting algorithm…”
Get full text
Get full text
Get full text
Get full text
Article -
9
-
10
A block cipher based on genetic algorithm
Published 2016“…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
Adaptive intelligence job online scheduling within dynamic grid environment based on gridsim
Published 2008“…Moreover, both dynamic and static information are handled by the solution. In static case, the resource information such as a number of CPUs of a machine, CPU speed, a number machine in the grid system is significantly known in advance while dynamic information like the arrival jobs that are submitted to the system any time during simulation. …”
Get full text
Get full text
Article -
13
-
14
Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan
Published 2014“…Guaranteeing anonymous usage of location-based services however requires that the precise location information transmitted by a user cannot be easily used to identify the subject. …”
Get full text
Get full text
Thesis -
15
Adaptive firefly algorithm for hierarchical text clustering
Published 2016“…In order to refine the obtained clusters, a second algorithm, termed as Weight-based Firefly Algorithm with Relocate (WFAR), is proposed. …”
Get full text
Get full text
Get full text
Thesis -
16
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024“…The ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
Article -
17
Design of information hiding algorithm for multi-link network transmission channel
Published 2019“…This shows that the algorithm has a high accuracy in extracting secret information. …”
Get full text
Get full text
Get full text
Article -
18
Efficient Entropy-Based Decoding Algorithms For Higher-Order Hidden Markov Model
Published 2019“…This algorithm is a memory-efficient algorithm due to its required memory space that is time independent. …”
Get full text
Get full text
Thesis -
19
A new algorithm on Graphical User Authentication (GUA) based on multi-line grids
Published 2010“…Thereafter a comparative analysis of all Recall-Based algorithms based on attack patterns of graphical user authentication is tabulated. …”
Get full text
Get full text
Get full text
Article -
20
MGR: An Information Theory Based Hierarchical Divisive Clustering Algorithm for Categorical Data
Published 2014“…This research proposes mean gain ratio (MGR), a new information theory based hierarchical divisive clustering algorithm for categorical data. …”
Get full text
Get full text
Get full text
Article
