-
161
Network monitoring system to detect unauthorized connection
Published 2017“…There are ten modules in this system which are user main page, register admin module, register staff module, login admin module, login staff module, admin menu module, staff menu module, scan view module, status view module and report module. …”
Get full text
Article -
162
Formulation of hybrid 3D image segmentation algorithm based partial differential equation
Published 2012“…One of the best segmentation methods that can perform 3D segmentation is the level-set method which has its mathematical foundation in partial differential equation (PDE). Owing to its complex nature, it exhibits a level of unacceptable sluggishness on implementation hence a need to hasten up the process by hybridizing it with a faster region-based segmentation method which is inherently a logical approach to segmentation pivoted on thresholding but not as good in segmentation as the former. …”
Get full text
Get full text
Proceeding Paper -
163
Comparison of empirical propagation path loss models for mobile communications in the suburban area of Kuala Lumpur
Published 2011“…They become important tools in both research and industrial communities owing to their speed of implementation and their limited dependence on detailed knowledge of the terrain. …”
Get full text
Proceeding Paper -
164
Wavelet cesptral coefficients for isolated speech recognition
Published 2013“…In traditional cepstral analysis, the cepstrums are calculated with the use of the Discrete Fourier Transform (DFT). Owing to the fact that the DFT calculation assumes signal stationary between frames which in practice is not quite true, the WCC replaces the DFT block in the traditional cepstrum calculation with the Discrete Wavelet Transform (DWT) hence producing the WCC. …”
Get full text
Article -
165
Information leakage through online social networking: Opening the doorway for advanced persistence threats
Published 2010“…It also describes how OSN becomes an attack vector of APT owing to employees’ social networking behaviour, and finally, recommends security education, training and awareness (SETA) for organisations to combat these threats.…”
Get full text
Proceeding Paper -
166
Information Leakage through online social networking: opening the doorway for advanced persistence threats
Published 2011“…It also describes how OSN becomes an attack vector of APT owing to employees’ social networking behaviour, and finally, discusses security education, training and awareness (SETA) for organizations to combat these threats.…”
Get full text
Article -
167
Language planning and policy in Nigeria: the prospects of arabic language
Published 2015“…Several efforts are been made to influence the function of Arabic language in Nigeria owing to its long historical antecedents in the country but successive governments have been coming up with different language policies that contribute to the development and decline of the use of Arabic language in Nigeria. …”
Get full text
Get full text
Article -
168
Throughput evaluation for the downlink scenario of co-tier interference in heterogeneous network
Published 2015“…To extend the coverage and capacity of Heterogeneous Networks (HetNets), femtocells (HeNodeBs) has been impressive to deploy in in-house or apartment. Owing to co-channel spectrum involvement these HeNodeB sources Co-Tier interference (CTI) with neighbor HeNodeBs and users of HeNodeB (HUE) in orthogonal frequency division multiplexing Access (OFDMA). …”
Get full text
Article -
169
Green biosynthesis of silver nanoparticles using ‘Polygonum hydropiper’ and study its catalytic degradation of methylene blue
Published 2016“…Plant mediated synthesis of silver nanoparticles is gaining more importance owing its simplicity, rapid rate of synthesis of nanoparticles and eco-friendliness. …”
Get full text
Article -
170
Traumatic adrenal haemorrhage : a case report
Published 2009“…The prevalence of adrenal haemorrhage among patients with blunt abdominal trauma undergoing CT scanning is 2%, among which 60% occur on the right side, 25% on the left and 15% are bilateral. …”
Get full text
Proceeding Paper -
171
Evaluation of artificial reef in Tioman Island
Published 2012“…Eleven sites of artificial reefs were surveyed in June 2012 and the locations of artificial reefs were determined by using side scan sonar. The survey consists of underwater photography and videography. …”
Get full text
Get full text
Proceeding Paper -
172
Metastatic neuroendocrine tumor of small cell type in a kidney transplant recipient
Published 2016“…He had a remarkably elevated serum lactate dehydrogenase levels with multiple metastatic masses in the left inguinal, left iliac fossa, and right lower abdominal wall on abdominal computed tomography scan. Excisional biopsy of a left inguinal node revealed extensive infiltration with malignant cells in it. …”
Get full text
Get full text
Article -
173
Improvement of accuracy and speed of a commercial AFM using Positive Position Feedback control
Published 2009“…As a result, they were susceptible to piezoelectric creep, thermal drift, hysteresis nonlinearity and scan-induced vibration. These effects tend to distort the generated image. …”
Get full text
Proceeding Paper -
174
Evaluating the accessibility and visibility of Quranic websites
Published 2010“…It is futile to have a website that is difficult to access by users owing to non compliance with the accessibility guidelines. …”
Get full text
Proceeding Paper -
175
The Non-party Caretaker Government (NCG) for conducting elections: Bangladesh as a case study
Published 2011“…However, the fourth one suffered a setback owing to composition imbroglio and was replaced by a military-backed Caretaker Government. …”
Get full text
Proceeding Paper -
176
A comparative ride performance and dynamic analysis of passive and semi-active suspension systems based on different vehicle models
Published 2009“…In this work our focus will be on discrete models, which have more popularity with ground vehicle analysts owing to their shorter computational time and lower cost compared with continuous models. …”
Get full text
Article -
177
Stability and rupture of nano-liquid film (NLF) flowing down an inclined plane
Published 2005“…The growth of instability tends to be explosive near rupture, owing to excessive buildup of van der Waals attraction. …”
Get full text
Article -
178
Small claims court's procedure for small claims business dispute
Published 2006“…It is best and cheaper to simply rely on diplomacy, patient and luck in getting the money due and owing from the scrupulous guy. Though, justice that is delayed is as good as justice is being denied, but in this case, justice is not simply delayed, instead, is not seen to be done. …”
Get full text
Article -
179
Optimization of robust and LQR control parameters for half car model using genetic algorithm
Published 2019“…A half car model is considered in this research to study the effects in passenger owing to different road profiles. The weights of Robust H-infinity and LQR controller are obtained using Genetic Algorithm on a half car model with two different types of usually existing road disturbance.The design parameters of both the active controller varies with various road profiles. …”
Get full text
Get full text
Article -
180
An anti-amoebic composition
Published 2020“…In Acanthamoeba keratitis cases, the diagnosis is often difficult and delayed due to its resemblance to bacterial or fungal keratitis. Owing to failure in early diagnosis and error in prescription, the Acanthamoeba keratitis infection in the patient may risk developing into permanent blindness. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Patent