Harmful data that affect ethical, religious, and social values of Internet users in education process
| Main Author: | Hameed, Shihab A. |
|---|---|
| Format: | Book Chapter |
| Language: | English |
| Published: |
IIUM Press
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/18214/ http://irep.iium.edu.my/18214/1/Harmful_Data_that_Affect_Ethical.pdf |
Similar Items
Fast UWB wireless connectivity for MIMO multi-user
by: Mohammed, Ahmed R., et al.
Published: (2013)
by: Mohammed, Ahmed R., et al.
Published: (2013)
Computer and electronic devices waste: analytical study
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Face verification : an introduction
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Introduction to fingerprint verification
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Enhancement of voip and video streaming performance over IEEE802.11e WLAN
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Internet-based troubleshooting and monitoring system of industrial robots
by: Rahman, Md. Mozasser, et al.
Published: (2015)
by: Rahman, Md. Mozasser, et al.
Published: (2015)
Evaluation of MAC's distributed queuing algorithm for Internet of things applications
by: Agel, Mabruka Mohamed, et al.
Published: (2017)
by: Agel, Mabruka Mohamed, et al.
Published: (2017)
Performance evaluation of lightweight Crypto functions for Internet of things applications
by: Jaleel, Nubila, et al.
Published: (2020)
by: Jaleel, Nubila, et al.
Published: (2020)
Application of mobile cloud computing in emergency health care
by: Hameed, Shihab A., et al.
Published: (2019)
by: Hameed, Shihab A., et al.
Published: (2019)
Introduction to multicast mobility management
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
An efficient bilateral remote user authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Attacks on Shen et. al.’s remote user authentication scheme and defense*
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Current trend in Image Guided Surgery(IGS)
by: Aboaba, Abdulfattah A., et al.
Published: (2011)
by: Aboaba, Abdulfattah A., et al.
Published: (2011)
QOS multicast routing in MANETs
by: Qabajeh, Mohammad, et al.
Published: (2011)
by: Qabajeh, Mohammad, et al.
Published: (2011)
Speaker’s variabilities, technology and language issues that affect automatic speech and speaker recognition systems
by: Abushariah, Mohammad A. M., et al.
Published: (2011)
by: Abushariah, Mohammad A. M., et al.
Published: (2011)
Decision tree ensemble construction incorporating feature values modification and random subspace method
by: Akhand, M. A. H, et al.
Published: (2014)
by: Akhand, M. A. H, et al.
Published: (2014)
Analysis of Indonesian sentiment text based on affective space model (ASM) using electroencephalogram (EEG) signals
by: Hulliyah, Khodijah, et al.
Published: (2017)
by: Hulliyah, Khodijah, et al.
Published: (2017)
Transducers-to-microcntroller interfaces-software solution approach
by: Adetunji, Lawal Wahab, et al.
Published: (2011)
by: Adetunji, Lawal Wahab, et al.
Published: (2011)
Frequent itemset mining in high dimensional data: a review
by: Md. Zaki, Fatimah Audah, et al.
Published: (2019)
by: Md. Zaki, Fatimah Audah, et al.
Published: (2019)
Pavement condition analysis via vehicle mounted accelerometer data
by: Mohiddeen, Ahmad Jazlan, et al.
Published: (2020)
by: Mohiddeen, Ahmad Jazlan, et al.
Published: (2020)
Design and implementation of an optimal fuzzy logic controller using egentic algorithm
by: Abdulazeez, Salami Femi, et al.
Published: (2011)
by: Abdulazeez, Salami Femi, et al.
Published: (2011)
Ethical challenges of informatin technology : an Islamic perspective
by: Khalifa, Othman Omran, et al.
Published: (2006)
by: Khalifa, Othman Omran, et al.
Published: (2006)
Use and abuse of technology : Internet as a case study
by: Faris, Waleed Fekry, et al.
Published: (2011)
by: Faris, Waleed Fekry, et al.
Published: (2011)
Tumor volume determination technique using pixel filling and discrete integral function
by: Aboaba, Abdulfattah A., et al.
Published: (2015)
by: Aboaba, Abdulfattah A., et al.
Published: (2015)
Bringing order in segments for a robust network in mobile services
by: Muhyiddeen, Abdulfattah, et al.
Published: (2015)
by: Muhyiddeen, Abdulfattah, et al.
Published: (2015)
Adaptive interval type-2 fuzzy logic controller for autonomous mobile robot
by: Shill, P.C., et al.
Published: (2014)
by: Shill, P.C., et al.
Published: (2014)
Particle swarm optimization with partial search for solving traveling salesman problem
by: Akhand, M. A. H, et al.
Published: (2014)
by: Akhand, M. A. H, et al.
Published: (2014)
The proposal of partial sharing for link-sharing method of buffer in NoC router
by: Fukase, Naohisa, et al.
Published: (2014)
by: Fukase, Naohisa, et al.
Published: (2014)
Effects of high neutron fluence on the electrical characteristics of InAs quantum dot structures
by: Ahmad Fauzi, Dhiyauddin, et al.
Published: (2013)
by: Ahmad Fauzi, Dhiyauddin, et al.
Published: (2013)
3MeV-electron beam induced threshold voltage shifts and drain current degradation on ZVN3320FTA & ZVP3310FTA commercial MOSFETs
by: Abubakkar, Sheik Fareed Ookar, et al.
Published: (2014)
by: Abubakkar, Sheik Fareed Ookar, et al.
Published: (2014)
Design and optimization of alLow-voltage shunt capacitive RF-MEMS switch
by: Ma, Li Ya, et al.
Published: (2014)
by: Ma, Li Ya, et al.
Published: (2014)
Design and analysis of a low-voltage electrostatic
actuated RF CMOS-MEMS switch
by: Ma, Li Ya, et al.
Published: (2013)
by: Ma, Li Ya, et al.
Published: (2013)
Equivalent circuit modeling of two-port Al-doped Zinc Oxide CMOS SAW resonator using MATLAB™
by: Md Ralib @ Md Raghib, Aliza 'Aini, et al.
Published: (2013)
by: Md Ralib @ Md Raghib, Aliza 'Aini, et al.
Published: (2013)
Comparative analysis of zinc oxide and aluminium doped ZnO for GHz CMOS MEMS surface acoustic wave resonator
by: Md Ralib @ Md Raghib, Aliza 'Aini, et al.
Published: (2013)
by: Md Ralib @ Md Raghib, Aliza 'Aini, et al.
Published: (2013)
Finite element modeling of SAW resonator in CMOS technology for single and double interdigitated electrode (IDT) structure
by: Md Ralib @ Md Raghib, Aliza 'Aini, et al.
Published: (2013)
by: Md Ralib @ Md Raghib, Aliza 'Aini, et al.
Published: (2013)
Cytotoxicity studies of lung cancer cells using impedance biosensor
by: Mohd Mansor, Ahmad Fairuzabadi, et al.
Published: (2015)
by: Mohd Mansor, Ahmad Fairuzabadi, et al.
Published: (2015)
Screen printed impedance biosensor for cytotoxicity studies of lung carcinoma cells
by: Mohd Mansor, Ahmad Fairuzabadi, et al.
Published: (2016)
by: Mohd Mansor, Ahmad Fairuzabadi, et al.
Published: (2016)
Design and simulation of 10 MHz MEMS oscillator
by: Taufik, Mohamad Syamsi, et al.
Published: (2014)
by: Taufik, Mohamad Syamsi, et al.
Published: (2014)
Piezoelectric thin films for double electrode CMOS MEMS surface acoustic wave (SAW) resonator
by: Md Ralib @ Md Raghib, Aliza 'Aini, et al.
Published: (2015)
by: Md Ralib @ Md Raghib, Aliza 'Aini, et al.
Published: (2015)
Design and simulation of RF-CMOS SPST switch for reconfigurable RF front-end
by: Soeroso, Iksannurazmi Bambang, et al.
Published: (2014)
by: Soeroso, Iksannurazmi Bambang, et al.
Published: (2014)
Similar Items
-
Fast UWB wireless connectivity for MIMO multi-user
by: Mohammed, Ahmed R., et al.
Published: (2013) -
Computer and electronic devices waste: analytical study
by: Hameed, Shihab A., et al.
Published: (2011) -
Face verification : an introduction
by: Hameed, Shihab A., et al.
Published: (2011) -
Introduction to fingerprint verification
by: Hameed, Shihab A., et al.
Published: (2011) -
Enhancement of voip and video streaming performance over IEEE802.11e WLAN
by: Hameed, Shihab A., et al.
Published: (2011)