Search Results - (( code application usage algorithm ) OR ( java application towards algorithm ))
Search alternatives:
- application usage »
- towards algorithm »
- code application »
- java application »
- usage algorithm »
-
1
Automatic marking system for programming subject
Published 2023“…This application handle execution of anonymous code that could be malicious securely by running the code in an isolate environment. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
-
3
-
4
Network game (Literati) / Chung Mei Kuen
Published 2003“…This thesis steps towards developing a networked game, Literati game system that supporting two players at one time. …”
Get full text
Get full text
Thesis -
5
Automated time series forecasting
Published 2011Get full text
Get full text
Get full text
Monograph -
6
Image encryption algorithm based on chaotic mapping
Published 2003Get full text
Get full text
Get full text
Article -
7
The usage of watermarking to store patient information and diagnosis in medical images
Published 2011Get full text
Get full text
Undergraduates Project Papers -
8
Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy
Published 2017“…In addition, CORDIC algorithm has a low usage of memory space compared to Look Up table (LUT) technique. …”
Get full text
Get full text
Student Project -
9
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
10
-
11
-
12
Applying case reuse and Rule-Based Reasoning (RBR) in object-oriented application framework documentation: Analysis and design
Published 2023“…The main objective of an object-oriented application framework is to promote the reuse of both design and code in the development of new applications. …”
Conference Paper -
13
A hermite interpolated LUT for RF power amplifiers
Published 2017Get full text
Get full text
Get full text
Article -
14
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Therefore, in this research, the first objective is to develop an algorithm for a remote AR-IoT monitoring system. The algorithm was designed by utilizing C++ and C# coding language. …”
Get full text
Get full text
Thesis -
15
OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA
Published 2004Get full text
Get full text
Final Year Project -
16
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
17
Network monopoly / Tan Kean Yeap
Published 2002“…With the powerful networking features of Java, it is expected that this project would produce a "real" game engine. …”
Get full text
Get full text
Thesis -
18
A Model of FPGA-based Direct Torque Controller
Published 2013“…The model is prepared for fast computation, without using of CORDIC algorithm, a soft-core CPU, a transformation from Cartesian-topolar coordinates, and without the help of third-party applications. …”
Get full text
Get full text
Article -
19
Solar Photovoltaic Maximum Power Point Tracking via Predictive Technique
Published 2022“…On the other hand, the algorithm would be diligently going through several alteration in order to achieve the stable coding command with varied environment factor. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
20
Car plate recognition based on stroke composition technique / Samsul Setumin, Mohd Ikmal Fitri Maruzuki and Shahrul Nizam Ishak.
Published 2012“…These different approaches are customized for their various applications. In this algorithm however, it comprises two main processes; character extraction and stroke analysis. …”
Get full text
Get full text
Research Reports
