Search Results - (( java application customization algorithm ) OR ( attack perception modelling algorithm ))
Search alternatives:
- customization algorithm »
- perception modelling »
- modelling algorithm »
- attack perception »
- java application »
-
1
Modeling heterogeneous behaviors with different strategies in a terrorist attack
Published 2022“…We constructed an emotional model that integrated personality and visual perception for pedestrians. …”
Get full text
Get full text
Get full text
Article -
2
-
3
Watermarking technique based on ISB (Intermediate Significant Bit)
Published 2010“…The disadvantage of LSB is that it is not robust against attacks. The aim of this study is to develop a robust watermarking model using spatial domain technique and at the same time maintaining important watermarking requirements of picture quality. …”
Get full text
Get full text
Proceeding Paper -
4
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
5
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
