-
1
Comparing Developmental Trajectories of Loophole Behavior in Autistic and Neurotypical Children
Published 2024“…Loophole behavior is a common strategy used by neurotypical children to avoid trouble. …”
Get full text
Thesis -
2
-
3
Free will in device-independent cryptography
Published 2014“…This thesis addresses the so-called `free will loophole', presenting Bell tests and associated cryptographic protocols robust against adversarial manipulation of the random number generators with which measurements in a Bell test are selected.…”
Thesis -
4
Adjudicator determines own jurisdiction : a prediction for the proposed construction industry payment and adjudication act
Published 2010“…It is can be learnt that there is loophole in the provisions of the proposed CIPAA which can continue the jurisdictional challenge as been experience by the HGCRA 1996. …”
Thesis -
5
Adjudicator determines own jurisdiction: a prediction for the proposed construction industry payment and adjudication act
Published 2010“…It is can be learnt that there is loophole in the provisions of the proposed CIPAA which can continue the jurisdictional challenge as been experience by the HGCRA 1996. …”
Get full text
Thesis -
6
China's charm in Southeast Asia revisited : a study of political implication of South China Sea conflict on China's soft power in Southeast Asia
Published 2013“…Whilst there is a limited source in explaining further the nature of soft power in various circumstances, this dissertation concerns basically in the ‘loophole’ on the explanation of how soft power works and whether hard power can influence, especially in the case of the growing tension in South China Sea. …”
Get full text
Thesis -
7
Just war or just peace? : humanitarian intervention and international law
Published 2000“…The thesis begins with an examination of the genealogy of this right, and arguments that it may have survived the passage of the Charter, either through a loophole in Article 2(4) or as part of customary international law. …”
Thesis -
8
Illustrative cases of fraud in a bank: types, causes, distresses and mitigators / Surida Mat Piah
Published 2013“…The internal control systems of the bank are found to be able to detect fraud and can be considered as effective but there is still a loophole in the system that the bank needs to address. …”
Get full text
Thesis -
9
Formal relationships in sequential object systems
Published 2010“…</p><p> The root cause of this correctness loophole is the failure of specifications to capture such relationships adequately as well as their correctness requirements. …”
Thesis -
10
Sexting: a comparative study of child sexual criminalogy between Australia and Malaysia / Nur Liyana Rosli, Nur Shafiqah Nor Azelan and Fatimah Zubaidah Mohd Zabidi
Published 2010“…The key task in relation to the ways would be to find some sort of exception, defense or something along those lines excluding sexting from child pornography offences while at the same time avoiding creating some sort of a loophole that can be used by serious child pornography offenders.…”
Get full text
Thesis -
11
Penambahbaikan tatacara pengurusan permohonan pecah bahagian tanah
Published 2022“…As a result, there is a potential loophole that can be manipulated especially by landowners who want to develop his land. …”
Get full text
Thesis -
12
Failure analysis of a low-cost domestic permanent fault indicator and its solution
Published 2020“…Simulation, as well as laboratory experiments, were conducted for testing the response of Permanent Fault Indicator on a real scenario. The loophole (false indication when loads are connected) was identified and solved through the development of a low-cost prototype. …”
Get full text
Thesis -
13
Detecting and preventing unauthorised computer access on a physical network system
Published 2008“…At any corporate network, a number of active port are located through out the organization, this could be a loophole for a security breach. A hacker may enter the network by inserting a cable to an active port which is not secure within the building. …”
Get full text
Thesis -
14
Secure analog-to-digital conversion against power side-channel attack
Published 2020Get full text
Thesis -
15
Transit usage and urban form : lessons for transit reliant neighborhoods
Published 2012Get full text
Thesis -
16
The philosopher masked as literary theorist: 'cunning intelligence' (metis) instantiated in Bakhtin's rhetorical style
Published 2016“…Bakhtin’s two figures of speech: the word with a 'backward glance' «слово с оглядкой» and the word with a 'loophole' «слово с лазейкой» encapsulate this convergence of theory and life. …”
Thesis -
17
Islamic Compliance Quality Management System (Icqms): An Analysis From Islamic Epistemology, Tasawwur And Ontology Perspectives
Published 2016“…In-depth examinations of QMS theoretical foundation on both Islamic compliance and conventional application have been reviewed to evaluate and comprehend the differences between both applications. The loophole of ICQMS MS 1900 is highlighted for the betterment and future improvement.…”
Get full text
Thesis -
18
A source code perspective C overflow vulnerabilities exploit taxonomy based on well-defined criteria / Nurul Haszeli Ahmad
Published 2015“…One of the main causes lies in the C software developers themselves, who inadvertently introduced these vulnerabilities due to their lack of understanding of vulnerabilities being the security loophole. To educate them, researchers have constructed C overflow vulnerabilities taxonomies. …”
Get full text
Thesis -
19
Three essays on asset pricing
Published 2024“…By exploiting the tax loophole, investors can potentially earn a better return than the index. …”
Thesis -
20
Device-independent key distribution between trapped-ion quantum network nodes
Published 2022“…This is enabled by a record-high detection-loophole-free CHSH inequality violation of 2.677(6) and low quantum bit error rate of 1.44(2) %, stable across millions of Bell pairs, and an improved security analysis and post-processing pipeline. …”
Thesis