Search Results - (( developing general perception algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7

    Risk perception modeling based on physiological and emotional responses / Ding Huizhe by Ding , Huizhe

    Published 2024
    “…Therefore, accurate risk perception has become vital. This research aims to develop models for objectively assessing perceived risk. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Capability requirements on fraud prevention in the Nigeria public sector: perception of forensic accountants and auditors by Lateef, Saheed Ademola

    Published 2017
    “…The respondents are forensic accountants and auditors from the Office of Accountant General of the Federation and the Auditor General for the Federation in Nigeria. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    Watermarking technique based on ISB (Intermediate Significant Bit) by Zeki, Akram M., Abdul Manaf, Azizah, Olanweraju, Rashidah Funke

    Published 2010
    “…Digital watermarking is a special case of the general information hiding problem. It inserts a perceptually transparent pattern called watermark in an image called host or cover using an embedding algorithm. …”
    Get full text
    Get full text
    Proceeding Paper
  18. 18
  19. 19

    A rule-based image segmentation method and neural network model for classifying fruit in natural environment / Hamirul'aini Hambali by Hambali, Hamirul'aini

    Published 2015
    “…Therefore, another segmentation method has been developed to address the problem. The new method, named as Adaptive K-means, is developed based on clustering approach. …”
    Get full text
    Get full text
    Thesis
  20. 20