Search Results - (( java application customization algorithm ) OR ( using generalized replication algorithm ))
Search alternatives:
- customization algorithm »
- replication algorithm »
- java application »
-
1
Optimize performance load balancing techniques using binary vote assignment grid quorum (BVAGQ): A systematic review
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
3
Application of correlation as a measure of performance
Published 2011“…A judicious use of this relationship may yield a measure of performance for a given algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
4
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Power production optimization of model-free wind farm using simulated annealing algorithm
Published 2022Get full text
Get full text
Get full text
Conference or Workshop Item -
6
-
7
A comparative analysis of image copy-move forgery detection algorithms based on hand and machine-crafted features
Published 2023“…IC-MFD algorithms based hand-crafted features are the algorithms that detect the faked image depending on manual feature extraction while IC-MFD algorithms based machine-crafted features are the algorithms that detect the faked image automatically from image. …”
Article -
8
-
9
-
10
A Novel Wrapper-Based Optimization Algorithm for the Feature Selection and Classification
Published 2023“…Moreover, K-Nearest Neighbor (KNN) classifier was used to evaluate the effectiveness of the features identified by the proposed SCSO algorithm. …”
Get full text
Get full text
Article -
11
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
An enhanced fingerprint template protection scheme
Published 2022Get full text
Get full text
Thesis -
13
-
14
-
15
-
16
-
17
-
18
3D imaging techniques in documentation of cultural assets in Malaysia
Published 2015“…This paper presents an initial stage in an exploratory study that investigates the potentials of using CV automated image-based open- source software and web services to reconstruct and replicate cultural assets. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Medical identity theft in telemedicine: solving the privacy and security issues
Published 2015Get full text
Get full text
Monograph -
20
GLCM correlation approach for blood vessel identification in thermal image
Published 2019Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
