Search Results - (( program competency model algorithm ) OR ( java application modified algorithm ))
Search alternatives:
- application modified »
- program competency »
- competency model »
- java application »
-
1
-
2
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
4
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
5
Capabilities and competencies related to leadership performance effectiveness in the context of change in Malaysian Higher Education Institutions / Majid Ghasemy
Published 2017“…Next, IBM SPSS Statistics 23 was used for data screening and descriptive analysis whereas SmartPLS 3 was employed to develop a few models for the contribution of capabilities and competencies to leadership performance in Malaysian academic settings. …”
Get full text
Get full text
Get full text
Thesis -
6
Graph theory approach for managing lecturers’ schedule using graph colouring method / Siti Nor Ba Basri, Nur Su’aidah Khozaid and Farhana Hazwani Ismail
Published 2023“…Different colours are allocated to each vertex using graph colouring techniques such as the vertices algorithm or the edges algorithm, ensuring that clashing courses and lecturers are assigned different time slots. …”
Get full text
Get full text
Student Project -
7
Predicting Post-Internship Employability Using Ensemble Machine Learning Approach
Published 2024“…These findings underscore the importance of robust internship programs in enhancing graduate outcomes. Future research could explore the competencies developed during internships and their correlation with job success.…”
Get full text
Get full text
Get full text
Get full text
Article -
8
Measuring Enterprise Architecture / Siti Fatimah Azzahra Ibrahim
Published 2016Get full text
Get full text
Thesis -
9
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
10
-
11
Modelling knowledge transfer of nursing students during clinical placement / Nor Azairiah Fatimah Othman
Published 2017“…The application of the proposed algorithm has been justified as the most accurate with lower computation time as compared to other optimization techniques such as evolutionary programming (EP) and artificial immune system (AIS). …”
Get full text
Get full text
Book Section -
12
Beyond Grades - Predicting Programme Learning Outcomes with Multi-Output Regression in Malaysian Higher Education
Published 2025journal-article -
13
An innovative approach of blending security features in energy-efficient routing for a crowded network of wireless sensors
Published 2014“…Wireless sensor networks (WSN) are emerging as both an important new tier in the IT (information technology) ecosystem and a rich domain of active research involving hardware and system design, networking, distributed algorithms, programming models, data management, security, and social factors [1,2]. …”
Get full text
Get full text
Get full text
Book Chapter -
14
Validation of deep convolutional neural network for age estimation in children using mandibular premolars on digital panoramic dental imaging / Norhasmira Mohammad
Published 2022“…Overall, deep learning using the Tensorflow.Keras (tf.keras) application programming interface (API) makes the development of the DCNN model easier. …”
Get full text
Get full text
Thesis
