Search Results - (digitalization OR (functionalities OR (functionized OR (functionality OR function))))

Refine Results
  1. 1

    Functional analysis of oral-digital stereotypy in a student with profound mental retardation by Tang, Jung-Chang

    Published 2005
    “…The specific sensory function of this student's oral-digital stereotypy might be maintained by tactile stimulation. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Protection of the digital holy Quran using SAB hash function by Alshaikhli, Imad Fakhri Taha, Alahmad, Mohammad

    Published 2013
    “…In this paper, we designed a concrete hash function called SAB. SAB hash function uses a permutation Q used in Grøstl hash function as a permutation function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    Review of the Sigmoid Function Implementation into Digital Hardware by Syahrulanuar, Ngah, Rohani, Abu Bakar, Abdullah, Embong

    Published 2015
    “…Some researcher has start hybrid method by combining two or more the available methods for realizing the sigmoid function in digital hardware.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    The development and social function of digital art museum by Tianwei Xiao, Zaimie Sahibil

    Published 2020
    “…This paper analyzes the application and status quo of Digital Art Museum, studies the social function and social significance of Digital Art Museum in the information age, discusses the construction mode and operation mechanism of Digital Art Museum, and analyzes the advantages and problems in the construction of Digital Art Museum.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  5. 5

    Improved digital signature protocol using iterated function systems. by Al-Saidi, Nadia M.G., Md. Said , Mohamad Rushdan

    Published 2011
    “…In this paper, a novel digital signature protocol is proposed. It is based on the iterated function system attractor, which is regarded as an emerging method. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Healthcare data integrity using hash function / Wan Madihah Wan Harrum by Wan Harrum, Wan Madihah

    Published 2016
    “…In order to preserve data security, there is a type of encryption form being introduced, Hash function. Hash function however, has an open flaw for data integrity. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Input Information in the Approximate Calculation of Two-Dimensional Integral from Highly Oscillating Functions (Irregular Case) by Lytvyn, Oleg M., Nechuiviter, Olesia, Pershyna, Iuliia, Mezhuyev, Vitaliy

    Published 2019
    “…There are the cases when input information about function is given on the set of traces of the function on planes, the set of traces of the function on lines, and the set of values of the function in the points. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Encrypting Images Using the Sum of Functions of a Real Variable by Avramenko, Viktor V., Watada, Junzo, Bondarenko, Mykyta O., Kalashnykova, Nataliya, Hasan, Mohd Hilmi

    Published 2025
    “…Eight key functions correspond to the eight binary digits in the ASCII character code, with each binary digit assigned a specific key function. …”
    Get full text
    Get full text
    Article
  9. 9

    Hyperbolic Tangent Activation Function Integrated Circuit Design / Fadzilatul Husna Adnan by Adnan, Fadzilatul Husna

    Published 2012
    “…The project scope is to approach the digital design with hardware description language (HDL) and functioned simulation. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Adaptive neural network classifier for extracted invariants of handwriten digits by Keng, L. H., Shamsuddin, Siti Mariyam

    Published 2004
    “…We propose an adaptive activation function of neural network classifier for isolated handwritten digits that undergo basic transformations. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Determining digital maturity among ICT users in Malaysia by Hazita Azman, Ali Salman, Norizan Abdul Razak, Supyan Hussin, Mohd Safar Hasim, Musa Abu Hassan

    Published 2014
    “…Meanwhile, their ICT-Mobile Phone engagement seemsto be high in digital maturity for the indispensable characteristics and functions of internet. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Digital communications using frequency - shift keying by Liew Jing Hong, Liew Jing Hong

    Published 1998
    “…This kind of digital modulation is needed to overcome the bandwidth limitation of the telephone lines for original digital data. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  14. 14

    Digital assistant for workspace apps by See, Ling Xuan

    Published 2022
    “…The proposed system will be achieved by applying machine learning to train the digital assistant model for it can study and execute every Teams’ function or the function combinations and allow user customization on its steps to complete certain task. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    On the security of digital signature protocol based on iterated function systems. by M. G. AL-Saidi, Nadia, Md. Said, Mohamad Rushdan

    Published 2011
    “…A common goal of cryptographic research is to design protocols that provide a confidential and authenticated transmission channel for messages over an insecure network. Hash functions are used within digital signature schemes to provide data integrity for cryptographic applications. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Method of Event Reconstruction in Digital Investigation and its Visualization by Abdullah, Mohd. Taufik

    Published 2011
    “…Various event reconstruction techniques are used for representing the sequence of event that caused presence of the digital objects. The reconstruction of events in digital investigations is fairly complicated. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Some local fractional inequalities involving fractal sets via generalized exponential (s,m)-convexity by Saleh, Wedad, Kılıçman, Adem

    Published 2023
    “…In addition, we look at some interactions between generalized exponentially (s,m)-convex functions and local fractional integrals. The properties of the generalized new special cases of (s,m)-convex functions, s-convex functions, and also generalized m-convex functions are impressive. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Digital dictionary system / Zaharah Ibrahim by Zaharah, Ibrahim

    Published 2004
    “…Digital dictionary is a global system and it is suitable for public usage. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Exploring the influence of digital literacy skills, and functional skills with ICT self-efficacy as a mediator at primary school level: a need assessment analysis by Majeed, Mohamad Kashif, Tunku Ahmad, Tunku Badariah, Majeed, Muhammad Saqib

    Published 2024
    “…To investigate the relationship between digital literacy and functional skills, while examining the mediating role of ICT self-efficacy.to explore the interplay between digital literacy and functional skills, with a specific focus on understanding how ICT self-efficacy mediates this relationship. …”
    Get full text
    Get full text
    Get full text
    Article