Search Results - (( development issues thinking algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- development issues »
- thinking algorithm »
- implication based »
- java implication »
- issues thinking »
-
1
-
2
Word problems as a vehicle for teaching computational thinking
Published 2023“…Our children and grandchildren must think critically in order to solve the world's ill-structured, unexpected, and intricate issues. …”
Get full text
Get full text
Get full text
Article -
3
E-Grocery application with Geolocation and YOLO Algorithm / Ikhwan Nurhakim Zuzalli and Raihana Md Saidi
Published 2021“…The objective of this project is to develop an E-Grocery application using geolocation and YOLO algorithm. …”
Get full text
Get full text
Get full text
Book Section -
4
-
5
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
6
Stress Level Detection using Fuzzy Logic / Nor Husna Nabila Khuzaini
Published 2020“…This study aim to determine, develop and evaluate the system of level detection using Fuzzy logic. …”
Get full text
Get full text
Thesis -
7
User-guided Database Schema Generation For Naive Database Developers
Published 2014“…At the end of research, researcher are expected to the generate algorithms and initial prototype for the formulated method to provide a user-friendly platform for the developer or user to reduce the above issue. …”
Get full text
Get full text
Final Year Project -
8
Multi-dimensional networking and distributed computing services
Published 2012“…Furthermore, different types of distributed computing technologies are widening the scope of our thinking and research issues in networking. The multi-dimensional research issues include wireless and mobility problems, routing protocols and algorithms, resource and service location protocols, performance evaluations of networking systems, ubiquitous systems, context aware ubiquitous environment, mechanisms to improve throughput over wireless links, network management and network security, and other related areas. …”
Get full text
Get full text
Get full text
Article -
9
Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm
Published 2016“…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
-
11
EEG-based fatigue detection using binary pattern analysis and KNN algorithm
Published 2024Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
-
13
Teaching students interdisciplinary knowledge through compilation of differential models within the framework of course projects / Duisebek Nurgabyl ... [et al.]
Published 2023“…An experimental study showed that higher education teachers face the following learning issues: the development of a new content of mathematical disciplines aimed at creating the ability of future teachers to compose mathematical models, at ameliorating their mathematical thinking, interdisciplinary knowledge; development of a methodology for teaching future teachers of mathematics interdisciplinary knowledge, to compiling differential models.…”
Get full text
Get full text
Get full text
Article -
14
Humanizing AI in Higher Education: Rethinking HR, Ethics, and Skill Development for University Employees in the SDG Era
Published 2025“…The results identified three predominant themes: (1) unbalanced ethical frameworks and low transparency in AI-driven hiring and performance appraisal; (2) faculty and staff apprehension due to algorithmic biases, data privacy issues, and a lack of institutional oversight; and (3) an urgent need to develop emotional intelligence, interdisciplinary thinking, and digital sensitivity among employees. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
Published 2004“…Rather than thinking of security as an add-on feature to software systems, security should be designed into the system from the earliest stages of requirements gathering through development, testing, integration, and deployment. …”
Get full text
Get full text
Thesis -
16
Artificial intelligence in sustainability reporting / Prof. Dr Corina Joseph
Published 2023“…The conference theme, 'Re-thinking the dynamization between environmental issues and adaptive technology for inclusive growth,' saw Prof. …”
Get full text
Get full text
Article -
17
