Search Results - (( knowledge creating surface algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 5 results of 5
Refine Results
  1. 1

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Investigations On Human Perceptual Maps Using A Stereo-Vision Mobile Robot by Eng, Swee Kheng

    Published 2018
    “…Therefore, additional algorithms are developed in order to remove the reflection and noise. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Evaluation of cracks and disintegrations using close-range digital photogrammetry and image processing technique by Ling, Tung Chai

    Published 2005
    “…Advancement in digital photogrammetric technology creates an opportunity to overcome some problems associated with the manual methods. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Integration of object-based image analysis and data mining techniques for detailes urban mapping using remote sensing by Hamedianfar, Alireza

    Published 2015
    “…In this research, to eliminate the manual developments of the rule-sets, the supervised DM technique was used to identify the appropriate selection of attributes for object-based classification. This algorithm represents the decision tree knowledge model, enables fast classification of intra-urban classes, and disables subjectivities related to the interaction with analysts. …”
    Get full text
    Get full text
    Thesis