Search Results - (( java application customization algorithm ) OR ( based contractors method algorithm ))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Government policy as a key moderator to contractors’ risk attitudes among Malaysian construction companies by Taofeeq, D. M., Adeleke, A. Q., Lee, Chia Kuang

    Published 2020
    “…This study uses the quantitative method to identify the individual factors influencing contractors’ risk attitude and the moderating role of government policy among construction companies in Malaysia. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    An optimum drill bit selection technique using artificial neural networks and genetic algorithms to increase the rate of penetration by Momeni, M., Hosseini, S.J., Ridha, S., Laruccia, M.B., Liu, X.

    Published 2018
    “…This paper discusses bit selection by employing a method of combining Artificial Neural Network (ANN) and the computation of Genetic Algorithm (GA). …”
    Get full text
    Get full text
    Article
  4. 4

    Real-Time Detection of Personal Protective Equipment for Site Safety Using Deep Learning Techniques by Muhammad Hadif, Dzulkhissham

    Published 2022
    “…This paper presents a deep learning technique for detecting multiple personal protection equipment at once based on You-Only-Look-Once Version 4 (YOLOv4) object detection algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    Influences of Cost Factors Affecting Technical Performance of Local Government Projects in Nigeria: A Partial Least Square-Structural Equation Modeling (PLS-SEM) Approach by Gambo, Nuru, Said, Ilias, Ismail, Radzi

    Published 2016
    “…Survey instruments were administered to major stakeholders in the construction industry comprising of project clients, contractors and consultants using proportionate stratified random sampling method. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Time-Uncertainty Analysis by Using Simulation in Project Scheduling Networks by Mohammed Omer, Anwar

    Published 1999
    “…The merge event bias as one of the essential problems associated with PERT is discussed, along with models and approaches developed by other researchers, namely, Probabilistic Network Evaluation Technique (PNET algorithm), Modified PNET, Back-Forward Uncertainly Estimation procedure (BFUE) and concept based on the robust reliability idea. …”
    Get full text
    Get full text
    Thesis