An Action Arcade Web-Based Game – Slime Attack Plus (Stack-O-Slime)
| Main Author: | Chan, Hoong Wai |
|---|---|
| Format: | Final Year Project / Dissertation / Thesis |
| Published: |
2017
|
| Subjects: | |
| Online Access: | http://eprints.utar.edu.my/2658/ http://eprints.utar.edu.my/2658/1/CS%2D2017%2D1203703%2D1.pdf |
Similar Items
An Action Arcade Web Based Game-Slime Attack Plus (Slime Invader)
by: Ong, Hui Huang
Published: (2017)
by: Ong, Hui Huang
Published: (2017)
An Action Arcade Web Based Game –Slime Attack Plus (Backend Integration)
by: Cheah, Kean Huang
Published: (2017)
by: Cheah, Kean Huang
Published: (2017)
Hagfish predatory behaviour and slime defence mechanism
by: Zintzen, V., et al.
Published: (2011)
by: Zintzen, V., et al.
Published: (2011)
Levy slime mould algorithm for solving numerical and engineering optimization problems
by: J. J., Jui, et al.
Published: (2022)
by: J. J., Jui, et al.
Published: (2022)
Fabrication and characterization of
polyvinyl acetate slime phantom for
magnetic resonance spectroscopy
by: Baharudin, Siti Sarah
Published: (2020)
by: Baharudin, Siti Sarah
Published: (2020)
Parameter identification of thermoelectric modules using enhanced slime mould algorithm (ESMA)
by: Ponnalagu, Dharswini, et al.
Published: (2024)
by: Ponnalagu, Dharswini, et al.
Published: (2024)
Identifying and estimating solar cell parameters using an enhanced slime mould algorithm
by: Logeswaary, Devarajah, et al.
Published: (2024)
by: Logeswaary, Devarajah, et al.
Published: (2024)
A study of human computer interaction in arcade game design
by: Chin, Kah Yean
Published: (2014)
by: Chin, Kah Yean
Published: (2014)
Fabrication and characterization of polyvintl acetate slime phantom for T1-weighted, T2-weighted, and diffusion tensor magnetic resonance imaging
by: Chaw, Nurbranda
Published: (2020)
by: Chaw, Nurbranda
Published: (2020)
Real-time human action recognition using stacked sparse autoencoders
by: Farooq, Adnan, et al.
Published: (2018)
by: Farooq, Adnan, et al.
Published: (2018)
Azimuthal solar synchronization and aerodynamic neuro-optimization: an empirical study on slime-mold-inspired neural networks for solar UAV range optimization
by: Graheeth, Hazare, et al.
Published: (2024)
by: Graheeth, Hazare, et al.
Published: (2024)
Analysis of web worm attack on web application
by: Mohd. Ghazzali, Amalina
Published: (2008)
by: Mohd. Ghazzali, Amalina
Published: (2008)
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
by: Sallam, Amer A., et al.
Published: (2020)
by: Sallam, Amer A., et al.
Published: (2020)
Action-Based Help Technique To Improve Learnability And Understandability Of Web Applications
by: Shamsuddin, Nurul Afiqah
Published: (2014)
by: Shamsuddin, Nurul Afiqah
Published: (2014)
Modeling malicious multi-attacker node collusion
in MANETs via game theory
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
Evolution strategies for evolving artificial neural networks in an arcade game
by: Tse, Guan Tan, et al.
Published: (2010)
by: Tse, Guan Tan, et al.
Published: (2010)
An intelligence based model for the prevention of advanced cyber-attacks
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
A detailed survey on various aspects of SQL injection in web applications: vulnerabilities, innovative attacks and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Mining stack overflow to recommend Java API classes using word embedding and topic modelling / Lee Wai Keat
by: Lee , Wai Keat
Published: (2019)
by: Lee , Wai Keat
Published: (2019)
Tracing Technique for Blaster Attack
by: Selamat, S. R., et al.
Published: (2009)
by: Selamat, S. R., et al.
Published: (2009)
Joux multicollisions attack in sponge construction
by: AlAhmad, Mohammad A., et al.
Published: (2013)
by: AlAhmad, Mohammad A., et al.
Published: (2013)
Attacks on SVD-Based watermarking schemes
by: Huo-Chong, Ling, et al.
Published: (2008)
by: Huo-Chong, Ling, et al.
Published: (2008)
On the prevention of Cross-VM cache-based side channel attacks / Zakira Inayat
by: Zakira, Inayat
Published: (2017)
by: Zakira, Inayat
Published: (2017)
Simulation System To Educate People On Phivisp Attack
by: Salman, Khairul Anuar
Published: (2023)
by: Salman, Khairul Anuar
Published: (2023)
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017)
by: Jaber, Aws Naser, et al.
Published: (2017)
Intelligent image search engine with AI-Based similarity detection for web application
by: Chong, Wai Soon
Published: (2024)
by: Chong, Wai Soon
Published: (2024)
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)
by: Jaber, Aws Naser, et al.
Published: (2018)
Presence of rare arterial arcade at 1st web space in the right hand and its possible clinical complications.
by: Anitha G,, et al.
Published: (2013)
by: Anitha G,, et al.
Published: (2013)
FURIA stacking ensemble for ASD classification
by: Ainie Hayati, Noruzman, et al.
Published: (2022)
by: Ainie Hayati, Noruzman, et al.
Published: (2022)
Kamus Bahasa Arab Plus! untuk kanak-kanak / Siti Khadijah Rosdan
by: Siti Khadijah, Rosdan
Published: (2002)
by: Siti Khadijah, Rosdan
Published: (2002)
Expert System of Heart Attack Prediction
by: Kayalvily, Tabianan, et al.
Published: (2019)
by: Kayalvily, Tabianan, et al.
Published: (2019)
Web-based AHP system
by: Ayu, Media Anugerah, et al.
Published: (2011)
by: Ayu, Media Anugerah, et al.
Published: (2011)
Image manipulations analysis and detection methods for reflection-based attacks / Nor Bakiah Abd. Warif
by: Nor Bakiah, Abd. Warif
Published: (2018)
by: Nor Bakiah, Abd. Warif
Published: (2018)
Detection of distributed denial-of-service (DDoS) attack with hyperparameter tuning based on machine learning approach
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
Detection Of Distributed Denial-Of-Service (Ddos) Attack With Hyperparameter Tuning Based On Machine Learning Approach
by: Choo, Yong Han
Published: (2023)
by: Choo, Yong Han
Published: (2023)
Web based education game related to farming and arithmetic mathematics
by: Nur Anis, Mohd Khatib
Published: (2018)
by: Nur Anis, Mohd Khatib
Published: (2018)
Application of Artificial Neural Network in Detection of Probing Attacks
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Application of Artificial Neural Network in Detection of Probing Attacks
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Applying Neural Network to U2R Attacks
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
Cyber-attacks detection & protection in Kuwait government
sectors
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Similar Items
-
An Action Arcade Web Based Game-Slime Attack Plus (Slime Invader)
by: Ong, Hui Huang
Published: (2017) -
An Action Arcade Web Based Game –Slime Attack Plus (Backend Integration)
by: Cheah, Kean Huang
Published: (2017) -
Hagfish predatory behaviour and slime defence mechanism
by: Zintzen, V., et al.
Published: (2011) -
Levy slime mould algorithm for solving numerical and engineering optimization problems
by: J. J., Jui, et al.
Published: (2022) -
Fabrication and characterization of
polyvinyl acetate slime phantom for
magnetic resonance spectroscopy
by: Baharudin, Siti Sarah
Published: (2020)