Browse Items (28 total)

26860-71348-1-PB.pdf
Piezoelectric materials are capable of generating electricity in response to mechanical strain, making them suitable for energy harvesting applications. Piezoelectric energy harvesters (PEHs) are promising alternatives for renewable energy…

26613-69001-1-PB.pdf
Grid-integrated photovoltaic (PV) systems are currently undergoing explosive growth in Malaysia. However, as more PV systems are installed close to transmission lines, there are concerns about the impact of electromagnetic (EM) properties affecting…

26498-68989-1-PB.pdf
Normal people’s interaction and communication are easier than those with disabilities
such as hearing and speech, which are very complicated; hence, the
use of sign language plays a crucial role in bridging this gap in communication.
While…

26450-68992-1-PB.pdf
Modern aeroponic systems leverage internet of things (IoT) technology for automated control of climate, lighting, and nutrient delivery, rendering them susceptible to unauthorized access and network attacks. Such disruptions can lead to financial…

26443-69002-1-PB.pdf
The growing popularity of chip-based devices has spurred interest in developing on-chip antennas (OCAs). However, low gain and poor radiation characteristics have been significant challenges. Integrating an artificial magnetic conductor (AMC) into…

26272-68986-1-PB.pdf
Floods damage ecosystem of the affected area resulting in destruction, loss of asset and life.

26163-69000-1-PB.pdf
This paper investigates the effectiveness of traditional machine learning techniques, namely linear regression and random forest (RF), in enhancing the detection of money laundering (ML) activities within financial systems. As ML schemes evolve in…

26121-68980-1-PB.pdf
The article analyzes approaches to the use of cloud technologies in the process of teaching students at large universities. The model of the academic cloud of a modern university is considered. Examples of software and functional platforms that meet…

26080-68996-1-PB.pdf
Image encryption is a critical process aimed at securing digital images, safeguarding them from unauthorized access, tampering, or viewing to ensure the confidentiality and integrity of sensitive visual information. In this research, we integrate…

26078-68995-1-PB.pdf
Image encryption is a vital field ensuring the secure transmission of digital images. In this study, encryption is the core process, employing complex mathematical algorithms and cryptographic keys to transform the original image into a secure…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2