Search Results - affecting computing techniques

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    The role of external auditor in the adoptionof computer-assisted audit techniques with unified theory of acceptance and use of technology: An empirical study in public audit firms... by Deniswara, Kevin, Henky, Thomas, Mulyawan, Archie Nathanael, Armand, Wishnu Kameshwara, Mustapha, Mazlina

    Published 2023
    “…This research aimed to analyze the factors that influence the acceptance of Computer Assisted Audit Techniques (CAATs) among external auditors in Public Audit Firms in Jakarta. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Security analysis techniques using differential relationships for block ciphers by Buja, Alya Geogiana

    Published 2018
    “…The uses of block cipher has become crucial in nowadays’ computing era as well as the information security. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Scale-invariant and adaptive-search template matching for monocular visual odometry in low-textured environment by Aqel, Mohammad O. A.

    Published 2016
    “…Size of template and search area were determined and calculated to reach a trade-off between the performance and computational cost of template matching. This developed technique sped up the correlation process with more than 87% reduction in computational cost compared to the traditional full-search correlation. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Affective assessment in learning using fuzzy logic / Lusiana Syaiful by Syaiful, Lusiana

    Published 2016
    “…Currently, there is no specific mechanism to access the affective value during the computer based learning environment. …”
    Get full text
    Get full text
    Thesis
  9. 9

    CMAC-based computational model of affects (CCMA) for profiling emotion from EEG signals by Yaacob, Hamwira Sakti, Abdul Rahman, Abdul Wahab, Alshaikhli, Imad Fakhri Taha, Kamaruddin, Norhaslinda

    Published 2014
    “…Several studies have been performed to profile emotions using EEG signals through affective computing approach. It includes data acquisition, signal pre-processing, feature extraction and classification. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    CRITICAL FACTORS THAT AFFECTING ADOPTION OF E-LEARNING BASED ON CLOUD COMPUTING FOR IRAQI HIGHER EDUCATION ORGANIZATIONS by Abdulsaeed, Ali A., Mohd Aboobaider, Burhanuddin, Abd Ghani, Mohd Khanapi, Jaber, Mustafa Musa

    Published 2022
    “…Cloud computing-based e-learning is one of the most popular techniques discovered to promote traditional instruction by software applications and a virtual learning environment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Real-time denial of service attack detection and mitigation on controller in software defined network environment / Bilal Ishfaq by Bilal , Ishfaq

    Published 2016
    “…If the controller is malfunctioned by the attacker than the whole operation of the SDN will be affected. The DoS attack is one of the attacks which affect the controller in the control plane in terms of network and computational resources. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Botnet Detection Using a Feed-Forward Backpropagation Artificial Neural Network by Ahmed, Abdulghani Ali

    Published 2019
    “…Botnet represent a critical threat to computer networks because their behavior allows hackers to take control of many computers simultaneously. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15
  16. 16

    AGR256: Agricultural Research Methods / Faculty of Plantation and Agrotechnology by UiTM, Faculty of Plantation and Agrotechnology

    Published 2017
    “…This course will introduce students to the research techniques in the conduct of field experimentation and factors affecting the outcomes of experimental results. …”
    Get full text
    Get full text
    Get full text
    Teaching Resource
  17. 17
  18. 18
  19. 19
  20. 20