Search Results - (( knowledge profiling data algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- data algorithm »
-
1
Using algorithmic taxonomy to evaluate lecturer workload
Published 2006“…We constructed an algorithmic taxonomy based on the lecturer profile data to measure lecturer teaching workload. …”
Get full text
Get full text
Get full text
Article -
2
Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal
Published 2006“…We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload. …”
Get full text
Get full text
Conference or Workshop Item -
3
Cyber fraud profiling with routine activity theory using data mining techniques / Sunardi, Abdul Fadlil and Nur Makkie Perdana Kusuma
Published 2023“…The data collection method in this study uses data mining technology on structured and unstructured data. …”
Get full text
Get full text
Article -
4
Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal
Published 2006“…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Evaluation on rapid profiling with clustering algorithms for plantation stocks on Bursa Malaysia
Published 2016“…Building a stock portfolio often requires extensive financial knowledge and Herculean efforts looking at the amount of financial data to analyse. …”
Get full text
Get full text
Get full text
Article -
6
Voltage and load profiles estimation of distribution network using independent component analysis / Mashitah Mohd Hussain
Published 2014“…The voltage profile is predicted using Independent Component Analysis (lCA) algorithm. …”
Get full text
Get full text
Thesis -
7
Electricity load profile determination by using fuzzy C-means and probability neural network / Norhasnelly Anuar
Published 2015“…Hence they need the knowledge of load profile to help them choose their electricity supplier. …”
Get full text
Get full text
Thesis -
8
A knowledge based system for automatic classification of web pages
Published 2006“…Each stem word is generated with local profile. This local profile contains information that indicates the weight of each stem with the possible related classes of web pages.A statistical analysis process is illustrated to reduce the noise stems.The various components of the AIRDB are described.The knowledge based system is tested with various web pages that disseminate their content in English.The average discrimination performance of the AIRDB reaches 84%.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
10
A hybrid approach to improve recommendation system in E-tourism
Published 2024conference output::conference proceedings::conference paper -
11
-
12
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
-
14
Pattern extraction for programming performance evaluation using directed apriori
Published 2009“…Several researches indicated that there are many factors which can affect student programming performance.Thus, the objective of this paper is to investigate the significant factors that may influence students programming performance using information from previous student performance.Since data mining data analysis able to discover hidden knowledge in database, a programming dataset which comprises information about performance profile of Bachelor of Information Technology students of Faculty of IT, Universiti Utara Malaysia in the year 2004-2005 were explored using data mining technique.The dataset consists of 421 records with 70 mixture type of attributes were pre-processed and then mined using directed association rule (AR) mining algorithm namely apriori.The result indicated that the student who has a programming experience in advanced before starts learn programming in university and scored well in Mathematics and English subject during SPM were among the factor that contributes to a good programming grades.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
An investigation into influence factor of student programming grade using association rule mining
Published 2010“…Researches indicated there are many factors can affect student programming performance.Thus, the aim of this study is to investigate the significant factors that may influence students programming performance based information from previous student performance using data mining technique. Data mining is a data analysis technique that able to discover hidden knowledge in database. …”
Get full text
Get full text
Get full text
Article -
16
A hybrid cryptosystem for biometric authentication and template protection
Published 2017“…However, the biometric modalities used are not secret as biometric data can be obtained without the knowledge, permission or cooperation of the owner, thus violating the security of the authentication system and the privacy of legitimate users. …”
Get full text
Get full text
Thesis -
17
Three-dimensional craniometrics identification model and cephalic index classification of Malaysian sub-adults: A multi-slice computed tomography study / Sharifah Nabilah Syed Mohd...
Published 2024“…Discriminant function analysis (DFA), binary logistic regression (BLR), and several machine learning (ML) algorithms (random forest (RF), support vector machines (SVM), and linear discriminant analysis (LDA)) were used to statistically analyse the data. …”
Get full text
Get full text
Get full text
Thesis
