Search Results - (( course evaluation study algorithm ) OR ( its verification based algorithm ))

Refine Results
  1. 1

    Stroke-to-stroke matching in on-line signature verification by Ahmad Jaini, Azhar

    Published 2010
    “…Current methods make use of the DTW algorithm and its variant to segment them before comparing each of its data dimension. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7

    Building norms-adaptable agents from Potential Norms Detection Technique (PNDT) by Mahmoud M.A., Ahmad M.S., Ahmad A., Mustapha A., Yusoff M.Z.M., Hamid N.H.A.

    Published 2023
    “…The literature proposes that an agent changes or updates its norms based on the variables of the local environment and the amount of thinking about its behaviour. …”
    Short Survey
  8. 8

    Halal product checker: real time ingredient verification application using mobile text scanning by Abd Rahim, Adam Putra

    Published 2025
    “…The Halal Product Checker: Real-Time Ingredient Verification Application Using Text Scanning is an OCR (Optical Character Recognition) technology-based mobile application created to assist Muslims in ascertaining whether the ingredients in foods are halal. …”
    Get full text
    Get full text
    Student Project
  9. 9

    Finger vein verification by Krishna Veni, Selvan.

    Published 2009
    “…This trait offers a higher security because for gery is extremely difficult. The finger vein verification project verifies a person‟s identity based on the vein patterns. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    Using algorithmic taxonomy to evaluate lecturer workload by Hashim, Ruhil Hayati, Abdul Hamid, Jamaliah, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Mohayidin, Mohd Ghazali

    Published 2006
    “…The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset. Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset. Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Automated study plan generator using rule-based and knapsack problem by Salahuddin, Lizawati, Hashim, Ummi Rabaah, Salahuddin, Lizawati

    Published 2022
    “…Hence, this study aims to propose an algorithm to generate an automated and accurate study plan throughout the study duration. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Evaluate the performance of university course timetabling problem with different combinations of genetic algorithm by Foo, Yao Heng

    Published 2025
    “…University course timetabling problem (UCTP) is a scheduling problem that requires courses to be assigned to the limited time slots, classrooms, and lecturers, while adhering to a set of predefined constraints. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hassan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Multi-base number representation in application to scalar multiplication and pairing computation by Mohammed Ismail, Abdelwahed

    Published 2011
    “…The multi-bases number representation is also applied to construct another new elliptic curve joint-scalar multiplication algorithm, called the joint-multi base algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Fuzzy logic-based hill climbing technique for photovoltaic maximum power point tracking converter by Taghvaee, Mohammad Hossein

    Published 2013
    “…Further experimental setup was carried out for comparative evaluation and the MPPT algorithm was implemented to performance verification of the algorithm by using digital signal processor (TMS320F28335). …”
    Get full text
    Get full text
    Thesis