-
1
Skala ketagihan internet Chen (CIAS)
Published 2020“…Bahasa Malaysia translated version of Chen internet addiction scale…”
Get full text
Get full text
Copyright -
2
PeerMate: a malicious peer detection algorithm for P2P systems based on MSPCA
Published 2012“…Many reputation management schemes have been introduced to assist peers to choose the most trustworthy collaborators in P2P environment where honest peers coexist with malicious ones. …”
Get full text
Proceeding Paper -
3
Linearizing peer-to-peer systems with Oracles
Published 2013“…We study distributed linearization or topological sorting in peer-to-peer networks. We define strict and eventual variants of the problem. …”
Get full text
Proceeding Paper -
4
-
5
Application of multistage homotopy-perturbation method for the solutions of the Chen system
Published 2009“…In this paper, a new reliable algorithm based on an adaptation of the standard homotopy-perturbation method (HPM) is applied to the Chen system which is a three-dimensional system of ODEs with quadratic nonlinearities. …”
Get full text
Article -
6
Peer-to-peer video-on-demand in future internet
Published 2013“…We highlight that the Peer-to-Peer (P2P) protocol is one of the most popular techniques for downloading data, viewing online channels, and/or watching Video-on-Demand (VoD) movies. …”
Get full text
Book Chapter -
7
-
8
-
9
Self- and Peer-Assessment: the case of Peer Supervision in Counselling Psychology
Published 2011“…Peer supervision is widely recognised within health services vocational training as a rich source of learning for clinical trainees. …”
Get full text
Article -
10
-
11
Implementation and self-checking of different adder circuits
Published 2020Get full text
Book Section -
12
-
13
Optical coherence tomography and visual acuity: photoreceptor loss
Published 2012Get full text
Get full text
Book Chapter -
14
PMDA: A malicious peer detection algorithm for P2P systems
Published 2011“…Many reputation management schemes have been introduced to assist peers in choosing trustworthy collaborators in P2P environments where honest peers coexist with malicious ones. …”
Get full text
Article -
15
-
16
Discovering Doris Lessing: convergences between Islam and her thoughts
Published 2016“…The 2007 Nobel literature laureate Doris Lessing (1919-2013) is one of the twentieth century’s most prolific and versatile British writers. Her literary career is marked by the robustness and diversity of her ideas. …”
Get full text
Article -
17
Securing peer-to-peer mobile communications using public key cryptography: new security strategy
Published 2011“…Third party servers were used to check the certificates, authenticating the communicating parties, key distribution, etc. …”
Get full text
Article -
18
Developing a coherent theoretical framework for Forest School in the UK
Published 2022“…This work is set within the context of other research on FS, an examination of which leads to the proposition that what is missing from this whole body of research is a coherent theoretical framework. This thesis draws out that framework and presents it as a systematic and synthesised interdisciplinary whole. …”
Get full text
Thesis -
19
Two dimensional array based overlay network for balancing load of peer-to-peer live video streaming
Published 2013“…In case of departure of a peer with additional upload bandwidth, the overlay network becomes very vulnerable to chur n. …”
Get full text
Proceeding Paper -
20
Two dimensional array based overlay network for balancing load of peer-to-peer live video streaming
Published 2013“…In case of departure of a peer with additional upload bandwidth, the overlay network becomes very vulnerable to churn. …”
Get full text
Get full text
Article