Search Results - consumer protection computer simulation
Search alternatives:
- protection »
-
1
Implementing CD Copyright Protection by Using TCPA Framework
Published 2005“…The end product of this research is the concept ofhow TCPA can be implemented in protecting the copyright of the CDsand also the simulation demo authored in Java. …”
Get full text
Get full text
Final Year Project -
2
Protected bidding against compromised information injection in IoT-based smart grid
Published 2019“…We show that proposed ADR bidding are computationally practical through simulations performed in three simulation environments.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Effect of integrating direct cash aid into fuel subsidy removal in the domestic commodity market in Malaysia using Computable General Equilibrium (CGE) model
Published 2018“…This study was carried out using the Lofgren-based computable general equilibrium (CGE) model, by simulating the before and after imposition of fiscal integration. …”
Get full text
Get full text
Get full text
Article -
4
Effects of Integrating Direct Cash Aid into Fuel Subsidy Removal in The Domestic Commodity Market in Malaysia Using Computable General Equilibrium (CGE) Model
Published 2018“…This study was carried out using the Lofgren-based computable general equilibrium (CGE) model, by simulating the before and after imposition of fiscal integration. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…Most of the techniques are used to address the power system reliability which consumes long computation time. Hence, an inaccurate result for system operators is inevitable as most of the variables affecting the reliability changes with time. …”
Get full text
Get full text
Thesis -
7
Effect of GIC Neutral Blocking Devices (NBDs) on Power Network Ferroresonance in Malaysia
Published 2023Article -
8
Development of crash box for racing application / Muhammad Hafizzul Jukri
Published 2017Get full text
Get full text
Student Project -
9
-
10
TRANSIENT OVERVOLTAGE ON 500 KV TRANSMISSION LINE PLAN IN SARAWAK USING POWER SYSTEM COMPUTER AIDED DESIGN
Published 2018Get full text
Get full text
Final Year Project Report / IMRAD -
11
Smart modeling of flood occurrences in a river basin
Published 1999“…At the same time the collection of such data is costly, difficult and time consuming. During flooding, severe damage will occur to the agricultural lands or farms and the availability of a good hydrologic record will help in taking the required protection to reduce this damage. …”
Get full text
Get full text
Conference or Workshop Item -
12
-
13
An Adaptive Protection of Flooding Attacks Model for Complex Network Environments
Published 2023Article -
14
Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA
Published 2013“…Storage encryption (data at-rest) has now become an important aspect in today’s computing environment. User data stored in computing devices that includes computers, personal digital assistant (PDA), flash drives and external hard drive are getting vulnerable to security attacks. …”
Get full text
Get full text
Thesis -
15
Effect of GIC neutral blocking devices (NBDs) on power network ferroresonance in Malaysia
Published 2022“…The NBD systems were tested under different working conditions. The simulation results found that the metal oxide varistors (MOVs) arresters in NBDs fault protection mode effectively clamped ferroresonance overvoltages below the protection level under faulty conditions. …”
Get full text
Get full text
Article -
16
Evaluation of Security Mechanisms for Information Dissemination in Wireless Sensor Networks
Published 2013“…We have evaluated these TinySec mechanisms in terms of packet transmission time, average number of packet received and energy consumption. The simulation results show that TinySec-AE consumed more energy and required more time to transmit packet in comparing to TinySec-Auth due to higher computational time and longer packet size for extra encryption mechanism.…”
Get full text
Get full text
Get full text
Article -
17
Mitigation of Power Quality Disturbances
Published 2009“…The design, modeling and simulation are done using PSS/ADEPT and PSCAD software.…”
Get full text
Get full text
Citation Index Journal -
18
Environmental impact on the building envelope: An architectural analytical study of heat Exchange in new mosque design in Baghdad/ Akeel Noori Abdul Hameed al Mulahiwaish
Published 2004“…The research covers a survey of the design, construction features, and comfort levels in new mosques, and the definition of the "model musalla", as well as the identification and thermal assessment of the typical "model musalla" taking into consideration, urban planning, available material skill and other religious criteria. Computer simulations of thermal conditions; modification for design, building ele ments and construction are also covered by the research.The finding and conclusion of the impact of simulation changes are stated as well as recommendation given for possible future mosque and design strategy. …”
Get full text
Get full text
Thesis -
19
Carbon nanotube-based microwave resonant sensor for organic contaminants detection
Published 2014“…The best design of patch antenna and feed line position in 5 GHz resonant frequency are chosen based on simulation results using full-wave electromagnetic simulator Computer Simulation Technology (CST) Microwave studio. …”
Get full text
Get full text
Thesis -
20
Screening of Metal Oxides and Hydroxides for Arsenic Removal from Water Using Molecular Dynamics Simulations
Published 2023“…In this work, a molecular simulation computational framework using molecular dynamics and Monte Carlo simulations was developed to investigate the adsorption of arsenic using various potential metal oxides. …”
Get full text
Get full text
Get full text
Get full text
Article
