Search Results - (( basic preventive selection algorithm ) OR ( java application stemming algorithm ))

  • Showing 1 - 4 results of 4
Refine Results
  1. 1

    Building a feature-space for visual surveillance by Altahir, A.A., Asirvadam, V.S.

    Published 2014
    “…Visual surveillance applications play essential roles as a tool for archiving and to some extend preventing criminal activities. The future of visual surveillance applications relies on the developments in the area of computer vision, human motion analysis and computer algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
    Get full text
    Get full text
    Article
  3. 3

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
    Get full text
    Get full text
    Article
  4. 4

    Development of Lightning Protection System (LPS) Designing Tool by Idris, Samueil

    Published 2015
    “…Just then, the input and output interface should be constructed and thereby, by selecting and key an option provided, a user could have some basic idea on how the designing of Lightning Protection System work done and hence, show the criteria to design the Lightning Protection Systems.…”
    Get full text
    Get full text
    Final Year Project