Search Results - "Yusof, Yusnita"
-
1
Improving Environmental Performance Through Innovative Academic Citizenship Behaviour: Green Training and Development, Green Recruitment and Selection as Antecedents in Jordanian Government University
Published in Economics (Bijeljina.) (01-04-2024)“…Education institutions are thought to be largely responsible for environmental pollution even though businesses of all shapes and sizes contribute to this…”
Get full text
Journal Article -
2
Elagolix treatment in women with heavy menstrual bleeding associated with uterine fibroid: a systematic review and meta-analysis
Published in BMC women's health (15-01-2022)“…Elagolix is effective and safe for treating menorrhagia in women with uterine fibroid. However, it is reported to be associated with hypoestrogenism that can…”
Get full text
Journal Article -
3
Organizational performance with disruptive factors and inventory control as a mediator in public healthcare of Punjab, Pakistan
Published in Management science letters (2021)“…The organizational performance at Punjab healthcare is crucial and often faces stock-outs of critical medicines and equipment at emergency department of…”
Get full text
Journal Article -
4
Efficacy of Oral Mixed Tocotrienols in Diabetic Peripheral Neuropathy: A Randomized Clinical Trial
Published in JAMA neurology (01-04-2018)“…Management of painful diabetic peripheral neuropathy remains challenging. Most therapies provide symptomatic relief with varying degrees of efficacy…”
Get more information
Journal Article -
5
A CROSS SECTIONAL SURVEY OF PULMONARY TUBERCULOSIS AMONG ELDERLY DIABETICS ATTENDING PRIMARY CARE CLINICS IN PENANG, MALAYSIA
Published in Southeast Asian journal of tropical medicine and public health (01-03-2019)“…Latent tuberculosis (TB) is more likely to convert to active TB with increasing age and with poorly controlled diabetes mellitus (DM). We aimed to determine…”
Get full text
Journal Article -
6
Overview of Financial Fraud Digital Forensic Investigation Framework
Published in 2021 14th International Conference on Developments in eSystems Engineering (DeSE) (07-12-2021)“…Financial fraud cases are dangerously escalating. Industries and consumers are struggling to prevent being victims of fraud cases. Fraudsters typically aim to…”
Get full text
Conference Proceeding -
7
EAGLE: GUI-Based Penetration Testing Tool for Scanning and Enumeration
Published in 2021 14th International Conference on Developments in eSystems Engineering (DeSE) (07-12-2021)“…Penetration testing is a security exercise that is carried out by penetration testers to identify and exploit vulnerabilities in a system. Many penetration…”
Get full text
Conference Proceeding -
8
DFBC Recon Tool: Digital Footprint and Breach Check Reconnaissance Tool
Published in 2021 14th International Conference on Developments in eSystems Engineering (DeSE) (07-12-2021)“…Nowadays, Internet is no longer private. Web service providers are trying to extract every single piece of user data for analytics or advertising purposes so…”
Get full text
Conference Proceeding -
9
Automated Nmap Toolkit
Published in 2022 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC) (19-11-2022)“…Information gathering is one of the most important methodologies within Cybersecurity allowing pen-testers and security researchers to find information about a…”
Get full text
Conference Proceeding -
10
CyberGeeksMY: Public Awareness on Website Vulnerability and Proposed Idea of 'Smuggy' Prototype
Published in 2022 IEEE 2nd International Conference on Mobile Networks and Wireless Communications (ICMNWC) (02-12-2022)“…The needs on online-based activities are increasing tremendously as the worldwide is currently in COVID-19 pandemic situation and most people are being bounded…”
Get full text
Conference Proceeding -
11
State-of-the-art digital watermarking attacks
Published in 2012 International Conference on Computer and Communication Engineering (ICCCE) (01-07-2012)“…Digital watermarking is a huge research area which is progressively growing. It covers theoretical studies, novel techniques, attacks and performance analysis…”
Get full text
Conference Proceeding -
12
Performance evaluations of digital watermarking systems
Published in 2012 8th International Conference on Information Science and Digital Content Technology (ICIDT2012) (01-06-2012)“…A description of performance evaluation methods according to imperceptibility and robustness properties is presented in this paper. Imperceptibility can be…”
Get full text
Conference Proceeding -
13
Digital watermarking for digital images using wavelet transform
Published in 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications (01-05-2007)“…The field of digital watermarking has recently seen vast interests covering theoretical studies, novel techniques, attacks and analysis. This is due to the…”
Get full text
Conference Proceeding -
14
SMS banking transaction as an alternative for information, transfer and payment at merchant shops in Malaysia
Published in 2013 3rd International Conference on Information Technology and e-Services (ICITeS) (01-03-2013)“…This paper discusses Mobile Banking and Payment Systems using Short Message Services (SMS). The main goal of this system is to make banking services available…”
Get full text
Conference Proceeding -
15
Imperceptibility and robustness analysis of DWT-based digital image watermarking
Published in 2008 International Conference on Computer and Communication Engineering (01-05-2008)“…Digital watermarking is distinctive depending on the techniques used and its intended applications. This paper concentrates on invisible digital image…”
Get full text
Conference Proceeding -
16
An improved wavelet digital watermarking software implementation
Published in 2012 International Conference on Computer and Communication Engineering (ICCCE) (01-07-2012)“…There are quite a number of researches in proposing digital image watermarking using Discrete Wavelet Transform (DWT). However, it is clearly observed that…”
Get full text
Conference Proceeding -
17
Establishing of knowledge based framework for situational awareness using Nonaka's and Endsley's models
Published in 2016 International Conference on Information and Communication Technology (ICICTM) (2016)“…Up to this moment, there is no knowledge based framework with situational awareness using the combination of two models: Nonaka and Endsley. These models can…”
Get full text
Conference Proceeding