Search Results - (( java application customization algorithm ) OR ( linear extraction path algorithm ))

  • Showing 1 - 6 results of 6
Refine Results
  1. 1
  2. 2

    STEP-NC Interpolator for General 2D and 3D Parametric Curve / Dzullijah Ibrahim...[et al.] by Ibrahim, Dzullijah, Yaakob, Yusli, Hussin, Norasikin, Samad, Zahurin

    Published 2017
    “…A STEP-NC interface to OAPC-NC interpolator using STEP-NC tool path data is proposed and developed. A hierarchical-based algorithm is used to extract the tool path data from STEP-NC tool path file of a product model. …”
    Get full text
    Get full text
    Article
  3. 3

    Quantum Processing Framework And Hybrid Algorithms For Routing Problems by Soltan Aghaei, Mohammad Reza

    Published 2010
    “…At first, the hybrid architecture was designed for the quantum algorithms. Then, the relationship between classical and quantum parts of the hybrid algorithms were extracted and the main stages of the hybrid algorithm were determined. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Modelling of geometric correction and relative radiometric normalization for near equatorial earth observation satellite images by Al-Razzaq Abd, Hayder Abd

    Published 2015
    “…Automatic control point extraction is then performed to generate control points automatically. …”
    Get full text
    Get full text
    Thesis