Showing 101 - 120 results of 12,318 for search '(((((bees OR peers) OR beens) OR bees) OR beer) OR (((checkers OR checks) OR hackers) OR checked))', query time: 0.20s Refine Results
  1. 101

    Development of an industrial SCADA firewall prototype using single board computer - part 2 by Teo, Joycelyn Li Ting

    Published 2019
    “…Cyber security has always been of great importance. Even more so in this age, as we move into the 4th industrial revolution. …”
    Get full text
    Final Year Project (FYP)
  2. 102

    Smart-contract privacy preservation mechanism by Siraj, Muhammed, Ninggal, Mohd. Izuan Hafez, Udzir, Nur Izura, Abdullah, Muhammad Daniel Hafiz, Asmawi, Aziah

    Published 2023
    “…Sensitive records stored in the cloud such as healthcare records, private conversation and credit card information are targets of hackers and privacy abuse. Current information and record management systems have difficulties achieving privacy protection of such sensitive records in a secure, transparent, decentralized and trustless environment. …”
    Get full text
    Article
  3. 103

    Tournament induced incentives and analysts' boldness. by Yin, Huifang.

    Published 2012
    “…This finding survives several robustness checks and is more pronounced when the interim assessment date is closer to the end of the tournament period, when analysts are inexperienced/non-all-star, and when the market activity is high. …”
    Get full text
    Thesis
  4. 104

    Design of blockchain-based P2P energy trading framework and a SCADA system for distributed energy resources in microgrids by Li, Yao

    Published 2022
    “…This project mainly completed the development and implementation of a peer-to-peer (P2P) energy trading framework between prosumers based on an Ethereum private blockchain network. …”
    Get full text
    Thesis-Master by Coursework
  5. 105

    Encrypted smartphone with advanced encryption standard 256 by Tan, Alvin Chee Munn.

    Published 2011
    “…However, in this digital age, mobile users cannot take the confidentiality of data transfer for granted because of the presence of hackers and the threats that exist. In today’s market, various encryption suites are available for mobile users to send their SMS “safely” and offer different ways of encryption and decryption such as symmetry cryptography and asymmetric cryptography. …”
    Get full text
    Final Year Project (FYP)
  6. 106

    Finite element analysis on post-buckling of thin-walled structures using ANSYS by Theint, Yi Mon

    Published 2015
    “…The results obtained were checked against experimental data and led to the development and the revision of design procedures for the pin-ended lipped column and hollow box section.…”
    Get full text
    Final Year Project (FYP)
  7. 107

    Design and development of a web-based platform for EEE MSc student orientation by Soo, Serena Keng Shuang

    Published 2023
    “…The main aim of the web application is for students to have cultural exchanges, to explore Singapore, and to engage in school life by forming interest groups with like-minded peers.…”
    Get full text
    Final Year Project (FYP)
  8. 108

    Reframing stigma in Tourette syndrome: an updated scoping review by Pring, K, Malli, M, Hardy, BW, Rapp, SR, Storch, EA, Mink, JW, Martindale, JM

    Published 2023
    “…On the individual level, youth with PTD had lower self-esteem than peers, often leading to fear of future stigmatization, avoidant behaviors, and self-stigmatization. …”
    Journal article
  9. 109

    Influence of non-linear wave load models on monopile supported offshore wind turbines for extreme conditions by Ryan, GV, Tang, T, McAdam, RA, Adcock, TAA

    Published 2025
    “…These models are compared to the widely used constrained wave approach, showing that significant differences are predicted for steel and geotechnical design checks. This suggests that the industry standard approach may be inappropriate for the design of monopile structures against extreme wave loads.…”
    Journal article
  10. 110

    Average velocity of grains moving over a channel bed by Song, Chengwei

    Published 2016
    “…Therefore, the results in today’s experiment are going to be checked against the results in the past paper. In order to obtain better analytical results, the idea of dimensional analysis is applied in the discussion. …”
    Get full text
    Final Year Project (FYP)
  11. 111

    Part I : Ranking of 2004 financial sector reforms and liberalisation of ASEAN 10+5 economies. by Khoo, Miaosi., Seah, Terence Choon Kiat., Shahirah Arshad.

    Published 2008
    “…This study aims to motivate the ASEAN 10+5 economies to push for greater financial reforms and liberalisation by ranking and comparing them with their regional peers.…”
    Get full text
    Final Year Project (FYP)
  12. 112

    Design and development of small scale index matching tunnel by Tan, Yu Tiong

    Published 2017
    “…Then, the results of the experiment are cross-checked with the theoretical equations, an analysis is being accounted for the difference in result. …”
    Get full text
    Final Year Project (FYP)
  13. 113

    Developing of innovative and cool mobile applications on the Googles Android powered devices 5 by Arun Mohan

    Published 2014
    “…Sports Info is tailored to meet the expectations of smart phone users who regularly checks sports updates like match schedules, score card and important sports news.…”
    Get full text
    Final Year Project (FYP)
  14. 114

    Enriching students’ cross-cultural and multilingual communication: the serious play approach utilizing Playmobil pro figures by Meletiadou, Eleni

    Published 2024
    “…Thematic analysis was used to analyse the data which revealed that Playmobil pro facilitated intercultural communication in the post-COVID-19 era as students seemed to be unwilling to work with their peers in face-to-face classes, possibly suffering from trauma. …”
    Get full text
    Article
  15. 115

    Tournaments of financial analysts by Yin, Huifang, Zhang, Huai

    Published 2013
    “…This finding survives several robustness checks and is more pronounced when the interim assessment date is closer to the end of the tournament period, when analysts are inexperienced, and when the market activity is high. …”
    Get full text
    Get full text
    Journal Article
  16. 116

    Human factors evaluation of conflict resolution aid in future air traffic control by Pereira, Theresse Vanessa

    Published 2014
    “…In 1929, the airport operator employed him to prevent collisions between aircrafts and his tools of communication were simply a red flag to indicate “hold” and a checked one for “go”. With the advancement of technology over the next few decades, high tech equipment were integrated into air traffic control, such as the radar, to meet the growing number of flights as more people turned to aeroplanes as a means of commercial transport. …”
    Get full text
    Final Year Project (FYP)
  17. 117

    Can good ESG performance help companies resist external shocks? by Yang, Xin, Sheikh Hassan, Ahmad Fahmi, Karbhari, Yusuf

    Published 2024
    “…Our results remain robust even after a series of rigorous robustness checks.…”
    Get full text
    Article
  18. 118

    Normal People / by Rooney, Sally, author 631806, Faber (Online service) 656045

    Published 2018
    “…Well-off Marianne blossoms at university, becoming pretty and popular, while Connell struggles for the first time in his life to fit in properly with his peers. The two weave in and out of each other's lives during their university years, developing an intense bond that exposes their traumas and insecurities.…”
    Get full text
    software, multimedia
  19. 119

    The Inspiration Design Toolkit: A Human-Centered Design Tool for a System Engineering Course by Lee, Sheng-Hung, Yang, Maria C, Carramolino, Beatriz, Rudnik, John

    Published 2024
    “…The aim of the IDT is to improve the participants’ learning experience and course engagement, increase opportunities for them to interact with their peers and teaching team, enable them to practice and reinforce the concepts through the creation of their own IDT cards, and share the cards in the discussion to increase learners’ engagement with course material and peers. …”
    Get full text
    Article
  20. 120

    Machine learning for industrial IOT by Yeow, Brandon Wei Liang

    Published 2023
    “…This paper concludes by proposing an algorithm for peer-to-peer Federated Learning where clients search for peers up to the 𝑘th degree and perform the best actions with 𝑛 peers under bandwidth constraints. …”
    Get full text
    Final Year Project (FYP)