Search Results - (( process certification problems algorithm ) OR ( java application force algorithm ))
Search alternatives:
- certification problems »
- process certification »
- application force »
- java application »
- force algorithm »
-
1
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
2
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
3
-
4
Impact of Computational Thinking and Computer Science (CTCS) Teaching Technique at Seleceted Schools in Sarawak : A Qualitative Analysis
Published 2023“…Computational thinking and computer science (CTCS) is an educational approach that involves a four-stage process involving concepts of decomposition, pattern recognition, abstraction, and algorithm that promotes greater levels of thinking. …”
Get full text
Get full text
Get full text
Proceeding -
5
Speech dereverberation enhancement
Published 2020Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Developing students' mathematical thinking: how far have we came?
Published 2015“…There has not been a conclusive definition on mathematical thinking because some view it as a process and others as an outcome. Mathematical thinking is the foundation to do reasoning and problem solving and to develop conceptual knowledge, as opposed to procedural knowledge. …”
Get full text
Get full text
Get full text
Inaugural Lecture -
7
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…These challenges are: 1) single point failure in the cryptography scheme, 2) key abuse problem in the key generating process, and 3) delayed access to the data in the cloud for the user. …”
Get full text
Get full text
Thesis
