-
241
A model of information security and competition
Published 2024“…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
Journal article -
242
The Importance of Bystanders in Threat Assessment and Management
Published 2025“…They are the reason that some planned attacks are foiled before they occur. Numerous studies of targeted violence (e.g., mass shootings and school shootings), have demonstrated that peers and bystanders often have knowledge of an attacker’s intentions, concerning communication, and troubling behavior before the attack occurs. …”
Get full text
Book chapter -
243
Challenges of online collaborative learning among special needs university students
Published 0002“…In addition, they also did not have many issues with assistance tools and technology when doing online work with their peers. In conclusion, to ensure that SNS have a meaningful learning experience in collaborative learning, all parties should be made aware of and given exposure on working with SNS in all educational institutions in the online setting.…”
Get full text
Article -
244
TDSF: Two-phase tamper detection in semi-fragile watermarking using two-level integer wavelet transform
Published 2025“…The initial phase will check four segments to determine the tampered bit or not. …”
Get full text
Article -
245
Influence of presumed influence on thinness as a beauty ideal for girls.
Published 2008“…It was interesting that when it comes to the influence on the desire to be thin, we could only see that the “influence of self” has an impact on the desire to be thin. …”
Get full text
Thesis -
246
Practical fuzzing on open-source projects
Published 2022“…Hackers exploiting software vulnerabilities found in all software programs, resulting in unfavorable outcomes, which is a major concern in software security. …”
Get full text
Final Year Project (FYP) -
247
Encrypted smartphone with advanced encryption standard 256
Published 2011“…Mobile users are enticed by this secondary form of mobile communication because of its generally low cost when compared to making a phone call. However, in this digital age, mobile users cannot take the confidentiality of data transfer for granted because of the presence of hackers and the threats that exist. …”
Get full text
Final Year Project (FYP) -
248
GPU-accelerated real-time motion planning for safe human-robot collaboration
Published 2024“…Our method guarantees the safety of human operators in the sense that the robot will collide only when the robot has a zero velocity, in accordance with ISO safety standards. …”
Get full text
Thesis-Doctor of Philosophy -
249
Laser driver (ACC - auto current control) for driving laser diode in LED and laser modes
Published 2008“…The circuit implemented is such that is portable and able to cater for few applications such as visual inspection of a laser diode and fiber checker.…”
Get full text
Thesis -
250
Study of cascade failures of power grids
Published 2013“…The effects of the high and low load attacks are identical at α = 0.8 and only when α 1 then high load attack will cause a greater cascading failure. …”
Get full text
Final Year Project (FYP) -
251
Design and development of small scale index matching tunnel
Published 2017“…Suitable design and sodium thiosulfate is used, to overcome the issue of rapid oxidation of the sodium iodide solution when it is exposed to the atmosphere. Then, the results of the experiment are cross-checked with the theoretical equations, an analysis is being accounted for the difference in result. …”
Get full text
Final Year Project (FYP) -
252
Please, let me go /
Published 2017“…At a time when the abuse ring realities of young white women in Rotherham and other major English cities are coming to light, Caitlin's story will appal readers - not just because of the degree of horrific attacks which were perpetrated upon her, but also because of the ways in which the authorities refused to act. …”
text -
253
Design and development of a web-based platform for EEE MSc student orientation
Published 2023“…Transition is a phase that all students face when they advance from an educational level to the next. …”
Get full text
Final Year Project (FYP) -
254
Software implementation of side-channel analysis on AES encryption with different key length
Published 2022“…Cryptographic algorithms such as Advanced Encryption Standard (AES) are usually strong against mathematical attacks even with a huge amount of computing power. …”
Get full text
Final Year Project (FYP) -
255
The GCSE attainment gap: assessing the influence of permanent school exclusion
Published 2025“…Research has shown that pupils who have been permanently excluded are at a greater risk of negative life outcomes when compared with their non-excluded peers. However, the idea that disadvantaged groups are disproportionately represented amongst those excluded has not previously been tested in prior work. …”
Get full text
Get full text
Article -
256
Contribution of problems and exercises at end chapters plus book interactive online exercises MCQ In: Cryptography and Network Security: Principles and Practice, Global Edition, 8t...
Published 2024“…In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. …”
Book -
257
The Mark of Cain: The crime of terrorism in times of armed conflict as interpreted by the Court of Appeal of England and Wales in R v. Mohammed Gul
Published 2013“…On 22 February 2012, the Court of Appeal of England and Wales was called on to interpret the definition of the crime of terrorism as contained in relevant United Kingdom (UK) legislation. When confronted with defence arguments grounded in international law, the Court denied that attacks by non-state armed groups against governmental armed forces in a non-international armed conflict may be exempted from being labelled as terrorist acts. …”
Journal article -
258
Machine learning for industrial IOT
Published 2023“…The algorithm preferentially chooses to run FedAvg to reduce bandwidth cost unless historically this peer has not provided significant improvement. Sharing data is done when there is little improvement left for FedAvg to achieve and we have sufficient bandwidth for it.…”
Get full text
Final Year Project (FYP) -
259
Towards a more trustworthy generative artificial intelligence
Published 2024“…However, with these advancements comes new challenges, especially in ensuring the robustness and reliability of such models when faced with adversarial attacks. Adversarial attacks are attacks that exploits the vulnerabilities of Generative AI models by subtly altering the input data, also known as perturbations, to deceive the models into making hallucinated, distorted, or incorrect predictions. …”
Get full text
Final Year Project (FYP) -
260
StudentGO web application
Published 2023“…It would also strongly promote a community of students who help each other when in need.…”
Get full text
Final Year Project (FYP)