Showing 1 - 20 results of 60 for search '"loophole"', query time: 0.07s Refine Results
  1. 1

    Comparing Developmental Trajectories of Loophole Behavior in Autistic and Neurotypical Children by Broski, Annalisa

    Published 2024
    “…Loophole behavior is a common strategy used by neurotypical children to avoid trouble. …”
    Get full text
    Thesis
  2. 2
  3. 3

    Free will in device-independent cryptography by Pope, JE

    Published 2014
    “…This thesis addresses the so-called `free will loophole', presenting Bell tests and associated cryptographic protocols robust against adversarial manipulation of the random number generators with which measurements in a Bell test are selected.…”
    Thesis
  4. 4

    Adjudicator determines own jurisdiction : a prediction for the proposed construction industry payment and adjudication act by Mohd. Yusop, Imran

    Published 2010
    “…It is can be learnt that there is loophole in the provisions of the proposed CIPAA which can continue the jurisdictional challenge as been experience by the HGCRA 1996. …”
    Thesis
  5. 5

    Adjudicator determines own jurisdiction: a prediction for the proposed construction industry payment and adjudication act by Mohd. Yusop, Imran

    Published 2010
    “…It is can be learnt that there is loophole in the provisions of the proposed CIPAA which can continue the jurisdictional challenge as been experience by the HGCRA 1996. …”
    Get full text
    Thesis
  6. 6

    China's charm in Southeast Asia revisited : a study of political implication of South China Sea conflict on China's soft power in Southeast Asia by Nandyatama, Randy Wirasta

    Published 2013
    “…Whilst there is a limited source in explaining further the nature of soft power in various circumstances, this dissertation concerns basically in the ‘loophole’ on the explanation of how soft power works and whether hard power can influence, especially in the case of the growing tension in South China Sea. …”
    Get full text
    Thesis
  7. 7

    Just war or just peace? : humanitarian intervention and international law by Chesterman, S

    Published 2000
    “…The thesis begins with an examination of the genealogy of this right, and arguments that it may have survived the passage of the Charter, either through a loophole in Article 2(4) or as part of customary international law. …”
    Thesis
  8. 8

    Illustrative cases of fraud in a bank: types, causes, distresses and mitigators / Surida Mat Piah by Mat Piah, Surida

    Published 2013
    “…The internal control systems of the bank are found to be able to detect fraud and can be considered as effective but there is still a loophole in the system that the bank needs to address. …”
    Get full text
    Thesis
  9. 9

    Formal relationships in sequential object systems by Kerfoot, E

    Published 2010
    “…</p><p> The root cause of this correctness loophole is the failure of specifications to capture such relationships adequately as well as their correctness requirements. …”
    Thesis
  10. 10

    Sexting: a comparative study of child sexual criminalogy between Australia and Malaysia / Nur Liyana Rosli, Nur Shafiqah Nor Azelan and Fatimah Zubaidah Mohd Zabidi by Rosli, Nur Liyana, Nor Azelan, Nur Shafiqah, Mohd Zabidi, Fatimah Zubaidah

    Published 2010
    “…The key task in relation to the ways would be to find some sort of exception, defense or something along those lines excluding sexting from child pornography offences while at the same time avoiding creating some sort of a loophole that can be used by serious child pornography offenders.…”
    Get full text
    Thesis
  11. 11

    Penambahbaikan tatacara pengurusan permohonan pecah bahagian tanah by Mohd. Ramaly, Bazilah

    Published 2022
    “…As a result, there is a potential loophole that can be manipulated especially by landowners who want to develop his land. …”
    Get full text
    Thesis
  12. 12

    Failure analysis of a low-cost domestic permanent fault indicator and its solution by Aslam, Muhammad Amad

    Published 2020
    “…Simulation, as well as laboratory experiments, were conducted for testing the response of Permanent Fault Indicator on a real scenario. The loophole (false indication when loads are connected) was identified and solved through the development of a low-cost prototype. …”
    Get full text
    Thesis
  13. 13

    Detecting and preventing unauthorised computer access on a physical network system by Mohd. Shariff, Muhammad Reza

    Published 2008
    “…At any corporate network, a number of active port are located through out the organization, this could be a loophole for a security breach. A hacker may enter the network by inserting a cable to an active port which is not secure within the building. …”
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    The philosopher masked as literary theorist: 'cunning intelligence' (metis) instantiated in Bakhtin's rhetorical style by Cook, J

    Published 2016
    “…Bakhtin’s two figures of speech: the word with a 'backward glance' «слово с оглядкой» and the word with a 'loophole' «слово с лазейкой» encapsulate this convergence of theory and life. …”
    Thesis
  17. 17

    Islamic Compliance Quality Management System (Icqms): An Analysis From Islamic Epistemology, Tasawwur And Ontology Perspectives by Othman, Khatijah

    Published 2016
    “…In-depth examinations of QMS theoretical foundation on both Islamic compliance and conventional application have been reviewed to evaluate and comprehend the differences between both applications. The loophole of ICQMS MS 1900 is highlighted for the betterment and future improvement.…”
    Get full text
    Thesis
  18. 18

    A source code perspective C overflow vulnerabilities exploit taxonomy based on well-defined criteria / Nurul Haszeli Ahmad by Ahmad, Nurul Haszeli

    Published 2015
    “…One of the main causes lies in the C software developers themselves, who inadvertently introduced these vulnerabilities due to their lack of understanding of vulnerabilities being the security loophole. To educate them, researchers have constructed C overflow vulnerabilities taxonomies. …”
    Get full text
    Thesis
  19. 19

    Three essays on asset pricing by Li, W

    Published 2024
    “…By exploiting the tax loophole, investors can potentially earn a better return than the index. …”
    Thesis
  20. 20

    Device-independent key distribution between trapped-ion quantum network nodes by Nadlinger, DP

    Published 2022
    “…This is enabled by a record-high detection-loophole-free CHSH inequality violation of 2.677(6) and low quantum bit error rate of 1.44(2) %, stable across millions of Bell pairs, and an improved security analysis and post-processing pipeline. …”
    Thesis