Search Results - (( java application customization algorithm ) OR ( data identification path algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    False path identification algorithm framework for nonseparable controller-data path circuits by Shaheen, Ateeq U. R., Hussin, Fawnizu Azmadi, Hamid, Nor Hisham

    Published 2016
    “…This paper proposes an algorithm frame-work to deal with these false paths through identification for DFT test. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    False path identification algorithm framework for nonseparable controller-data path circuits by Shaheen, A.-U.-R., Hussin, F.A., Hamid, N.H.

    Published 2017
    “…This paper proposes an algorithm framework to deal with these false paths through identification for DFT test. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7

    Localization using fingerprint method in emergency situation for indoor navigation system / Felix Ceilomond Samam by Samam, Felix Ceilomond

    Published 2015
    “…Route planning using Dijkstra's algorithm can produce better accuracy and more reliable in indoor environment since the only factor taken into account is the weight for each path.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Embedded Dual Band Rfid Based Blood Glucose Monitoring System For Internet Of Medical Things by Hamid, Shabinar Abdul

    Published 2020
    “…Manually recorded health information could lead to errors such as inaccurate patient identification and mismatch patient data that could seriously affect patient safety. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Adaptive model predictive control based on wavelet network and online sequential extreme learning machine for nonlinear systems by Salih, Dhiadeen Mohammed

    Published 2015
    “…The ability of wavelets for localization in both time and frequency domain will help OSELM to train the WN in both uniform and non-uniform data sets. Moreover, the ability of initialization the hidden nodes parameters using density function and recursive algorithm will help WN-OSELM to perform useful generalization facility and modeling accuracy. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Digital forensic investigation reduction model (DIFReM) for Windows 10 OS by Shayau, Yazid Haruna

    Published 2018
    “…The most important part of Digital Forensic Investigation (DFI) is the examination of data – knowing the data type and nature beforehand makes this easier. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Intruder localization wireless sensor network radar design with virtual reference tags by Abdullah, Hadi

    Published 2014
    “…This research designs a WSN (Wireless Sensor Network) algorithm for human intruder localization and path detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis