Search Results - (( changes notification based algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- notification based »
- java application »
-
1
-
2
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
3
-
4
Network intrusion detection and alert system
Published 2024“…The intrusion detection component will utilize a combination of signature-based and anomaly-based detection techniques. Signature-based detection compares network traffic packets with a real-time updated database of known attack patterns, while anomaly-based detection algorithms learn normal behavior patterns and identify deviations. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
IoT-Based intelligent system for headwater phenomenon detection and alerts using ESP32 / Rozan Boudville … [et al]
Published 2025“…Data are transmitted to Firebase for cloud storage and further processed using Google Sheets for visualisation and analysis. A decision-making algorithm correlates rainfall intensity with water level changes to classify potential hazards and trigger appropriate alerts. …”
Get full text
Get full text
Get full text
Article -
6
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Internet of Things-based Home Automation with Network Mapper and MQTT Protocol
Published 2025“…The synthetic simulations show positive outcomes for the data fusion-based monitoring system, where alerts are promptly triggered as sensor values change, with an overall system latency of approximately 24 ms. …”
Article -
8
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…In Chapter 2, we propose a new algorithm based on incremental Radial Basis Function Network (RBFN) to accelerate the learning in stream data. …”
Get full text
Get full text
Thesis
