Search Results - (( java application optimisation algorithm ) OR ( attack perception modelling algorithm ))

  • Showing 1 - 5 results of 5
Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Modeling heterogeneous behaviors with different strategies in a terrorist attack by Le Bi, Tingting Liu, Zhen Liu, Jason Teo, Yumeng Zhao, Yanjie Chai

    Published 2022
    “…We constructed an emotional model that integrated personality and visual perception for pedestrians. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Watermarking technique based on ISB (Intermediate Significant Bit) by Zeki, Akram M., Abdul Manaf, Azizah, Olanweraju, Rashidah Funke

    Published 2010
    “…The disadvantage of LSB is that it is not robust against attacks. The aim of this study is to develop a robust watermarking model using spatial domain technique and at the same time maintaining important watermarking requirements of picture quality. …”
    Get full text
    Get full text
    Proceeding Paper