Search Results - (( risk quantification system algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- quantification system »
- system algorithm »
- java application »
-
1
Access control model based on trust, purpose, and role in materialized view for privacy protection
Published 2019“…This may lead to the risk of privacy disclosure to unauthorized and untrusted users. …”
Get full text
Get full text
Thesis -
2
Evaluating Power Reliability Dedicated for Sudden Disruptions: Its Application to Determine Capacity on the Basis of Energy Security
Published 2018“…In addition, existing reliability indexes are developed based on past experience, hardly covering the prediction of disruption risks. As such, a new electricity reliability quantification approach dedicated for sudden disruptions was established and the newly proposed electricity reliability prediction index was evaluated. …”
Get full text
Get full text
Article -
3
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
4
Non-invasive diagnosis of risk in dengue patients using bioelectrical impedance analysis and artificial neural network
Published 2010“…As a result, the system is able to classify and diagnose the risk in the dengue patients with an overall prediction accuracy of 96.27. …”
Get full text
Get full text
Get full text
Article -
5
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
