Search Results - (( java application customization algorithm ) OR ( software transformation method algorithm ))

Refine Results
  1. 1

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Semi-automatic oil palm tree counting from pleiades satellite imagery and airborne LiDAR / Nurul Syafiqah Khalid by Khalid, Nurul Syafiqah

    Published 2020
    “…Therefore, the final output of tree crown shows the watershed transformation algorithm is the best method for use represented oil palm tree counting in the map which is the accuracy assessment is 38.9%.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Time Domain Reflectometry Computational Technique Using Agilent Vee by Mohamed Dan, Nur Sharizan

    Published 2007
    “…Additionally, frequency-to-time measurement option of the VNA has limited capability with only selected transformation algorithm, window and gating method. This motivates the transformation using computer software instead of VNA to transform data, thus, the development of transformation software. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    A proposed genetic algorithm to optimize service restoration in electrical networks with respect to the probability of transformers failure by Aminian, Masoud, Moazami, Ehsan, Mirzaei, Maryam, Ab Kadir, Mohd Zainal Abidin

    Published 2010
    “…Expected results of this new algorithm should lead to a new plan of restoration in permissible ranges of transformer loading in respect of their age, previous experienced faults and condition monitoring.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    Autoreclosure in Extra High Voltage Lines using Taguchi’s Method and Optimized Neural Networks by Desta, Zahlay F., K.S., Ramarao, Taj, Mohammed Baloch

    Published 2008
    “…The algorithms are developed using MATLABTM software. A range of faults are simulated on EHV modeled transmission line using SimPowerSytemsTM, and the spectra of the fault data are analyzed using fast Fourier transform which facilitates extraction of distinct features of each type of fault. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Autoreclosure in Extra High Voltage Lines using Taguchi's Method and Optimized Neural Networks by Desta, Zahlay F., K.S., Rama Rao

    Published 2009
    “…The algorithms are developed using MATLAB software. A range of faults are simulated on EHV modeled transmission line using SimPowerSytems, and the spectra of the fault data are analyzed using fast Fourier transform to extract features of each type of fault. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20