Search Results - prevention program (techniques OR technique)
-
1
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Second phase was conducted against the proposed technique to evaluate the effectiveness of it. Interview was conducted to get an overview of programming experts towards using Hybrid Obfuscation Technique to prevent prohibited Reverse Engineering. …”
Get full text
Get full text
Thesis -
2
Techniques on video streaming for back pain prevention
Published 2014“…This paper is about the study of techniques on multiple video streaming, which is going to be used to prevent back pain among manual workers. …”
Get full text
Get full text
Get full text
Article -
3
Discrete Evolutionary Programming for Network Splitting Strategy: Different Mutation Technique
Published 2018“…The results show that three-level mutation technique produces better optimal splitting solution as compared to single mutation technique.…”
Get full text
Get full text
Article -
4
Using nominal group technique to develop COMBI related health contents of a mobile application
Published 2024“…This research aimed to systematically develop the health content for the mobile application using the nominal group technique (NGT) to improve the implementation of COMBI in preventing and controlling dengue in Malaysia. …”
Get full text
Get full text
Get full text
Article -
5
Using nominal group technique to develop COMBI related health contents of a mobile application
Published 2024“…This research aimed to systematically develop the health content for the mobile application using the nominal group technique (NGT) to improve the implementation of COMBI in preventing and controlling dengue in Malaysia. …”
Get full text
Get full text
Get full text
Article -
6
Optimal undervoltage load shedding scheme by using artificial immune system optimization technique / Mohd Firdaus Moktar
Published 2009“…This program was developed using MATLAB software and the proposed technique was tested on IEEE 30-Bus reliability test system. …”
Get full text
Get full text
Thesis -
7
Discrete evolutionary programming for network splitting strategy: Different mutation technique
Published 2023“…Therefore, this paper investigates two different mutation techniques; single-level and three-level mutation, utilized in Discrete Evolutionary Programming (DEP) optimization to find the optimal splitting solution following a critical line outage. …”
Article -
8
Self-Efficacy and Its Influence on Job Satisfaction Among Substance Abuse Prevention Program Teachers
Published 2024“…Drug prevention and education program had been implemented in schools through special Substance Abuse Prevention Program (PPDa). …”
Get full text
Article -
9
Data mining techniques for transformer failure prediction model: A systematic literature review
Published 2023Conference Paper -
10
-
11
Bridging academician and community through knowledge transfer program (KTP) on workplace risk assessment technique- A case study
Published 2021“…The purpose of an individual assessment is to gauge participant understanding and the effectiveness of the program. The program has been conducted successfully whereby all the 32 participants have undergone the training and passed the assessment (written test and interview). …”
Get full text
Get full text
Get full text
Article -
12
Load shedding scheme based metaheuristic technique for power system controlled islanding
Published 2021“…Power system-controlled islanding is one of the mitigation techniques taken to prevent blackouts during severe outage. …”
Get full text
Get full text
Get full text
Article -
13
Compliance audit model for managing process safety in process industries
Published 2014“…Compliance audit for process safety management (PSM) is a technique to verify that the implementation of the PSM program is in compliance with OSHA standards and to identify potential deficiencies in the PSM program used. …”
Get full text
Get full text
Article -
14
Detection of vulnerability attack through wireless network on android platform
Published 2014“…Next, at the end of this research will develop an Android application for applying the active technique as a method to detect and prevent the ARP spoofing attack on Android smartphone. …”
Get full text
Get full text
Undergraduates Project Papers -
15
Load shedding scheme based metaheuristic technique for power system controlled islanding
Published 2023“…Power system-controlled islanding is one of the mitigation techniques taken to prevent blackouts during severe outage. …”
Article -
16
Body change techniques in Iranian adolescents: relationship to sex and body weight status
Published 2013“…Conclusion: Significant differences existed in using body change techniques according to sex and body weight status and these should be considered in obesity prevention programs for adolescents.…”
Get full text
Article -
17
Effects of "Bacterfree Hand Intervention" on the knowledge, attitude of handwashing and its technique, among pre-schoolers in Wilayah Persekutuan, Malaysia
Published 2024journal::journal article -
18
The pilot study on Down to Earth (D2E) injury prevention program among varsity netball players
Published 2019“…We explored the effect of Down to Earth, a program which focuses on safe-landing techniques during sport activities, in reducing lower limbs injuries among varsity netball players. …”
Get full text
Get full text
Article -
19
-
20
The development of a non-communicable disease prevention training program using youtube and its effect on community health volunteer's self-efficacy
Published 2022“…Objective: To develop a YouTube-based training program and to determine the effect of the program on self-efficacy and task importance in NCD prevention education among CHVs in Kelantan. …”
Get full text
Get full text
Thesis
