Search Results - (( program kerja method algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 5 results of 5
Refine Results
  1. 1

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Evaluation of cracks and disintegrations using close-range digital photogrammetry and image processing technique by Ling, Tung Chai

    Published 2005
    “…Results obtained by this technique are compared with the Jabatan Kerja Raya manual using conventional method to check accuracy. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Self routing traffic light for traffic light controller using priority method based on volume of vehicles by Tan, Swee Tiang

    Published 2015
    “…In order to increase and enhance the efficiency and accuracy of real time traffic flow, this thesis proposes a novel implementation of sensing method called Self-Routing Traffic Light (SRTL) which incorporates a self-algorithm program as a practical solution to reduce traffic congestion. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Hardware Acceleration of Window Big-Digit (Wbd) Multiplication for Embedded Applications by Lim, Ee Wah

    Published 2015
    “…Hence, wBD number system could be an excellent candidate to speed up overall multiplication process. The wBD algorithm has been analyzed and benchmarked against other multiplication methods in algorithmic level. …”
    Get full text
    Get full text
    Thesis