Search Results - (( process certification problem algorithm ) OR ( java application force algorithm ))

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    Dynamic force-directed graph with weighted nodes for scholar network visualization by Mohd. Aris, Khalid Al-Walid, Ramasamy, Chitra, Mohd Aris, Teh Noranis, Zolkepli, Maslina

    Published 2022
    “…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
    Get full text
    Get full text
    Article
  2. 2

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Impact of Computational Thinking and Computer Science (CTCS) Teaching Technique at Seleceted Schools in Sarawak : A Qualitative Analysis by Nor Iqbal, Mohd Sait, Noor'ain, Aini, Kartinah, Zen

    Published 2023
    “…Computational thinking and computer science (CTCS) is an educational approach that involves a four-stage process involving concepts of decomposition, pattern recognition, abstraction, and algorithm that promotes greater levels of thinking. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  5. 5
  6. 6

    Developing students' mathematical thinking: how far have we came? by Md. Yunus, Aida Suraya

    Published 2015
    “…There has not been a conclusive definition on mathematical thinking because some view it as a process and others as an outcome. Mathematical thinking is the foundation to do reasoning and problem solving and to develop conceptual knowledge, as opposed to procedural knowledge. …”
    Get full text
    Get full text
    Get full text
    Inaugural Lecture
  7. 7

    Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing by Jamal, Fara

    Published 2021
    “…These challenges are: 1) single point failure in the cryptography scheme, 2) key abuse problem in the key generating process, and 3) delayed access to the data in the cloud for the user. …”
    Get full text
    Get full text
    Thesis