Search

Your search keyword '"Ooi Shih Yin"' showing total 43 results

Search Constraints

Start Over You searched for: Author "Ooi Shih Yin" Remove constraint Author: "Ooi Shih Yin" Publication Type Academic Journals Remove constraint Publication Type: Academic Journals
43 results on '"Ooi Shih Yin"'

Search Results

1. Temporal Convolutional Recurrent Neural Network for Elderly Activity Recognition

2. Stacking Ensemble Approach for Churn Prediction: Integrating CNN and Machine Learning Models with CatBoost Meta-Learner

3. Interactive Learning System for Learning Calculus [version 2; peer review: 1 approved, 2 approved with reservations]

4. A hybrid TCN-GRU model for classifying human activities using smartphone inertial signals.

5. MSTCN: A multiscale temporal convolutional network for user independent human activity recognition [version 2; peer review: 2 approved, 1 approved with reservations]

6. Stacked deep analytic model for human activity recognition on a UCI HAR database [version 3; peer review: 2 approved]

7. Synchronous Display and Whiteboard-Like Freehand Writing App as Teaching Tool for Virtual Classroom amidst the Pandemic [version 2; peer review: 2 approved, 1 approved with reservations]

8. Stacked deep analytic model for human activity recognition on a UCI HAR database [version 2; peer review: 2 approved]

13. Interactive Learning System for Learning Calculus [version 2; peer review: 2 approved with reservations]

16. Challenges and Solutions in Working with Green Suppliers: Perspective from a Manufacturing Industry.

17. Feature-Level Fusion Multi-Sensor Aggregation Temporal Network for Smartphone-Based Human Activity Recognition.

18. Stacked deep analytic model for human activity recognition on a UCI HAR database [version 3; peer review: 2 approved]

19. Interactive Learning System for Learning Calculus [version 1; peer review: 2 approved with reservations]

21. Stacked deep analytic model for human activity recognition on a UCI HAR database [version 2; peer review: 2 approved]

22. Synchronous Display and Whiteboard-Like Freehand Writing App as Teaching Tool for Virtual Classroom amidst the Pandemic [version 1; peer review: 2 approved with reservations]

23. MSTCN: A multiscale temporal convolutional network for user independent human activity recognition [version 1; peer review: 2 approved with reservations]

24. Stacked deep analytic model for human activity recognition on a UCI HAR database [version 1; peer review: 2 approved with reservations]

25. Framework to Create Inventory Dataset for Disaster Behavior Analysis Using Google Earth Engine: A Case Study in Peninsular Malaysia for Historical Forest Fire Behavior Analysis.

26. Predicting churn with filter-based techniques and deep learning.

30. Collaborative Learning Management System with Analytical Insights: A Preliminary Study.

31. Predictive Churn Modeling for Sustainable Business in the Telecommunication Industry: Optimized Weighted Ensemble Machine Learning.

32. The Development of a Data Collection and Browser Fingerprinting System.

33. Sustainable Growth for Small and Medium-Sized Enterprises: Interpretive Structural Modeling Approach.

34. Benchmarking full version of GureKDDCup, UNSW-NB15, and CIDDS-001 NIDS datasets using rolling-origin resampling.

35. A Review of Forest Fire Combating Efforts, Challenges and Future Directions in Peninsular Malaysia, Sabah, and Sarawak.

36. Principal coefficient encoding for subject-independent human activity analysis.

37. Spatiotemporal spectral histogramming analysis in hand gesture signature recognition.

38. Study of long short-term memory in flow-based network intrusion detection system.

39. Evaluation of black-marker and bilateral classification with J48 decision tree in anomaly based intrusion detection system.

40. Application of Bayesian belief networks and fuzzy cognitive maps in intrusion analysis.

41. Camera-Based Signature Verification System through Discrete Radon Transform (DRT) and Principle Component Analysis (PCA).

42. Adoption of IP Truncation in a Privacy-Based Decision Tree Pruning Design: A Case Study in Network Intrusion Detection System.

43. Bayesian optimization driven strategy for detecting credit card fraud with Extremely Randomized Trees.

Catalog

Books, media, physical & digital resources