Search Results - (( java data normalization algorithm ) OR ( data competency learning algorithm ))

Refine Results
  1. 1
  2. 2

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…Even a normal people using clustering to grouping their data. …”
    Get full text
    Get full text
    Thesis
  3. 3

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Academic leadership bio-inspired classification model using negative selection algorithm by Jantan, Hamidah, Sa’dan, Siti ‘Aisyah, Che Azemi, Nur Hamizah Syafiqah

    Published 2015
    “…In the experimental phase, academic leadership competency data were collected from a selected higher learning institution as training data-set based on 10-fold cross validation. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Federated deep learning for automated detection of diabetic retinopathy by Zainal Abidin, Nadzurah, Ismail, Amelia Ritahani

    Published 2022
    “…Federated learning allows deep learning algorithms to learn from a diverse set of data stored in multiple databases. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  7. 7

    An intelligent risk management framework for monitoring vehicular engine health by Rahim, Md. Abdur, Rahman, Md. Arafatur, Rahman, Md. Mustafizur, Zaman, Nafees, Moustafa, Nour, Razzak, Imran

    Published 2022
    “…The stacked ensemble of the deep learning algorithm outperformed other standard machine learning and deep learning algorithms in providing 80.3% decision accuracy for the 80% training data and efficiently managing large amounts of data. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Permodelan Rangkaian Neural Buatan Untuk Penilaian Kendiri Teknologi Maklumat Guru Pelatih by Hashim, Asman

    Published 2001
    “…The system functions as a research instrument generating questionnaires as well as performing rubric assessment in information technology competency online. The data entered online using web as a medium and then executing back propagation simulation to obtain the desired neural network model, and to predict information technology competency based on the model obtained. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Fake news detection: A machine learning approach by Yeoh, Dennis Guan Lee

    Published 2021
    “…Once the dataset was created, several machine learning algorithms were used to train several different models. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Physics-guided deep neural network to characterize non-Newtonian fluid flow for optimal use of energy resources by Kumar, A., Ridha, S., Narahari, M., Ilyas, S.U.

    Published 2021
    “…However, machine and deep learning methods have higher accuracy but rely heavily on the quality and amount of training data, and the solution may become inconclusive if data is sparse. …”
    Get full text
    Get full text
    Article
  13. 13

    Contextualising Computational Thinking: A Case Study in Remote Rural Sarawak Borneo by Nur Hasheena, Anuar, Fitri Suraya, Mohamad, Jacey Lynn, Minoi

    Published 2020
    “…The paper describes an exploratory case study on novice indigenous children’s learning characteristics as they learn Computational thinking (CT) competencies, such as abstraction, decomposition, and algorithmic thinking. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Ethical considerations for equitable outcome-based education in the Metaverse: a qualitative study by Mohamed Sofiadin, Aidrina

    Published 2025
    “…Thematic analysis revealed three primary ethical concerns: digital access inequities, bias in assessment algorithms, and privacy and data governance risk. Recommendations emerging from the study include equity-first design principles, theoretical assessment frameworks, robust data governance policies, and culturally responsive pedagogical approaches. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17
  18. 18

    Ethical considerations for equitable outcome-based education in the metaverse: a qualitative study by Mohamed Sofiadin, Aidrina

    Published 2025
    “…Thematic analysis revealed three primary ethical concerns: digital access inequities, bias in assessment algorithms, and privacy and data governance risk. Recommendations emerging from the study include equity-first design principles, theoretical assessment frameworks, robust data governance policies, and culturally responsive pedagogical approaches. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Influence of Renewable Energy Sources on Day Ahead Optimal Power Flow Based on Meteorological Data Forecast Using Machine Learning: A Case Study of Johor Province by Touma H.J., Mansor M., Rahman M.S.A., Mokhlis H., Ying Y.J.

    Published 2024
    “…The article integrates the machine learning into power system operation to predict precisely day ahead meteorological data (wind speed, temperature and solar irradiance) that influence directly on the calculations of generated power of wind turbines and solar photovoltaic generators. …”
    Article
  20. 20

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article