-
3301
Improved 5G network slicing for enhanced QoS against attack in SDN environment using deep learning
Published 2024“…Additionally, the proposed Convolutional Neural Networks-Long Short-Term Memory (CNN-LSTM) approach demonstrates superiority over conventional ML algorithms, signifying its potential for real-time attack detection. …”
Get full text
Article -
3302
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
Get full text
Article -
3303
Physical Properties of New Formulation of Hybrid Nanofluid-based Minimum Quantity Lubrication (MQL) from Modified Jatropha Oil as Metalworking Fluid
Published 2023“….% hBN + WS2) has the ability as a long-term metalworking fluid for the machining operation. …”
Get full text
Article -
3304
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
Get full text
Article -
3305
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
Get full text
Article -
3306
A Preliminary Checklist of Fish Species in the Peat Swamp Forest of Ayer Hitam Utara State Park Forest, Johor, Malaysia
Published 2024“…These endeavours will facilitate the development of practical conservation approaches to ensure the long-term sustainability of AHUSPF and its associated species.…”
Get full text
Article -
3307
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2022“…Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
Get full text
Article -
3308
Study on promote occupational safety and health practices in construction projects
Published 2018“…Safety is an important issue, but many employers do not feel it is vital to the success of companies. For a long time, the construction industry has been labeled as with poor OSHP and performance, which needs stern attention and in-depth research to put forward solutions to this issue. …”
Get full text
Get full text
Get full text
Thesis -
3309
Single-sided magnetic nanoparticles imaging scanner for early detection of breast cancer
Published 2018“…Furthermore, the scanners have long signal acquisition time and high memory requirement. …”
Get full text
Get full text
Get full text
Thesis -
3310
Faulty sensor detection using data correlation of multivariant sensor reading in smart agriculture with IOT
Published 2019“…Also, when the sensor gives a constant reading for a long time the system has got a fault in this sensor. …”
Get full text
Get full text
Get full text
Thesis -
3311
Pulse electric field effect on cervical cancer cell: a plant based anti-cancer study
Published 2018“…This necessitates alternate anti-cancer treatment as the conventional treatment have resulted in high number of long- term survivors who are left to deal with the aftereffect of their therapy. …”
Get full text
Get full text
Get full text
Thesis -
3312
Professional doctorate in health psychology : thesis portfolio (Whippey : 2018)
Published 2017“…When starting this course, it took me a long time to decide on an original topic of research for the thesis, (Section C3, page 109) and I feel that at the beginning, when writing my ethics proposal, my thought process was much more basic. …”
Get full text
Thesis -
3313
Characterization of dehalogenase for the degradation of 3-chloropropionic acid
Published 2023Get full text
Thesis -
3314
-
3315
-
3316
Secure channel free public key encryption with multiple keywords search
Published 2020“…This PhD research aims to propose a few PEKS schemes in order to solve both Single and Multiple Keyword(s) Search issues and resist Off-line Keyword Guessing Attack (OKGA) and/or Inside Keyword Guessing Attack (IKGA). …”
Get full text
Thesis -
3317
توظيف الألعاب المحوسبة في تعلّم اللغة العربية وتعليمها لغير الناطقين بها للطلاب للمبتدئين في الجامعة الإسلامية العالمية بماليزيا أنموذجا...
Published 2011“…In fact, there are many studies and research conducted in educational computer games at the moment, particularly in the areas other than Arabic especially in Western countries. However, we find that the attention of scholars for this research in Malaysia is still at an early age, especially among researchers and teachers of Arabic. …”
Get full text
Proceeding Paper -
3318
Information from pharmaceutical companies and the quality, quantity, and cost of physicians' prescribing: a systematic review
Published 2010“…The narrative synthesis finding of variable results was supported by a meta-analysis of studies of prescribing frequency that found significant heterogeneity. …”
Get full text
Article -
3319
-
3320
New composite coagulant from agro-waste (tapioca peel) and polyaluminium chloride for primary landfill leachate treatment
Published 2021“…Response surface methodology (RSM) was applied after using the conventional method of one-factor-at-a-time (OFAT) optimisation to find the optimum pH for the leachate sample and dosage of PACTPPg. …”
Get full text
Get full text
Get full text
Thesis