Search Results - (( integer _ detection algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 16 results of 16
Refine Results
  1. 1
  2. 2

    Development of symbolic algorithms for certain algebraic processes by Abd. Rahman, Ali, Aris, Nor'Aini

    Published 2007
    “…The modular technique is employed to minimize the complexity involved in such computations. A divisor test algorithm that enables the detection of an unlucky reduction is a crucial device for an effective implementation of the modular technique. …”
    Get full text
    Get full text
    Get full text
    Monograph
  3. 3

    Development of symbolic algorithms for certain algebraic processes by Abd. Rahman, Ali, Aris, Nor'aini

    Published 2007
    “…The modular technique is employed to minimize the complexity involved in such computations. A divisor test algorithm that enables the detection of an unlucky reduction is a crucial device for an effective implementation of the modular technique. …”
    Get full text
    Get full text
    Get full text
    Monograph
  4. 4

    Dual-purpose semi-fragile watermark: Authentication and recovery of digital images by Ullah, Rafi, Khan, Asifullah, Malik, Aamir Saeed

    Published 2013
    “…The proposed technique exhibits the flexibility between imperceptibility, robustness, and capacity. In addition, integer wavelet transform has been used to reduce the computational complexity of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  5. 5

    Dual-purpose semi-fragile watermark: Authentication and recovery of digital images by Ullah, R., Khan, A., Malik, A.S.

    Published 2013
    “…The proposed technique exhibits the flexibility between imperceptibility, robustness, and capacity. In: addition, in:teger wavelet transform has been used to reduce the computational complexity of the algorithm. …”
    Get full text
    Get full text
    Article
  6. 6

    A fuzzy multi-objective optimisation model of risk-based gas detector placement methodology for explosion protection in oil and gas facilities by Idris, A.M., Rusli, R., Nasif, M.S., Ramli, A.F., Lim, J.S.

    Published 2022
    “…A flammable gas detection system is one of the critical control strategies of catastrophic events such as fire and explosion. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…The existing infeasible path detection methods are restricted to extended finite state machine (EFSM) models with integer data type only. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    A reliable time base routing framework with seamless networking operation for SDN / Nauman Khan by Nauman , Khan

    Published 2024
    “…It is framed as a mixed-integer linear programming problem. To address this complexity, this work presents a multi-objective heuristic algorithm in the framework with the help of other module inputs that efficiently determines the best path for upcoming affected flows and timely isolates the maintenance switch except for the critical switch. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Identification of debris flow initiation zones using topographic model and airborne laser scanning data by Lay, Usman Salihu, Pradhan, Biswajeet

    Published 2017
    “…Debris flows and no-debris flows were categorized, and the transform to continuous integer (1 and 0), respectively. To achieve this, the data set was divided into two, 70% (840) for the training dataset and 30% (360) for validation. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item