University of Malaya Students Emerged Victorious At the Global Datathon Champsionship

May 2, 2018 -

The Center of Applied Data Science (CADS) in collaboration with Data Science Society hosted the first ever global Datathon challenge which saw students from the Faculty of Computer Science and Information Technology, University of Malaya, Malaysia, emerging victorious with their creative and innovative solution on the trading of cryptocurrency, globally, having beaten five other countries.

The Victorious Team of University of Malaya who Won the Global Datathon Championship

The team of six students and three mentors from the faculty of Computer Science and Information Technology, University of Malaya participated in a 48-hour championship, the Academia Datathon International University Data Science Society along with the simultaneous global participation of 130 students from renowned universities across five other countries, namely Bulgaria, Serbia, Greece, Croatia and India.

The team comprised of four undergraduates, and they are Sabrina Binti Kamal Izat, Nur Hidayah Binti Mohd Rosli, Prasanta A/L Sathasivam and Yee Xun Wei; as well as two postgraduate students, namely, Nur Baiti Afini Normadhi and Muhammad Nazrin Bin Napiah. The students were mentored by senior lecturers from the faculty of Computer Science and Information Technology, namely, Dr. Hoo Wai Lam; Dr. Nor Liyana Mohd Shuib and Dr. Muhammad Reza Bin Zaba.


There were 19 teams that reached the semifinals and each team was judged by 3 mentors - 1 expert, 1 university professor, 1 Data Science Society mentor.

The finals of the competition were reached by 5 teams and they were judged by jury only of experts in the field.
  1. The winners received certificates of recognition by Data Science Society for their accomplishment and hard work.
  2. Second place was won by Team UNWE (University of National and World Economy) and third place was by Team Cryptomonkeys. Both from Bulgaria.
  3. Team University Malaya won the jury with their well-structured work and with their approach to solve level 1 and level 2 of the crypto data content. They also used unusual method for the second task.

Comments