Showing 1 - 20 results of 28 for search '"loophole"', query time: 0.07s Refine Results
  1. 1
  2. 2

    Winterson’s philosophy of love in relation to language and grand narratives. by Lim, Lee Lian.

    Published 2010
    “…One would think that this form of criticism embedded in a love story immediately effaces the concept of love, and serves to give the reader the impression that love is a fallacy; Winterson’s writing techniques serve to enhance and strengthen her philosophy of love, using the loophole that the above mentioned form of criticism creates to further amplify her argument. …”
    Get full text
    Final Year Project (FYP)
  3. 3

    Design of FPGA based testing platform for modern memory by Li, Zehao

    Published 2020
    “…It utilizes the existing loophole of dual port RAMs of an FPGA. With the opposite logic values write to same address simultaneously, the data stored in the bit cell will become undeterminable caused by transient short circuit of the back to back inverter. …”
    Get full text
    Final Year Project (FYP)
  4. 4

    China's charm in Southeast Asia revisited : a study of political implication of South China Sea conflict on China's soft power in Southeast Asia by Nandyatama, Randy Wirasta

    Published 2013
    “…Whilst there is a limited source in explaining further the nature of soft power in various circumstances, this dissertation concerns basically in the ‘loophole’ on the explanation of how soft power works and whether hard power can influence, especially in the case of the growing tension in South China Sea. …”
    Get full text
    Thesis
  5. 5

    Assessing 12-year military reform in Indonesia : major strategic gaps for the next stage of reform by Iisgindarsah, Sebastian, Leonard C.

    Published 2012
    “…With regard to the final point, this paper discerns three major strategic gaps that undermine the processes of military reform in Indonesia, namely: the “regulation loophole”, the “defence-economic gap” and the “shortcomings of democratic civilian control”. …”
    Get full text
    Get full text
    Working Paper
  6. 6

    Design and development of biometric-based techniques for e-security by Woon, Qing Yong.

    Published 2010
    “…Banks, military and other high security organization introduced a token as a 2nd factor authentication but it still proves security loophole and bring inconvenience to user. Passwords are being forgotten, tokens are lost, security being compromised. …”
    Get full text
    Final Year Project (FYP)
  7. 7

    Bangladesh: Checking Violent Extremism by Bashar, Iftekharul

    Published 2016
    “…Rather than denying the growing transnational linkages of the local terrorist groups, Bangladesh must plug the loopholes in its counterterrorism strategy.…”
    Get full text
    Get full text
    Commentary
  8. 8

    Xinjiang unrest: catalyst for new grand vision for China? by Li, Mingjiang

    Published 2016
    “…The 5 July Xinjiang incident has its roots in the loopholes of China’s developmental approach. It is obsessed with growth at the expense of social justice and governance, especially at the local levels. …”
    Get full text
    Get full text
    Commentary
  9. 9

    Insured financial options by Shu, Jian Jun

    Published 2011
    “…This paper also addresses the “loopholes” of prevailing market practices and attempts to fill the void by proposing a third entity framework, potentially gaining benefits from the situation.…”
    Get full text
    Get full text
    Conference Paper
  10. 10

    Automated lab attendance management system for SCSE by Qwek, Zhi Hui

    Published 2021
    “…This process resulted in loopholes where students circumvented the system through buddy punching. …”
    Get full text
    Final Year Project (FYP)
  11. 11

    Digital rights management system by Otto, Charlie Nathanael.

    Published 2011
    “…However, there are still possibilities for people to manipulate unknown loopholes within the system to illegally consume media content. …”
    Get full text
    Final Year Project (FYP)
  12. 12

    The possibility of winning in casino table games using probability theory and game theory. by Chia, Derrine Mei Mei., Ku, Sin Huei., Li, Ying Zhu.

    Published 2009
    “…The objective of this project is to look for loopholes in certain casino table games so as to reduce the house edge of the various games to the lowest. …”
    Get full text
    Final Year Project (FYP)
  13. 13

    Analysis of smart contract development platforms by Huang, Shaohang

    Published 2022
    “…However, many flaws and loopholes for respective platforms were gradually discovered as the platforms started to scale. …”
    Get full text
    Final Year Project (FYP)
  14. 14

    Secure fingerprint authentication by Lim, Wen Jun.

    Published 2010
    “…However, issues like key management and loopholes in data transmission are still a problem. …”
    Get full text
    Final Year Project (FYP)
  15. 15

    American fuzzy lop (AFL) fuzzing by Goh, Brandon Wen Heng

    Published 2019
    “…This final year project introduces the concept of fuzzing to discover flaws in code, and expose loopholes that might have the potential to cause damage to computer systems. …”
    Get full text
    Final Year Project (FYP)
  16. 16

    FPGA-based investigation of coding and detection for non-volatile memories by Lim, Melvin Heng Li

    Published 2015
    “…This thesis therefore demonstrates numerous propositions pertaining to cost-effective high-throughput implementation of the LDPC decoders on field-programmable gate-array (FPGA) hardware, alongside ingenious techniques to compensate for certain performance loopholes in LDPC decoding. Moreover, the possibility and potential of amalgamating two or more of the proposed works have been accomplished and substantiated in this thesis, rendering a concerted effect of high-throughput decoding and low-complexity realization while retaining outstanding decoding performances.…”
    Get full text
    Thesis
  17. 17

    WCF based communication bridge between privacy preserving online social network and a client side standalone application by Singh, Sabharwal Shahbaaz Deep

    Published 2014
    “…This update was relayed to the users in light of many security loopholes being exploited by hackers around the globe. …”
    Get full text
    Final Year Project (FYP)
  18. 18

    Remote-controlled robot with wireless video streaming & image processing by Yare, Feng Shui

    Published 2017
    “…As most of the surveillance systems available currently are mounted in a fixed position, this means that more than one visual surveillance device has to be employed to cover loopholes of the surveillance system known as the "blind spot", i.e. the areas that are beyond the surveillance circumference of the system. …”
    Get full text
    Final Year Project (FYP)
  19. 19

    Deconstruction-reconstruction : the experiential catalogue of time passes by Tan, Jenson Gabriel Hong Charn

    Published 2021
    “…In line with this process, the project aims to analyse the loopholes when exhibitions are shifting digitally and explore the significance of this phenomena. …”
    Get full text
    Final Year Project (FYP)
  20. 20

    Solving real world security problems hacking and protection : a knowledege-based open-source online firmware security tools evaluation by Kang, Wei Bin

    Published 2021
    “…This also resolves the vulnerabilities, loopholes, and loose ends in a code or application. …”
    Get full text
    Final Year Project (FYP)