Search Results - (( java application customization algorithm ) OR ( _ intention path algorithm ))

  • Showing 1 - 12 results of 12
Refine Results
  1. 1
  2. 2

    Analysis of Moderating Effect of Turnover Intention on the Relationship of Intrinsic Motivation and Employee Performance by Salim Alsouri Al Ali, Amna Rashid, Salahudin, Shahrul Nizam

    Published 2024
    “…The first stage involved a bootstrapping process to generate and determine the significance level and strength of the path. The second stage employed the PLS Algorithm process, generating a simple slope graph. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack by Izaddoost, Alireza

    Published 2008
    “…To achieve such a goal, this research improves the Intention-driven ICMP traceback model by filtering normal flow in the specific short time and two new algorithms in UDP-based and TCP-based attack are applied. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Algebraic Net Class Rewriting Systems, Syntax and Semantics for Knowledge Representation and Automated Problem Solving by Tirri, Seppo Ilari

    Published 2013
    “…New results are obtained within construction of problem solving systems where solution algorithms are derived parallel with other candidates applied to the same net classes. …”
    Get full text
    Get full text
    Journal
  7. 7

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Cyber hygiene during Covid-19 to avoid cyber attacks by Lee, Yvonne Yi Jin

    Published 2022
    “…After received the responds from participants, we had run the analysis on all the variables by using SmartPLS 3.3 and calculate the PLS-SEM algorithm of the variables. After running the analysis, we discuss our key findings using the results for each path's t-statistic and p-value. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9
  10. 10

    Review of Kalman filter variants for SLAM in mobile robotics with linearization and covariance initialization by Muhammad Haniff, Gusrial, Nur Aqilah, Othman, Hamzah, Ahmad, Mohd Hasnun Ariff, Hassan

    Published 2025
    “…This article aims to provide a comprehensive review of SLAM concept in the context of mobile robotics navigation by focusing on theoretical principles, estimation problem, algorithm involved and related application. The existing literature is systematically analyzed and classified based on three main perspectives of navigation which are localization, mapping and path planning. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Performance evaluation of manet in presence of black hole nodes by Dhahir, Saif Mahmood

    Published 2017
    “…In this type of attack, the black hole node uses the maximum destination sequence number to lure the sender node, to send packets via the shortest path, so that it will drop or alter the packets intentionally instead of sending them to the destination. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Image orientation watermarking technique for copyright protection by Jasim, Hend Muslim

    Published 2016
    “…Watermarking attracts much interest in algorithm design to enable a signature to be embedded on secrecy and encryption beds. …”
    Get full text
    Get full text
    Get full text
    Thesis