Search Results - (( java application customization algorithm ) OR ( post implementation mix algorithm ))

  • Showing 1 - 5 results of 5
Refine Results
  1. 1

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Digital media-enhanced cultural brand development: creative strategies for urban identity construction by Wei, Zhang, Mastika, Lamat

    Published 2025
    “…This study investigates digital media-enhanced cultural brand development through creative strategies for urban identity construction, aiming to develop a comprehensive framework that extends integrated marketing communication theory while preserving cultural authenticity and enabling community participation. A mixed-methods approach incorporated stakeholder surveys (n=420) across four participant groups, systematic analysis of 800 social media posts, examination of 35 institutional platforms, and comparative analysis of 12 international cities, utilizing an AI-enhanced analytical pipeline with natural language processing, computer vision, and machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Computational Thinking : Experiences of Rural Pupils in Sarawak Primary School by Nur Hasheena, Anuar

    Published 2021
    “…The Computational Thinking results of quantitative data were collected using pre-test and post-test that consisted of five subjective computational thinking items. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis