Search Results - (( java implication _ algorithm ) OR ( knowledge validation study algorithm ))
Search alternatives:
-
1
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
Get full text
Get full text
Get full text
Article -
2
-
3
Using algorithmic taxonomy to evaluate lecturer workload
Published 2006“…The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset. Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Article -
4
Analytical studies and experimental examines for flooding-based search algorithms
Published 2012“…To improve this searching scheme and reduce redundant messages, there are many flooding-based search algorithms in literature. This pa- per provided analytical study for flooding and flooding-based algorithms. …”
Get full text
Book Section -
5
Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal
Published 2006“…The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset. Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Conference or Workshop Item -
6
SURE-Autometrics algorithm for model selection in multiple equations
Published 2016“…This automatic model selection algorithm is better than non-algorithm procedure which requires knowledge and extra time. …”
Get full text
Get full text
Get full text
Thesis -
7
Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal
Published 2006“…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
From Employees to Entrepreneurs: A Qualitative Exploration of Career Transitions in Ghana
Published 2025“…Specifically, this study investigated the knowledge creation process in KMS to support the implementation of OBE in HEIs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Multilingual Sentiment Analysis From Students Feedback: Optimal Techniques And Resources For Bengali Lingual Data
Published 2024thesis::doctoral thesis -
10
Discovering decision algorithm from a distance relay event report
Published 2009“…This derived algorithm, aptly known as relay CD-prediction rules, can later be used as a knowledge base in support of a protection system analysis expert system to predict, validate or even diagnose future unknown relay events. …”
Get full text
Get full text
Get full text
Article -
11
An Artificial Intelligence-Based Knowledge Management System for Outcome-Based Education Implementing in Higher Education Institutions
Published 2025“…Specifically, this study investigated the knowledge creation process in KMS to support the implementation of OBE in HEIs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Ontology-based metabolic pathway prediction using saccharomyces cerevisiae data from genbank, ecocyc and kegg
Published 2006“…The identification and validation of drug targets depends critically on knowledge of the metabolic pathways in which potential target molecules operate within cells. …”
Get full text
Get full text
Thesis -
13
Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer
Published 2017“…Furthermore, the Lazy-IBK algorithm have been validated to produce the best classifier model, with the machine learning algorithm performance of 65.26%, recall of 65.3%, and 65.4% F-measured as compared to other evaluated machine learning classifier algorithms proposed within the WEKA data mining algorithm. …”
Get full text
Get full text
Get full text
Thesis -
14
Frameworks for a computational Isnad authentication and mechanism development
Published 2016“…These days, there are an increasing number of studies in ICT has been done on the hadith domain in different levels of knowledge of hadith, where a number of studies have been conducted in IT to validate the Ahadith where most of them are based on the matching of test Ahadith with the authentic Ahadith in the database. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Efficient genetic partitioning-around-medoid algorithm for clustering
Published 2019“…This study utilizes genetic algorithms based upon the medoid rather than the mean as a centroid-selection schema to improve the clustering efficiency. …”
Get full text
Get full text
Thesis -
16
Comparison of document similarity algorithms in extracting document keywords from an academic paper
Published 2021“…The idea of this study is to validate a list of keywords derived from a scientific article by a domain expert from years of knowledge with prominent document similarity algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Rabbit breed classification using CNN / Aishah Nabila Mohd Zaid
Published 2024“…Literature review, knowledge acquisition, and dataset collection inform algorithm selection and dataset validation. …”
Get full text
Get full text
Thesis -
18
Comparison of document similarity algorithms in extracting document keywords from an academic paper
Published 2021“…The idea of this study is to validate a list of keywords derived from a scientific article by a domain expert from years of knowledge with prominent document similarity algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Capability requirements on fraud prevention in the Nigeria public sector: perception of forensic accountants and auditors
Published 2017“…Six hypotheses are developed in the study. Three were tested through the use of the PLS-SEM Algorithm and Bootstrapping techniques regarding their internal consistency reliability, convergent validity, discriminant validity, and direct relationships. …”
Get full text
Get full text
Get full text
Thesis -
20
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…The experiment was executed by using k-fold cross validation techniques for predicting the classification algorithm performance. …”
Get full text
Get full text
Thesis
