Search Results - (( basic computer usage algorithm ) OR ( ((java implication) OR (_ implication)) based algorithm ))
Search alternatives:
- java implication »
- usage algorithm »
- basic computer »
- computer usage »
- _ implication »
-
1
Bridging Mayer’s cognitive theory of multimedia learning and computational thinking in tackling the cognitive load issues among young digital natives : a conceptual framework
Published 2022“…CT refers to the capacity of learners to systematically tackle unstructured tasks focused on four computing concepts such as decomposition, abstraction, pattern recognition, and algorithmic thinking. …”
Get full text
Get full text
Get full text
Article -
2
-
3
Web usage mining for UUM learning care using association rules
Published 2004Get full text
Get full text
Thesis -
4
-
5
A genetic similarity algorithm for searching the Gene Ontology terms and annotating anonymous protein sequences
Published 2008“…The semantic similarity measure algorithm is used to compute the similitude strength between the Gene Ontology terms. …”
Get full text
Get full text
Get full text
Article -
6
The development of semantic meta-database: an ontology based semantic integration of biological databases
Published 2007“…Therefore, a simple and practical computational method that is more accurate, faster, easy to configure and use, and bears low computing cost is needed particularly for offline usage. …”
Get full text
Get full text
Monograph -
7
Petri Net Algorithm for controlling and monitoring system
Published 2009Get full text
Working Paper -
8
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
9
DESIGN AND IMPLEMENTATION OF RIPEMD-160 HASH FUNCTION USING VERILOG HDL
Published 2022“…Information security is now of the utmost importance since it aims to safeguard data that is valuable to individuals and companies thus a variety of encryption methods have been studied due to the numerous risks and vulnerabilities that computer networks have. Now, sensitive data can be safely transmitted via the network thanks to the Cryptography Algorithm's usage of encryption to safeguard data. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
10
Parametric modelling of a TRMS using dynamic spread factor particle swarm optimisation
Published 2009Get full text
Get full text
Get full text
Proceeding Paper -
11
-
12
Hybrid DE-PEM algorithm for identification of UAV helicopter
Published 2014“…Practical implications – The identification algorithm is expected to facilitate the required model development for model-based control design for autonomous helicopter development. …”
Get full text
Get full text
Get full text
Article -
13
Application of clustering in managing unstructured textual data in relational database / Wael Mohamed Shaher Yafooz
Published 2014“…Huge reliance on computer usage in everyday life, leads to a continuous increase of large data applications in textual forms. …”
Get full text
Get full text
Thesis -
14
Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks
Published 2015“…To generate, update and distribute the keys for secure communication over IEEE 802.16e, the MBS applies Multicast and Broadcast Rekeying Algorithm (MBRA) as a basic key management algorithm. …”
Get full text
Get full text
Thesis -
15
A Constraint Programming-based Genetic Algorithm (CPGA) for Capacity Output Optimization
Published 2014“…Purpose: The manuscript presents an investigation into a constraint programming-based genetic algorithm for capacity output optimization in a back-end semiconductor manufacturing company. …”
Get full text
Get full text
Get full text
Article -
16
Agreement options for negotiation on material location decision of housing development
Published 2020“…Social implications: The satisficing algorithm of the coalition will satisfy all stakeholders. …”
Get full text
Get full text
Article -
17
Evaluation of the routing algorithms for NoC-based MPSoC: a fuzzy multi-criteria decision-making approach
Published 2023“…Firstly, the decision matrix is constructed based on the performance assessment criteria and routing algorithms. …”
Get full text
Get full text
Get full text
Article -
18
Using predictive analytics to solve a newsvendor problem / S. Sarifah Radiah Shariff and Hady Hud
Published 2023“…The best algorithm will not be the same for all the data sets. …”
Get full text
Get full text
Book Section -
19
Optimization of an extended H-infinity controller for unmanned helicopter control using multiobjective differential evolution (MODE)
Published 2015“…Then apply the MODE-based algorithm to optimize the weighting function of the control problem formulation for optimal performance. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
20
