Search Results - (( program sharing control algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Pengurusan rantaian bekalan menggunakan MRP dan DRP di FAMA by Sabarudin, Aswahida

    Published 2005
    “…This system is developed using web application to help the management team in sharing information. The Wagner Within Algorithm is being used to determine the lot sizing to obtain the optimum order quantity. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    A flowchart-based multi-agent system for assisting novice programmers with problem solving activities by Hooshyar D., Ahmad R.B., Raj R.G., Nizam M.H.N.M., Yousefi M., Horng S.-J., Rugelj J.

    Published 2023
    “…In the early stages of learning computer programming, Computer Science (CS) minors share a misconception of what programming is. …”
    Article
  5. 5

    Development of water surface robot system for lake sanitation and sampling / Ahmed Abdullah Omar by Ahmed Abdullah , Omar

    Published 2022
    “…Also, low-cost robot designs have become limited to onboard computational resources; sensor data is captured locally, and the mechanical aspects of the robots are mainly pre-programmed or remotely controlled. In low-cost robots, automation is hardly ever considered. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Investigating The Performance Of Metaheuristics To Optimize The Revenue Of Semiconductor Supply Chain by Roslee, Muhammad Sharifuddin

    Published 2022
    “…Small fitness values are often indicative of close-to-optimal control-variable values, as shown in this case. Below is the comparison of the fitness value among 20 metaheuristics algorithms run through Python programming.…”
    Get full text
    Get full text
    Monograph
  10. 10

    Nonparametric predictive inference forest fire dashboard by Amirah Hazwani, Roslin, Noryanti, Muhammad

    Published 2024
    “…These damages can be minimised, through information sharing before the forest fire occurrence using a dashboard. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    The prevalence and functional impact of rare genomic copy number variation in hypertension-related left ventricular hypertrophy / Julia Ashazila Mat Jusoh by Mat Jusoh, Julia Ashazila

    Published 2020
    “…Losartan (Angiotensin II receptor blocker) was used to see whether regression of LVH was directly related to BP control or indirectly by triggering foetal cardiac gene program. …”
    Get full text
    Get full text
    Thesis