Showing 81 - 100 results of 7,065 for search '((((ceers OR peers) OR shears) OR (cher OR ((trackers OR attackers) OR checks))) OR peer)', query time: 0.22s Refine Results
  1. 81

    Shear lag analysis by the adaptive finite element method by Lee, Chi King, Wu, G.J

    Published 2014
    “…By using the adaptive finite element method, parametric studies were carried out to investigate the influence of some key geometrical parameters on the shear lag effect for these types of structures. …”
    Get full text
    Get full text
    Journal Article
  2. 82

    Investigation of bed shear stresses subject to external turbulence by Cheng, Nian-Sheng, Sumer, B. Mutlu, Fredsøe, Jørgen

    Published 2012
    “…The fluctuating bed shear stress has largely been investigated only for uniform channel flows and boundary layers. …”
    Get full text
    Get full text
    Journal Article
  3. 83

    Dynamics of a self-interacting sheet in shear flow by Funkenbusch, William T., Silmore, Kevin S., Doyle, Patrick S.

    Published 2024
    “…Finally, we calculate the stresslet and find that, even in the absence of thermal fluctuations and multiple sheet interactions, shear-thinning followed by shear-thickening behavior can appear.…”
    Get full text
    Article
  4. 84

    Measuring shear wave velocity using bender elements by Leong, Eng Choon, Yeo, Sir Hoon, Rahardjo, Harianto

    Published 2011
    “…The use of bender element to measure shear wave velocity is popular due to its simplicity. …”
    Get full text
    Get full text
    Journal Article
  5. 85

    Influence of shear stress on cyclic behavior of marine sand by Kim, Jin Man, Safdar, Muhammad, Son, Su Won

    Published 2014
    “…Cyclic direct simple shear (CDSS) tests are performed with relative density of 85%, vertical effective stress 300 kPa, and failure criteria of either 15% double amplitude cyclic shear strain (γcyc) or permanent shear strain (γp) are adapted. …”
    Get full text
    Get full text
    Get full text
    Journal Article
  6. 86

    Development of interactive software (shear force and bending moment) by Wong, Jun Yan

    Published 2022
    “…It shall be capable of serving as a learning platform, as well as providing pertinent information in response to user interaction with the graphical user interface (GUI). Shear force and bending moment diagrams will also be generated to better visualize and convey the concept of shear force and bending moment for future learners. …”
    Get full text
    Final Year Project (FYP)
  7. 87

    Shear strength of reinforced and prestressed concrete deep beams by Lu, Hai Yun.

    Published 2009
    “…The influence of main steel ratio p, concrete strength fc', shear span-to-overall-height ratio a/h (or shear span-to-effective-depth ratio a/d), overall height h and prestress force on deep beams are investigated.…”
    Get full text
    Thesis
  8. 88

    Effects of hemodynamic shear stress on circulating tumor cells by How, Yunhan

    Published 2014
    “…The effects of sustained exposure to hemodynamic shear stress on the viability and behaviour of circulating tumor cells (CTCs) are also not fully understood. …”
    Get full text
    Final Year Project (FYP)
  9. 89

    2020 Jolo suicide attack : evolving tactics by Yeo, Kenneth, Mahzam, Remy

    Published 2020
    “…The 24 August 2020 suicide bombing in Jolo which involved female attackers has brought attention to the emergence of the pro-Islamic State (IS) Hatib Hajan Sawadjaan faction of the Abu Sayyaf Group and its tactic of engaging women for this role.…”
    Get full text
    Commentary
  10. 90

    Class-based attack on graph convolution network by He, HeFei

    Published 2022
    “…Recent study has been shown that graph convolutional networks are vulnerable to adversary attacks, causing a severe threat to real world application. …”
    Get full text
    Final Year Project (FYP)
  11. 91

    Protecting neural networks from adversarial attacks by Yeow, Zhong Han

    Published 2024
    “…This project investigates how Searchable Symmetric Encryption (SSE) can be applied to neural networks as a form of protection from adversarial attacks and the viability of such an implementation. …”
    Get full text
    Final Year Project (FYP)
  12. 92
  13. 93

    Collusion attacks for digital fingerprinting of image and video by Wahadaniah, Viktor

    Published 2008
    “…In this thesis, three existing linear and non-linear collusion attacks on image/video fingerprinting, namely averaging collusion attack, maximum-minimum collusion attack, and Stone's zero-correlation collusion attack, are studied and analysed. …”
    Get full text
    Thesis
  14. 94
  15. 95

    Co-resident attacks on public cloud infrastructures by Vu, Duc Long

    Published 2019
    “…This report proposes a novel virtual machine (VM) placement technique called "Grouped Instance" in response to the rise of co-location side-channel attack in public cloud infrastructure. This is a simple yet effective algorithm, of which origin is to limit the spreading area of malicious users by restricting the VM placement area of a user into a small group of users. …”
    Get full text
    Final Year Project (FYP)
  16. 96

    The Stabbing of Wiranto : Growing Trend of Knife Attacks by Arianti, Vidia

    Published 2019
    “…The incident highlights the continuation of the knife attack trend among terrorists and the militant threat arising from Indonesian pro-IS family units.…”
    Get full text
    Get full text
    Commentary
  17. 97

    Islamic State's first terror attack in Malaysia by Gunaratna, Rohan

    Published 2016
    “…The ideological influence of the Islamic State is spreading rapidly in Southeast Asia. The terrorist attack in Selangor, Malaysia demonstrates that the threat is growing.…”
    Get full text
    Get full text
    Commentary
  18. 98

    Kabul Suicide Attack: Growing IS Factor in Afghanistan by Rathore, Shahzeb Ali, Mahmood, Sara

    Published 2016
    “…The suicide attack in Kabul by Islamic State’s local franchise, Wilayat Khurasan, underscores the group’s operational capability. …”
    Get full text
    Get full text
    Commentary
  19. 99

    Konfrontasi: why Singapore was in forefront of Indonesian attacks by Mushahid Ali

    Published 2016
    “…Indonesia’s confrontation of Malaysia in the 1960s saw a campaign of bomb attacks against civilian targets in Singapore including MacDonald House. …”
    Get full text
    Get full text
    Commentary
  20. 100

    Assessing the Islamic State’s commitment to attacking the West by Hegghammer, T, Nesser, P

    Published 2015
    “…This article looks at what IS has said and done with regard to attacks in the West. We examine IS statements and take stock of IS-related attack plots in Western Europe, North America, and Australia from January 2011 through June 2015 using a new dataset of jihadi plots and a new typology of links between organizations and attackers. …”
    Journal article