Search Results - (( program during does algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1
  2. 2

    Midblock signalled pedestrian crossing : alternative controller algorithms by Chik, Abdul Aziz, Ismail, Che Ros, Hainin, Mohd. Rosli

    Published 2000
    “…The measures of performance of all algorithms are evaluated using a fully calibrated and validated simulation program. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    A review of classification techniques for electromyography signals by Mohd Saad, Norhashimah, Omar, Siti Nashayu, Abdullah, Abdul Rahim, Shair, Ezreen Farina, H.Rashid

    Published 2023
    “…To detect neuromuscular abnormalities, these test is very useful.EMG can measures the electrical activity of muscle during rest, slight and forceful contraction. Normally, during rest our muscle tissue does not produce electrical signals. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Off-the-shelf indoor localization system using radio frequency for wireless local area network by Alhammadi, Abdulraqeb Shaif Ahmed

    Published 2018
    “…The location fingerprinting algorithm consists of two phases: offline phase and online phase. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…In the worst condition, it optimized 3.99% higher than the most fault-tolerant previous works. The resulting algorithm does not involve variability in the hardware type nor is it based on specific distributed application software or databases. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…The key semantic difference between FEs and DDoS is that the former represents legitimate access of the website while the latter does not. However, this does not help in discriminating them automatically. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Multi-sensor fusion for automated guided vehicle positioning by Ahmed Elshayeb, Said Abdo

    Published 2010
    “…Radio frequency module is used to transfer sensors reading from the mobile robot to a host PC has software program written on LabVIEW, which has a positioning algorithm and graphical display for robot position. …”
    Get full text
    Get full text
    Get full text
    Thesis