Search Results - (( java data normalization algorithm ) OR ( data competency learning algorithm ))
Search alternatives:
- normalization algorithm »
- competency learning »
- data normalization »
- learning algorithm »
- data competency »
- java »
-
1
-
2
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
3
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
4
Academic leadership bio-inspired classification model using negative selection algorithm
Published 2015“…In the experimental phase, academic leadership competency data were collected from a selected higher learning institution as training data-set based on 10-fold cross validation. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Federated deep learning for automated detection of diabetic retinopathy
Published 2022“…Federated learning allows deep learning algorithms to learn from a diverse set of data stored in multiple databases. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
7
An intelligent risk management framework for monitoring vehicular engine health
Published 2022“…The stacked ensemble of the deep learning algorithm outperformed other standard machine learning and deep learning algorithms in providing 80.3% decision accuracy for the 80% training data and efficiently managing large amounts of data. …”
Get full text
Get full text
Get full text
Article -
8
Permodelan Rangkaian Neural Buatan Untuk Penilaian Kendiri Teknologi Maklumat Guru Pelatih
Published 2001“…The system functions as a research instrument generating questionnaires as well as performing rubric assessment in information technology competency online. The data entered online using web as a medium and then executing back propagation simulation to obtain the desired neural network model, and to predict information technology competency based on the model obtained. …”
Get full text
Get full text
Get full text
Thesis -
9
-
10
Fake news detection: A machine learning approach
Published 2021“…Once the dataset was created, several machine learning algorithms were used to train several different models. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
12
Physics-guided deep neural network to characterize non-Newtonian fluid flow for optimal use of energy resources
Published 2021“…However, machine and deep learning methods have higher accuracy but rely heavily on the quality and amount of training data, and the solution may become inconclusive if data is sparse. …”
Get full text
Get full text
Article -
13
Contextualising Computational Thinking: A Case Study in Remote Rural Sarawak Borneo
Published 2020“…The paper describes an exploratory case study on novice indigenous children’s learning characteristics as they learn Computational thinking (CT) competencies, such as abstraction, decomposition, and algorithmic thinking. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Ethical considerations for equitable outcome-based education in the Metaverse: a qualitative study
Published 2025“…Thematic analysis revealed three primary ethical concerns: digital access inequities, bias in assessment algorithms, and privacy and data governance risk. Recommendations emerging from the study include equity-first design principles, theoretical assessment frameworks, robust data governance policies, and culturally responsive pedagogical approaches. …”
Get full text
Get full text
Get full text
Article -
15
Perceptions and practices of blended learning in foreign language teaching at USIM
Published 2024journal::journal article -
16
-
17
-
18
Ethical considerations for equitable outcome-based education in the metaverse: a qualitative study
Published 2025“…Thematic analysis revealed three primary ethical concerns: digital access inequities, bias in assessment algorithms, and privacy and data governance risk. Recommendations emerging from the study include equity-first design principles, theoretical assessment frameworks, robust data governance policies, and culturally responsive pedagogical approaches. …”
Get full text
Get full text
Get full text
Article -
19
Influence of Renewable Energy Sources on Day Ahead Optimal Power Flow Based on Meteorological Data Forecast Using Machine Learning: A Case Study of Johor Province
Published 2024“…The article integrates the machine learning into power system operation to predict precisely day ahead meteorological data (wind speed, temperature and solar irradiance) that influence directly on the calculations of generated power of wind turbines and solar photovoltaic generators. …”
Article -
20
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article
