Showing 281 - 300 results of 2,178 for search '(((((hone OR hongge) OR (pone OR done)) OR (zhonge OR phong)) OR hoonge) OR (hon OR soon))'s', query time: 0.21s Refine Results
  1. 281
  2. 282
  3. 283
  4. 284
  5. 285
  6. 286

    Development of an advanced nano-satellite VELOX-I – a micro-thruster system by Gay, Dexter Kai Wei.

    Published 2013
    “…Testing was done using wire wrapping. This helped to boost the efficiency by 50%. …”
    Get full text
    Final Year Project (FYP)
  7. 287

    Against the dying of the light. by Lee, Jieying.

    Published 2009
    “…Done in traditional 2D animation with stylised character designs, this short film explores the following ideas: that cynicism soon seeps into miracles, that some things are more important than others, and that there is, almost always, a choice to be made.…”
    Get full text
    Final Year Project (FYP)
  8. 288

    Design and implementation of a CDMA modem for Ku-band simulator by Foo, Jong Chin.

    Published 2008
    “…This thesis presents the research and development work done on designing and developing a CDMA modem for Ku-band simulator.…”
    Get full text
    Thesis
  9. 289

    Demand for higher education in Singapore. by Chia, Wilson., Yap, Si Guan., Teo, Bee Cheng.

    Published 2008
    “…This is a survey done on NUS and NTU undergraduates to elicit their response for the need for higher education after the undergraduate level. …”
    Get full text
    Final Year Project (FYP)
  10. 290

    SUPERHERO OF LOVE : HEAL YOUR BROKEN HEART & THEN GO SAVE THE WORLD / by Fonger, Bridget, 1962-, author 655765

    Published 2019
    “…Readers will develop and hone their powers of Super Sight, Super Hearing, Super Humility, Super Self-Love, and Super Alignment to build their connection to their own hearts, the ultimate source of love in their lives…”
    text
  11. 291
  12. 292

    EFFECTIVE THREAT INVESTIGATION FOR SOC ANALYSTS : The ultimate guide to examining various threats and attacker techniques using security logs / by Yahia, Mostafa, author 656270

    Published 2023
    “…This book provides insights into the most common cyber threats and various attacker techniques to help you hone your incident investigation skills. The book begins by explaining phishing and email attack types and how to detect and investigate them, along with Microsoft log types such as Security, System, PowerShell, and their events. …”
    Get full text
    Get full text
    software, multimedia
  13. 293

    Development of heuristic analysis guidelines for game interface on mobile phones by Tan, Chee Boon.

    Published 2008
    “…If mobile phone owners experienced poor gaming interaction, they will soon lost the interest in mobile phone games.…”
    Get full text
    Thesis
  14. 294
  15. 295
  16. 296

    VR chemistry lab by Shaanmugam, MN

    Published 2021
    “…The development of the application was done in Unity Engine and was designed to be run on an Oculus Quest 2 hardware.…”
    Get full text
    Final Year Project (FYP)
  17. 297

    Trend of temperature changes in Singapore by Wang, Qian.

    Published 2009
    “…Lastly, the writer proposed a number of possible mitigation measures for different impact scenarios that the authority have done or could be carried out.…”
    Get full text
    Final Year Project (FYP)
  18. 298

    Traffic management system designs by Ng, Jackson Jian Cheng.

    Published 2009
    “…Although several researches have been done in this field, but as traffic problems are fast-evolutionary and highly interactive, only few practical projects have been implemented. …”
    Get full text
    Final Year Project (FYP)
  19. 299
  20. 300