Search Results - "Weakest Link"

Refine Results
  1. 1

    The effect of baroque music on the PassPoints graphical password by Gao, Haichang, Ren, Zhongjie, Chang, Xiuling, Liu, Xiyang, Aickelin, Uwe

    Published 2010
    “…The crux of the problem is users’ memory limitations. Users are the weakest link in password authentication mechanism. It shows that baroque music has positive effects on human memorizing and learning. …”
    Get full text
  2. 2

    Line following robot using MC68HC11 by Mohd Anwar, Jahrani

    Published 2009
    “…Unreliability and inefficiency in this part of the assembly line formed the weakest link. The project is to automate this sector, using carts to follow a line instead of laying railway tracks which are both costly and an inconvenience. …”
    Get full text
    Get full text
  3. 3

    Deciphering the physicochemical and microscopical changes in Ganoderma boninense-infected oil palm woodblocks under the influence of phenolic compounds by Surendran, Arthy, Siddiqui, Yasmeen, Ahmad, Khairulmazmi, Fernanda, Rozi

    Published 2021
    “…The threat of Ganoderma boninense, the causal agent of basal stem rot disease, in the oil palm industry warrants finding an effective control for it. The weakest link in the disease management strategy is the unattended stumps/debris in the plantations. …”
    Get full text
  4. 4

    Digital empathy and supply chain cybersecurity challenges: concept, framework and solutions for small-medium enterprises by Gani, Anisha Banu Dawood, Fernando, Yudi

    Published 2022
    “…Despite contributing significantly to the world’s economy and being the most targeted by cybercriminals for being the weakest link in the supply chain, small-medium enterprises (SMEs) lag behind cybersecurity implementation. …”
    Get full text
    Get full text
  5. 5

    Rapport management in air traffic control in Malaysian aviation discourse. by Paramasivam, Shamala

    Published 2011
    “…Oral communication is documented as the weakest link in air traffic control interactions and one of the primary causes of aviation accidents and incidents. …”
    Get full text
  6. 6

    Tuning a Kalman filter carrier tracking algorithm in the presence of ionospheric scintillation by Susi, Melania, Andreotti, Marcus, Aquino, Marcio, Dodson, Alan

    Published 2016
    “…In order to mitigate scintillation effects at receiver level, the robustness of the carrier tracking loop, the receiver weakest link under scintillation, must be enhanced. Kalman Filter (KF) based tracking algorithms are particularly suitable to cope with the variable working conditions imposed by scintillation. …”
    Get full text
  7. 7

    7P's marketing strategy affecting customer's purchase intentions towards Global Market Operation of Deutsche Bank, Kuala Lumpur / Mohd Khairi Mohd Hanafiah by Mohd Hanafiah, Mohd Khairi

    Published 2008
    “…The result indicates that the staffs / personnel factor explained the highest proportion of customer's purchase intentions towards GM OPS of Deutsche Bank Malaysia Berhad. The weakest link in the 7P's marketing strategy would be the promotional activities and process of banking transaction that are not aggressively and accurately performed in order to create customer awareness and enhance customer's satisfactions. …”
    Get full text
  8. 8

    Analyzing the shear performance of dapped wet vertical wall-to-wall connection by Amril Hadri Jamaludin, Noorsuhada Md Nor, Amir Khomeiny Ruslan, Soffian Noor Mat Saliah, Ahmad Syauqi Md Hassan, Mohd Azrizal Fauzi, Shahrum Abdullah, Fatma Sakinah Razali

    Published 2024
    “…One critical aspect of precast construction is the connection between wall panels, where it is one of the proven to be the weakest link in the system. Rigidity of the connection between panels was also a point of concern. …”
    Get full text
    Get full text
  9. 9
  10. 10

    Fatigue strength of mortise and tenon furniture joints made from oil palm lumber and some Malaysian timbers. by Ratnasingam, Jegatheswaran, Ioras, Florin, McNulty, Thomas

    Published 2010
    “…The fact that furniture joints are the weakest link in the furniture structure, it is necessary to establish its strength performance especially under repeated loading as experienced by the chair in service. …”
    Get full text
    Get full text
  11. 11

    Automatic diabetic retinopathy detection and classification system by Omar, Zainab Awatif, Hanafi, Marsyita, Mashohor, Syamsiah, Mahfudz, Nur Faten Munirah, Abdul Muna'aim, Maimunah

    Published 2017
    “…However, the manual screening process is the weakest link as it is a complicated and time-consuming process. …”
    Get full text
    Get full text
  12. 12

    Modeling of dynamic response of desktop computer’s motherboard due to drop impact by Abdul Malik, Mohd. Maarif

    Published 2010
    “…These connections are the weakest link in the system so realibility of the entire system depends on them. …”
    Get full text
    Get full text
  13. 13

    Improved receiver tracking models for scintillation monitoring by Susi, Melania

    Published 2017
    “…In order to mitigate scintillation effects at receiver level, the robustness of the carrier tracking loop, the receiver’s weakest link under scintillation, must be enhanced. Thanks to their adaptive nature, Kalman Filter (KF) based tracking algorithms are particularly suitable to cope with the variable working conditions imposed by scintillation. …”
    Get full text
  14. 14

    Information security policy perceived compliance among staff in Palestine universities: An empirical pilot study by Mohammad Iriqat, Yousef, Ahlan, Abdul Rahman, Abdul Molok, Nurul Nuha

    Published 2019
    “…Being the possible insider threats to Information Security, employees are often coined as the weakest link. Both employees and organizations should be aware of this raising challenge. …”
    Get full text
    Get full text
    Get full text
  15. 15

    Investigation of Security Awareness on e-Learning System Among Lecturers and Students in Higher Education Institution by Hasmanizam, Abdul Majid, Mazlina, Abdul Majid, Mohd Izham, Ibrahim, Wan Nurul Safawati, Wan Manan, Muhammed Ramiza, Ramli

    Published 2015
    “…Human is identified as the weakest link in information security and lack of security awareness such as password sharing will compromise the security of e-learning system. …”
    Get full text
    Get full text
    Get full text
  16. 16

    Cybersecurity behavioural model for students in the tertiary institutions / Fatokun Faith Boluwatife by Fatokun Faith , Boluwatife

    Published 2020
    “… Humans are majorly identified as the weakest link in cybersecurity. Tertiary institution student’s face lot of cybersecurity issues due to their increased Internet exposure, however cybersecurity behavioural studies focusing on tertiary students is limited. …”
    Get full text
    Get full text
    Get full text
  17. 17

    Effectiveness of a trauma triage educational programme on knowledge and skill of emergency nurses in public hospitals in the West Bank, Palestine by Mohd Awwad, Khalaf Abdelfattah

    Published 2023
    “…Phase One – Trauma triage care is the weakest link in developing-country hospitals. Low levels of knowledge and skill will harm the trauma triage system and increase medical errors in hospitals. …”
    Get full text
    Get full text
  18. 18

    Towards designing effective security messages: Persuasive password guidelines by Zakaria, Nur Haryani, Katuk, Norliza

    Published 2013
    “…In many cases human factors were attributed as the cause of the problem.Humans are well known as the weakest link in the security chain.Commonly, end-users will depend on security messages when confronted with security-related decision making. …”
    Get full text
  19. 19

    Recent challenges for the enforcement of wildlife laws in East Malaysia by Ho Nyuk Onn @ Ariffin, Mariani

    Published 2018
    “…Law enforcement is one of the weakest links in wildlife conservation. This paper analyses the main challenges facing wildlife law enforcement in East Malaysia and identifies the enforcement strategy used by wildlife officers in the region. …”
    Get full text
    Get full text
  20. 20

    Awareness of social engineering among IIUM students by Adam, Mutasim Elsadig, Yousif, Omer, Amodi, Yusra, Ibrahim, Jamaludin

    Published 2011
    “…The concept of social engineering is essentially to manipulate the users of a system, that are considered to be the weakest links on the chain, in order to get said information. …”
    Get full text
    Get full text