Search Results - (( basic computer assisted algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Computer aided interactive pressure vessel design by Teoh, Sun Jie

    Published 2008
    “…Designing a pressure vessel using a handbook is troublesome and not interactive. Therefore computer aided software is created to assist the users, however due to business benefit, the computer aided software for designing pressure vessel are not for sale or pricey. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    Application of Mellin-Kamal transformation in EL Gamal Ciphertext Cryptosystem / Nurul Syazwani Husairi and Nurul Aqilah Mohd Fauzi by Husairi, Nurul Syazwani, Mohd Fauzi, Nurul Aqilah

    Published 2023
    “…Our main objective is to compute encryption process and develop decryption schemes using Mellin Transformation and to modify the basic El Gamal system with the application of Mellin-Kamal Transformation. …”
    Get full text
    Get full text
    Student Project
  13. 13

    Interval-valued fuzzy soft topology and its applications in group decision-making problems by Altwer, Mabruka Ali Juma

    Published 2022
    “…In the application phase of this thesis, we provide a representation of the results acquired in the previous steps in order to compute and define various algorithms that assist group decision-making using interval-valued fuzzy soft sets. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Trust based Lightweight Security Protocol for Device to Device Multihop Cellular Communication by Yasir, Javed

    Published 2020
    “…It also achieves confidentiality, integrity and avoids any no-repudiation attack. The computational overhead shows that TLwS is at least 40% better than popular algorithm such as SeDS, UAKA-D2D, and D2D-Assist. …”
    Get full text
    Get full text
    Thesis
  15. 15

    i-ManGoeS by Ahmad, Khairul Adilah, Abdul Malik, Anis Faradella

    Published 2017
    “…Human Human activity system is an essential area in computer vision, with its wide range of applications including ambient assisted living. …”
    Get full text
    Get full text
    Get full text
    Book Section
  16. 16

    Mobile application for sign language learning with real time feedback by Lee, Xiao Xu Alexis

    Published 2024
    “…Machine learning algorithms using MediaPipe and deep learning will analyse users' hand motions to provide corrections for improving technique. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Dynamical fuzzy autocatalytic set of combustion process in circulating fluidized bed boiler using transition matrix / Hazwani Hashim by Hashim, Hazwani

    Published 2014
    “…The improvised GDAis able to reduce computer running time as compared to previous algorithm and able to deals with a sparse graph. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    Tasks Distribution In Driver Scheduling Using Dynamic Set Of Bandwidth In Harmony Search Algorithm With 2-Opt by Shaffiei, Zatul Alwani

    Published 2021
    “…Knowledge on the problem is needed to assist the searching process and to strengthen the exploitation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis