Showing 101 - 120 results of 6,443 for search '(((((bees OR peers) OR beads) OR bees) OR beer) OR ((checkers OR hackers) OR checked))', query time: 0.18s Refine Results
  1. 101

    Synbiotic encapsulation against Vibrio parahaemolyticus infection in whiteleg shrimps by Wei, Guangmin, Tay, Moon Yue Fen, Kamaja, Vamshi Krishna, Chan-Park, Mary B.

    Published 2024
    “…Coculture method indicated that synbiotic beads reduce viability of Vibrio parahaemolyticus by 3 orders of magnitude. …”
    Get full text
    Journal Article
  2. 102

    Influence of presumed influence on thinness as a beauty ideal for girls. by Soh, Wai Siong.

    Published 2008
    “…On the other hand, if the “influence on significant others or female peers” exerts an impact on “influence on self”, it will result in desire to be thin.…”
    Get full text
    Thesis
  3. 103

    Embedded Object Detection and Mapping in Soft Materials Using Optical Tactile Sensing by Solano-Castellanos, Jose A., Do, Won Kyung, Kennedy, Monroe D.

    Published 2024
    “…To demonstrate the effectiveness of the method, we tested our approach on an experimental setup that consists of a series of quartz beads located underneath a polyethylene foam that prevents direct observation of the configuration and requires the use of tactile exploration to recover the location of the beads. …”
    Get full text
    Article
  4. 104

    Challenges of online collaborative learning among special needs university students by Hidayu Shafie, Ireena Nasiha Ibnu, Noori, Abdullah, Nurhilleny Rosly, Nadia Anuar, Nur Husna Serip Mohamad

    Published 0002
    “…Based on the findings of the study, it was found that the SNS in this study mostly had problems communicating with their peers during online collaborative learning. They were not really lacking in collaborative skills, but they were more concerned about their peers’ perspectives on their disabilities, and their abilities to do group work. …”
    Get full text
    Article
  5. 105

    Engineering of In Vitro 3D Capillary Beds by Self-Directed Angiogenic Sprouting by Chan, Juliana Maria, Zervantonakis, Ioannis K., Rimchala, Tharathorn, Polacheck, William Joseph, Whisler, Jordan, Kamm, Roger Dale

    Published 2013
    “…Here, we report the engineering of 3D capillary beds in an in vitro microfluidic platform that is comprised of a biocompatible collagen I gel supported by a mechanical framework of alginate beads. The engineered vessels have patent lumens, form robust ~1.5 mm capillary networks across the devices, and support the perfusion of 1 µm fluorescent beads through them. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 106

    A model of information security and competition by de Cornière, A, Taylor, G

    Published 2024
    “…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
    Journal article
  7. 107

    Covalent immobilization of aminoacylase to alginate for L-phenylalanine production by Lee, Pat M., Lee, Kong H., Siaw, Yew S.

    Published 1993
    “…The beads showed stable activity under operational conditions, they lost about 40% of their activity after four reaction cycles. …”
    Article
  8. 108

    Contribution of problems and exercises at end chapters plus book interactive online exercises MCQ In: Cryptography and Network Security: Principles and Practice, Global Edition, 8t... by Stallings, Wiliam

    Published 2024
    “…In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. …”
    Book
  9. 109

    Control of microstructure architecture of polycaprolactone electrospun scaffolds by Rajendran, R., Ham, W. J., Low, C. Y., Alexander, C. H. C., Koh, C. T.

    Published 2024
    “…The beads formation was reduced by adding PBS salt solution and increasing the distance of the collector plate from the needle tip. …”
    Get full text
    Conference or Workshop Item
  10. 110

    Changes in microbial and physicochemical properties during free-cell and encapsulated probiotic fermentation of red dragon fruit juice by Ong, Yien Yien

    Published 2014
    “…The viability loss of encapsulated probiotic in red dragon fruit juice can be further improved with 1% (w/v) calcium alginate beads with 107 to 109 cfu/g of probiotic in the beads. …”
    Get full text
    Thesis
  11. 111

    Design language in packaging. by Wijaya, Merwyn.

    Published 2012
    “…Craid is a fictitious brand of Irish beer that is designed based on this essential role. …”
    Get full text
    Final Year Project (FYP)
  12. 112

    Lesbian rights and recognition in Singapore : lesbian relationships should be accepted legally and socially. by Yu, Bertinelli Shasha.

    Published 2013
    “…Family, religion and politics can negatively affect one’s lesbian identity while the support from peers can be empowering to their lesbian identity. …”
    Get full text
    Final Year Project (FYP)
  13. 113

    Enhancing security in generic e-Commerce systems by Mak, Foo Keong.

    Published 2010
    “…One of the most common security features found in today e-Commerce application is the Secure Socket Layer (SSL) connection and even with SSL alone, it may not be sufficient to withstand hackers’ attacks. It may cause great losses to the store owner if their online store is broken into. …”
    Get full text
    Final Year Project (FYP)
  14. 114

    Spooky action in the film/novel debate. by Lee, Tracy Marie Shiyin., Luo, Esmonde Jianwen., Wong, Kai Wing., Manoj Prabhoda Chandran., Chee, Kang Xiong.

    Published 2012
    “…The installation follows a Collector, Photographer, Writer and a Collective (a beer garden group that gathers at the local coffeeshop) in their daily life as they contemplate the curious events, and each other, in an attempt to cope with the boredom they face in the neighbourhood. …”
    Get full text
    Final Year Project (FYP)
  15. 115

    Development of an industrial SCADA firewall prototype using single board computer - part 2 by Teo, Joycelyn Li Ting

    Published 2019
    “…Threats such as the rise in hackers, cyber espionage and increased influence of radical activists’ groups cannot be undermined. …”
    Get full text
    Final Year Project (FYP)
  16. 116

    Smart-contract privacy preservation mechanism by Siraj, Muhammed, Ninggal, Mohd. Izuan Hafez, Udzir, Nur Izura, Abdullah, Muhammad Daniel Hafiz, Asmawi, Aziah

    Published 2023
    “…Sensitive records stored in the cloud such as healthcare records, private conversation and credit card information are targets of hackers and privacy abuse. Current information and record management systems have difficulties achieving privacy protection of such sensitive records in a secure, transparent, decentralized and trustless environment. …”
    Get full text
    Article
  17. 117

    Design of blockchain-based P2P energy trading framework and a SCADA system for distributed energy resources in microgrids by Li, Yao

    Published 2022
    “…This project mainly completed the development and implementation of a peer-to-peer (P2P) energy trading framework between prosumers based on an Ethereum private blockchain network. …”
    Get full text
    Thesis-Master by Coursework
  18. 118

    Investigations into high resolution imaging and contouring for diagnostic bio-applications by Valiyambath, Krishnan Mohankumar

    Published 2016
    “…The capability of the system was demonstrated using micron-sized fluorescent polystyrene beads and cells mounted on a microscope slide. Besides providing imaging capability, the imaging fibre can double up as a light conduit to illuminate the target tissue, which would be in synergy with the first two modalities, namely, the RGB and the dynamic speckle analyses. …”
    Get full text
    Thesis
  19. 119

    Encrypted smartphone with advanced encryption standard 256 by Tan, Alvin Chee Munn.

    Published 2011
    “…However, in this digital age, mobile users cannot take the confidentiality of data transfer for granted because of the presence of hackers and the threats that exist. In today’s market, various encryption suites are available for mobile users to send their SMS “safely” and offer different ways of encryption and decryption such as symmetry cryptography and asymmetric cryptography. …”
    Get full text
    Final Year Project (FYP)
  20. 120

    Design and development of a web-based platform for EEE MSc student orientation by Soo, Serena Keng Shuang

    Published 2023
    “…The main aim of the web application is for students to have cultural exchanges, to explore Singapore, and to engage in school life by forming interest groups with like-minded peers.…”
    Get full text
    Final Year Project (FYP)