Search Results - (( risk quantification system algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 5 results of 5
Refine Results
  1. 1

    Access control model based on trust, purpose, and role in materialized view for privacy protection by Salji, Mohd Rafiz

    Published 2019
    “…This may lead to the risk of privacy disclosure to unauthorized and untrusted users. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Evaluating Power Reliability Dedicated for Sudden Disruptions: Its Application to Determine Capacity on the Basis of Energy Security by Kosai, Shoki, Tan, Chia Kwang, Yamasue, Eiji

    Published 2018
    “…In addition, existing reliability indexes are developed based on past experience, hardly covering the prediction of disruption risks. As such, a new electricity reliability quantification approach dedicated for sudden disruptions was established and the newly proposed electricity reliability prediction index was evaluated. …”
    Get full text
    Get full text
    Article
  3. 3

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Non-invasive diagnosis of risk in dengue patients using bioelectrical impedance analysis and artificial neural network by Ibrahim, F., Faisal, T., Mohamad Salim, M.I., Taib, M.N.

    Published 2010
    “…As a result, the system is able to classify and diagnose the risk in the dengue patients with an overall prediction accuracy of 96.27. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item