Search Results - (( developing sharing risk algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing sharing »
- implication based »
- java implication »
- risk algorithm »
- sharing risk »
-
1
-
2
Development of key-dependent dynamic S-Boxes with dynamic irreducible polynomial and affine constant
Published 2018“…Machine-to-machine sharing of data involves the risk of data stealing or modification, which may further disrupt the working of manufacturing process and leads to poor quality product. …”
Get full text
Get full text
Get full text
Article -
3
An immunological-based simulation: A case study of risk concentration for mobile spam context assessment
Published 2024Get full text
Get full text
journal::journal article -
4
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
5
Computed Tomography virtual lab software application in process tomography research
Published 2010Get full text
Working Paper -
6
Efficient multi-UAV coordination via rl: joint path planning and task scheduling for post-disaster UAV-assisted MEC systems
Published 2025“…Meanwhile, task scheduling is optimized using a greedy algorithm to reduce computational complexity, and UAVs cooperate through information sharing to achieve robust performance. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Simulation software and virtual environments for acceleration of agricultural robotics: features highlights and performance comparison
Published 2018“…This review suggests that an open-source software platform for agricultural robotics will significantly accelerate effective collaborations between different research groups for sharing existing workspaces, algorithms, and reusing the materials.…”
Get full text
Get full text
Get full text
Article -
8
StockMaster simulator / Nor Hamiza Mohd Noor ... [et al.]
Published 2023“…Real-time market data, trading algorithms, and interactive features will make it more engaging. …”
Get full text
Get full text
Book Section -
9
Blockchain-enabled cybersecurity framework for healthcare domain
Published 2025“…Consequently, daily health data transactions carry the risk of privacy leaks and make data sharing and storage space capability difficulties. …”
Get full text
Get full text
Thesis -
10
Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias
Published 2023“…Thus, this project aims to design, develop, and evaluate web-based application utilizing sentiment analysis, specifically employing the Naïve Bayes algorithm, to identify and analyze suicidal ideation within Twitter posts. …”
Get full text
Get full text
Thesis -
11
-
12
-
13
Real-time personal protective equipment compliance detection using you only look once
Published 2024“…Developing automated systems to detect and identify protective equipment in working sites is not just a technical accomplishment but also a significant step towards improving the workplace, especially in high-risk areas like construction and manufacturing sites. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
The prevalence and functional impact of rare genomic copy number variation in hypertension-related left ventricular hypertrophy / Julia Ashazila Mat Jusoh
Published 2020“…When differential expressed genes were compared between these groups, 207 genes (p<0.001) shared similar patterns. Enrichment analysis revealed the involvement of these genes in the cardiac development via Sp1 signalling. …”
Get full text
Get full text
Thesis
