Search Results - (( developing new coding algorithm ) OR ( java application system algorithm ))
Search alternatives:
- coding algorithm »
- java application »
- system algorithm »
- developing new »
- new coding »
-
1
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
2
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Therefore, it is essential to develop a new technique to authenticate access to database related to web applications and prevent SQL injection vulnerabilities. …”
Get full text
Get full text
Get full text
Article -
3
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…Recent research has focused on analysing Android Intent in the XML file. We propose a new method of analysing Android Intent in Java code, which includes implicit intent and explicit intent. …”
Get full text
Get full text
Get full text
Thesis -
4
Development of open platform controller for step-NC compliant CNC system
Published 2020“…The hardware of the system was upgraded with the new servo system combined with SSCNET implementation to improve the functionality and efficiency of the new system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
-
6
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
7
-
8
-
9
New Fast Block Matching Algorithm Using New Hybrid Search Pattern And Strategy To Improve Motion Estimation Process In Video Coding Technique
Published 2016“…The aims for this study is to develop and design a new hybrid search pattern and strategy for new fast BMAs that can further improve the ME process in terms of estimation accuracy and video image quality, searching speed and computational complexity. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Development of a scalable video compression algorithm
Published 2012“…Meeting the required bandwidth for video transmission is extremely complex resulting in poor video quality. The new technology H.264/AVC, based on scalable video coding appears as a new modus operandi that has the ability to satisfy the underlying requirements. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
-
13
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
14
-
15
Steganography algorithm to hide secret message inside an image
Published 2011“…The proposed algorithm uses binary codes and pixels inside an image. …”
Get full text
Get full text
Article -
16
A new real coded genetic algorithm crossover: Rayleigh crossover
Published 2014Get full text
Get full text
Get full text
Article -
17
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
18
-
19
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
20
Parallel Block Methods for Solving Ordinary Differential Equations
Published 2004“…The new codes are based on the implicit multistep block methods formulae. …”
Get full text
Get full text
Thesis
