Search Results - (( variable reflection among algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Skyline queries on data with uncertain dimensions for efficient computation by Mohd Saad, Nurul Husna

    Published 2018
    “…The performance of SkyQUD-T is studied against two naïve algorithms that are developed to reflect the best-case and worst-case scenarios. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Determining malaria risk factors in Abuja, Nigeria using various statistical approaches by Segun, Oguntade Emmanuel

    Published 2018
    “…Using hill climbing from search and score algorithms, the Bayesian network analysis revealed that there were associations among the network covariates, while cofounding effects of SES were observed. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Traditional and higher order sliding mode control of MEMS optical switch by Keramati, Ehsan

    Published 2010
    “…It is a harmful phenomenon caused either by switching imperfections or unmodelled dynamics of the system and limits the application of the TSM method in reality. Among all the methods that have been proposed to avoid chattering, HOSM algorithm is used in this work to eliminate this disadvantage. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Computational Analysis of Gas Kinetic Bhatnagar-Grosskrook Scheme for Inviscid Compressible Flow by Ong, Jiunn Chit

    Published 2004
    “…Higher-order spatial accuracy of the scheme is achieved through the reconstruction of the flow variables via the Monotone Upstream-Centered Schemes for Conservation Laws (MUSCL) approach. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Keyword query processing interface model of ontological natural language manipulation by Hasany, Syed Muhammad Noman

    Published 2010
    “…For the problem of conversion, techniques with fixed templates face scalability problems; while graph only techniques are processing intensive. We propose a variable template based conversion with inexpensive graph techniques to handle lengthy queries and exploring indirect connectivity among elements. …”
    Get full text
    Get full text
    Thesis