Search Results - (( developing customer replication algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- replication algorithm »
- customer replication »
- developing customer »
- java application »
-
1
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
2
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Evaluation of SongketChain : A Framework to Protect Unique Cultural Product using Blockchain Technology
Published 2025“…This study evaluates the effectiveness of SongketChain through a comparative analysis of blockchain platforms and consensus algorithms, highlighting the framework's potential to mitigate counterfeit issues and support the sustainable development of the Songket market. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Determination of transfer capability considering risk and reliability cost/ worth assessment in dynamic and static system cascading collapses / Nur Ashida Salim
Published 2015“…The proposed research methodology involved developing an algorithm commenced with a fault occurrence and then followed by the propagation of power system component tripping events which is defined as the system cascading collapse. …”
Get full text
Get full text
Thesis -
5
Access control model based on trust, purpose, and role in materialized view for privacy protection
Published 2019“…Materialized view is a replica of a table which is created in a very large system where data are replicated from the master tables. Role-based access control model in materialized view has been proposed to protect customer's data. …”
Get full text
Get full text
Thesis
