Dual function mouse
A computer mouse is an input device that is most often used with a personal computer. Moving a mouse along a flat surface can move the on-screen cursor to different items on the screen. Today, many computer mice use wired and wireless technology and have no wire. This Dual Function Mouse developed...
| Main Author: | Ahmad Muhddin Hidir, Othman |
|---|---|
| Format: | Undergraduates Project Papers |
| Language: | English |
| Published: |
2015
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/13446/ http://umpir.ump.edu.my/id/eprint/13446/1/Dual%20function%20mouse%20.pdf |
Similar Items
Hybrid Scheduling and Dual Queue Scheduling
by: Shah, S.N.M., et al.
Published: (2009)
by: Shah, S.N.M., et al.
Published: (2009)
Dual Watermarking Framework for Industrial Digital Images
by: Mohd Fairuz, Ramli, et al.
Published: (2007)
by: Mohd Fairuz, Ramli, et al.
Published: (2007)
Hybrid scheduling and dual queue scheduling
by: A., Oxley, et al.
Published: (2009)
by: A., Oxley, et al.
Published: (2009)
Discrete Wavelet Transform (DWT) Based Dual Watermarking For Authentication And Copyright Protection
by: Lim, Chen Gen
Published: (2023)
by: Lim, Chen Gen
Published: (2023)
Dual Image Watermarking Based On Human Visual Characteristics For Authentication And Copyright Protection
by: Wong, Shu Jie
Published: (2023)
by: Wong, Shu Jie
Published: (2023)
Functions
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Dual Access Control for Cloud Storage and Sharing
by: Sandeep, T.S., et al.
Published: (2024)
by: Sandeep, T.S., et al.
Published: (2024)
Dual image watermarking based on NSST-LWT-DCT for color image
by: Avivah, Siti Nur, et al.
Published: (2024)
by: Avivah, Siti Nur, et al.
Published: (2024)
Correlating website functionality with popularity
by: Lee, Guan Chuan
Published: (2015)
by: Lee, Guan Chuan
Published: (2015)
Image Steganography Using Hash Function And Compression
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
A dual-focused approach to e-commerce product ranking: Leveraging search engine optimization and search engine marketing
by: Ibrahim, Hassan, et al.
Published: (2024)
by: Ibrahim, Hassan, et al.
Published: (2024)
Image tool function
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Biological-based semi-supervised clustering algorithm to improve gene function prediction
by: Kasim, Shahreen, et al.
Published: (2011)
by: Kasim, Shahreen, et al.
Published: (2011)
Broad view of cryptographic hash functions
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
The Arens algebras of vector-valued functions
by: Ganiev, Inomjon, et al.
Published: (2013)
by: Ganiev, Inomjon, et al.
Published: (2013)
Low-power dual-port asynchronous CMOS SRAM design techniques
by: Tan, Soon-Hwei, et al.
Published: (2007)
by: Tan, Soon-Hwei, et al.
Published: (2007)
Low-power dual-port asynchronous CMOS SRAM design techniques
by: Tan, Soon-Hwei, et al.
Published: (2007)
by: Tan, Soon-Hwei, et al.
Published: (2007)
A new fitness function for tuning parameters of Peripheral Integral Derivative Controllers
by: Odili, Julius Beneoluchi, et al.
Published: (2021)
by: Odili, Julius Beneoluchi, et al.
Published: (2021)
Dual-stage Er/Yb doped fiber amplifier for gain and noise figure enhancements
by: Harun, Sulaiman Wadi, et al.
Published: (2006)
by: Harun, Sulaiman Wadi, et al.
Published: (2006)
Cryptographic hash function: a high level view
by: Taha, Imad, et al.
Published: (2015)
by: Taha, Imad, et al.
Published: (2015)
A new design of cryptographic hash function: gear
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
A new design of cryptographic hash function: gear
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
EEG analysis for understanding stress based on affective model basis function
by: Rahnuma , Kazi Shahzabeen, et al.
Published: (2011)
by: Rahnuma , Kazi Shahzabeen, et al.
Published: (2011)
Design and analysis of a new hash function gear
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
MOIM: a novel design of cryptographic hash function
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Hash function of finalist SHA-3: analysis study
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
Cryptographic hash function: A high level view
by: Alkandari, Abdulaziz Ali, et al.
Published: (2013)
by: Alkandari, Abdulaziz Ali, et al.
Published: (2013)
An overview on effectiveness of activation functions in processing medical images
by: Al-Shoukry, Suhad, et al.
Published: (2024)
by: Al-Shoukry, Suhad, et al.
Published: (2024)
PalmHashing: A novel approach for dual-factor authentication
by: Tee, Connie, et al.
Published: (2004)
by: Tee, Connie, et al.
Published: (2004)
The Application of Mamdani Fuzzy Model for Auto Zoom Function of a Digital Camera
by: Vasant, Pandian
Published: (2009)
by: Vasant, Pandian
Published: (2009)
Protection of the digital holy Quran using SAB hash function
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
Study of cost functions in three term backpropagation for classification problems
by: Kuppusamy, Puspadevi
Published: (2008)
by: Kuppusamy, Puspadevi
Published: (2008)
The development of machine learning based software for predicting protein-protein interactions and protein function from protein primary structure
by: Othman, Muhamad Razib, et al.
Published: (2007)
by: Othman, Muhamad Razib, et al.
Published: (2007)
Feature Selection and Radial Basis Function Network for Parkinson Disease Classification
by: Ibrahim, Ashraf Osman, et al.
Published: (2017)
by: Ibrahim, Ashraf Osman, et al.
Published: (2017)
Finding kernel function for stock market prediction with support vector regression
by: Chai, Chon Lung
Published: (2006)
by: Chai, Chon Lung
Published: (2006)
The impact of VMAX activation function in particle swarm optimization neural network
by: Lee, Yiew Siang
Published: (2008)
by: Lee, Yiew Siang
Published: (2008)
Filtering approaches and mish activation function applied on handwritten chinese character recognition
by: Yingna, Zhong, et al.
Published: (2024)
by: Yingna, Zhong, et al.
Published: (2024)
Performance of different operation techniques applied in genetic algorithm towards benchmark functions
by: Ong, Chin Hwa
Published: (2018)
by: Ong, Chin Hwa
Published: (2018)
Performance Optimization of Java Virtual Machine on Dual-Core Technology for Web Services - A Study
by: Mun, Chong Kam, et al.
Published: (2007)
by: Mun, Chong Kam, et al.
Published: (2007)
Fast-lock dual charge pump analog DLL using improved phase frequency detector
by: Lip-Kai, Soh, et al.
Published: (2007)
by: Lip-Kai, Soh, et al.
Published: (2007)
Similar Items
-
Hybrid Scheduling and Dual Queue Scheduling
by: Shah, S.N.M., et al.
Published: (2009) -
Dual Watermarking Framework for Industrial Digital Images
by: Mohd Fairuz, Ramli, et al.
Published: (2007) -
Hybrid scheduling and dual queue scheduling
by: A., Oxley, et al.
Published: (2009) -
Discrete Wavelet Transform (DWT) Based Dual Watermarking For Authentication And Copyright Protection
by: Lim, Chen Gen
Published: (2023) -
Dual Image Watermarking Based On Human Visual Characteristics For Authentication And Copyright Protection
by: Wong, Shu Jie
Published: (2023)