Search Results - consumer protection computer simulation

Search alternatives:

Refine Results
  1. 1

    Implementing CD Copyright Protection by Using TCPA Framework by Mohd. Hussin, Nurashikin

    Published 2005
    “…The end product of this research is the concept ofhow TCPA can be implemented in protecting the copyright of the CDsand also the simulation demo authored in Java. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Protected bidding against compromised information injection in IoT-based smart grid by Bhuiyan, Md Zakirul Alam, Zaman, M., Wang, Guojun, Wang, Tian, Rahman, Md. Arafatur, Tao, Hai

    Published 2019
    “…We show that proposed ADR bidding are computationally practical through simulations performed in three simulation environments.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Effect of integrating direct cash aid into fuel subsidy removal in the domestic commodity market in Malaysia using Computable General Equilibrium (CGE) model by Ying, Loo Sze, Harun, Mukaramah

    Published 2018
    “…This study was carried out using the Lofgren-based computable general equilibrium (CGE) model, by simulating the before and after imposition of fiscal integration. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Effects of Integrating Direct Cash Aid into Fuel Subsidy Removal in The Domestic Commodity Market in Malaysia Using Computable General Equilibrium (CGE) Model by Loo, Sze Ying, Harun, Mukaramah

    Published 2018
    “…This study was carried out using the Lofgren-based computable general equilibrium (CGE) model, by simulating the before and after imposition of fiscal integration. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…Most of the techniques are used to address the power system reliability which consumes long computation time. Hence, an inaccurate result for system operators is inevitable as most of the variables affecting the reliability changes with time. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Smart modeling of flood occurrences in a river basin by Mohammed, Thamir Ahmed, Said, Salim, Bardaie, Mohd Zohadie, Basri, Shahnor

    Published 1999
    “…At the same time the collection of such data is costly, difficult and time consuming. During flooding, severe damage will occur to the agricultural lands or farms and the availability of a good hydrologic record will help in taking the required protection to reduce this damage. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13
  14. 14

    Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA by Ahmed, Shakil

    Published 2013
    “…Storage encryption (data at-rest) has now become an important aspect in today’s computing environment. User data stored in computing devices that includes computers, personal digital assistant (PDA), flash drives and external hard drive are getting vulnerable to security attacks. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Effect of GIC neutral blocking devices (NBDs) on power network ferroresonance in Malaysia by Mohammed Khurshid, Zmnako, Ab Aziz, Nur Fadilah, Rhazali, Zeti Akma, Ab Kadir, Mohd Zainal Abidin

    Published 2022
    “…The NBD systems were tested under different working conditions. The simulation results found that the metal oxide varistors (MOVs) arresters in NBDs fault protection mode effectively clamped ferroresonance overvoltages below the protection level under faulty conditions. …”
    Get full text
    Get full text
    Article
  16. 16

    Evaluation of Security Mechanisms for Information Dissemination in Wireless Sensor Networks by Mohamad Nazim, Jambli, Sinarwati, Mohamad Suhaili, Nurul Sahida, Mansor

    Published 2013
    “…We have evaluated these TinySec mechanisms in terms of packet transmission time, average number of packet received and energy consumption. The simulation results show that TinySec-AE consumed more energy and required more time to transmit packet in comparing to TinySec-Auth due to higher computational time and longer packet size for extra encryption mechanism.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Mitigation of Power Quality Disturbances by K. , Chandrasekaran, P. A. , Vengkatachalam, Karsiti, Mohd Noh, K. S. , Rama Rao

    Published 2009
    “…The design, modeling and simulation are done using PSS/ADEPT and PSCAD software.…”
    Get full text
    Get full text
    Citation Index Journal
  18. 18

    Environmental impact on the building envelope: An architectural analytical study of heat Exchange in new mosque design in Baghdad/ Akeel Noori Abdul Hameed al Mulahiwaish by Akeel Noori, Abdul Hameed al Mulahiwaish

    Published 2004
    “…The research covers a survey of the design, construction features, and comfort levels in new mosques, and the definition of the "model musalla", as well as the identification and thermal assessment of the typical "model musalla" taking into consideration, urban planning, available material skill and other religious criteria. Computer simulations of thermal conditions; modification for design, building ele ments and construction are also covered by the research.The finding and conclusion of the impact of simulation changes are stated as well as recommendation given for possible future mosque and design strategy. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Carbon nanotube-based microwave resonant sensor for organic contaminants detection by Mohammadi, Ahmad

    Published 2014
    “…The best design of patch antenna and feed line position in 5 GHz resonant frequency are chosen based on simulation results using full-wave electromagnetic simulator Computer Simulation Technology (CST) Microwave studio. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Screening of Metal Oxides and Hydroxides for Arsenic Removal from Water Using Molecular Dynamics Simulations by Noor E., Hira, Serene Lock, Sow Mun, Ushtar, Arshad, Khadija, Asif, Farman, Ullah, Abid Salam, Farooqi, Yiin, Chung Loong, Bridgid Chin, Lai Fui, Zill e, Huma

    Published 2023
    “…In this work, a molecular simulation computational framework using molecular dynamics and Monte Carlo simulations was developed to investigate the adsorption of arsenic using various potential metal oxides. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article