Search Results - (( developing users prevention algorithm ) OR ( java application using algorithm ))
Search alternatives:
- prevention algorithm »
- developing users »
- users prevention »
- java application »
- using algorithm »
-
1
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…The main objectives for this project are focusing on the development of user interface that can connect with the machine learning build in Microsoft Azure for pump diagnostic purpose. …”
Get full text
Get full text
Monograph -
2
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Therefore, it is essential to develop a new technique to authenticate access to database related to web applications and prevent SQL injection vulnerabilities. …”
Get full text
Get full text
Get full text
Article -
3
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Besides, the proposed MRA is effective in preventing FOA attack. A majority of the survey participants also stated that the proposed cued recall methods can aid users in memorising their password.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
6
-
7
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
8
Phishing attack detection using machine learning method
Published 2019“…The Naïve Bayes algorithm, Decision Tree algorithm and Support Vector Machine algorithm has been used to prevent the spam attack, as well as the phishing attack. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
9
Review of the machine learning methods in the classification of phishing attack
Published 2019“…There are several algorithms that can be used in the machine learning method to prevent these attacks. …”
Get full text
Get full text
Get full text
Article -
10
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
12
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
14
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
15
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking
Published 2020“…Most of the existing location cloaking algorithms are only concerned with snapshot user locations and cannot effectively prevent users from location-dependent attacks when user location-contexts are continuously updated. …”
Get full text
Get full text
Get full text
Article -
17
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…Most of the existing location cloaking algorithms are only concerned with snapshot user locations and cannot effectively prevent users from location-dependent attacks when user location-contexts are continuously updated. …”
Get full text
Get full text
Article -
18
CleverSecure ONLINE System
Published 2008“…CleverSecure Online System (COS) implements on the use of popular algorithm which is Blowfish algorithm to encrypt and decrypt the data that can be save in directory or send through email. …”
Get full text
Get full text
Final Year Project -
19
-
20
Route Optimization System
Published 2005“…The method used to develop this project is Rapid Application Development (RAD). …”
Get full text
Get full text
Final Year Project
