Search Results - (( course validation study algorithm ) OR ( early notification system algorithm ))*

Refine Results
  1. 1

    Early detection for server availability in University Malaya data center / Mohd Azizi Osman by Osman, Mohd Azizi

    Published 2016
    “…The objective of the system is to design the detection algorithm for server availability, to develop the detection algorithm for server availability and to test the detection algorithm form server availability. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Flood detector with IoT notifications / Mohammad Fazrul Fahmi Mohammad Razali by Mohammad Razali, Mohammad Fazrul Fahmi

    Published 2024
    “…The introduction of effective early warning systems is imperative due to the substantial danger that floods pose to individuals, assets, and infrastructure. …”
    Get full text
    Get full text
    Student Project
  3. 3

    Earthquake alarm detector / Nik Aqil Farihin Nik Mohd Azizee by Nik Mohd Azizee, Nik Aqil Farihin

    Published 2024
    “…Constructing reliable early warning systems is crucial since earthquakes pose a significant threat to both infrastructure and human life. …”
    Get full text
    Get full text
    Student Project
  4. 4

    Image processing-based flood detection by Ariawan, Angga, Pebrianti, Dwi, Ronny, Akbar, Yudha Maulana, Margatama, Lestari, Bayuaji, Luhur

    Published 2019
    “…If the water level exceeds the specific threshold, the system will generate notification as early warning for the possibility of floodi ng by uploading the text and image to the twitter regarding that condition. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Graph theory approach for managing lecturers’ schedule using graph colouring method / Siti Nor Ba Basri, Nur Su’aidah Khozaid and Farhana Hazwani Ismail by Basri, Siti Nor Ba, Khozaid, Nur Su’aidah, Ismail, Farhana Hazwani

    Published 2023
    “…Different colours are allocated to each vertex using graph colouring techniques such as the vertices algorithm or the edges algorithm, ensuring that clashing courses and lecturers are assigned different time slots. …”
    Get full text
    Get full text
    Student Project
  6. 6

    IoT alarm system: detecting & preventing microsleep events by Azhar, Ahmad Mirza, Awang, Norkhushaini

    Published 2024
    “…The sensor data is transmitted to an onboard alarm unit that employs machine learning algorithms to analyze the metrics and detect early signs of microsleep episodes. …”
    Get full text
    Get full text
    Book Section
  7. 7

    Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset. Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Using algorithmic taxonomy to evaluate lecturer workload by Hashim, Ruhil Hayati, Abdul Hamid, Jamaliah, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Mohayidin, Mohd Ghazali

    Published 2006
    “…The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset. Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hassan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    My little learner: E-learning wonderland by Teoh, Wei En

    Published 2025
    “…The main goal is to overcome the shortcomings that currently exist in e-learning platforms for young learners, including inadequate motivation incentives, a lack of a dashboard that provides insight, an absence of a reminder notification system, insufficient support for a variety of learning methods, and a lack of interactive areas. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    My little learner : E-learning wonderland by Teoh, Wei En

    Published 2025
    “…The main goal is to overcome the shortcomings that currently exist in e-learning platforms for young learners, including inadequate motivation incentives, a lack of a dashboard that provides insight, an absence of a reminder notification system, insufficient support for a variety of learning methods, and a lack of interactive areas. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Internet of Things-based Home Automation with Network Mapper and MQTT Protocol by Alam T., Rokonuzzaman M., Sarker S., Abadin A.F.M.Z., Debnath T., Hossain M.I.

    Published 2025
    “…A multi-level alert system ensures early threat mitigation, with alarms, SMS, notifications, and email alerts to maximize awareness. ? …”
    Article
  14. 14

    Impact of external forces on the quality of digital elevation model derived from drone technology by Isola, Ajibola Ismaila, Mansor, Shattri, Shafri, Helmi, Pradhan, Biswajeet, Mansor, Yaakob

    Published 2019
    “…To achieve the research objective, an experiment was carried out using a fixed-wing drone that was flown over a Golf course at the Universiti Putra Malaysia. The drone with an on-board camera captured photos of the study area at a predefined regular time interval. …”
    Get full text
    Get full text
    Article
  15. 15

    Technologization of Educational Standards and the Triple Hegemony of Cultural Inequality: Perspectives from Digital Education Internationalization by LiPeng, Wang, Wai Yie, Leong, Feng, Yang Yang

    Published 2025
    “…By introducing the Cultural Alienation Index (CAI), the study quantifies digital cultural inequality and validates its explanatory power through cross-regional cases. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Jobs Visualization and Salary Prediction System Based on Jobstreet Malaysia / Khyrina Airin Fariza Abu Samah ... [et al.] by Abu Samah, Khyrina Airin Fariza, Wirakarnain, Nurqueen Sayang Dinnie, Deraman, Noor Afni, Johari, Siti Nor Amalina, Moketar, Nor Aıza, Hasrol Jono, Mohd Nor Hajar

    Published 2021
    “…The extracted Jobstreet’s data runs the pre-processing, develops the model, and runs on real-world data. Linear Regression algorithm was used to predict the salary and tested using mean absolute error to validate the prediction. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18

    Deep learning-based recommendation system to address challenges in providing electronic services by AL Hinai, Turki Abdullah Masood, Al Kulaibi, Juma, Al Husaini, Mohammed Abdulla Salim, Al Husaini, Yousuf Nasser, Habaebi, Mohamed Hadi

    Published 2026
    “…Furthermore, 10-fold cross-validation was employed to assess model generalizability, yielding accuracy scores ranging from 0.88 to 0.92, with Fold 4 scoring 0.89623. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure by Asbullah, Muhammad Asyraf

    Published 2015
    “…Moreover, for the purpose of empirical evidences, some parameters are chosen in the course of the process to validate the efficiency in terms of algorithmic running time and memory consumptions. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…In Chapter 3, we propose a new online system to detect malicious spam emails and to adapt to the changes of malicious URLs in the body of spam emails by updating the system daily. …”
    Get full text
    Get full text
    Thesis