Search Results - (( develop competency gap algorithm ) OR ( java implication tree algorithm ))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    Investigating computational thinking among primary school students in Terengganu using visual programming by Osmanullrazi, Abdullah

    Published 2022
    “…There is still a large gap in term of the investigation of student’s CT skills competency in this aspect. …”
    Get full text
    Get full text
    Thesis
  2. 2

    What drives Chinese youth to use fitness-related health information on social media? an analysis of intrinsic needs, social media algorithms, and source credibility by Zhang, Xin, Tang, Qing Qing, Cai, Ying Ying

    Published 2024
    “…This study aims to address this gap by integrating Self-Determination Theory (SDT)-based internal factors and external factors (social media algorithms and source credibility). …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  4. 4

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  5. 5

    Fostering motivation in TVET students: the role of learner-paced segments and computational thinking in digital video learning by Wan Nor Ashiqin Wan Ali, Wan Ahmad Jaafar Wan Yahaya, Syed Zulkarnain Syed Idrus, Mohd Noorul Fakhri Yaacob

    Published 2024
    “…This study aims to address this gap by examining how learner-paced predefined segments and CT algorithmic thinking can impact TVET students' perceived motivation. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Variational Bayesian inference for exponentiated Weibull right censored survival data by Jibril Abubakar, Jibril Abubakar, Mohd Asrul Affendi Abdullah, Mohd Asrul Affendi Abdullah, Oyebayo Ridwan Olaniran, Oyebayo Ridwan Olaniran

    Published 2023
    “…The results from the experiments reveal that the Variational Bayesian (VB) approach is better than the competing Metropolis-Hasting Algorithm and the reference maximum likelihood estimates.…”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Applying (ACTFL) Standards to Arabic Language Education and the Challenges of Artificial Intelligence An Analytical Study by Abdallah, Abdallah Saleh, Al-Haddad, Abdulwahab Abdulaziz Kassem, Talib, Noor Husna, Ibrahim Youssef, Mohamed Abdelrahman, Zolmaily, Muhammad Akmal

    Published 2025
    “…Furthermore, alignment with ACTFL standards should not only guide instructional content but also inform the development of AI algorithms and feedback systems. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Modelling knowledge transfer of nursing students during clinical placement / Nor Azairiah Fatimah Othman by Othman, Nor Azairiah Fatimah

    Published 2017
    “…This study made an attempt to incorporate knowledge transfer-related variables (articulability of knowledge, credibility of knowledge source, gap of theory-practice, embedded knowledge and environmental uncertainty) into the framework. …”
    Get full text
    Get full text
    Book Section