Search Results - (( developing mobile thinking algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- thinking algorithm »
- java application »
- mobile thinking »
-
1
(E-Taste Apps) – visualization food taste descriptors
Published 2019Get full text
Get full text
Student Project -
2
-
3
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
4
-
5
A conceptual Malaysian private healthcare university-of-the-future business model: staying relevant in the digital and post-covid era
Published 2022“…This paper develops and proposes through the adoption of the design thinking methodology an alternate conceptual business model for a Malaysian private healthcare University-of-the-Future (UotF) using the renowned Business Model Canvas (BMC) and Strategy Canvas (SC) frameworks. …”
Get full text
Get full text
Get full text
Article -
6
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Multi-dimensional networking and distributed computing services
Published 2012“…Furthermore, different types of distributed computing technologies are widening the scope of our thinking and research issues in networking. The multi-dimensional research issues include wireless and mobility problems, routing protocols and algorithms, resource and service location protocols, performance evaluations of networking systems, ubiquitous systems, context aware ubiquitous environment, mechanisms to improve throughput over wireless links, network management and network security, and other related areas. …”
Get full text
Get full text
Get full text
Article -
8
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…Imagine that a notice with a logo of Mobile Phone company is received by an email informing that the customer had recently run up a large mobile phone bill. …”
Get full text
Get full text
Thesis
