Search Results - (( data protection path algorithm ) OR ( program visualisation using algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    Effectiveness of algorithm visualisation in studying complex algorithms: a case study using TRAKLA Ravie / Chandren Muniyandi, Ali Maroosi by Muniyandi, Chandren, Maroosi, Ali

    Published 2015
    “…Algorithm visualisation (AV) can be utilised to improve students ’programming and programme comprehension skills. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Secured route optimization in mobile IPv6 wireless networks in terms of data integrity by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm at a cost of a small increase in delay. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Reconstruction algorithm of calibration map for RPT technique in quadrilateral bubble column reactor using MCNPX code by Mohd Yunos, Mohd Amirul Syafiq, Anak Usang, Mark Dennis, Ithnin, Hanafi, Hussain, Siti Aslina, Mohamed Yusoff, Hamdan, Sipaun, Susan

    Published 2018
    “…The iterative reconstruction algorithms is used to generate and calculate the 2600 coordinates of calibration map from the number of photon counts from the ten NaI scintillation detectors. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Image orientation watermarking technique for copyright protection by Jasim, Hend Muslim

    Published 2016
    “…In the Pre-Protection design, it investigates the proofing on image operation corruption to support the principle used in showing the preliminary impact of data corruption made by resizing. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Security enhancement of route optimization in mobile IPv6 networks by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor by Mohamad Nor, Ahmad Azhari

    Published 2024
    “…This application, integrated with a predictive model, offers real-time visualisation of primary cooling system characteristics through handheld devices. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Protection Schemes for Fiber to the Home Access Networks with Intra Network Switch by P'ng, Won Tiang

    Published 2008
    “…If a protection path were to be created, the network provider would have to lay another 2 fibers on the network. …”
    Get full text
    Get full text
    Thesis
  8. 8

    FBGA-based implementation of electronic abacus using altera DE2 board by Sidek, Azmi

    Published 2017
    “…The development of electronic abacus is to integrate the use of abacus along with electronic devices which offers better visualisation of the abacus operations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Long-term rain attenuation probability and site diversity gain prediction formulas by Al-Tabatabaie, Kusay Faisal A.

    Published 2007
    “…The aim of this project is to determine the effect of SD under the rain conditions, combine both categories for the estimation of slant path rain attenuation and SD gain. It includes the designing of algorithm flow which incorporated into MATLAB programming software. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A YOLO-based deep learning model for Real-Time face mask detection via drone surveillance in public spaces by A. Mostafa, Salama, Ravi, Sharran, Zebari, Dilovan Asaad, Zebari, Nechirvan Asaad, Mohammed, Mazin Abed, Nedoma, Jan, Martinek, Radek, Deveci, Muhammet, Ding, Weiping

    Published 2024
    “…The feature enhancement task is performed by applying the Path Aggregation Network (PANet) and Spatial Pyramid Pooling Network (SPPNet) algorithms, which are deployed to enhance the extracted and generated features. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A collision resistant cryptographic hash function based on cellular automata rules by Jamil, Norziana

    Published 2013
    “…A cryptographic hash function is one of the cryptographic primitives designed to protect the integrity of data such as that in digital signatures and online business transactions. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Digital forensic investigation reduction model (DIFReM) for Windows 10 OS by Shayau, Yazid Haruna

    Published 2018
    “…The most important part of Digital Forensic Investigation (DFI) is the examination of data – knowing the data type and nature beforehand makes this easier. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Modified dynamic programming model with limited order picking capacity / Noraimi Azlin Mohd Nordin by Noraimi Azlin , Mohd Nordin

    Published 2021
    “…Next, to determine either Dijsktra’s algorithm or Dynamic Programming Method will give the most accurate shortest path and minimum travel time for order pickers. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities by Draib, Najla'a Ateeq Mohammed

    Published 2022
    “…Static analysis is devoted to identifying candidate pairs of vulnerable paths to second-order SQLI. It statically detects when the data comes from tainted sources, when they are stored in the back-end database, and when they are retrieved later in another point to build a new SQL statement without proper sanitisation. …”
    Get full text
    Get full text
    Thesis