Search Results - (( risk mitigation path algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- mitigation path »
- path algorithm »
-
1
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
2
Debris flow susceptibility areas identification in Bukit Kachi, Sintok, Kedah using Flow R Software / Nursyamimi Che Daud
Published 2023“…The final output of this study is a map of debris flow susceptibility areas that will help the community, authorities, or any agencies in mitigating the risk as well as improving a community's resilience and achieving sustainable development goals 13.1 which target to strengthen resilience and adaptive capacity to climate-related hazards and natural disasters in all countries.…”
Get full text
Get full text
Student Project -
3
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
