Search Results - prevention program (techniques OR technique)

Refine Results
  1. 1

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…Second phase was conducted against the proposed technique to evaluate the effectiveness of it. Interview was conducted to get an overview of programming experts towards using Hybrid Obfuscation Technique to prevent prohibited Reverse Engineering. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Techniques on video streaming for back pain prevention by Ramdan, Nur Sufiah Akmala, Bani Hashim, Ahmad Yusairi, Kamat, Seri Rahayu, Asmai, S. A.

    Published 2014
    “…This paper is about the study of techniques on multiple video streaming, which is going to be used to prevent back pain among manual workers. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Discrete Evolutionary Programming for Network Splitting Strategy: Different Mutation Technique by Saharuddin, Nur Zawani, Abidin, Izham Zainal, Mokhlis, Hazlie

    Published 2018
    “…The results show that three-level mutation technique produces better optimal splitting solution as compared to single mutation technique.…”
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    Optimal undervoltage load shedding scheme by using artificial immune system optimization technique / Mohd Firdaus Moktar by Moktar, Mohd Firdaus

    Published 2009
    “…This program was developed using MATLAB software and the proposed technique was tested on IEEE 30-Bus reliability test system. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Discrete evolutionary programming for network splitting strategy: Different mutation technique by Saharuddin N.Z., Abidin I.Z., Mokhlis H.

    Published 2023
    “…Therefore, this paper investigates two different mutation techniques; single-level and three-level mutation, utilized in Discrete Evolutionary Programming (DEP) optimization to find the optimal splitting solution following a critical line outage. …”
    Article
  8. 8

    Self-Efficacy and Its Influence on Job Satisfaction Among Substance Abuse Prevention Program Teachers by Nurhafizah Mohd. Sukor, Siti Zubaidah Hussin

    Published 2024
    “…Drug prevention and education program had been implemented in schools through special Substance Abuse Prevention Program (PPDa). …”
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    Bridging academician and community through knowledge transfer program (KTP) on workplace risk assessment technique- A case study by Nur Fazlinna, Ab Ghani, Azizan, Ramli, Kharul Anwar, Johari, Mohd Shaiful Zaidi, Mat Desa, Norhaslinda, Hanapi

    Published 2021
    “…The purpose of an individual assessment is to gauge participant understanding and the effectiveness of the program. The program has been conducted successfully whereby all the 32 participants have undergone the training and passed the assessment (written test and interview). …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Load shedding scheme based metaheuristic technique for power system controlled islanding by Saharuddin, Nur Zawani, Zainal Abidin, Izham, Mokhlis, Hazlie, Shair, Ezreen Farina

    Published 2021
    “…Power system-controlled islanding is one of the mitigation techniques taken to prevent blackouts during severe outage. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Compliance audit model for managing process safety in process industries by Majid, N.D.A., Shariff, A.M., Thiam, E.S.B.

    Published 2014
    “…Compliance audit for process safety management (PSM) is a technique to verify that the implementation of the PSM program is in compliance with OSHA standards and to identify potential deficiencies in the PSM program used. …”
    Get full text
    Get full text
    Article
  14. 14

    Detection of vulnerability attack through wireless network on android platform by Muhamad Izhan Fakri, Imran

    Published 2014
    “…Next, at the end of this research will develop an Android application for applying the active technique as a method to detect and prevent the ARP spoofing attack on Android smartphone. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15

    Load shedding scheme based metaheuristic technique for power system controlled islanding by Saharuddin N.Z., Abidin I.Z., Mokhlis H., Shair E.F.

    Published 2023
    “…Power system-controlled islanding is one of the mitigation techniques taken to prevent blackouts during severe outage. …”
    Article
  16. 16

    Body change techniques in Iranian adolescents: relationship to sex and body weight status by Hatami, Monireh, Mohd Taib, Mohd Nasir, Jamaluddin, Rosita, Abu Saad, Hazizi, Djazayery, Abolghasem

    Published 2013
    “…Conclusion: Significant differences existed in using body change techniques according to sex and body weight status and these should be considered in obesity prevention programs for adolescents.…”
    Get full text
    Article
  17. 17
  18. 18

    The pilot study on Down to Earth (D2E) injury prevention program among varsity netball players by Zulkarnain, Jaafar, Khairullina, Khalid

    Published 2019
    “…We explored the effect of Down to Earth, a program which focuses on safe-landing techniques during sport activities, in reducing lower limbs injuries among varsity netball players. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    The development of a non-communicable disease prevention training program using youtube and its effect on community health volunteer's self-efficacy by Hamidun, Aliff Ridzwan

    Published 2022
    “…Objective: To develop a YouTube-based training program and to determine the effect of the program on self-efficacy and task importance in NCD prevention education among CHVs in Kelantan. …”
    Get full text
    Get full text
    Thesis