Search Results - (( java code classification algorithm ) OR ( data competency gap algorithm ))

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    Object-Oriented Programming semantics representation utilizing agents by Mohd Aris, Teh Noranis

    Published 2011
    “…A formal algorithm that can be applied to any two related Java-based source codes examples is invented to generate the semantics of these source codes. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
    Get full text
    Get full text
    Monograph
  3. 3

    Cross cultural competence, human resource management practices, cross cultural adjustment and adaptive performance among Jordanian military leaders in United Nations peacekeeping by Al Shdaifat, Fayez Hamed Abdo

    Published 2014
    “…However, little is known about the determinants of a military leader‟s adaptive performance in the United Nations missions. Hence a gap remains in the literature. This study fills the gap by examining the relationships that exist between cross-cultural competence, human resource management practices, cross-cultural adjustment and adaptive performance by using a sample of 279 Jordanian military leaders who participated in the United Nations missions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    What drives Chinese youth to use fitness-related health information on social media? an analysis of intrinsic needs, social media algorithms, and source credibility by Zhang, Xin, Tang, Qing Qing, Cai, Ying Ying

    Published 2024
    “…This study aims to address this gap by integrating Self-Determination Theory (SDT)-based internal factors and external factors (social media algorithms and source credibility). …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Variational Bayesian inference for exponentiated Weibull right censored survival data by Jibril Abubakar, Jibril Abubakar, Mohd Asrul Affendi Abdullah, Mohd Asrul Affendi Abdullah, Oyebayo Ridwan Olaniran, Oyebayo Ridwan Olaniran

    Published 2023
    “…The AFT model was developed using two comparative studies based on real-life and simulated data sets. The results from the experiments reveal that the Variational Bayesian (VB) approach is better than the competing Metropolis-Hasting Algorithm and the reference maximum likelihood estimates.…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A comparison of the proposed system with other competing solutions demonstrates its superiority. © 2017, Springer-Verlag London Ltd., part of Springer Nature.…”
    Get full text
    Get full text
    Article
  7. 7

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A comparison of the proposed system with other competing solutions demonstrates its superiority. © 2017, Springer-Verlag London Ltd., part of Springer Nature.…”
    Get full text
    Get full text
    Article