Search Results - (( variable web application algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1
  2. 2
  3. 3

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Metocean Prediction using Hadoop, Spark & R by Sumayema, Kabir Ricky

    Published 2019
    “…The new system will be a single page reactive web application with shiny web UI containing forecasting model, ARIMA developed with R for the variables of Metocean data stored in Hadoop and spark is integrated to make the computations happen in-memory. …”
    Get full text
    Get full text
    Final Year Project
  5. 5
  6. 6
  7. 7

    Fuzzy Type-1 Triangular Membership Function Approximation Using Fuzzy C-Means by Azam, M.H., Hasan, M.H., Hassan, S., Abdulkadir, S.J.

    Published 2020
    “…Membership functions are used to depict the fuzzy values of given variable. Though membership functions are determined through expert's opinion, however, the one estimated through heuristic algorithms is the preferable methods. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    A Review of Multi-criteria Decision-Making Methods Using Application of Variable Weight Theory and IF-TOPSIS-EF by Ayasrah, Omar, Faiz, Mohd Turan

    Published 2021
    “…This paper represents the methodology to conduct a research that aims to combine two methods (IFS-TOPSIS-exponential based and Variable Weight Theory) in a new technique that tackles the abovementioned gaps by following induction research approach to validate the new technique by utilizing the secondary data, then to use interviews to develop the mobile application algorithm to perform solving MCDM problems virtually.…”
    Get full text
    Get full text
    Get full text
    Book Chapter
  10. 10

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…By using Java applet, it will give a good interactive response since it does not suffer from the delays or variability of bandwidth associated with network connection. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    A review of slicing techniques in software engineering by Shah, Asadullah, Raza, Ali, Hassan, Basri, Shah, Abdul Salam

    Published 2015
    “…This specific survey focuses on slicing techniques in the fields of numerous programing paradigms like web applications, object oriented, and components based. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    Steganography For Embedding Data In Digital Image by Sowan, Salah Ibrahem

    Published 2003
    “…In the design part, we present new data hiding algorithms for binary images, grayscale and color images, covering such applications as annotation, fingerprinting, and ownership protection.…”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18