Search Results - "Chen Kang Lee"

Refine Results
  1. 1

    Blended learning for engineering education 4.0: Students' perceptions and their learning difficulties by Low, Min Chi, Lee, Chen Kang, Sidhu, Manjit Singh, Lim, Seng Poh, Hasan, Zaimah, Lim, Seng Chee

    “…Abstract Engineering education plays a vital role in nurturing high‐quality engineers to meet the demands of the industry. The advancement in Information and…”
    Get full text
    Journal Article
  2. 2

    Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing by Ali, Sijjad, Wadho, Shuaib Ahmed, Yichiet, Aun, Gan, Ming Lee, Lee, Chen Kang

    Published in Egyptian informatics journal (01-09-2024)
    “…Cloud computing security and data protection are becoming increasingly critical as its use increases. The research we present demonstrates how undercover…”
    Get full text
    Journal Article
  3. 3

    Validation of Pictorial Mood Assessment with Ottawa Mood Scales and the Positive and Negative Affect Scale for Young Adults by Wong, Mei-Yi, Croarkin, Paul E., Lee, Chen Kang, Lee, Poh Foong

    Published in Community mental health journal (01-04-2021)
    “…Pictorial mood assessments reduce the barriers of age, culture, gender and language fluency in the course of psychiatric assessments. This study sought to…”
    Get full text
    Journal Article
  4. 4

    Factors Influencing Cloud Business Intelligence Adoption and Use at Organisational Level by Hasnain Sultan, Lee-Kwun, Chan, Pei-Hwa Siew, Chen Kang Lee

    Published in ITM Web of Conferences (01-01-2024)
    “…The integration of cloud computing and business intelligence enables analytics solutions through cloud environments. Despite the fears about issues such as…”
    Get full text
    Conference Proceeding Journal Article
  5. 5

    Engineering Students Learning Preferences in UNITEN: Comparative Study and Patterns of Learning Styles by Lee, Chen Kang, Sidhu, Manjit Singh

    Published in Educational Technology & Society (01-07-2015)
    “…Engineering educators have been increasingly taking the learning style theories into serious consideration as part of their efforts to enhance the teaching and…”
    Get full text
    Journal Article
  6. 6

    Molecular cloning and functional analysis of the zebrafish follicle-stimulating hormone (FSH)β promoter by Chen, Jyh-Yih, Chiou, Ming-Jyun, Chen, Lee-Kang, Wu, Jen-Leih

    “…In the present study, we cloned and characterized a zebrafish follicle-stimulating hormone (zfFSH)β promoter with deletion fragments transfected into a tilapia…”
    Get full text
    Journal Article
  7. 7

    Stable expression in a Chinese hamster ovary (CHO) cell line of bioactive recombinant chelonianin, which plays an important role in protecting fish against pathogenic infection by Chiou, Ming-Jyun, Chen, Lee-Kang, Peng, Kuan-Chieh, Pan, Chia-Yu, Lin, Tai-Lang, Chen, Jyh-Yih

    “…Chelonianin, originally isolated from the shrimp ( Penaeus monodon), exhibits antimicrobial effects in vitro and in vivo and is used to treat infectious fish…”
    Get full text
    Journal Article
  8. 8

    Impact of Cyber Insurances on Ransomware by Wadho, Shuaib Ahmed, Yichiet, Aun, Lee, Gan Ming, Kang, Lee Chen, Akbar, Rehan, Kumar, Roshan

    “…The purpose of this research is to examine the rapidly expanding cyber insurance market, specifically focusing on policies designed to counter ransomware…”
    Get full text
    Conference Proceeding
  9. 9

    Emerging Ransomware Attacks: Improvement and Remedies - A Systematic Literature Review by Wadho, Shuaib Ahmed, Yichiet, Aun, Gan, Ming Lee, Kang, Lee Chen, Akbar, Rehan, Kumar, Roshan

    “…Ransomware has emerged as a serious and evolving cybersecurity threat. This research paper examines the advancements and improvements observed in ransomware…”
    Get full text
    Conference Proceeding
  10. 10

    Ransomware Detection Techniques Using Machine Learning Methods by Wadho, Shuaib Ahmed, Yichiet, Aun, Gan, Ming Lee, Lee, Chen Kang, Ali, Sijjad, Akbar, Rehan

    “…Considering the rising frequency and refinement of ransomware attacks, there is a rising significance for dynamic and successful methods of detection and…”
    Get full text
    Conference Proceeding
  11. 11

    Performance Evaluation of Self-Organising Map Model in Organising the Unstructured Data by You, Cheng Chun, Lim, Seng Poh, Lee, Chen Kang, Tan, Joi San, Lim, Seng Chee

    “…Surface reconstruction becomes a difficult task in reverse engineering when the data obtained during the data acquisition process is unstructured. The…”
    Get full text
    Conference Proceeding
  12. 12

    Enhancing teaching and learning for pupils with dyslexia: A comprehensive review of technological and non-technological interventions by Javed, Salman, Muniandy, Manoranjitham, Lee, Chen Kang, Husni, Husniza

    Published in Education and information technologies (01-06-2024)
    “…Dyslexia is the most prevalent disorder in the world that causes difficulties with reading, writing, and spelling. Pupils with dyslexia show trouble with their…”
    Get full text
    Journal Article
  13. 13

    Carbonyl compounds in dining areas,kitchens and exhaust streams in restaurants with varying cooking methods in Kaohsiung,Taiwan by Cheng, Jen-Hsuan, Lee, Yi-Shiun, Chen, Kang-Shin

    Published in Journal of environmental sciences (China) (01-03-2016)
    “…Eighteen carbonyl species in C_1-C_(10) were measured in the dining areas,kitchens and exhaust streams of six different restaurant types in Kaohsiung,southern…”
    Get full text
    Journal Article
  14. 14

    Preliminary Study on the Perception of Engineering Students on Metaverse by Sidhu, Manjit Singh, Lee, Chen Kang, Hassan, Zaimah, Mousakhani, Sara, Sidhu, Kirandeep Kaur, Anuar, Adzly

    “…Understanding Mechanics Dynamics is a crucial foundation in engineering education. Nonetheless, many engineering students face challenges in this course,…”
    Get full text
    Conference Proceeding
  15. 15

    Tailored Virtual Environments for Facilitating School Transition in Children with Autism by Ling Ang, Yi, Guan Goh, Hock, Kang Lee, Chen, Shuen Pheh, Kai, Hui Saw, Seow

    “…An intervention that applies Virtual Reality (VR) in Social Story (SS) is designed to train autistic children to minimize adaptation stress among autistic…”
    Get full text
    Conference Proceeding
  16. 16

    Molecular cloning and functional analysis of the zebrafish follicle-stimulating hormone (FSH)b promoter by Chen, Jyh-Yih, Chiou, Ming-Jyun, Chen, Lee-Kang, Wu, Jen-Leih

    “…In the present study, we cloned and characterized a zebrafish follicle-stimulating hormone (zfFSH)b promoter with deletion fragments transfected into a tilapia…”
    Get full text
    Journal Article
  17. 17

    Preliminary Study on the Accessibility and Learning Experience of Low-Code Development Platforms by Theam Lim, Jit, Kang Lee, Chen, Heng Lim, Ean, Voon Wong, Pei, Tak Yew, King, Yee Ooi, Chek

    “…The Computer Science education industry faces challenges in traditional computer science education that depends critically on theoretical programming concepts…”
    Get full text
    Conference Proceeding
  18. 18

    An Unsupervised Machine Learning Approach for Heart Disease Prediction by Loh, Wing Son, Lim, Yu Jiun, Ling, Lloyd, Chin, Ren Jie, Lee, Chen Kang, Lee, Ming Jie

    “…Cardiovascular diseases (CVDs) persist as a primary cause of mortality on a global scale, necessitating effective prediction methods. This study presents a…”
    Get full text
    Conference Proceeding
  19. 19

    Smart Web Data Analytics Quiz and Tests System by Sidhu, Manjit Singh, Lee, Chen Kang, Ali, Zuraidah

    “…In recent years, the increase in the number of students in classrooms has demanded more efficient analytics software tools for educators such as to grade,…”
    Get full text
    Conference Proceeding
  20. 20

    H-FND: Hierarchical False-Negative Denoising for Distant Supervision Relation Extraction by Chen, Jhih-Wei, Fu, Tsu-Jui, Lee, Chen-Kang, Ma, Wei-Yun

    Published 07-12-2020
    “…Although distant supervision automatically generates training data for relation extraction, it also introduces false-positive (FP) and false-negative (FN)…”
    Get full text
    Journal Article