Zobrazeno 1 - 10
of 32
pro vyhledávání: '"Fazidah Othman"'
Autor:
Syed Adeel Ali Shah, Habiba Hamid, Sheena Kaur, Syaril Nizam Omar, Ismail Ahmedy, Rafidah Md Noor, Shaik Shabana Anjum, Fazidah Othman, Emran Mohd Tamil
Publikováno v:
Scientometrics. 126:2759-2800
The rapid escalation in the usage of the Internet of Things (IoT) devices is threatened by botnets. The expected increase in botnet attacks has seen numerous botnet detection/mitigation proposals from academia and industry. This paper conducts a syst
Autor:
Tengku Sarina Aini Tengku Kasim, Amirah Hazwani Bakri, Mohd Hairul Nizam Md Nasir, Fazidah Othman, Zarinah Mohd Kasirun, Noor Aishah Rosli
Publikováno v:
Makara Journal of Health Research, Vol 23, Iss 3, Pp 127-131 (2019)
Background: Parents of children with Autistic Spectrum Disorder (ASD) are at an increased risk for stress and other mental health problems. While treatment is mainly focused on the child, somehow parents’ stress is exacerbated. Accordingly, the pur
Autor:
Muhammad Alam, Rafidah Md Noor, Shaik Shabana Anjum, Muhammad Khurram Khan, Fazidah Othman, Ismail Ahmedy, Mohammad Hossein Anisi
Publikováno v:
IEEE Internet of Things Journal. 6:250-266
Ubiquitous computing is foreseen to play an important role for data production and network connectivity in the coming decades. The Internet of Things (IoT) research which has the capability to encapsulate identification potential and sensing capabili
Publikováno v:
PROCEEDINGS OF THE 14TH ASIA-PACIFIC PHYSICS CONFERENCE.
Ordinary µ capture is useful for probing the neutrino nuclear responses for double beta decay especially in the β+ side region. The aim of this study is to measure the prompt and delayed gamma rays from NatMo (µ,xnv) and 100Mo (µ,xnv) reactions a
Autor:
Rosli Salleh, Firdaus Afifi, Nor Badrul Anuar, Mohd Faizal Ab Razak, Fazidah Othman, Ahmad Firdaus
Publikováno v:
Arabian Journal for Science and Engineering. 43:6963-6979
The leaking of sensitive data on Android mobile device poses a serious threat to users, and the unscrupulous attack violates the privacy of users. Therefore, an effective Android malware detection system is necessary. However, detecting the attack is
Autor:
Rosli Salleh, Mohd Yamani Idna Idris, Ainuddin Wahid Abdul Wahab, Nor Bakiah Abd Warif, Fazidah Othman
Publikováno v:
Journal of Visual Communication and Image Representation. 46:219-232
Copy-move forgery (CMF) is a popular image manipulation technique that is simple and effective in creating forged illustrations. The bulk of CMF detection methods concentrate on common geometrical transformation attacks (e.g., rotation and scale) and
Autor:
Tatsushi Shima, Fazidah Othman, Atsushi Sato, I. H. Hashim, H. Ejiri, Faridah Ibrahim, Kazuhiko Ninomiya, N. N. A. M. A. Ghani, F. Soberi
Muon capture isotope production (MuCIP) using negative ordinary muon capture reactions (OMC) is used to efficiently produce various kinds of nuclear isotopes for both fundamental and applied science studies. The large capture probability of muon into
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::56594307a78beeae84a1d21e35f502b8
Autor:
Ismail Ahmedy, Raenu Kolandaisamy, Aznul Qalid Md Sabri, Noorzaily Mohd Noor, Farnaz Fatovatikhah, Fazidah Othman, Rafidah Md Noor
Publikováno v:
Journal of Ambient Intelligence and Humanized Computing. 13:1-1
Flood is one of the devastating natural disaster than anything else. It is a harmful event that can risk human life, damage homes, and have huge economic impacts. Flooding creates garbage and solid waste which includes dead animals, waste products, e
Publikováno v:
Lecture Notes in Electrical Engineering ISBN: 9789811326219
This paper reviews the recognition-based graphical password system. Twenty-five recognition-based graphical password systems are studied and analyzed with regards to their security threats. Countermeasures and suggestions are given to prevent and red
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0166a94d2d00106039c7fba6ec93b940
https://doi.org/10.1007/978-981-13-2622-6_49
https://doi.org/10.1007/978-981-13-2622-6_49
Publikováno v:
International Journal of Computer and Electrical Engineering. :642-650
The strength of the combination between hiding and encryption science is due to the non-existence of standard algorithms to be used in hiding and encrypting secret messages. Also there are many ways in hiding methods such as combining several media (