Search Results - (( legal protection system algorithm ) OR ( spider optimisation based algorithm ))

Search alternatives:

  • Showing 1 - 9 results of 9
Refine Results
  1. 1
  2. 2
  3. 3

    The development of parameter estimation method for Chinese hamster ovary model using black widow optimization algorithm by Nurul Aimi Munirah, ., Muhammad Akmal, Remli, Noorlin, Mohd Ali, Hui, Wen Nies, Mohd Saberi, Mohamad, Khairul Nizar Syazwan, Wan Salihin Wong

    Published 2020
    “…Therefore, this paper proposed a Black Widow Optimisation (BWO) algorithm inspired by the bizarre mating behaviour of a spider as the method to use to solve the problem. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Machine learning in predicting anti-money laundering compliance with protection motivation theory among professional accountants by Masrom, S., Tarmizi, M.A., Halid, S., Rahman, R.A., Abd Rahman, A.S., Ibrahim, R.

    Published 2023
    “…Alongside demographic factors, the study evaluates the effectiveness of each algorithm in anti-money laundering compliance by utilizing five attributes derived from the Protection Motivation Theory (PMT). …”
    Get full text
    Get full text
    Article
  5. 5

    Distortion-Free Digital Watermarking for Medical Images (Fundus) using Complex- Valued Neural Network by Khalifa, Othman Omran, Hassan Abdalla Hashim, Aisha, Olanrewaju, Rashidah Funke

    Published 2015
    “…Though several high-ranking watermarking schemes using neural networks have been proposed in order to make watermark stronger in protection of medical images to resist attacks. However, the current system only deals with real value data. …”
    Get full text
    Get full text
    Monograph
  6. 6

    Securing electronic medical records transmissions over unsecured communications: An overview for better medical governance by Alanazi, H.O., Jalab, H.A., Alam, G.M., Zaidan, B.B., Zaidan, A.A.

    Published 2010
    “…In addition, cryptography algorithms and security requirements have been discussed and the paper has also discussed different architecture, designs and systems that have been reported in the literature. …”
    Get full text
    Article
  7. 7

    NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases by Imam, A.A., Basri, S., Gonzalez-Aparicio, M.T., Balogun, A.O., Kumar, G.

    Published 2022
    “…Cyber-Attack has today become a habitual practice of remotely destroying computer systems across the globe. The behavior of these systems is solely controlled by data which is nowadays stored in NoSQL databases. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases by Imam, A.A., Basri, S., Gonzalez-Aparicio, M.T., Balogun, A.O., Kumar, G.

    Published 2022
    “…Cyber-Attack has today become a habitual practice of remotely destroying computer systems across the globe. The behavior of these systems is solely controlled by data which is nowadays stored in NoSQL databases. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Access control model based on trust, purpose, and role in materialized view for privacy protection by Salji, Mohd Rafiz

    Published 2019
    “…A prototype system is developed and tested, and the result shows that sensitive attributes are protected. …”
    Get full text
    Get full text
    Thesis