Search Results - (( programming security selection algorithm ) OR ( java application sensor algorithm ))
Search alternatives:
- programming security »
- selection algorithm »
- security selection »
- application sensor »
- java application »
- sensor algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
2
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
3
-
4
AI recommendation penetration testing tools for password attacks: random forest
Published 2025“…This project developed an AI-based recommendation system using the Random Forest algorithm to address the complexities of selecting appropriate penetration testing tools for password attacks. …”
Get full text
Get full text
Get full text
Article -
5
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
6
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
-
8
Enhanced dynamic security assessment for power system under normal and fake tripping contingencies.
Published 2019“…The hybrid logistic model tree (hybrid LMT) approach proposed in this study combines the symmetrical uncertainties (SU) algorithm and the logistic model tree (LMT) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024Proceedings Paper -
10
Database encryption for a Web-based Claims System
Published 2008“…This system can also be equipped with a security tool to prevent hackers or unauthorised persons, which can be selected from the results of the security analysis. …”
Get full text
Thesis -
11
-
12
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Modified firefly algorithm for directional overcurrent relay coordination in power system protection / Muhamad Hatta Hussain
Published 2020“…They can utilize the results for the setting, type and coordination protective device to ensure reliable design in terms of security, selectivity, stability and speed.…”
Get full text
Get full text
Thesis -
14
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…It consists of 3-stage procedures: feature ranking, feature selection and classification. Subsequently, an experimental evaluation of the proposed Multi-Filter Feature Selection (M2FS) method is performed by using the benchmark dataset, NSL-KDD and employed the J48 classification algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection
Published 2023“…FAM is selected as a meta-learner to effectively train and combine the outputs of the base learners and achieve robust and accurate classification. …”
Get full text
Get full text
Get full text
Article -
16
Solving power system state estimation using orthogonal decomposition algorithm / Tey Siew Kian
Published 2009Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
17
