-
3261
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
Get full text
Article -
3262
Physical Properties of New Formulation of Hybrid Nanofluid-based Minimum Quantity Lubrication (MQL) from Modified Jatropha Oil as Metalworking Fluid
Published 2023“….% hBN + WS2) has the ability as a long-term metalworking fluid for the machining operation. …”
Get full text
Article -
3263
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
Get full text
Article -
3264
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
Get full text
Article -
3265
A Preliminary Checklist of Fish Species in the Peat Swamp Forest of Ayer Hitam Utara State Park Forest, Johor, Malaysia
Published 2024“…These endeavours will facilitate the development of practical conservation approaches to ensure the long-term sustainability of AHUSPF and its associated species.…”
Get full text
Article -
3266
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2022“…Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
Get full text
Article -
3267
Study on promote occupational safety and health practices in construction projects
Published 2018“…Safety is an important issue, but many employers do not feel it is vital to the success of companies. For a long time, the construction industry has been labeled as with poor OSHP and performance, which needs stern attention and in-depth research to put forward solutions to this issue. …”
Get full text
Get full text
Get full text
Thesis -
3268
Single-sided magnetic nanoparticles imaging scanner for early detection of breast cancer
Published 2018“…Furthermore, the scanners have long signal acquisition time and high memory requirement. …”
Get full text
Get full text
Get full text
Thesis -
3269
Faulty sensor detection using data correlation of multivariant sensor reading in smart agriculture with IOT
Published 2019“…Also, when the sensor gives a constant reading for a long time the system has got a fault in this sensor. …”
Get full text
Get full text
Get full text
Thesis -
3270
Pulse electric field effect on cervical cancer cell: a plant based anti-cancer study
Published 2018“…This necessitates alternate anti-cancer treatment as the conventional treatment have resulted in high number of long- term survivors who are left to deal with the aftereffect of their therapy. …”
Get full text
Get full text
Get full text
Thesis -
3271
Professional doctorate in health psychology : thesis portfolio (Whippey : 2018)
Published 2017“…When starting this course, it took me a long time to decide on an original topic of research for the thesis, (Section C3, page 109) and I feel that at the beginning, when writing my ethics proposal, my thought process was much more basic. …”
Get full text
Thesis -
3272
Characterization of dehalogenase for the degradation of 3-chloropropionic acid
Published 2023Get full text
Thesis -
3273
-
3274
-
3275
Secure channel free public key encryption with multiple keywords search
Published 2020“…This PhD research aims to propose a few PEKS schemes in order to solve both Single and Multiple Keyword(s) Search issues and resist Off-line Keyword Guessing Attack (OKGA) and/or Inside Keyword Guessing Attack (IKGA). …”
Get full text
Thesis -
3276
توظيف الألعاب المحوسبة في تعلّم اللغة العربية وتعليمها لغير الناطقين بها للطلاب للمبتدئين في الجامعة الإسلامية العالمية بماليزيا أنموذجا...
Published 2011“…In fact, there are many studies and research conducted in educational computer games at the moment, particularly in the areas other than Arabic especially in Western countries. However, we find that the attention of scholars for this research in Malaysia is still at an early age, especially among researchers and teachers of Arabic. …”
Get full text
Proceeding Paper -
3277
Information from pharmaceutical companies and the quality, quantity, and cost of physicians' prescribing: a systematic review
Published 2010“…The narrative synthesis finding of variable results was supported by a meta-analysis of studies of prescribing frequency that found significant heterogeneity. …”
Get full text
Article -
3278
-
3279
New composite coagulant from agro-waste (tapioca peel) and polyaluminium chloride for primary landfill leachate treatment
Published 2021“…Response surface methodology (RSM) was applied after using the conventional method of one-factor-at-a-time (OFAT) optimisation to find the optimum pH for the leachate sample and dosage of PACTPPg. …”
Get full text
Get full text
Get full text
Thesis -
3280
Beyond individual flow: distributed flow in ice hockey, its antecedents and consequences to performance
Published 2023“…Mental toughness had both a direct and indirect effect on flow, which increased performance. This finding was in line with previous research, confirming the integrity of the data and allowing for the new individual subscales to be analysed in the same fashion. …”
Get full text
Thesis