Search Results - (( legal protection system algorithm ) OR ( spider optimisation based algorithm ))
Search alternatives:
- optimisation based »
- protection system »
- legal protection »
- system algorithm »
-
1
-
2
-
3
The development of parameter estimation method for Chinese hamster ovary model using black widow optimization algorithm
Published 2020“…Therefore, this paper proposed a Black Widow Optimisation (BWO) algorithm inspired by the bizarre mating behaviour of a spider as the method to use to solve the problem. …”
Get full text
Get full text
Get full text
Article -
4
Machine learning in predicting anti-money laundering compliance with protection motivation theory among professional accountants
Published 2023“…Alongside demographic factors, the study evaluates the effectiveness of each algorithm in anti-money laundering compliance by utilizing five attributes derived from the Protection Motivation Theory (PMT). …”
Get full text
Get full text
Article -
5
Distortion-Free Digital Watermarking for Medical Images (Fundus) using Complex- Valued Neural Network
Published 2015“…Though several high-ranking watermarking schemes using neural networks have been proposed in order to make watermark stronger in protection of medical images to resist attacks. However, the current system only deals with real value data. …”
Get full text
Get full text
Monograph -
6
Securing electronic medical records transmissions over unsecured communications: An overview for better medical governance
Published 2010“…In addition, cryptography algorithms and security requirements have been discussed and the paper has also discussed different architecture, designs and systems that have been reported in the literature. …”
Get full text
Article -
7
NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases
Published 2022“…Cyber-Attack has today become a habitual practice of remotely destroying computer systems across the globe. The behavior of these systems is solely controlled by data which is nowadays stored in NoSQL databases. …”
Get full text
Get full text
Conference or Workshop Item -
8
NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases
Published 2022“…Cyber-Attack has today become a habitual practice of remotely destroying computer systems across the globe. The behavior of these systems is solely controlled by data which is nowadays stored in NoSQL databases. …”
Get full text
Get full text
Conference or Workshop Item -
9
Access control model based on trust, purpose, and role in materialized view for privacy protection
Published 2019“…A prototype system is developed and tested, and the result shows that sensitive attributes are protected. …”
Get full text
Get full text
Thesis
