Search Results - (( course evaluation new algorithm ) OR ( between transformational system algorithm ))

Refine Results
  1. 1
  2. 2

    Evaluate the performance of university course timetabling problem with different combinations of genetic algorithm by Foo, Yao Heng

    Published 2025
    “…University course timetabling problem (UCTP) is a scheduling problem that requires courses to be assigned to the limited time slots, classrooms, and lecturers, while adhering to a set of predefined constraints. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Artificial neural networks and genetic algorithm for transformer winding/insulation faults by K.S.R., Rao, K.N., Nashruladin

    Published 2008
    “…The results are compared between the real and predicted faults to observe the accuracy rate of the system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    A PSO inspired asynchronous cooperative distributed hyper-heuristic for course timetabling problems by Joe Henry Obit, Rayner Alfred, Mansour Hassani Abdalla

    Published 2017
    “…The performances of the proposed cooperative hyper-heuristics are evaluated using the standard course timetabling benchmark problem. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Transformer T-joint optimization using particle swarm optimization and hemisphere-shape design of the core by Yehya, Omar Sharaf Al-Deen

    Published 2017
    “…The electrical power engineering and transformer experts seek to achieve the best economic and practical operation of electrical power system transformers, which include minimizing losses that are generated inside the transformers. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Black hole algorithm along edge detector and circular hough transform based iris projection with biometric identification systems by Tara Othman Qadir, Tara Othman Qadir, N.S.A.M Taujuddin, N.S.A.M Taujuddin

    Published 2024
    “…In this study, we presented a Black Hole Algorithm (BHA) along the Canny edge detector and circular Hough transform-based optimization technique for circular parameter identification of iris segmentation. …”
    Get full text
    Get full text
    Article
  8. 8

    APPLICATION OF ANN AND GA FOR TRANSFORMER WINDING/ INSULATION FAULTS by NASHRULADIN, KHAIRUN NISA'

    Published 2007
    “…The project outcome is analyzed using Neural Network and Genetic Algorithm MATLAB Toolbox. Comparison between the real fault and predicted fault is made as to observe the accuracy rate of the system. …”
    Get full text
    Get full text
    Final Year Project
  9. 9
  10. 10
  11. 11

    An FPGA implementation and performance analysis between radix-2 and radix-4 of 4096 point FFT by Abbas, Zaid Ali, Sulaiman, Nasri, Md Yunus, Nurul Amziah, Wan Hasan, Wan Zuha, Ahmed, Mohammed K.

    Published 2018
    “…The main block in any OFDM transceiver is the Fast Fourier Transform (FFT). FFT consider the transformation bridge between the time and frequency domains. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Correlation immunity and resiliency of boolean functions from haar domain perspective by Rafiq, Hashum M., Siddiqi, Mohammad Umar

    Published 2015
    “…The paper exploits the analogy between the two transforms to derive the Haar general representation of the correlation-immunity and the resiliency security criteria. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Object-oriented online course recommendation systems based on deep neural networks by Luo, Hao, Husin, Nor Azura, Abdipoor, Sina, Mohd Aris, Teh Noranis, Sharum, Mohd Yunus, Zolkepli, Maslina

    Published 2024
    “…To tackle these issues, this paper introduces a comprehensive analysis and design of an object-oriented online course recommendation system. Employing a deep neural network algorithm for course recommendation, our system adeptly captures user preferences, course attributes, and intricate relationships between them. …”
    Get full text
    Get full text
    Article
  15. 15

    Analysis Of Sift And Surf Algorithms For Image Mosaicing On Embedded Platform by Ooi , Chong Wei

    Published 2015
    “…Next homography estimation is performed by using RANSAC algorithm. Perspective transform is applied to obtain a transformation for mapping a two dimensional quadrilateral into another. …”
    Get full text
    Get full text
    Thesis
  16. 16

    COMPUTER AIDED SYSTEM FOR BREAST CANCER DIAGNOSIS USING CURVELET TRANSFORM by MOHAMED ELTOUKHY, MOHAMED MESELHY

    Published 2011
    “…In this thesis we developed a computer aided system for the diagnosis and detection of breast cancer using curvelet transform. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Object-oriented online course recommendation systems based on deep neural networks by Husin, Nor Azura, Mohd Aris, Teh Noranis, Zolkepli, Maslina, Sharum, Mohd Yunus, Luo, Hao, Sina, Abdipoor

    Published 2024
    “…To tackle these issues, this paper introduces a comprehensive analysis and design of an object-oriented online course recommendation system. Employing a deep neural network algorithm for course recommendation, our system adeptly captures user preferences, course attributes, and intricate relationships between them. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Verification of correctness properties for aggregation behavior of swarm robotics system using spin model checker / Siti Shafinaz Ali by Ali, Siti Shafinaz

    Published 2015
    “…This algorithm is based on PFSA only relies on local interactions between individuals, the extensibility of the algorithm is very weak. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Verification correctness properties for aggregation behavior of swarm robotics system using SPIN model checker / Siti Shafinaz Ali by Ali, Siti Shafinaz

    Published 2015
    “…This algorithm is based on PFSA only relies on local interactions between individuals, the extensibility of the algorithm is very weak. …”
    Get full text
    Get full text
    Thesis
  20. 20

    The haar analysis of nonlinearity cryptographic security criterion by Rafiq, Hashum M., Siddiqi, Mohammad Umar

    Published 2016
    “…This paper presents an analysis of the nonlinearity criterion from the Haar transform domain perspective. The paper proceeds by utilizing the connection between the Haar and the Walsh transforms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper