Search Results - (( course evaluation methods algorithm ) OR ( related information seeking algorithm ))*

Refine Results
  1. 1

    Using algorithmic taxonomy to evaluate lecturer workload by Hashim, Ruhil Hayati, Abdul Hamid, Jamaliah, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Mohayidin, Mohd Ghazali

    Published 2006
    “…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hassan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Using web questionnaire for web-based course evaluation: advantages and disadvantages by Fariborzi, Elham, Abu Bakar, Kamariah, Kasa, Zakaria, Abu Samah, Bahaman, Abdullah, Muhammad Taufik

    Published 2017
    “…This article examines some advantages and disadvantages of conducting Web survey research especially for Web-based course evaluation at Iranian university E-learning centers. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Clustering algorithm for market-basket analysis : the underlying concept of data mining technology by Abdul Kadir, Khairil Annuar

    Published 2003
    “…In this research, the author tried to relate the algorithm presented with the experiment. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Graph theory approach for managing lecturers’ schedule using graph colouring method / Siti Nor Ba Basri, Nur Su’aidah Khozaid and Farhana Hazwani Ismail by Basri, Siti Nor Ba, Khozaid, Nur Su’aidah, Ismail, Farhana Hazwani

    Published 2023
    “…In this study, the scheduling problem is represented as a graph where vertices represent time slots and edges represent conflicts or dependencies between courses and lecturers. Different colours are allocated to each vertex using graph colouring techniques such as the vertices algorithm or the edges algorithm, ensuring that clashing courses and lecturers are assigned different time slots. …”
    Get full text
    Get full text
    Student Project
  8. 8

    Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions by Gorment N.Z., Selamat A., Cheng L.K., Krejcar O.

    Published 2024
    “…This paper seeks to conduct a thorough systematic literature review (SLR) and offer a taxonomy of machine learning methods for malware detection that considers these problems by analyzing 77 chosen research works related to malware detection using machine learning algorithm. …”
    Article
  9. 9

    Computational dynamic support model for social support assignments around stressed individuals among graduate students by Al-Shorman, Roqia Rateb

    Published 2020
    “…Hence, this study aims to develop the dynamic configuration algorithm to provide an optimal support assignment based on information generated from both social support recipient and provision computational models. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Space allocation for examination scheduling using Genetic Algorithm / Alya Kauthar Azman by Azman, Alya Kauthar

    Published 2025
    “…The research adopts a Genetic Algorithm-based approach, where examination scheduling details such as date, time, course code, program code, student group, student numbers, and available spaces are encoded as chromosomes. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Determination of permeability characteristics of solid/liquid separation using simplex algorithm by Tanaka, Takanori, Kato, Hiroki, Fukuyama, Ryo, Hayashi, Natsuko, Jami, Mohammed Saedi, Iwata, Masashi

    Published 2013
    “…For efficacy evaluation of this estimation method, the permeability data of zinc oxide were determined using the method. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    CSC649 - Special Topics in Computer Science / College of Computing, Informatics and Media by UiTM, College of Computing, Informatics and Media

    Published 2022
    “…The course will cover specialized technology and described in terms of frameworks and problem formulations, standard models, methods, computational tools, algorithms, as well as methodologies to evaluate the system and select optimal models. …”
    Get full text
    Get full text
    Get full text
    Teaching Resource
  14. 14

    CSC649: Special Topics in Computer Science / College of Computing, Informatics and Mathematics by UiTM, College of Computing, Informatics and Mathematics

    Published 2018
    “…The course will cover specialized technology and described in terms of frameworks and problem formulations, standard models, methods, computational tools, algorithms, as well as methodologies to evaluate the system and select optimal models. …”
    Get full text
    Get full text
    Get full text
    Teaching Resource
  15. 15

    An evolutionary based features construction methods for data summarization approach by Rayner Alfred, Suraya Alias, Chin, Kim On

    Published 2015
    “…In the process of summarizing relational data, a genetic algorithm is also applied and several feature scoring measures are evaluated in order to find the best set of relevant constructed features. …”
    Get full text
    Get full text
    Research Report
  16. 16

    Analysis and evaluation of various aspects of solar radiation in the Palestinian territories by Ismail M.S., Moghavvemi M., Mahlia T.M.I.

    Published 2023
    “…Calculations of the optimized tilt and surface azimuth angles on monthly, seasonal and yearly basis were conducted, with the genetic algorithm being used for this purpose. Different PV tracking methods were also evaluated, taking into account the annual energy production. …”
    Article
  17. 17

    Analysis and evaluation of various aspects of solar radiation in the Palestinian territories by Ismail, M.S., Moghavvemi, Mahmoud, Mahlia, T.M.I.

    Published 2013
    “…Calculations of the optimized tilt and surface azimuth angles on monthly, seasonal and yearly basis were conducted, with the genetic algorithm being used for this purpose. Different PV tracking methods were also evaluated, taking into account the annual energy production. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    A survey of exploratory search systems based on LOD resources by Jacksi, Karwan, Dimililer, Nazife, Zeebaree, Subhi R. M.

    Published 2015
    “…Semantic Web technology plays a major role in resolving this problem by permitting the search engines to retrieve meaningful information. Exploratory search system, a special information seeking and exploration approach, supports users who are unfamiliar with a topic or whose search goals are vague and unfocused to learn and investigate a topic through a set of activities. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Exploring the impact of social media on political discourse: a case study of the Makassar mayoral election by Jufri, Aedah, Abd Rahman, Suarga, .

    Published 2024
    “…A hybrid method is employed to combine the benefits of k-means, SVM, and naïve Bayes. This method seeks to thoroughly grasp how social media affects conversations about the mayoral race, offering insightful information to political scientists and practitioners. …”
    Get full text
    Get full text
    Get full text
    Journal