Search Results - (( developing order thinking algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- thinking algorithm »
- developing order »
- java application »
-
1
Developing computational thinking competencies through constructivist argumentation learning: a problem-solving perspective
Published 2022“…To nurture higher order thinking skills and to engage effective problem-solvers, our framework incorporates four Computational Thinking-Argumentation design principles to support instructional innovation in the teaching and learning of science at the secondary school level, viz. 1) developing problem-solving competencies and building capability in solving uncertainties throughout scientific inquiry; 2) developing creative thinking and cooperativity through negotiation and evaluation; 3) developing algorithmic thinking in talking and writing; 4) developing critical thinking in the processes of abstraction and generalization.…”
Get full text
Get full text
Article -
2
Word problems as a vehicle for teaching computational thinking
Published 2023“…In order to solve problems and offer solutions that can be applied in a variety of contexts, computational thinking”i.e., algorithmically, with or without the use of computers”is crucial in computing and information science. …”
Get full text
Get full text
Get full text
Article -
3
Developing students' mathematical thinking: how far have we came?
Published 2015“…Several findings from studies that focused on students' ability to provide reasoning and give meanings to concepts and algorithms are highlighted. Students' development in geometric thinking based van Hiele's levels of geometric thinking in learning, shapes and spaces is also discussed. van Hiele's levels of geometric thinking includes higher order thinking and decision making skills and acquisition of mathematical concepts to enable learners to operate at higher levels in van Hiele's theory. …”
Get full text
Get full text
Get full text
Inaugural Lecture -
4
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
5
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
6
Why coding? Why now? From coding to computational thinking through computational mathematics problem based learning (CM-PBL)
Published 2019“…Computational thinking is essential to computing and information science (i.e., algorithmically, with or without the assistance of computers) to solve problems with solutions that are reusable in different contexts. …”
Get full text
Get full text
Conference or Workshop Item -
7
Islands of superficial knowledge without a canoe to get from one end to the other: the nature of college mathematics / Parmjit Singh and Teoh Sian Hoon
Published 2017“…Successful mathematics students do indeed construct a fairly large number and variety of algorithms in order to continue to achieve good results in college mathematics courses. …”
Get full text
Get full text
Get full text
Article -
8
Handbook of Machine Learning for Computational Optimization: Applications and Case Studies
Published 2021“…This handbook focuses on new machine learning developments that can lead to newly developed applications. …”
Get full text
Get full text
Book -
9
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction
Published 2022“…However, three scenarios were developed to compare the outcomes of the proposed method by using similar datasets. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
-
12
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…Then the customer closes the page and thinking of to visit the website again at other time. …”
Get full text
Get full text
Thesis
