Search Results - (( java application customization algorithm ) OR ( _ intention path algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- intention path »
- path algorithm »
-
1
-
2
Analysis of Moderating Effect of Turnover Intention on the Relationship of Intrinsic Motivation and Employee Performance
Published 2024“…The first stage involved a bootstrapping process to generate and determine the significance level and strength of the path. The second stage employed the PLS Algorithm process, generating a simple slope graph. …”
Get full text
Get full text
Get full text
Article -
3
Dealing with well-formed and malformed packets, associated with point of failure that cause network security breach
Published 2020“…Two algorithms are proposed, utilizing single-path and multipath in transmission flow. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
4
Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack
Published 2008“…To achieve such a goal, this research improves the Intention-driven ICMP traceback model by filtering normal flow in the specific short time and two new algorithms in UDP-based and TCP-based attack are applied. …”
Get full text
Get full text
Thesis -
5
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
6
Algebraic Net Class Rewriting Systems, Syntax and Semantics for Knowledge Representation and Automated Problem Solving
Published 2013“…New results are obtained within construction of problem solving systems where solution algorithms are derived parallel with other candidates applied to the same net classes. …”
Get full text
Get full text
Journal -
7
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Cyber hygiene during Covid-19 to avoid cyber attacks
Published 2022“…After received the responds from participants, we had run the analysis on all the variables by using SmartPLS 3.3 and calculate the PLS-SEM algorithm of the variables. After running the analysis, we discuss our key findings using the results for each path's t-statistic and p-value. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
-
10
Review of Kalman filter variants for SLAM in mobile robotics with linearization and covariance initialization
Published 2025“…This article aims to provide a comprehensive review of SLAM concept in the context of mobile robotics navigation by focusing on theoretical principles, estimation problem, algorithm involved and related application. The existing literature is systematically analyzed and classified based on three main perspectives of navigation which are localization, mapping and path planning. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Performance evaluation of manet in presence of black hole nodes
Published 2017“…In this type of attack, the black hole node uses the maximum destination sequence number to lure the sender node, to send packets via the shortest path, so that it will drop or alter the packets intentionally instead of sending them to the destination. …”
Get full text
Get full text
Thesis -
12
Image orientation watermarking technique for copyright protection
Published 2016“…Watermarking attracts much interest in algorithm design to enable a signature to be embedded on secrecy and encryption beds. …”
Get full text
Get full text
Get full text
Thesis
