Search Results - (( programmes program modified algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- programmes program »
- program modified »
- java application »
-
1
Parallel computation of maass cusp forms using mathematica
Published 2013“…Special attention is given to the computation of eigenvalues for the modular group because this part is intended to serve as the basis for further development of computation for the more complex surfaces. This parallel programme is further modified using a generalized Hejhal’s algorithm to cater for fundamental domain that has several cusps namely the principal congruence subgroup of level two. …”
Get full text
Get full text
Thesis -
2
A Malay Chatterbot
Published 2005“…The chatterbot will be developed using AIML (Artificial Intelligence Markup Language) which is an XML specification for programming chat robots. AIML is open source software, a great advantage for the project since the software can be freely used and, if necessary, modified. …”
Get full text
Get full text
Final Year Project -
3
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
4
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Challenges of hidden data in the unused area two within executable files
Published 2009“…Problem statement: The executable files are one of the most important files in operating systems and in most systems designed by developers (programmers/software engineers), and then hiding information in these file is the basic goal for this study, because most users of any system cannot alter or modify the content of these files. …”
Get full text
Get full text
Get full text
Article
