Search Results - (( java adaptation optimization algorithm ) OR ( using thinking process algorithm ))

Refine Results
  1. 1
  2. 2

    Machine learning using robust AI techniques / Prof. Madya Dr. Nordin Abu Bakar by Abu Bakar, Nordin (Prof. Madya Dr.)

    Published 2012
    “…It is important to know how this process is exercised. There is a model that studies the social behavior of humans called genetic algorithms (GA). …”
    Get full text
    Get full text
    Research Reports
  3. 3

    Computational Thinking : Experiences of Rural Pupils in Sarawak Primary School by Nur Hasheena, Anuar

    Published 2021
    “…Computational thinking (CT) is one of the cognitive processes involved in STEM learning which human use in problem-solving to provide computational solutions that humans and machines can support. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Behaviour Analysis Among Adolescents And Children For Cyberbullying Based On Twitter And Kaggle Dataset by Afiefah Hannani, Abdul Halim

    Published 2023
    “…The dataset to perform the algorithm will be retrieved from an open-source website called Kaggle where it will be used for the training and testing process. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5

    Enhancing understanding of programming concepts through physical games by Raja Yusof, Raja Jamilah, Habib, Ahsan

    Published 2017
    “…This is closely related to computational thinking activities approach discussed by others. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Developing students' mathematical thinking: how far have we came? by Md. Yunus, Aida Suraya

    Published 2015
    “…This paper discusses what is meant by mathematical thinking. There has not been a conclusive definition on mathematical thinking because some view it as a process and others as an outcome. …”
    Get full text
    Get full text
    Get full text
    Inaugural Lecture
  7. 7

    A hybridization of butterfly optimization algorithm and harmony search for fuzzy modelling in phishing attack detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail

    Published 2023
    “…The advantages of both algorithms are used to balance the exploration and exploitation in the searching process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Algorithm As A Problem Solving Technique For Teaching And Learning Of The Malay Language by Jano, Zanariah, Omar, Norliza, Nazir, Faridah

    Published 2019
    “…Computational thinking or CT refers to the thought processes involved in expressing solutions as computational steps or algorithms that can be carried out by a computer. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Algorithm as a problem solving technique for teaching and learning of the Malay language by Faridah Nazir, Zanariah Jano, Norliza Omar

    Published 2019
    “…Computational thinking or CT refers to the thought processes involved in expressing solutions as computational steps or algorithms that can be carried out by a computer. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    How are exponents used in real-world situations? / Nurul Aityqah Yaacob by Yaacob, Nurul Aityqah

    Published 2023
    “…Exponents are challenging to understand because they require examination of the relationship between symbols, meanings, and exponentiation's algorithmic properties. In this process, knowing how to do the calculations isn't enough to figure out the value of exponential expressions. …”
    Get full text
    Get full text
    Monograph
  12. 12

    Building norms-adaptable agents from Potential Norms Detection Technique (PNDT) by Mahmoud M.A., Ahmad M.S., Ahmad A., Mustapha A., Yusoff M.Z.M., Hamid N.H.A.

    Published 2023
    “…The PNDT consists of five components: agent's belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent's belief base with new normative protocol. …”
    Short Survey
  13. 13
  14. 14

    Factors and types of error that contributes to the difficulties in solving Mathematical problems among Year 5 pupils in SK Goebilt, Kuching / Hardi Rasidi by Rasidi, Hardi

    Published 2016
    “…The test results and findings are analyzed using descriptive statistics. In this research, pupils were tested using a set of 10 question of mathematical word problem. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Art-Integration in Computational Thinking as an Unplugged Pedagogical Approach at A Rural Sarawak Primary School by Nur Hasheena, Anuar, Fitri Suraya, Mohamad, Jacey Lynn, Minoi

    Published 2020
    “…The purpose of this study is to explore the use of visual art in learning the problem-solving process and as an unplugged approach to involve learners in computational thinking. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Enhancing the Problem Solving Skills of Decision Science Learners by Cheng, Sheila, Fung, Han Ping

    Published 2015
    “…Results revealed that the cognitive processes of successful solvers followed a set of algorithms. …”
    Get full text
    Get full text
    Get full text
    Journal
  17. 17

    A Comparative Analysis of Machine Learning and Deep Learning Algorithms for Image Classification by Madanan M., Gunasekaran S.S., Mahmoud M.A.

    Published 2024
    “…CNN is a type of convolution neural network that has an unpredictable development and uses convolution calculations. It is one of the most well-known deep learning algorithms. …”
    Conference Paper
  18. 18

    Building norms-adaptable agents from Potential Norms Detection Technique (PNDT) by Mahmoud, Moamin Ahmed, Ahmad, Mohd Sharifuddin, Ahmad, Azhana, Mustapha, Aida, Mohd Yusoff, Mohd Zaliman, Abdul Hamid, Nurzeatul Hamimah

    Published 2013
    “…The PNDT consists of five components: agent’s belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent’s belief base with new normative protocol. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20