Search Results - (( java implication force algorithm ) OR ( based instruction make algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    Identifying football conflict using soft-set theory in Indonesia super league / Kukuh Wahyudin Pratama by Kukuh Wahyudin , Pratama

    Published 2021
    “…We then delineated the proposed algorithm for an instructional example of Indonesian football conflict situation concerning the Indonesia Football Super League. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Developing students' mathematical thinking: how far have we came? by Md. Yunus, Aida Suraya

    Published 2015
    “…Several findings from studies that focused on students' ability to provide reasoning and give meanings to concepts and algorithms are highlighted. Students' development in geometric thinking based van Hiele's levels of geometric thinking in learning, shapes and spaces is also discussed. van Hiele's levels of geometric thinking includes higher order thinking and decision making skills and acquisition of mathematical concepts to enable learners to operate at higher levels in van Hiele's theory. …”
    Get full text
    Get full text
    Get full text
    Inaugural Lecture
  4. 4

    Applying SAX-based time series analysis to classify EEG signal using a COTS EEG device by Shanmuga, Pillai A/L Murutha Muthu

    Published 2021
    “…The selected area was chosen for this project is the use of eye gaze tracking and movement to help people with disabilities. In order to make BCI useful, one of the approaches is to classify the EEG time series signal that may indicate given eye movements that will be used as input instructions to a device. …”
    Get full text
    Thesis
  5. 5

    Cloud computing load balancing technique with virtual machine migration / Rabiatul Addawiyah Mat Razali by Mat Razali, Rabiatul Addawiyah

    Published 2017
    “…There are two different types of resources, specifically low-powered and high-powered resources, which are based on Million Instructions per Second (MIPS) metrics. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Semantic analysis system by using latent semantic analysis (LSA) algorithm on khutbah texts / Ammar Zuber by Zuber, Ammar

    Published 2019
    “…As nowadays, some muslims attend the Friday Prayers just to obey God instruction instead of willingly come to gain new knowledge. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Efficient and secured compression and steganography technique in wireless sensor network by Tuama, Ammar Yaseen

    Published 2016
    “…Second, an improved steganographic algorithm based on the infamous Least Significant Bit (LSB) is proposed for hiding the sensed data scheduled for transmission. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Contextualising Computational Thinking: A Case Study in Remote Rural Sarawak Borneo by Nur Hasheena, Anuar, Fitri Suraya, Mohamad, Jacey Lynn, Minoi

    Published 2020
    “…Findings illustrate a direction in which novice indigenous children could learn and be informed about Computational thinking practices and skills through a mix of game-based learning, collaborative learning, problem-based learning, and project-based learning. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Graphical user interface test case generation for android apps using Q-learning / Husam N. S. Yasin by Husam , N. S. Yasin

    Published 2021
    “…The computation time complexity of the Q-Learning-based test coverage algorithm was also analyzed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Menu recommendation for Restoran Jannat Saba using Market Basket analysis / Dinie Sorfina Fathanah Kamarul Ariffin by Kamarul Ariffin, Dinie Sorfina Fathanah

    Published 2025
    “…By utilising the sales data, MBA is performed to uncover frequent itemsets and generate association rules based on the confidence and lift metrics. The FP-Growth algorithm has been employed for its effectiveness in identifying frequent itemsets and association rules in transactional data. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Development of low-overhead soft error mitigation technique for safety critical neural networks applications by Khalid Adam, Ismail Hammad

    Published 2021
    “…The performance analysis results showed that the S-MTTM-R achieved lower overhead compared to the well-known protection techniques: Algorithm-Based Fault Tolerance (ABFT), Double Modular Redundancy (DMR), and Triple Modular Redundancy (TMR). …”
    Get full text
    Get full text
    Thesis