Search Results - (( based encryption path algorithm ) OR ( based constructivist learning algorithm ))
Search alternatives:
- learning algorithm »
- path algorithm »
- constructivist »
-
1
Algoritma pendaraban nombor perpuluhan dari perspektif pelajar Tingkatan Satu
Published 2001“…Identification of students' algorithms has implications towards the teaching and learning activities and forms a basis in planning teaching strategies of multiplication involving decimals for mathematics educators.…”
Get full text
Get full text
Get full text
Article -
2
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Conference or Workshop Item -
3
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Get full text
Article -
4
Reimagining English language learning: a systematic review of AI integration in classroom practice (2019–2024)
Published 2025“…Grounded in constructivist and socio-cultural theories, these technologies promote collaboration, creativity, and learner autonomy through adaptive learning pathways and real-time feedback. …”
Get full text
Get full text
Get full text
Article -
5
Developing students' mathematical thinking: how far have we came?
Published 2015“…Several findings from studies that focused on students' ability to provide reasoning and give meanings to concepts and algorithms are highlighted. Students' development in geometric thinking based van Hiele's levels of geometric thinking in learning, shapes and spaces is also discussed. van Hiele's levels of geometric thinking includes higher order thinking and decision making skills and acquisition of mathematical concepts to enable learners to operate at higher levels in van Hiele's theory. …”
Get full text
Get full text
Get full text
Inaugural Lecture -
6
Image orientation watermarking technique for copyright protection
Published 2016“…In return, a copyright gains its validity based on such robust characteristics. Watermarking attracts much interest in algorithm design to enable a signature to be embedded on secrecy and encryption beds. …”
Get full text
Get full text
Get full text
Thesis
