Search alternatives:
beers » bears (Expand Search), beer (Expand Search), bees (Expand Search)
coars » coarse (Expand Search), coar (Expand Search), cars (Expand Search)
car » coar (Expand Search), care (Expand Search)
cheers » cheer (Expand Search), cheaters (Expand Search), checkers (Expand Search)
trackers » tracker (Expand Search), attackers (Expand Search), traces (Expand Search)
checks » check (Expand Search)
beers » bears (Expand Search), beer (Expand Search), bees (Expand Search)
coars » coarse (Expand Search), coar (Expand Search), cars (Expand Search)
car » coar (Expand Search), care (Expand Search)
cheers » cheer (Expand Search), cheaters (Expand Search), checkers (Expand Search)
trackers » tracker (Expand Search), attackers (Expand Search), traces (Expand Search)
checks » check (Expand Search)
-
161
Design of blockchain-based P2P energy trading framework and a SCADA system for distributed energy resources in microgrids
Published 2022“…This project mainly completed the development and implementation of a peer-to-peer (P2P) energy trading framework between prosumers based on an Ethereum private blockchain network. …”
Get full text
Thesis-Master by Coursework -
162
Influence of presumed influence on thinness as a beauty ideal for girls.
Published 2008“…This study highlights the potential roles that mothers, female peers, educators and policy makers can play to prevent girls from heading towards “dangerous curves” during adolescence. …”
Get full text
Thesis -
163
Machine learning for industrial IOT
Published 2023“…This paper concludes by proposing an algorithm for peer-to-peer Federated Learning where clients search for peers up to the 𝑘th degree and perform the best actions with 𝑛 peers under bandwidth constraints. …”
Get full text
Final Year Project (FYP) -
164
Smart-contract privacy preservation mechanism
Published 2023“…Sensitive records stored in the cloud such as healthcare records, private conversation and credit card information are targets of hackers and privacy abuse. Current information and record management systems have difficulties achieving privacy protection of such sensitive records in a secure, transparent, decentralized and trustless environment. …”
Get full text
Article -
165
A model of information security and competition
Published 2024“…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
Journal article -
166
Lesbian rights and recognition in Singapore : lesbian relationships should be accepted legally and socially.
Published 2013“…This project researches on how family, peers, religion, politics and society in general influence the psychological, emotional, and sometimes economical well-being of lesbians and thereby affect their lesbian relationships. …”
Get full text
Final Year Project (FYP) -
167
Design and development of a solar-powered vehicle
Published 2014“…The objective is to design a fast and stable solar model car which can be used to participate in a solar race named Alternative Energy Car Challenge Solar Prix 2014 in Singapore. …”
Get full text
Final Year Project (FYP) -
168
Surrounding-aware correlation filter for UAV tracking with selective spatial regularization
Published 2022“…In this paper, a surrounding-aware tracker with selective spatial regularization (SASR) is presented. …”
Get full text
Journal Article -
169
Enriching students’ cross-cultural and multilingual communication: the serious play approach utilizing Playmobil pro figures
Published 2024“…Thematic analysis was used to analyse the data which revealed that Playmobil pro facilitated intercultural communication in the post-COVID-19 era as students seemed to be unwilling to work with their peers in face-to-face classes, possibly suffering from trauma. …”
Get full text
Article -
170
A moment of change: facilitating refugee children's mental health in UK schools
Published 2015“…This paper describes the role of schools in supporting the overall development of refugee children and the importance of peer interactions. It argues that the UK school into which a refugee child arrives can be considered an extreme setting. …”
Journal article -
171
Lightscape application with light stencils
Published 2014“…After they press the capture button in the app, they will be asked to put the tablet in a tablet frame on the robot car and locate the robot car. Next, the tablet will flash a testing light stencil and the camera will capture that. …”
Get full text
Final Year Project (FYP) -
172
Best practices and factors to enhance transfer of training in Oman
Published 2014“…The list includes training designers, trainers, supervisor, managers, peers, top management, and customers or clients of the organizations. …”
Get full text
Thesis -
173
Deep learning network for NAO robot applications
Published 2020“…With the addition of deep learning to eye trackers, it is possible for the device to understand the user’s habits and improve the prediction of the output. …”
Get full text
Final Year Project (FYP) -
174
Automatic retrieval of visual continuity errors in movies
Published 2009“…<p>Continuity errors occur in many movies and television series, in spite of careful checking by those employed to minimise them. In this work we develop a scheme for automatically detecting these errors and producing a ranked list of the most likely inconsistencies, working from a commercial DVD release. …”
Conference item -
175
Reframing stigma in Tourette syndrome: an updated scoping review
Published 2023“…On the individual level, youth with PTD had lower self-esteem than peers, often leading to fear of future stigmatization, avoidant behaviors, and self-stigmatization. …”
Journal article -
176
Tournaments of financial analysts
Published 2013“…This finding survives several robustness checks and is more pronounced when the interim assessment date is closer to the end of the tournament period, when analysts are inexperienced, and when the market activity is high. …”
Get full text
Get full text
Journal Article -
177
Can good ESG performance help companies resist external shocks?
Published 2024“…Our results remain robust even after a series of rigorous robustness checks.…”
Get full text
Article -
178
Evaluating geospatial accuracy for equity analyses: a case study of the U.S. National Bridge Inventory
Published 2023“…Phase 3 assesses the feasibility of enhancing location granularity through a hand-checked case study. We find that for coarser geospatial levels (state and county), equity-based analyses may be possible, but for more granular geospatial levels (place and census tract), which is where equity-based analyses are often conducted, the data may need greater buffering and hand checks to ensure accuracy. …”
Journal article -
179
Enhancing security in generic e-Commerce systems
Published 2010“…One of the most common security features found in today e-Commerce application is the Secure Socket Layer (SSL) connection and even with SSL alone, it may not be sufficient to withstand hackers’ attacks. It may cause great losses to the store owner if their online store is broken into. …”
Get full text
Final Year Project (FYP) -
180
Circuit board design and electric vehicle decoding
Published 2015“…Hence, CAN message decoding must be carried out before car hacking happened. The main objective of the project is to design a circuit board and perform C programming to establish communication between CAN bus in an electric vehicle and a personal computer (PC), as well as decode the CAN message received from the electric car. …”
Get full text
Thesis