Relationship analysis of formal and experiential learning in military survival skills using text mining
Tacit knowledge tends to be an invaluable knowledge repository in lifelong learning. Critical domains such as military learning cannot solely rely on traditional manuals and methods due to the unforeseen and uncertain scenarios brought about by advances in modern warfare methods and technology. T...
| Main Authors: | Zainol, Zuraini, Nohuddin, Puteri, Kamarudin, Nur Diyana, Siew Hoong, Angela Lee, Wani, Sharyar |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
2019
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/75845/ http://irep.iium.edu.my/75845/1/2019_vol_12_num_2.pdf http://irep.iium.edu.my/75845/7/75845_Relationship%20analysis%20of%20formal%20and%20experiential%20learning%20in%20military%20survival%20skills%20using%20text%20mining_Scopus.pdf |
Similar Items
Offline printed Sindhi optical text recognition: survey
by: Solangi, Yasir Ali, et al.
Published: (2019)
by: Solangi, Yasir Ali, et al.
Published: (2019)
Randomized text encryption: a new dimension in cryptography
by: Memon, Jamshed, et al.
Published: (2014)
by: Memon, Jamshed, et al.
Published: (2014)
Visualization of job availability based on text analytics localization approach
by: Mohamad Zamani, Nur Azmina, et al.
Published: (2019)
by: Mohamad Zamani, Nur Azmina, et al.
Published: (2019)
CRF based feature extraction applied for supervised automatic text summarization
by: K. Batcha, Nowshath, et al.
Published: (2013)
by: K. Batcha, Nowshath, et al.
Published: (2013)
Similarities and dissimilarities between character frequencies of written text of Melayu, English and Indonesian languages
by: Shah, Asadullah, et al.
Published: (2013)
by: Shah, Asadullah, et al.
Published: (2013)
Quality rating of islamic websites features : A single user evaluation
by: Mahmud, Murni, et al.
Published: (2010)
by: Mahmud, Murni, et al.
Published: (2010)
Mobile phone appropriation of students and staff at an institution of higher learning
by: Abdul Karim, Nor Shariza, et al.
Published: (2010)
by: Abdul Karim, Nor Shariza, et al.
Published: (2010)
A 10 C’s of social networking, interconnections and the impact on social networking
by: Dar, Humaira, et al.
Published: (2013)
by: Dar, Humaira, et al.
Published: (2013)
Design and evaluation of network mobility protocol to achieve seamless handoff
by: Hassan Abdalla Hashim, Aisha
Published: (2012)
by: Hassan Abdalla Hashim, Aisha
Published: (2012)
Spam e-mail: how Malaysian e-mail users deal with it?
by: Bujang, Yanti Rosmunie, et al.
Published: (2010)
by: Bujang, Yanti Rosmunie, et al.
Published: (2010)
Acceptance of e-learning using artificial intelligence technology in military education process in UAE
by: Ali Alnaqbi, Ali Mohamed
Published: (2022)
by: Ali Alnaqbi, Ali Mohamed
Published: (2022)
Protecting personal medical information: Asian perspectives
by: Samsuri, Suhaila, et al.
Published: (2013)
by: Samsuri, Suhaila, et al.
Published: (2013)
Towards implementing a privacy policy: an observation on existing practices in hospital information system
by: Samsuri, Suhaila, et al.
Published: (2011)
by: Samsuri, Suhaila, et al.
Published: (2011)
Privacy models for protecting personal medical information: a preliminary study
by: Samsuri, Suhaila, et al.
Published: (2011)
by: Samsuri, Suhaila, et al.
Published: (2011)
Adopting a knowledge management concept in securing the privacy of electronic medical record systems
by: Samsuri, Suhaila, et al.
Published: (2013)
by: Samsuri, Suhaila, et al.
Published: (2013)
Proposed new standard of procedures (SOPs) for announcement in New IIUM/KAED website
by: Yaali, Syarel Azill, et al.
Published: (2018)
by: Yaali, Syarel Azill, et al.
Published: (2018)
Report of KAED website assessment
by: Yaali, Syarel Azill, et al.
Published: (2016)
by: Yaali, Syarel Azill, et al.
Published: (2016)
Innovative Web2.0 based collaborative learning and study circle model: integrating Islamic Revealed Knowledge and Human Science
by: Shah, Asadullah
Published: (2014)
by: Shah, Asadullah
Published: (2014)
Calculus and its applications in scale-free networks
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
An analysis of scheduling scheme for QoS guaranteed interactive multimedia over high speed wireless campus networks
by: Alam, M.K., et al.
Published: (2013)
by: Alam, M.K., et al.
Published: (2013)
Information security awareness through the use of social media
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
Development of wearable pulse oximetry for telehealth monitoring system
by: Khalifa, Othman Omran, et al.
Published: (2014)
by: Khalifa, Othman Omran, et al.
Published: (2014)
A scheduling algorithm for bandwidth aggregation in heterogeneous wireless network
by: Masud, M.H., et al.
Published: (2014)
by: Masud, M.H., et al.
Published: (2014)
Adaptive multi-rate video transcoding method
by: Fadlallah, Fadlallah Ali, et al.
Published: (2014)
by: Fadlallah, Fadlallah Ali, et al.
Published: (2014)
Analysis of design principles and requirements for procedural rigging of bipeds and quadrupeds characters with custom manipulators for animation
by: Bhati, Zeeshan, et al.
Published: (2015)
by: Bhati, Zeeshan, et al.
Published: (2015)
The most favourable mobile messaging apps
among IIUM students
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2014)
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2014)
A novel scheme of binding update no sense drop BCE in LMA
by: Geaiger, Mohamed, et al.
Published: (2014)
by: Geaiger, Mohamed, et al.
Published: (2014)
Node status detection and information diffusion in router network using scale-free network
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
r-TOLA: an architecture for real time open learning application for universities
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Video viewing and streaming enhancement
by: Khalifa, Othman Omran, et al.
Published: (2014)
by: Khalifa, Othman Omran, et al.
Published: (2014)
A computer vision-based alarming system for
real-time detection of driver sleep
by: Khalifa, Othman Omran, et al.
Published: (2014)
by: Khalifa, Othman Omran, et al.
Published: (2014)
Robust and secure image steganography based on elliptic curve cryptography
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
Budaya digital merentasi sempadan: hambatan kepada budaya tempatan
by: Saidin, Aznan Zuhid
Published: (2014)
by: Saidin, Aznan Zuhid
Published: (2014)
Introducing autonomy in internet of things
by: Ashraf , Qazi Mamoon, et al.
Published: (2015)
by: Ashraf , Qazi Mamoon, et al.
Published: (2015)
Real-Time personalized stress detection from physiological signals
by: Syazani, Muhammad, et al.
Published: (2015)
by: Syazani, Muhammad, et al.
Published: (2015)
Performance evaluation of human identification based on ECG signal
by: Amiruddin, Ainunjariah, et al.
Published: (2015)
by: Amiruddin, Ainunjariah, et al.
Published: (2015)
Wireless energy harvesting for portable devices using split ring resonator
by: Zainal ‘Abidin, Balqis Mohamed, et al.
Published: (2015)
by: Zainal ‘Abidin, Balqis Mohamed, et al.
Published: (2015)
Performance analysis of MAC layer scheduling schemes for IMM applications over high speed wireless campus network in IEEE802.11e
by: Alam, Md Korshed, et al.
Published: (2015)
by: Alam, Md Korshed, et al.
Published: (2015)
A review on scheduling schemes of high speed wireless campus network for Interactive Multimedia transmission
by: Alam, Md. Khorshed, et al.
Published: (2013)
by: Alam, Md. Khorshed, et al.
Published: (2013)
Comparison of X-band satellite link measurements with radar derived rain attenuation in the tropics
by: Badron, Khairayu, et al.
Published: (2014)
by: Badron, Khairayu, et al.
Published: (2014)
Similar Items
-
Offline printed Sindhi optical text recognition: survey
by: Solangi, Yasir Ali, et al.
Published: (2019) -
Randomized text encryption: a new dimension in cryptography
by: Memon, Jamshed, et al.
Published: (2014) -
Visualization of job availability based on text analytics localization approach
by: Mohamad Zamani, Nur Azmina, et al.
Published: (2019) -
CRF based feature extraction applied for supervised automatic text summarization
by: K. Batcha, Nowshath, et al.
Published: (2013) -
Similarities and dissimilarities between character frequencies of written text of Melayu, English and Indonesian languages
by: Shah, Asadullah, et al.
Published: (2013)