Search Results - (( data implication ((drops algorithm) OR (path algorithm)) ) OR ( java implications _ algorithm ))

  • Showing 1 - 5 results of 5
Refine Results
  1. 1

    Cyber hygiene during Covid-19 to avoid cyber attacks by Lee, Yvonne Yi Jin

    Published 2022
    “…Cyber security expenses have increased over the past decade while massive infringements of data and data leaks have also risen. In addition, we need to practice the best cyber hygiene behaviors in order to avoid cyber-attacks like phishing, data loss, and others. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2
  3. 3
  4. 4
  5. 5

    Fractal coding of bio-metric image for face authentication by Ahadullah, Md

    Published 2021
    “…The thesis also compares the results of enough images of various sizes generated by the proposed algorithms with the results of other fractal coding methods to confirm the algorithms’ clarity, reliability and validity. …”
    Get full text
    Get full text
    Thesis