-
1
The Syria alumni threat : legal loopholes and inadequate de-radicalisation
Published 2017Get full text
Get full text
Commentary -
2
Winterson’s philosophy of love in relation to language and grand narratives.
Published 2010“…One would think that this form of criticism embedded in a love story immediately effaces the concept of love, and serves to give the reader the impression that love is a fallacy; Winterson’s writing techniques serve to enhance and strengthen her philosophy of love, using the loophole that the above mentioned form of criticism creates to further amplify her argument. …”
Get full text
Final Year Project (FYP) -
3
Design of FPGA based testing platform for modern memory
Published 2020“…It utilizes the existing loophole of dual port RAMs of an FPGA. With the opposite logic values write to same address simultaneously, the data stored in the bit cell will become undeterminable caused by transient short circuit of the back to back inverter. …”
Get full text
Final Year Project (FYP) -
4
China's charm in Southeast Asia revisited : a study of political implication of South China Sea conflict on China's soft power in Southeast Asia
Published 2013“…Whilst there is a limited source in explaining further the nature of soft power in various circumstances, this dissertation concerns basically in the ‘loophole’ on the explanation of how soft power works and whether hard power can influence, especially in the case of the growing tension in South China Sea. …”
Get full text
Thesis -
5
Assessing 12-year military reform in Indonesia : major strategic gaps for the next stage of reform
Published 2012“…With regard to the final point, this paper discerns three major strategic gaps that undermine the processes of military reform in Indonesia, namely: the “regulation loophole”, the “defence-economic gap” and the “shortcomings of democratic civilian control”. …”
Get full text
Get full text
Working Paper -
6
Design and development of biometric-based techniques for e-security
Published 2010“…Banks, military and other high security organization introduced a token as a 2nd factor authentication but it still proves security loophole and bring inconvenience to user. Passwords are being forgotten, tokens are lost, security being compromised. …”
Get full text
Final Year Project (FYP) -
7
Bangladesh: Checking Violent Extremism
Published 2016“…Rather than denying the growing transnational linkages of the local terrorist groups, Bangladesh must plug the loopholes in its counterterrorism strategy.…”
Get full text
Get full text
Commentary -
8
Xinjiang unrest: catalyst for new grand vision for China?
Published 2016“…The 5 July Xinjiang incident has its roots in the loopholes of China’s developmental approach. It is obsessed with growth at the expense of social justice and governance, especially at the local levels. …”
Get full text
Get full text
Commentary -
9
Insured financial options
Published 2011“…This paper also addresses the “loopholes” of prevailing market practices and attempts to fill the void by proposing a third entity framework, potentially gaining benefits from the situation.…”
Get full text
Get full text
Conference Paper -
10
Automated lab attendance management system for SCSE
Published 2021“…This process resulted in loopholes where students circumvented the system through buddy punching. …”
Get full text
Final Year Project (FYP) -
11
Digital rights management system
Published 2011“…However, there are still possibilities for people to manipulate unknown loopholes within the system to illegally consume media content. …”
Get full text
Final Year Project (FYP) -
12
The possibility of winning in casino table games using probability theory and game theory.
Published 2009“…The objective of this project is to look for loopholes in certain casino table games so as to reduce the house edge of the various games to the lowest. …”
Get full text
Final Year Project (FYP) -
13
Analysis of smart contract development platforms
Published 2022“…However, many flaws and loopholes for respective platforms were gradually discovered as the platforms started to scale. …”
Get full text
Final Year Project (FYP) -
14
Secure fingerprint authentication
Published 2010“…However, issues like key management and loopholes in data transmission are still a problem. …”
Get full text
Final Year Project (FYP) -
15
American fuzzy lop (AFL) fuzzing
Published 2019“…This final year project introduces the concept of fuzzing to discover flaws in code, and expose loopholes that might have the potential to cause damage to computer systems. …”
Get full text
Final Year Project (FYP) -
16
FPGA-based investigation of coding and detection for non-volatile memories
Published 2015“…This thesis therefore demonstrates numerous propositions pertaining to cost-effective high-throughput implementation of the LDPC decoders on field-programmable gate-array (FPGA) hardware, alongside ingenious techniques to compensate for certain performance loopholes in LDPC decoding. Moreover, the possibility and potential of amalgamating two or more of the proposed works have been accomplished and substantiated in this thesis, rendering a concerted effect of high-throughput decoding and low-complexity realization while retaining outstanding decoding performances.…”
Get full text
Thesis -
17
WCF based communication bridge between privacy preserving online social network and a client side standalone application
Published 2014“…This update was relayed to the users in light of many security loopholes being exploited by hackers around the globe. …”
Get full text
Final Year Project (FYP) -
18
Remote-controlled robot with wireless video streaming & image processing
Published 2017“…As most of the surveillance systems available currently are mounted in a fixed position, this means that more than one visual surveillance device has to be employed to cover loopholes of the surveillance system known as the "blind spot", i.e. the areas that are beyond the surveillance circumference of the system. …”
Get full text
Final Year Project (FYP) -
19
Deconstruction-reconstruction : the experiential catalogue of time passes
Published 2021“…In line with this process, the project aims to analyse the loopholes when exhibitions are shifting digitally and explore the significance of this phenomena. …”
Get full text
Final Year Project (FYP) -
20
Solving real world security problems hacking and protection : a knowledege-based open-source online firmware security tools evaluation
Published 2021“…This also resolves the vulnerabilities, loopholes, and loose ends in a code or application. …”
Get full text
Final Year Project (FYP)