Search Results - (( developing new coding algorithm ) OR ( java application _ algorithm ))

Refine Results
  1. 1

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  2. 2

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…Therefore, it is essential to develop a new technique to authenticate access to database related to web applications and prevent SQL injection vulnerabilities. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…Recent research has focused on analysing Android Intent in the XML file. We propose a new method of analysing Android Intent in Java code, which includes implicit intent and explicit intent. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Development of open platform controller for step-NC compliant CNC system by Chi Adam, Mohd Khairil Anbia

    Published 2020
    “…Therefore, this study covers the system which has been designed and developed from outdated and conventional PROLIGHT 1000 Milling CNC machine from Light Intelitek as the lesser cost solution which further discussed in detail based upon upgrades of hardware, architecture, and algorithm design. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    New Fast Block Matching Algorithm Using New Hybrid Search Pattern And Strategy To Improve Motion Estimation Process In Video Coding Technique by Hamid, Nurul 'Atiqah

    Published 2016
    “…The aims for this study is to develop and design a new hybrid search pattern and strategy for new fast BMAs that can further improve the ME process in terms of estimation accuracy and video image quality, searching speed and computational complexity. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Development of a scalable video compression algorithm by Khalifa, Othman Omran, Issa, Sinzobakwira, Olanweraju, Rashidah Funke, Al Khazmi, El Mahdi A

    Published 2012
    “…Meeting the required bandwidth for video transmission is extremely complex resulting in poor video quality. The new technology H.264/AVC, based on scalable video coding appears as a new modus operandi that has the ability to satisfy the underlying requirements. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8
  9. 9

    Steganography algorithm to hide secret message inside an image by Ibrahim, Rosziati, Teoh, Suk Kuan

    Published 2011
    “…The proposed algorithm uses binary codes and pixels inside an image. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  12. 12
  13. 13

    Parallel Block Methods for Solving Ordinary Differential Equations by Abdul Majid, Zanariah

    Published 2004
    “…The new codes are based on the implicit multistep block methods formulae. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Development of new code for optical code division multiple access systems by Hilal Adnan, Fadhil

    Published 2011
    “…Splitting algorithm is proposed to construct the new code families namely RD code. …”
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Runge-Kutta-Nystrom Methods For Solving Oscillatory Problems by Senu, Norazak

    Published 2010
    “…We observe that the PERKN gives the better performance when solving large system of ODEs. In conclusion, the new codes developed in this thesis are suitable for solving system of second-order ODEs in which the solutions are in the oscillatory form.…”
    Get full text
    Get full text
    Thesis
  20. 20

    Forecast innovative development level in green supply chains using a comprehensive fuzzy algorithm by Delgoshaei, Aidin, Beighizadeh, Razieh, Mohd Arffin, Mohd Khairol Anuar, Leman, Zulkiflle, Ali, Ahad

    Published 2022
    “…Then, using a new model coded that is proposed and coded by Python, the innovation level related to technology in green supply chains will be classified and predicted. …”
    Get full text
    Get full text
    Article