Search Results - (( developing sharing risk algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1
  2. 2

    Development of key-dependent dynamic S-Boxes with dynamic irreducible polynomial and affine constant by Agarwal, Praveen, Singh, Amandeep, Kilicman, Adem

    Published 2018
    “…Machine-to-machine sharing of data involves the risk of data stealing or modification, which may further disrupt the working of manufacturing process and leads to poor quality product. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6

    Efficient multi-UAV coordination via rl: joint path planning and task scheduling for post-disaster UAV-assisted MEC systems by Adnan, Mohd Hirzi, Ahmad Zukarnain, Zuriati, Subramaniam, Shamala K.

    Published 2025
    “…Meanwhile, task scheduling is optimized using a greedy algorithm to reduce computational complexity, and UAVs cooperate through information sharing to achieve robust performance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Simulation software and virtual environments for acceleration of agricultural robotics: features highlights and performance comparison by Ramin, Shamshiri, A. Hameed, Ibrahim, Pitonakova, Lenka, Weltzien, Cornelia, Balasundram, Siva Kumar, Yule, Ian J., Grift, Tony E., Chowdhary, Girish

    Published 2018
    “…This review suggests that an open-source software platform for agricultural robotics will significantly accelerate effective collaborations between different research groups for sharing existing workspaces, algorithms, and reusing the materials.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    StockMaster simulator / Nor Hamiza Mohd Noor ... [et al.] by Mohd Noor, Nor Hamiza, Asbullah, Nurul Farzana, Hairi Annuar, Syazana Ezzati, Tujang, Anatasha Alfiera, Muhammad Rasli, Irdina Hani

    Published 2023
    “…Real-time market data, trading algorithms, and interactive features will make it more engaging. …”
    Get full text
    Get full text
    Book Section
  9. 9

    Blockchain-enabled cybersecurity framework for healthcare domain by Islam, Md Shohidul

    Published 2025
    “…Consequently, daily health data transactions carry the risk of privacy leaks and make data sharing and storage space capability difficulties. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias by Alias, Annasuha Atie Atirah

    Published 2023
    “…Thus, this project aims to design, develop, and evaluate web-based application utilizing sentiment analysis, specifically employing the Naïve Bayes algorithm, to identify and analyze suicidal ideation within Twitter posts. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Real-time personal protective equipment compliance detection using you only look once by Nurhanisah, Aminuddin, Nor Azuana, Ramli, Pratondo, Agus

    Published 2024
    “…Developing automated systems to detect and identify protective equipment in working sites is not just a technical accomplishment but also a significant step towards improving the workplace, especially in high-risk areas like construction and manufacturing sites. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    The prevalence and functional impact of rare genomic copy number variation in hypertension-related left ventricular hypertrophy / Julia Ashazila Mat Jusoh by Mat Jusoh, Julia Ashazila

    Published 2020
    “…When differential expressed genes were compared between these groups, 207 genes (p<0.001) shared similar patterns. Enrichment analysis revealed the involvement of these genes in the cardiac development via Sp1 signalling. …”
    Get full text
    Get full text
    Thesis