Search Results - (( variable information system algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- variable information »
- information system »
- system algorithm »
- java application »
-
1
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
Get full text
Get full text
Thesis -
2
An algorithm for pulsed activation of solenoid valves for variable rate application of agricultural chemicals
Published 2008Get full text
Get full text
Conference or Workshop Item -
3
EMS decoding algorithm that introduced shuffled strategy and improved variable node update
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
-
5
Modification of a commercial PWM sprayer control system for precision farming application
Published 2008Get full text
Get full text
Conference or Workshop Item -
6
Path optimization using genetic algorithm in laser scanning system
Published 2008Get full text
Get full text
Conference or Workshop Item -
7
Path optimization using genetic algorithm in laser scanning system
Published 2023Subjects:Conference paper -
8
Road Sign Detection and Recognition System for Real-Time Embedded Applications
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A study on advanced statistical analysis for network anomaly detection
Published 2005Get full text
Monograph -
10
-
11
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023Short Survey -
12
Comparison on queuing performance measures on customer’s flow using Queuing Theory Model and DSW Algorithm / Muhammad Izuanudin Azmi, Muhamad Aiman Zulhaikal Azizul and Nurul Aisya...
Published 2022“…In this study, the DSW Algorithm is used for the α-cut process to define the required variables for the Fuzzy Queuing Model. …”
Get full text
Get full text
Student Project -
13
-
14
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…This creates challenges in developing secure Elliptic Curve Cryptography systems and performing cryptanalysis for scalar multiplication algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…The dropping decision of the redundant RREQ in the NCPR algorithm completely relies on preset variables, such variables require to be set by the system administrator based on the scenario. …”
Get full text
Get full text
Get full text
Thesis -
16
Recommendation System Model For Decision Making in the E-Commerce Application
Published 2024thesis::doctoral thesis -
17
-
18
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…This creates challenges in developing secure Elliptic Curve Cryptography systems and performing cryptanalysis for scalar multiplication algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Parameter Magnitude-Based Information Criterion For Optimum Model Structure Selection In System Identification
Published 2020“…Model structure selection is among one of the steps in system identification and in order to carry out this, information criterion is developed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Image Based Congestion Detection Algorithms And Its Real Time Implementation
Published 2015“…The methodology includes vehicle detection by using backlight pairing feature algorithm and modified Watershed algorithm. The results returned by the algorithms are transmitted and received wirelessly using the SFFSDR platform, including the use of RF, FPGA, and DSP modules for variable distances. …”
Get full text
Get full text
Thesis
