Search Results - (( code application system algorithm ) OR ( java application a algorithm ))
Search alternatives:
- code application »
- system algorithm »
- java application »
- application a »
- a algorithm »
-
1
-
2
-
3
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
4
Network game (Literati) / Chung Mei Kuen
Published 2003“…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis -
5
-
6
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The experiment contains two phases; first phase was conducted against java applications that do not use any protection to determine the ability of reversing tools to read the compiled code. …”
Get full text
Get full text
Thesis -
7
Biometrics electronic purse
Published 1999“…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
Classroom finder system with student availability, space and time constraint
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022Get full text
Get full text
Monograph -
10
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
11
-
12
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We used a Drebin data sample, which is a collection of 5,560 applications, as well as clean data sample containing 1,846 applications. …”
Get full text
Get full text
Get full text
Thesis -
13
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…But the large number of available prevention techniques make the selection of the best solution a big challenge, because not every technique fit all types of web application, hence a one technique for all is another issue and a difficult task. …”
Get full text
Get full text
Get full text
Article -
14
-
15
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
16
Automatic marking system for programming subject
Published 2023Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
18
Fast algorithm for VQ-based wavelet coding system
Published 2003Get full text
Get full text
Get full text
Proceeding Paper -
19
Enhanced algorithms for three-dimensional object interpreter
Published 2004Get full text
Get full text
Get full text
Thesis -
20
