-
21
Detection defect in printed circuit boards using unsupervised feature extraction upon transfer learning
Published 2020Get full text
Conference Paper -
22
Prediction of negative symptoms of schizophrenia from objective linguistic, acoustic and non-verbal conversational cues
Published 2020Get full text
Conference Paper -
23
EEG-based mental workload and stress recognition of crew members in maritime virtual simulator : a case study
Published 2021Get full text
Conference Paper -
24
-
25
EEG-based recognition of driver state related to situation awareness using graph convolutional networks
Published 2021Get full text
Conference Paper -
26
Parallel point cloud compression using truncated octree
Published 2021Get full text
Conference Paper -
27
EEG-based human factors evaluation of air traffic control operators (ATCOs) for optimal training
Published 2021Get full text
Conference Paper -
28
The undiscovered country : the art of pictorial 3-D stereo animation
Published 2021Get full text
Conference Paper -
29
<b>Cibercenários: Hekuras, Karuanas & Kurupiras</b>
Published 2007-02-01“…Each performer, manipulating a wireless mouse, interacts in real time with virtual niches that compose cyberworlds. The journeys integrate the actions carried out by the performers with those processed in real time on the computer. …”
Get full text
Article -
30
Finding spatio-temporal patterns in climate data using clustering
Published 2005Get full text
Conference or Workshop Item -
31
Internet : avenue for women jihadi “participation”
Published 2011“…Analysts of online extremist websites have noticed a recurrent trend of jihadist attempts to engage women in the cyberworld. There also appears to be more women supporters utilising the virtual domain to express their activism.…”
Get full text
Get full text
Commentary -
32
A survey of distributed denial-of-service attack, prevention, and mitigation techniques
Published 2017-12-01“…Distributed denial-of-service is one kind of the most highlighted and most important attacks of today’s cyberworld. With simple but extremely powerful attack mechanisms, it introduces an immense threat to current Internet community. …”
Get full text
Article -
33
Jurisdiction: an issue on the internet
Published 2024-12-01“…Governments can seek to enforce their laws within the constraints of their physical, geographical, and political domains as defined by an atlas, but a borderless cyberworld regulated by fast -expanding technology has a variety of challenges. …”
Get full text
Article -
34
Developing smart ICT in rural communities in Malaysia through the establishment of telecenters
Published 2016“…In line with national aspirations, the government addressed the challenge of ICT through a programme in which telecentres were set up in rural communities. The cyberworld was introduced to the countryside through telecentres which offered online facilities, world exposure and learning to the rural population with the aim of narrowing the digital gap between the rural and the urban folk. …”
Get full text
Article -
35
Online-trip to Russia: creating a virtual sociocultural environment for teaching Russian as a foreign language
Published 2022-09-01“…The necessity to develop new methods and measures in teaching Russian as a foreign language is caused not only by the growth of distant educational technologies, but also by new cognitive style generation formed in the circumstances of changing the natural surrounding into the virtual (the cyberworld) one. The lack of methodic instruments for compensating the language and sociocultural environment in distant teaching of Russian as a foreign language interferes the forming of students’ communicative skills. …”
Get full text
Article -
36
-
37
A new 128-bit block cipher
Published 2009“…According to the National IT Council (NlTC) report on "Securing Malaysia Sovereignty in the CyberWorld" provided by Ministry of Science, Technology and Innovation, Malaysia, they have outlined critical areas in which new and additional research and development is needed to increase the protection of the national information infrastructure. …”
Get full text
Thesis -
38
Honeynet as a service deployment approach in enabling virtual crime scene investigation
Published 2015“…There is a range of different security threats including hacking, intrusions, computer worms and viruses in the cyberworld. In order to prevent these attacks, technologies such as firewall and intrusion prevention systems depend on known attack signature. …”
Get full text
Thesis -
39
Üksildus küberruumis: autori individuaalsus ja teksti autonoomia. Solitude in Cyberspace: the Individuality of an Author and the Autonomy of a Text
Published 2011-12-01“…It might thus seem paradoxical that in the printed world both the author and his work are solitary, whereas in the cyberworld the solitude of creative work vanishes, because it requires interaction between authors and readers. …”
Get full text
Article