Search Results - (( java implementation clustering algorithm ) OR ( using thinking process algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  4. 4
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…Firstly, k-luster could incorporate additional clustering algorithms, or even classification algorithms in the future. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Machine learning using robust AI techniques / Prof. Madya Dr. Nordin Abu Bakar by Abu Bakar, Nordin (Prof. Madya Dr.)

    Published 2012
    “…It is important to know how this process is exercised. There is a model that studies the social behavior of humans called genetic algorithms (GA). …”
    Get full text
    Get full text
    Research Reports
  10. 10

    Computational Thinking : Experiences of Rural Pupils in Sarawak Primary School by Nur Hasheena, Anuar

    Published 2021
    “…Computational thinking (CT) is one of the cognitive processes involved in STEM learning which human use in problem-solving to provide computational solutions that humans and machines can support. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Behaviour Analysis Among Adolescents And Children For Cyberbullying Based On Twitter And Kaggle Dataset by Afiefah Hannani, Abdul Halim

    Published 2023
    “…The dataset to perform the algorithm will be retrieved from an open-source website called Kaggle where it will be used for the training and testing process. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    Enhancing understanding of programming concepts through physical games by Raja Yusof, Raja Jamilah, Habib, Ahsan

    Published 2017
    “…This is closely related to computational thinking activities approach discussed by others. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Developing students' mathematical thinking: how far have we came? by Md. Yunus, Aida Suraya

    Published 2015
    “…This paper discusses what is meant by mathematical thinking. There has not been a conclusive definition on mathematical thinking because some view it as a process and others as an outcome. …”
    Get full text
    Get full text
    Get full text
    Inaugural Lecture
  14. 14

    A hybridization of butterfly optimization algorithm and harmony search for fuzzy modelling in phishing attack detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail

    Published 2023
    “…The advantages of both algorithms are used to balance the exploration and exploitation in the searching process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Algorithm As A Problem Solving Technique For Teaching And Learning Of The Malay Language by Jano, Zanariah, Omar, Norliza, Nazir, Faridah

    Published 2019
    “…Computational thinking or CT refers to the thought processes involved in expressing solutions as computational steps or algorithms that can be carried out by a computer. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Algorithm as a problem solving technique for teaching and learning of the Malay language by Faridah Nazir, Zanariah Jano, Norliza Omar

    Published 2019
    “…Computational thinking or CT refers to the thought processes involved in expressing solutions as computational steps or algorithms that can be carried out by a computer. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    How are exponents used in real-world situations? / Nurul Aityqah Yaacob by Yaacob, Nurul Aityqah

    Published 2023
    “…Exponents are challenging to understand because they require examination of the relationship between symbols, meanings, and exponentiation's algorithmic properties. In this process, knowing how to do the calculations isn't enough to figure out the value of exponential expressions. …”
    Get full text
    Get full text
    Monograph
  18. 18

    Building norms-adaptable agents from Potential Norms Detection Technique (PNDT) by Mahmoud M.A., Ahmad M.S., Ahmad A., Mustapha A., Yusoff M.Z.M., Hamid N.H.A.

    Published 2023
    “…The PNDT consists of five components: agent's belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent's belief base with new normative protocol. …”
    Short Survey
  19. 19
  20. 20

    Factors and types of error that contributes to the difficulties in solving Mathematical problems among Year 5 pupils in SK Goebilt, Kuching / Hardi Rasidi by Rasidi, Hardi

    Published 2016
    “…The test results and findings are analyzed using descriptive statistics. In this research, pupils were tested using a set of 10 question of mathematical word problem. …”
    Get full text
    Get full text
    Thesis