Search Results - (( java applications using algorithm ) OR ( source extraction using algorithm ))

Refine Results
  1. 1

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Constrained clustering approach to aid in remodularisation of object-oriented software systems / Chong Chun Yong by Chong, Chun Yong

    Published 2016
    “…This research follows an empirical research methodology, where the proposed approach is validated using 40 object-oriented open-source software systems written in Java. …”
    Get full text
    Get full text
    Thesis
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  4. 4
  5. 5
  6. 6

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12
  13. 13

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…The method used to develop this project is Rapid Application Development (RAD). …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Text based personality prediction from multiple social media data sources using pre-trained language model and model averaging by Christian, Hans, Suhartono, Derwin, Chowanda, Andry, Kamal Z., Zamli

    Published 2021
    “…Unlike earlier work which adopts a single social media data with open and close vocabulary extraction method, the proposed work uses multiple social media data sources namely Facebook and Twitter and produce a predictive model for each trait using bidirectional context feature combine with extraction method. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Photovoltaic shunt active power filter based on indirect self-charging with step size error cancellation and simplified adaptive linear neuron by Mohd Zainuri, Muhammad Ammirrul Atiqi

    Published 2017
    “…For comparison purpose, the existing DC-link capacitor voltage control and harmonics extraction algorithms were modeled too. Two nonlinear loads, which are inductive and capacitive, and PV source with different level of irradiances were used to test the PV SAPF by focusing on the performances of both proposed algorithms, under steady-state operation. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Integration of dual intelligent algorithms in shunt active power filter by Abdul Rahman, Nor Farahaida, Mohd Radzi, Mohd Amran, Mariun, Norman, Che Soh, Azura, Abd Rahim, Nasrudin

    Published 2013
    “…The effectiveness of the proposed dual intelligent algorithms is verified using Matlab/Simulink.…”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Fused multivariate empirical mode decomposition (MEMD) and inverse solution method for EEG source localization by Khosropanah, Pegah, Ramli, Abdul Rahman, Lim, Kheng Seang, Marhaban, Mohammad Hamiruce, Ahmedov, Anvarjon

    Published 2018
    “…High accuracy results of proposed algorithm using non-invasive and low-resolution EEG provide the potential of using this work for pre-surgical evaluation towards epileptogenic zone localization in clinics.…”
    Get full text
    Get full text
    Article
  18. 18

    Fused multivariate empirical mode decomposition (MEMD) and inverse solution method for EEG source localization by Khosropanah, Pegah, Ramli, Abdul Rahman, Lim, Kheng Seang, Marhaban, Mohammad Hamiruce, Ahmedov, Anvarjon

    Published 2018
    “…High accuracy results of proposed algorithm using non-invasive and low-resolution EEG provide the potential of using this work for pre-surgical evaluation towards epileptogenic zone localization in clinics.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…Diffie-Hellman algorithm is used to determine the pixel on an image that will be used to store the message. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Fast-varying flicker mitigation using D-statcom and its identification / Nur Fadhilah Jamaludin by Jamaludin, Nur Fadhilah

    Published 2015
    “…Meanwhile, the second control loop is used to determine the amplitude for source current. …”
    Get full text
    Get full text
    Thesis