Search Results - (( based competency gap algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- based competency »
- java implication »
- competency gap »
- gap algorithm »
-
1
A new countermeasure to combat the embedding-based attacks on the goldreich-goldwasser-halevi lattice-based cryptosystem
Published 2024“…Despite being considered the first practical lattice-based cryptosystem, interest from the post-quantum cryptography society in the Goldreich-Goldwasser-Halevi (GGH) lattice-based cryptosystem drastically drop due to the embedding-based attacks. …”
Get full text
Get full text
Get full text
Article -
2
A new countermeasure to combat the embedding-based attacks on the Goldreich-Goldwasser-Halevi lattice-based cryptosystem
Published 2024“…Despite being considered the first practical lattice-based cryptosystem, interest from the post-quantum cryptography society in the Goldreich-Goldwasser-Halevi (GGH) lattice-based cryptosystem drastically drop due to the embedding-based attacks. …”
Get full text
Get full text
Get full text
Article -
3
-
4
Investigating computational thinking among primary school students in Terengganu using visual programming
Published 2022“…There is still a large gap in term of the investigation of student’s CT skills competency in this aspect. …”
Get full text
Get full text
Thesis -
5
What drives Chinese youth to use fitness-related health information on social media? an analysis of intrinsic needs, social media algorithms, and source credibility
Published 2024“…This study aims to address this gap by integrating Self-Determination Theory (SDT)-based internal factors and external factors (social media algorithms and source credibility). …”
Get full text
Get full text
Get full text
Article -
6
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
7
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
8
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
9
Variational Bayesian inference for exponentiated Weibull right censored survival data
Published 2023“…The AFT model was developed using two comparative studies based on real-life and simulated data sets. The results from the experiments reveal that the Variational Bayesian (VB) approach is better than the competing Metropolis-Hasting Algorithm and the reference maximum likelihood estimates.…”
Get full text
Get full text
Get full text
Article -
10
Modelling knowledge transfer of nursing students during clinical placement / Nor Azairiah Fatimah Othman
Published 2017“…The minimum damping ratio ξmin was applied as an indicator to precisely determine the angle stability condition based on PSO technique. The proposed optimization technique was compared with respect to EP and AIS……”
Get full text
Get full text
Book Section
