Search Results - (( based encryption path algorithm ) OR ( ibs construction based algorithm ))*

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    Identification and analysis of hoisting safety risk factors for IBS construction based on the AcciMap and cases study by Junjia, Yin, Alias, Aidi Hizami, Haron, Nuzul Azam, Abu Bakar, Nabilah

    Published 2024
    “…Hoisting is an essential aspect of Industrial Building System (IBS) construction. Although research on hoisting safety in China has made strides to focus on “worker,” “data,” “task,” “site,” and “accident,” there still needs to be more approaches based on multi-dimensional social system thinking. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Route optimization security in mobile IPv6 wireless networks: a test-bed experience by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Structural assessment of a proposed precast wall connection under combined loading by Vaghei, Ramin

    Published 2016
    “…However, the stability of the building type constructed using IBS is a challenging issue against dynamic loads. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Security enhancement of route optimization in mobile IPv6 networks by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Image orientation watermarking technique for copyright protection by Jasim, Hend Muslim

    Published 2016
    “…In return, a copyright gains its validity based on such robust characteristics. Watermarking attracts much interest in algorithm design to enable a signature to be embedded on secrecy and encryption beds. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7