Search Results - (( java application customization algorithm ) OR ( software extraction path algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1
  2. 2

    Graph processing hardware accelerator for shortest path algorithms in nanometer very large-scale integration interconnect routing by Ch'ng, Heng Sun

    Published 2007
    “…This thesis proposes a graph processing hardware accelerator for shortest path algorithms applied in nanometer VLSI interconnect routing problems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    A review of slicing techniques in software engineering by Shah, Asadullah, Raza, Ali, Hassan, Basri, Shah, Abdul Salam

    Published 2015
    “…Quite a large numbers of variants for the program slicing have been analyzed along with the algorithms to compute the slice. Model based slicing split the large architectures of software into smaller sub models during early stages of SDLC. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    Optimization And Execution Of Multiple Holes-Drilling Operations Based On STEP-NC by Yusof, Yusri, Latif, Kamran, Hatem, Noor, A. Kadir, Aini Zuhra, Abedlhafd, Mohammed M.

    Published 2021
    “…The newly developed system combines between open CNC control system and ant colony optimization (ACO) algorithm by using LabVIEW software. A developed system is based on STEP-NC interpretation, optimization, 3D simulation, and automatic document generation modules that have been used to verify and validate the system in extract and optimize STEP-NC drilling codes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…The recent trend of software development uses OO paradigm. Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Let’s collaborate’: Malaysian TVET-engineering institution and industry partnership by U. S., Subri, N. E., Sohimi, H. M., Affandi, S. M., Noor, F. A. N, Yunus

    Published 2022
    “…Then, the data were analysed using the PLS-SEM 3.3.9 software via the algorithm, bootstrapping and blindfolding method. …”
    Get full text
    Get full text
    Article
  10. 10

    Development Of Distributed Grid-Based Hydrological Model And Floodplain Inundation Management System by Al_Fugara, A’kif Mohammed Salem

    Published 2008
    “…The discharge hydrographs were extracted from the grid-based overland flow routing model in ASCII format and imported into MIKE11 hydrodynamic modeling system. …”
    Get full text
    Get full text
    Thesis