Search Results - (( risk communication pattern algorithm ) OR ( java implication bees algorithm ))

  • Showing 1 - 3 results of 3
Refine Results
  1. 1
  2. 2

    Optimization of medical image steganography using n-decomposition genetic algorithm by Al-Sarayefi, Bushra Abdullah Shtayt

    Published 2023
    “…The Least Significant Bits (LSB) technique has been widely used for secure communication. However, it is susceptible to imperceptibility and security risks due to the direct manipulation of pixels, and ASCII patterns present limitations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    All-in-1 adverse drug reaction reporting system / Long Chiau Ming … [et al.] by Chiau Ming, Long, Karuppannan, Mahmathi, Abdul Wahab, Izyan, Abd Wahab, Mohd Shahezwan, Zulkifly, Hanis Hanum

    Published 2014
    “…The details and contact of the reporter (such as doctor, pharmacist) are included too to allow possible communication in future. Meanwhile, Naranjo algorithm is a model used to determine the likelihood of whether an ADR is actually due to the drug rather than the results of other factors. …”
    Get full text
    Get full text
    Get full text
    Book Section