Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Mohd Amin Mohd Yunus"'
Autor:
Mohd Amin Mohd Yunus, Muhammad Zainulariff Brohan, Nazri Mohd Nawi, Ely Salwana Mat Surin, Nurhakimah Azwani Md Najib, Chan Wei Liang
Publikováno v:
JOIV: International Journal on Informatics Visualization, Vol 2, Iss 3-2, Pp 215-219 (2018)
SQL injection happened in electronic records in database and it is still exist even after two decades since it first happened. Most of the web-based applications are still vulnerable to the SQL injection attacks. Although technology had improved a lo
Externí odkaz:
https://doaj.org/article/a1dfced0a3014f409f6029194d47445a
Publikováno v:
JOIV: International Journal on Informatics Visualization, Vol 1, Iss 4-2, Pp 192-194 (2017)
The study is about the security system of database management (DBMS) and proposed method. Information is an essential element in database management system where the users trust service providers will have a secure system to protect and prevent their
Externí odkaz:
https://doaj.org/article/3cd54a4b50044f7fac83eae57bd16356
Publikováno v:
Lecture Notes on Data Engineering and Communications Technologies ISBN: 9783030707125
The term selection is a potential challenge in query expansion. It concerns with the inability of query expansion techniques to select appropriate terms for expanding query. Most of the existing term selection for query expansion techniques allows th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::094fc744ee84588c87bead63611c3a1b
https://doi.org/10.1007/978-3-030-70713-2_107
https://doi.org/10.1007/978-3-030-70713-2_107
Publikováno v:
Communications in Computer and Information Science ISBN: 9783030691424
ICTA
ICTA
Query expansion has changed the information retrieval process to improve search performance. It aimed at improving the performance of information retrieval system to retrieve user information need. However, the term selection process still lacks prec
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::12d21a1d982ee226702085610f0501be
https://doi.org/10.1007/978-3-030-69143-1_19
https://doi.org/10.1007/978-3-030-69143-1_19
Publikováno v:
International Journal of Advanced Computer Science and Applications. 11
A phishing email is an attack that focused com-pletely on people to circumvent existing traditional security algorithms. The email appears to be a dependable, appropriate, and solid communication medium for internet users. At present, the email is su
Autor:
Nuhu Yusuf, Noor Azah Samsudin, Norfaradilla Wahid, Aida Mustapha, Nazri Mohd Nawi, Mohd Amin Mohd Yunus
Publikováno v:
International Journal of Data Mining, Modelling and Management. 14:30
Publikováno v:
International Journal on Advanced Science, Engineering and Information Technology. 11:1352
Due to large volumes of documents available for retrieval in a search database, an intelligent method is required to retrieve relevant search results. Query expansion is one of such methods widely used in retrieving pertinent results of various searc
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030335816
IRICT
IRICT
Information retrieval is an activity of finding needed information that satisfies the information need of the users. Stemming is one of the technique uses to improve information retrieval search performance for different languages. The Arabic languag
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9e2ca3f63da7819834db750cb20314e8
https://doi.org/10.1007/978-3-030-33582-3_1
https://doi.org/10.1007/978-3-030-33582-3_1
Autor:
Noor Azah Samsudin, Nazri Mohd Nawi, Mohd Amin Mohd Yunus, Noorhaniza Wahid, Nuhu Yusuf, Norfaradilla Wahid
Publikováno v:
ICSET
Recently, many query expansion methods have been proposed to improve the results of search applications. However, many of these search applications still lack better results and many attributed due to query expansion issues. This paper enhanced the q
Publikováno v:
Neural Computing and Applications. 27:2601-2604
Six algorithms that design secrecy keys are used for digital image encryption. The privacy keys generated by stream cipher generators were tested for their randomness applying five tests of randomness. The images generated by applying each algorithm