Search Results - (( course evaluation methods algorithm ) OR ( rate information sharing algorithms ))

Refine Results
  1. 1
  2. 2

    Using algorithmic taxonomy to evaluate lecturer workload by Hashim, Ruhil Hayati, Abdul Hamid, Jamaliah, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Mohayidin, Mohd Ghazali

    Published 2006
    “…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Multi-user beamforming, fairness and device-to-device channel state information sharing in downlink non-orthogonal multiple access systems by Abdulhussein, Mohanad Mohammed

    Published 2021
    “…To solve this problem, a new cooperative NOMA system is introduced, in which we first, propose a receiver equalizer at weak user known as weak user beam-matching (WBM) equalizer based on deviceto- device (D2D) channel state information (CSI) sharing between the nearby strong and weak users. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hassan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Using web questionnaire for web-based course evaluation: advantages and disadvantages by Fariborzi, Elham, Abu Bakar, Kamariah, Kasa, Zakaria, Abu Samah, Bahaman, Abdullah, Muhammad Taufik

    Published 2017
    “…This article examines some advantages and disadvantages of conducting Web survey research especially for Web-based course evaluation at Iranian university E-learning centers. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8

    Hybridflood algorithms minimizing redundant messages and maximizing efficiency of search in unstructured P2P networks by Barjini, Hassan

    Published 2012
    “…Thus, the proposed algorithms enhance the performance of the search by reducing redundant messages, increasing the success rate and decreasing latency. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Therefore, in order to improve bandwidth fairness along with efficient optimization to alleviate this problem, we propose two marker algorithms; a Double Modified Double Improved time sliding window Three Colour Marker (M2I2TSWTCM) algorithm, which makes a new value of that depends on the logarithm peak information rate (PIR) and which is added to the adaptive factor that exists in the previous algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Graph theory approach for managing lecturers’ schedule using graph colouring method / Siti Nor Ba Basri, Nur Su’aidah Khozaid and Farhana Hazwani Ismail by Basri, Siti Nor Ba, Khozaid, Nur Su’aidah, Ismail, Farhana Hazwani

    Published 2023
    “…In this study, the scheduling problem is represented as a graph where vertices represent time slots and edges represent conflicts or dependencies between courses and lecturers. Different colours are allocated to each vertex using graph colouring techniques such as the vertices algorithm or the edges algorithm, ensuring that clashing courses and lecturers are assigned different time slots. …”
    Get full text
    Get full text
    Student Project
  11. 11

    A Continuous Overlay Path Probing Algorithm For Overlay Networks by Feily, Maryam

    Published 2013
    “…Several experiments were carried out using the OMNeT++ simulation framework. The designed algorithm was evaluated using experimental data. The obtained results show that the continuous in-band overlay path probing algorithm (COPPA) provides up-to-date bandwidth information with reduced overhead and minimal impact on the traffic of the path.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Performance evaluation of task scheduling using hybrid meta-heuristic in the heterogeneous cloud environment by Mohammed, Faten Ameen Saif

    Published 2019
    “…Cloud computing is a platform in which it provides services, information and software over the Internet. The essential role of cloud computing is enabling sharing of resources on-demand over the network (e.g. servers, applications, storage, services and database) to the end-users that are distributed geographically. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15
  16. 16

    Restaurant review system with data visualization and text search using TF-IDF algorithm / Syazwina Abd Hamid by Abd Hamid, Syazwina

    Published 2020
    “…Besides that, the text in reviews convey better information than the rating alone thus encourages deeper study on the review content. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Space allocation for examination scheduling using Genetic Algorithm / Alya Kauthar Azman by Azman, Alya Kauthar

    Published 2025
    “…The research adopts a Genetic Algorithm-based approach, where examination scheduling details such as date, time, course code, program code, student group, student numbers, and available spaces are encoded as chromosomes. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh by Mohammed Saleh, Mohammed Ahmed

    Published 2016
    “…In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Determination of permeability characteristics of solid/liquid separation using simplex algorithm by Tanaka, Takanori, Kato, Hiroki, Fukuyama, Ryo, Hayashi, Natsuko, Jami, Mohammed Saedi, Iwata, Masashi

    Published 2013
    “…For efficacy evaluation of this estimation method, the permeability data of zinc oxide were determined using the method. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…The algorithm achieved an average of 87% precision, 83% of recall, 85% of F-score and 82% of accuracy rate.…”
    Get full text
    Get full text
    Thesis