Search Results - (( development organizational using algorithm ) OR ( java implications based algorithm ))
Search alternatives:
- organizational using »
- implications based »
- java implications »
- using algorithm »
-
1
-
2
Organizational Culture Automated Audit System (OCAAS)
Published 2017“…Several state of the art technologies and techniques were used to design and developed OCAAS which include the use of machine learning and sentiment analysis based novel opinion mining algorithms for electronic opinion analysis and computerized statistics based mathematical algorithms for electronic data analysis as well as MySQL database integration for faster data processing and cognitive ergonomics system interface for user friendly interface navigation.…”
Get full text
Get full text
Get full text
Thesis -
3
-
4
-
5
Effect of business social responsibility (BSR) on performance of SMEs in Nigeria
Published 2014“…This study used purposive sampling for sample selection. Partial Least Squares (PLS) algorithm and bootstrap techniques were used to test the study‘s hypotheses. …”
Get full text
Get full text
Get full text
Thesis -
6
Convergence Analysis of the African Buffalo Optimization Algorithm
Published 2016“…This paper presents the convergence analysis of the newly-developed African Buffalo Optimization algorithm. African Buffalo Optimization is a simulation of the organizational skills of the African buffalos using two basic sounds: /waaa/ and /maaa/ as they transverse the African landscape in search of grazing pastures. …”
Get full text
Get full text
Get full text
Article -
7
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
8
Moderating effects of government support on the relationship between organizational innovativeness, culture and sustainable construction among Malaysian contractors
Published 2016“…Therefore, to enhance sustainable construction adoption, more efforts are suggested to be applied to developing and utilising organizational innovativeness and organizational cultural dimensions, while more government support is also encouraged. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Structural Equation Modeling Algorithm and Its Application in Business Analytics
Published 2017Get full text
Get full text
Get full text
Book Chapter -
10
-
11
Campus study buddy : collaborative learning and resource sharing app
Published 2024“…The application is developed using Flutter and uses a tag recommendation algorithm to push content that users may be interested in, thereby intelligently providing users with an online learning environment that suits them and improving their learning efficiency. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Multilingual Sentiment Analysis From Students Feedback: Optimal Techniques And Resources For Bengali Lingual Data
Published 2024thesis::doctoral thesis -
13
Artificial intelligence (AI) and its application in architecture design: a thematic review
Published 2025“…Future studies are expected to focus on refining algorithms and integrating AI more closely with architectural tools to boost efficiency and sustainability in building design and project management, in addition to organizational influences aimed at advancing building sustainability.…”
Get full text
Get full text
Get full text
Article -
14
The mediating role of quality culture on the relationship between talent management and organization performance
Published 2017“…Partial Least Squares (PLS) algorithm and bootstrap techniques were used to test the hypotheses of the study.The result revealed that talent management dimensions and quality culture had a significant positive effect on university performance.Also, the results reveal that quality culture mediated the relationship between talent retention, talent development, and performance, but it did not mediate the relationship between talent attraction and performance of universities in QS ranking. …”
Get full text
Get full text
Conference or Workshop Item -
15
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
16
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
17
Exploring employee working productivity: initial insights from machine learning predictive analytics and visualization
Published 2023“…To address these challenges, this research aims to develop a predictive model using machine learning techniques to determine employee productivity within organizations. …”
Get full text
Get full text
Get full text
Article -
18
Exploring employee working productivity: initial insights from machine learning predictive analytics and visualization / Mohd Norhisham Razali ... [et al.]
Published 2023“…To address these challenges, we developed a predictive model using machine learning techniques to determine employee productivity within organizations. …”
Get full text
Get full text
Article -
19
-
20
AI recommendation penetration testing tools for password attacks: random forest
Published 2025“…This project developed an AI-based recommendation system using the Random Forest algorithm to address the complexities of selecting appropriate penetration testing tools for password attacks. …”
Get full text
Get full text
Get full text
Article
