Search Results - (( java application customization algorithm ) OR ( using interactions replication algorithm ))

  • Showing 1 - 5 results of 5
Refine Results
  1. 1

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Study of hand gesture recognition using impulse radio ultra wideband (IRUWB) radar sensor by Terence Jerome Daim

    Published 2023
    “…Additionally, the research enhances system functionality, enabling intricate interactions. A developed application allows users to visualize executed hand gestures, paving the way for future integration of complex interaction sub-systems in various gesture recognition applications. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    A Novel Path Prediction Strategy for Tracking Intelligent Travelers by Motlagh, Omid Reza Esmaeili

    Published 2009
    “…The FCM nodes are a novel selection of kinematical factors. Genetic algorithm (GA) is then used to train the FCM to be able to replicate the decisional behaviors of the intelligent traveler. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Comparison between specifications of linear regression and spatial-temporal autoregressive models in mass appraisal valuation for single storey residential property by Jahanshiri, Ebrahim

    Published 2013
    “…The best set of parameters that could produce more accurate results in the validation process, were selected and their associated neighbourhood and weights were used to compare with the linear models. The experiments were replicated on three different treatments based on removal of outliers and transformation of variables with high value of skewness. …”
    Get full text
    Get full text
    Thesis