Search Results - (( process certification problem algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- process certification »
- certification problem »
- problem algorithm »
- java application »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
3
-
4
Impact of Computational Thinking and Computer Science (CTCS) Teaching Technique at Seleceted Schools in Sarawak : A Qualitative Analysis
Published 2023“…Computational thinking and computer science (CTCS) is an educational approach that involves a four-stage process involving concepts of decomposition, pattern recognition, abstraction, and algorithm that promotes greater levels of thinking. …”
Get full text
Get full text
Get full text
Proceeding -
5
Speech dereverberation enhancement
Published 2020Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Developing students' mathematical thinking: how far have we came?
Published 2015“…There has not been a conclusive definition on mathematical thinking because some view it as a process and others as an outcome. Mathematical thinking is the foundation to do reasoning and problem solving and to develop conceptual knowledge, as opposed to procedural knowledge. …”
Get full text
Get full text
Get full text
Inaugural Lecture -
7
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…These challenges are: 1) single point failure in the cryptography scheme, 2) key abuse problem in the key generating process, and 3) delayed access to the data in the cloud for the user. …”
Get full text
Get full text
Thesis
