Search Results - (( security classifications matching algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- security classifications »
- classifications matching »
- application optimisation »
- optimisation algorithm »
- java application »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Android Mobile Malware Classification Based on System Call and Permission Using Tokenization
Published 2024thesis::master thesis -
3
A new mobile malware classification for call log exploitation
Published 2024journal::journal article -
4
Android: S-Based Technique in Mobile Malware Detection
Published 2018“…In order to overcome malware, concern in mobile, we propose a new framework for malware detection which is signature based technique using pattern matching. This framework uses signature number and Secure Hash Algorithm (SHA) as signature in the detection process. …”
Get full text
Get full text
Get full text
Article -
5
-
6
ios Mobile Malware Deep Analysis And Classification For Social Media And Online Banking Exploitation
Published 2024thesis::master thesis -
7
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
8
Development of biosignals-based multimodal biometric system
Published 2014“…The success of any biometric system is dependent on the pre-processing, features and classification algorithms exploits. There is a need for increase in reliability and security motivated by the fact that there is no unique technology that can be applied for all possible scenarios. …”
Get full text
Get full text
Get full text
Thesis -
9
Biometric identification and recognition for iris using failure rejection rate (FRR) / Musab A. M. Ali
Published 2016“…The subsequent step is using the DAUB3 wavelet transform for feature extraction along with the application of an additional step for biometric template security that is the Non-invertible transform (cancelable biometrics method) and finally utilizing the Support Vector Machine (Non-linear Quadratic kernel) for matching/classification. …”
Get full text
Get full text
Thesis -
10
-
11
Collective interaction filtering with graph-based descriptors for crowd behaviour analysis
Published 2018“…Crowd behaviour analysis plays an important role in high security interests in public areas such as railway stations, shopping centres, and airports, where large populations gather. …”
Get full text
Get full text
Thesis
