Search Results - (( program sharing control algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- program sharing »
- sharing control »
-
1
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
2
Pengurusan rantaian bekalan menggunakan MRP dan DRP di FAMA
Published 2005“…This system is developed using web application to help the management team in sharing information. The Wagner Within Algorithm is being used to determine the lot sizing to obtain the optimum order quantity. …”
Get full text
Get full text
Thesis -
3
Designing and implementation of robot mapping algorithm for mobile robot
Published 2014Get full text
Get full text
Get full text
Proceeding Paper -
4
A flowchart-based multi-agent system for assisting novice programmers with problem solving activities
Published 2023“…In the early stages of learning computer programming, Computer Science (CS) minors share a misconception of what programming is. …”
Article -
5
Development of water surface robot system for lake sanitation and sampling / Ahmed Abdullah Omar
Published 2022“…Also, low-cost robot designs have become limited to onboard computational resources; sensor data is captured locally, and the mechanical aspects of the robots are mainly pre-programmed or remotely controlled. In low-cost robots, automation is hardly ever considered. …”
Get full text
Get full text
Get full text
Thesis -
6
Wireless controller area networking using token frame scheme
Published 2012Get full text
Get full text
Thesis -
7
A platform to develop a secure instant messaging using jabber protocol
Published 2010Get full text
Article -
8
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Investigating The Performance Of Metaheuristics To Optimize The Revenue Of Semiconductor Supply Chain
Published 2022“…Small fitness values are often indicative of close-to-optimal control-variable values, as shown in this case. Below is the comparison of the fitness value among 20 metaheuristics algorithms run through Python programming.…”
Get full text
Get full text
Monograph -
10
Nonparametric predictive inference forest fire dashboard
Published 2024“…These damages can be minimised, through information sharing before the forest fire occurrence using a dashboard. …”
Get full text
Get full text
Get full text
Article -
11
The prevalence and functional impact of rare genomic copy number variation in hypertension-related left ventricular hypertrophy / Julia Ashazila Mat Jusoh
Published 2020“…Losartan (Angiotensin II receptor blocker) was used to see whether regression of LVH was directly related to BP control or indirectly by triggering foetal cardiac gene program. …”
Get full text
Get full text
Thesis
