Search Results - (( course validation study algorithm ) OR ( whale optimization isotherm algorithm ))
Search alternatives:
- optimization isotherm »
- whale optimization »
- course validation »
-
1
Graph theory approach for managing lecturers’ schedule using graph colouring method / Siti Nor Ba Basri, Nur Su’aidah Khozaid and Farhana Hazwani Ismail
Published 2023“…Different colours are allocated to each vertex using graph colouring techniques such as the vertices algorithm or the edges algorithm, ensuring that clashing courses and lecturers are assigned different time slots. …”
Get full text
Get full text
Student Project -
2
Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal
Published 2006“…The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset. Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Conference or Workshop Item -
3
Using algorithmic taxonomy to evaluate lecturer workload
Published 2006“…The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset. Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Article -
4
Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal
Published 2006“…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Impact of external forces on the quality of digital elevation model derived from drone technology
Published 2019“…To achieve the research objective, an experiment was carried out using a fixed-wing drone that was flown over a Golf course at the Universiti Putra Malaysia. The drone with an on-board camera captured photos of the study area at a predefined regular time interval. …”
Get full text
Get full text
Article -
6
Technologization of Educational Standards and the Triple Hegemony of Cultural Inequality: Perspectives from Digital Education Internationalization
Published 2025“…By introducing the Cultural Alienation Index (CAI), the study quantifies digital cultural inequality and validates its explanatory power through cross-regional cases. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Jobs Visualization and Salary Prediction System Based on Jobstreet Malaysia / Khyrina Airin Fariza Abu Samah ... [et al.]
Published 2021“…The extracted Jobstreet’s data runs the pre-processing, develops the model, and runs on real-world data. Linear Regression algorithm was used to predict the salary and tested using mean absolute error to validate the prediction. …”
Get full text
Get full text
Conference or Workshop Item -
8
-
9
Deep learning-based recommendation system to address challenges in providing electronic services
Published 2026“…Furthermore, 10-fold cross-validation was employed to assess model generalizability, yielding accuracy scores ranging from 0.88 to 0.92, with Fold 4 scoring 0.89623. …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
Published 2015“…Moreover, for the purpose of empirical evidences, some parameters are chosen in the course of the process to validate the efficiency in terms of algorithmic running time and memory consumptions. …”
Get full text
Get full text
Thesis -
11
Development Of Finite Element Codes For Shear Wall Analysis
Published 2008“…However, this would not serve the objectives of the research investigator. In this study, new elements have been developed, modified constitutive law has been proposed, new computational algorithm has been utilised. …”
Get full text
Get full text
Thesis
