Search Results - (( program code application algorithm ) OR ( java applications usage algorithm ))*
Search alternatives:
- application algorithm »
- applications usage »
- java applications »
- code application »
- usage algorithm »
- program code »
-
1
Automatic marking system for programming subject
Published 2023“…This project is a web application designed for lecturer that teaching programming subject to automatically mark programming algorithm exercise. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
An Effective Fast Searching Algorithm for Internet Crawling Usage
Published 2016“…The search algorithm is a crucial part in any internet applications. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…As for WXES3l82, the thesis cover the development of programming code, the code implementation and testing and the evaluation including discussion about the problem/constraints meed in the coding program development. …”
Get full text
Get full text
Thesis -
4
Reusability techniques in load-flow analysis computer program
Published 2004“…Adding and changing codes and algorithm of the software can be done without affecting much the existing codes and algorithms. …”
Get full text
Get full text
Article -
5
-
6
-
7
-
8
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
9
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
10
Development of a cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…This need to be done due to the fact that further improvement of this project will need the coding history on how the algorithm being developed thus documentation is the common practice in programming stage. …”
Get full text
Get full text
Monograph -
11
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Obfuscation involves transforming potentially revealing data, renaming useful classes and variables (identifiers) names to meaningless labels or adding unused or meaningless code to an application binary. Obfuscation is used to convert source code into a program that works the same way but is much harder to read and understand. …”
Get full text
Get full text
Thesis -
12
Development of cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…This need to be done due to the fact that further improvement of this project will need the coding history on how the algorithm being developed thus documentation is the common practice in programming stage. …”
Get full text
Get full text
Thesis -
13
-
14
Vision-based robot indoor navigation
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
-
16
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…The experimental result shows that using Java 2, this method improves the speed of PrefixSpan up to almost two orders of magnitude as well as the memory usage to more than one order of magnitude.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
-
18
-
19
Dynamic bandwidth allocation (DBA) for Fi-Wi realization using IN USRP
Published 2024text::Final Year Project -
20
Evaluation of Image Pixels Similarity Measurement Algorithm Accelerated on GPU with OpenACC
Published 2017“…OpenACC is a directive based parallel programming library that allows for easy acceleration of existing C, C++ and Fortran based applications with minimal code modifications. …”
Get full text
Get full text
Get full text
Article
