Search Results - (( based preventive practice algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    A new countermeasure to combat the embedding-based attacks on the goldreich-goldwasser-halevi lattice-based cryptosystem by Arif Mandangan, Nazreen Syazwina Nazaruddin, Muhammad Asyraf Asbullah, Hailiza Kamarulhaili, Che Haziqah Che Hussin, Babarinsa Olayiwola

    Published 2024
    “…Despite being considered the first practical lattice-based cryptosystem, interest from the post-quantum cryptography society in the Goldreich-Goldwasser-Halevi (GGH) lattice-based cryptosystem drastically drop due to the embedding-based attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A new countermeasure to combat the embedding-based attacks on the Goldreich-Goldwasser-Halevi lattice-based cryptosystem by Mandangan, Arif, Nazaruddin, Nazreen Syazwina, Asbullah, Muhammad Asyraf, Kamarulhaili, Hailiza, Che Hussin, Che Haziqah, Olayiwola, Babarinsa

    Published 2024
    “…Despite being considered the first practical lattice-based cryptosystem, interest from the post-quantum cryptography society in the Goldreich-Goldwasser-Halevi (GGH) lattice-based cryptosystem drastically drop due to the embedding-based attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases by Imam, A.A., Basri, S., Gonzalez-Aparicio, M.T., Balogun, A.O., Kumar, G.

    Published 2022
    “…In this paper, a new method is introduced into the NoSQL design practice. This method utilizes the Asymmetric encryption algorithm, RSA in particular. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases by Imam, A.A., Basri, S., Gonzalez-Aparicio, M.T., Balogun, A.O., Kumar, G.

    Published 2022
    “…In this paper, a new method is introduced into the NoSQL design practice. This method utilizes the Asymmetric encryption algorithm, RSA in particular. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    DEVELOPMENT OF DRIVER DROWSINESS DETECTION ALGORITHM by YVONNE, PHUA YEE WUN

    Published 2022
    “…This project proposes two different non-intrusive approaches to detect driver drowsiness to ensure the safety of the drivers and road users. Psychophysiological-based measurement is not feasible in practice as it causes driving distraction and inconvenience for the drivers by wearing special equipment on the body. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  10. 10

    Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation by Chen, Soong Der

    Published 2000
    “…This thesis focuses on ways to improve the existing solutions in the algorithmic and implementation aspects. For the algorithmic aspect, the basic principles of motion compensated DCT block-based compression scheme was studied. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Bayesian network of influence of sociodemographic variables on dengue related knowledge, attitude, and practices in selected areas in Selangor, Malaysia by Ajibola, Lamidi-Sarumoh Alaba

    Published 2019
    “…Therefore, quantifying the awareness about the dengue vectors, dengue infection and preventive practices can be used to curtail the spread of the infection and reduce the vectors. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A novel softsign fractional-order controller optimized by an intelligent nature-inspired algorithm for magnetic levitation control by Ahmad, Mohd Ashraf, Izci, Davut, Ekinci, Serdar, Mohd Tumari, Mohd Zaidi

    Published 2025
    “…The performance of the proposed approach was extensively benchmarked against four modern metaheuristic algorithms (greater cane rat algorithm, catch fish optimization algorithm, RIME algorithm and artificial hummingbird algorithm) under identical conditions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Development of an effective clustering algorithm for older fallers by Goh, Choon Hian, Wong, Kam Kang, Tan, Maw Pin *, Ng, Siew Cheok, Chuah, Yea Dat, Kwan, Ban Hoe

    Published 2022
    “…Such a tool could serve as a case identification or clinical decision support tool for clinical practice to enhance access to falls prevention efforts.…”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Autonomous flight algorithm of a quadcopter sensing system for methane gas concentration measurements at landfill site by Bashi, Omar Ibrahim Dallal

    Published 2018
    “…This algorithm was proposed in this thesis based on a special mathematical calculation model, which has the ability to decide the spacing between adjacent straight-line trajectories within a user defined area, this prevents the quadcopter from crashing during the survey due to reasons of overcapability. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Ethical concerns about the applications of artificial intelligence in healthcare practices: an explanatory review by Hassan, Ismail Bile, Hashi, Abdurezak Abdulahi

    Published 2021
    “…It helped medical doctors’ interpretation of medical images that are designed to diagnose given illnesses, such as imaging practices of X-ray, MRI and ultrasound diagnoses. Though the use of artificial intelligence and machine-learning algorithms is rapidly growing in various healthcare practices with promising potentials, however the use of computer-generated applications in healthcare sector have raised certain ethical concerns about the safety and reliability of these applications. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Development of efficient t-way test data generation algorithm and execution strategies by Khandakar Fazley, Rabbi

    Published 2012
    “…(II) EasyA (Easy Algorithm for 2-way Test Data Generation) is developed based on matrix based calculation to overcome the time constrains by keeping the number of test data in an acceptable range. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Determining malaria risk factors in Abuja, Nigeria using various statistical approaches by Segun, Oguntade Emmanuel

    Published 2018
    “…Therefore, this was not incorporated in BBN models. Based on cross-validation analysis, the score-based algorithm outperformed the constraint-based algorithms in the structural learning. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Variable Neighborhood Descent and Whale Optimization Algorithm for Examination Timetabling Problems at Universiti Malaysia Sarawak by Emily Sing Kiang, Siew

    Published 2025
    “…Furthermore, the research provided practical insights by comparing centralized and decentralized scheduling strategies, offering universities evidence-based guidance on balancing efficiency and space utilization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis