Search Results - (( java adaptation optimization algorithm ) OR ( using thinking process algorithm ))
Search alternatives:
- adaptation optimization »
- process algorithm »
- thinking process »
- java adaptation »
- using thinking »
-
1
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
2
Machine learning using robust AI techniques / Prof. Madya Dr. Nordin Abu Bakar
Published 2012“…It is important to know how this process is exercised. There is a model that studies the social behavior of humans called genetic algorithms (GA). …”
Get full text
Get full text
Research Reports -
3
Computational Thinking : Experiences of Rural Pupils in Sarawak Primary School
Published 2021“…Computational thinking (CT) is one of the cognitive processes involved in STEM learning which human use in problem-solving to provide computational solutions that humans and machines can support. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Behaviour Analysis Among Adolescents And Children For Cyberbullying Based On Twitter And Kaggle Dataset
Published 2023“…The dataset to perform the algorithm will be retrieved from an open-source website called Kaggle where it will be used for the training and testing process. …”
Get full text
Get full text
Undergraduates Project Papers -
5
Enhancing understanding of programming concepts through physical games
Published 2017“…This is closely related to computational thinking activities approach discussed by others. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Developing students' mathematical thinking: how far have we came?
Published 2015“…This paper discusses what is meant by mathematical thinking. There has not been a conclusive definition on mathematical thinking because some view it as a process and others as an outcome. …”
Get full text
Get full text
Get full text
Inaugural Lecture -
7
A hybridization of butterfly optimization algorithm and harmony search for fuzzy modelling in phishing attack detection
Published 2023“…The advantages of both algorithms are used to balance the exploration and exploitation in the searching process. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Algorithm As A Problem Solving Technique For Teaching And Learning Of The Malay Language
Published 2019“…Computational thinking or CT refers to the thought processes involved in expressing solutions as computational steps or algorithms that can be carried out by a computer. …”
Get full text
Get full text
Get full text
Article -
9
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Algorithm as a problem solving technique for teaching and learning of the Malay language
Published 2019“…Computational thinking or CT refers to the thought processes involved in expressing solutions as computational steps or algorithms that can be carried out by a computer. …”
Get full text
Get full text
Get full text
Article -
11
How are exponents used in real-world situations? / Nurul Aityqah Yaacob
Published 2023“…Exponents are challenging to understand because they require examination of the relationship between symbols, meanings, and exponentiation's algorithmic properties. In this process, knowing how to do the calculations isn't enough to figure out the value of exponential expressions. …”
Get full text
Get full text
Monograph -
12
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023“…The PNDT consists of five components: agent's belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent's belief base with new normative protocol. …”
Short Survey -
13
Mapping Computational Thinking Skills Through Digital Games Co-Creation Activity Amongst Malaysian Sub-urban Children Sub-urban Children
Published 2022“…The game co-creation process was recorded to identify and determine how these young, inexperienced, untrained young learners collaborated while using CT skills. …”
Get full text
Get full text
Get full text
Article -
14
Factors and types of error that contributes to the difficulties in solving Mathematical problems among Year 5 pupils in SK Goebilt, Kuching / Hardi Rasidi
Published 2016“…The test results and findings are analyzed using descriptive statistics. In this research, pupils were tested using a set of 10 question of mathematical word problem. …”
Get full text
Get full text
Thesis -
15
Art-Integration in Computational Thinking as an Unplugged Pedagogical Approach at A Rural Sarawak Primary School
Published 2020“…The purpose of this study is to explore the use of visual art in learning the problem-solving process and as an unplugged approach to involve learners in computational thinking. …”
Get full text
Get full text
Get full text
Article -
16
Enhancing the Problem Solving Skills of Decision Science Learners
Published 2015“…Results revealed that the cognitive processes of successful solvers followed a set of algorithms. …”
Get full text
Get full text
Get full text
Journal -
17
A Comparative Analysis of Machine Learning and Deep Learning Algorithms for Image Classification
Published 2024“…CNN is a type of convolution neural network that has an unpredictable development and uses convolution calculations. It is one of the most well-known deep learning algorithms. …”
Conference Paper -
18
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2013“…The PNDT consists of five components: agent’s belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent’s belief base with new normative protocol. …”
Get full text
Get full text
Article -
19
Mathematical modelling on communication between two parties / Nor Anees Asyiqin Md Disa, Khairunnisa Munawarah Khairul Anwar and Aniesa Farhana Mazlan
Published 2022“…Since the key exchange process is successful, we think the offered methods are effective.…”
Get full text
Get full text
Student Project -
20
(E-Taste Apps) – visualization food taste descriptors
Published 2019Get full text
Get full text
Student Project
