Search Results - ((coding techniques) OR (computing techniques))

Search alternatives:

Refine Results
  1. 1

    Algebraic coding techniques for error detection in data transmission / Nasaruddin Zenon by Zenon, Nasaruddin

    Published 1989
    “…The purpose of this paper is to describe currently available algebraic coding techniques for error detection in computer communication and the problems associated with them. …”
    Get full text
    Get full text
    Article
  2. 2

    Ontology-Based Source Code Retrieval Model To Support Program Comprehension by Kadar, Rozita

    Published 2019
    “…Therefore, this study focuses on the use of source code for text retrieval technique in identifying relevant location to be maintained. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Enhancement of channel coding technique for mobile system in 5G network / N. M. Salih ... [et al.] by Salih, N. M., Saleh, M. Z, Radzi, H. M., Johor, H., Sulong, S. M., M. Said, M. S.

    Published 2020
    “…Furthermore, the system is applying mathematical formulation for the error correction coding technique at the receiver, to enhance the computational complexity and finally measure the performance of the complete system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Code clone detection using string based tree matching technique by Wahid, Norfaradilla

    Published 2008
    “…There are many code clone detection techniques that can be found nowadays which generally can be group into string based, token based, tree based and semantic based. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A secure authentication scheme using locimetric and press touch code techniques by Noor Elya Afiqah, Che Nordin

    Published 2019
    “…For this research, we combine the Locimetric and Press Touch Code techniques to make the newly proposed authentication scheme is more secure. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    Design and cost performance of decoding technique for hybrid subcarrier spectral amplitude coding-optical code division multiple access system. by Sahbudin, Ratna Kalos Zakiah, Abdullah, M.K., Mokhtar, Makhfudzah, Hitam, Salasiah, Ahmad Anas, Siti Barirah

    Published 2011
    “…Problem statement: A hybrid technique combining subcarrier multiplexed and Spectral Amplitude Coding-Optical Code Division Multiple Access (SAC-OCDMA) deploying the Khazani-Syed code was proposed. …”
    Get full text
    Get full text
    Article
  7. 7

    Data Compression For Multimedia Computing by Mohd Tarmizi, Musa

    Published 1995
    “…The review of related literature reveals that there are two basic compression techniques available - lossless and lossy. Under the lossless technique, the Huffman Coding, Arithmetic Coding and Lempel-Ziv Welch Coding are discussed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    A survey on ontology-based visualization techniques towards program comprehension application / Rozita Kadar, Jamal Othman and Naemah Abdul Wahab by Kadar, Rozita, Othman, Jamal, Abdul Wahab, Naemah

    Published 2018
    “…From the literature review, we found that there are lacks of study that consider the use of knowledge representation to represent source code. Hence, the aim of this work is to review the existing techniques for source code representation based on knowledge representation that could help developers to reduce the amount of their effort needed to understand a source code.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Source code optimizer using local optimization approach for java based generic code clone detection by Ikhwan Muhammad, Hillmee

    Published 2019
    “…Second step is to review code optimization techniques. Third step is to apply code optimization technique as part of the process in GCCD model. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    Solving Boundary Value Problems for Ordinary Differential Equations Using Direct Integration and Shooting Techniques by V., Malathi

    Published 1999
    “…Multiple shooting technique for higher order ODEs with automatic partitioning is designed and successfully implemented in the code BVPDI, to solve the underlying IVP. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…Obfuscation techniques allow the programmer to customize which part of the code to be obfuscated. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Review on program slicing techniques towards program comprehension application / Rozita Kadar, Naemah Abdul Wahab and Jamal Othman by Kadar, Rozita, Abdul Wahab, Naemah, Othman, Jamal

    Published 2017
    “…One of the main challenges faced by programmers is to keep up with thousand or million lines of source code that needs to be read and understood. The source code is an essential resource for programmers to become familiar with the software system. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Metric-based code smell detection technique for python software by Leeman, Samaila Ja'afaru

    Published 2018
    “…The first phase involves reviewing the literatures on code smells detection techniques, parser models, and code smells in Python software. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Morphing engines classification by code histogram by Babak Bashari Rad, Maslin Masrom, Suhaimi Ibrahim, Zalina Mohd Daud

    Published 2011
    “…Although the obfuscation techniques try to convert the binary sequence of the code, in some techniques, the statistical feature of the code binaries will be still remain unchanged, relatively. …”
    Get full text
    Get full text
    Conference or Workshop Item