Search Results - (( java application customization algorithm ) OR ( dramatic representative _ algorithm ))

  • Showing 1 - 5 results of 5
Refine Results
  1. 1

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An automatic diacritization algorithm for undiacritized Arabic text by Zayyan, Ayman Ahmad Muhammad

    Published 2017
    “…Moreover, this research is to implement and evaluate the accuracy of the algorithm for dialectal Arabic text. The design of the proposed algorithm based on two main techniques as follows: statistical n-gram along with maximum likelihood estimation and morphological analyzer. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Time series modeling of water level at Sulaiman Station, Klang River, Malaysia by Galavi, Hadi

    Published 2010
    “…The estimation of parameters of the model is accomplished using the hybrid learning algorithm consisting of standard neural network backpropagation algorithm and least squares method. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Gene expression profiling of human bronchial smooth muscle and lung fibroblasts cells stimulated with IL-1B, IL-4, IL-5 and IL-13 cytokines through the application of cDNA microar... by Jaafar, Faizah

    Published 2011
    “…Microarray data was generated by using third party software. Two algorithms were chosen to summarize the data; RMA and PLIER. …”
    Get full text
    Get full text
    Thesis