Search Results - (( programming based circular algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 6 results of 6
Refine Results
  1. 1
  2. 2

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…The system development is based on the Treasury Circulars by the Ministry of Finance, Malaysia as well as other circulars related to it. …”
    Get full text
    Thesis
  3. 3

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Integration Of G-Code With Position Controller Via Interpreter Design Using MATLAB For Milling Machine Application by Mat Seman., Norhidayah

    Published 2019
    “…In most cases, the position controllers rarely utilize geometrical drawing such as CAD/CAM trajectory as input reference without extensive programming or trajectory generation algorithm. Thus, this thesis aims to integrate directly the trajectory in G-code form of *.txt format as input reference for the position controller algorithm designed in MATLAB/Simulink via development of a system interpreter. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis