Search alternatives:
checkers » checker (Expand Search), checks (Expand Search), crackers (Expand Search)
hackers » trackers (Expand Search)
cher » chern (Expand Search), chen (Expand Search), chee (Expand Search)
chenr » chenru (Expand Search), chen (Expand Search), cheng (Expand Search)
beer » been (Expand Search), peer (Expand Search), bee (Expand Search)
checkers » checker (Expand Search), checks (Expand Search), crackers (Expand Search)
hackers » trackers (Expand Search)
cher » chern (Expand Search), chen (Expand Search), chee (Expand Search)
chenr » chenru (Expand Search), chen (Expand Search), cheng (Expand Search)
beer » been (Expand Search), peer (Expand Search), bee (Expand Search)
-
141
Evaluation of the music collection at the National Institute of Education Library
Published 2011“…However, the Library fared relatively better, with 71.5% holdings, when a list of "Recommended Readings/References" drawn up by the Institute's academic staff was list-checked.…”
Get full text
Thesis -
142
A model of information security and competition
Published 2024“…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
Journal article -
143
Learning automations in game engine
Published 2013“…First, design and develop a server-client software version of Beer Game using Java. Second, develop a software entity (AI agent) in the Beer Game software utilizing Memetic approach. …”
Get full text
Final Year Project (FYP) -
144
Practical fuzzing on open-source projects
Published 2022“…Hackers exploiting software vulnerabilities found in all software programs, resulting in unfavorable outcomes, which is a major concern in software security. …”
Get full text
Final Year Project (FYP) -
145
Encrypted smartphone with advanced encryption standard 256
Published 2011“…Mobile users are enticed by this secondary form of mobile communication because of its generally low cost when compared to making a phone call. However, in this digital age, mobile users cannot take the confidentiality of data transfer for granted because of the presence of hackers and the threats that exist. …”
Get full text
Final Year Project (FYP) -
146
Design and development of small scale index matching tunnel
Published 2017“…Suitable design and sodium thiosulfate is used, to overcome the issue of rapid oxidation of the sodium iodide solution when it is exposed to the atmosphere. Then, the results of the experiment are cross-checked with the theoretical equations, an analysis is being accounted for the difference in result. …”
Get full text
Final Year Project (FYP) -
147
Contribution of problems and exercises at end chapters plus book interactive online exercises MCQ In: Cryptography and Network Security: Principles and Practice, Global Edition, 8t...
Published 2024“…In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. …”
Book -
148
Plastic heat sink
Published 2011“…The performances of plastic heat sinks are also determined by thermal imaging heat scans and evaluation of performance of light emitting diode when mounted on the plastic heat sinks. Plastic heat sink model is created to correlate heat dissipation with thermal conductivity. …”
Get full text
Final Year Project (FYP) -
149
Double trouble
Published 2019“…Ashley and Caden are a pair of exes who co-host the show; their already tenuous post-breakup relationship is tested when an unexpected guest finds their on the show—Dean, Ashley’s other ex-boyfriend. …”
Get full text
Final Year Project (FYP) -
150
Multiplicity dependence of σψ(2S)/σJ/ψ in pp collisions at √𝑠 = 13 TeV
Published 2024“…The ratio of production cross-sections of ψ(2S) over J/ψ mesons are cross-checked with other measurements in di-lepton channels and found to be compatible.…”
Get full text
Article -
151
Design language in packaging.
Published 2012“…Craid is a fictitious brand of Irish beer that is designed based on this essential role. …”
Get full text
Final Year Project (FYP) -
152
Enhancing security in generic e-Commerce systems
Published 2010“…One of the most common security features found in today e-Commerce application is the Secure Socket Layer (SSL) connection and even with SSL alone, it may not be sufficient to withstand hackers’ attacks. It may cause great losses to the store owner if their online store is broken into. …”
Get full text
Final Year Project (FYP) -
153
Membrane compaction in forward osmosis process
Published 2021“…Membrane compaction is commonly observed in polymeric membranes when subjected to elevated hydraulic pressure, but was rarely discussed in forward osmosis (FO) processes, since there was usually little hydraulic pressure difference across the membrane. …”
Get full text
Journal Article -
154
Investigation of low temperature wafer bonding using intermediate layer
Published 2008Get full text
Thesis -
155
-
156
Spooky action in the film/novel debate.
Published 2012“…The installation follows a Collector, Photographer, Writer and a Collective (a beer garden group that gathers at the local coffeeshop) in their daily life as they contemplate the curious events, and each other, in an attempt to cope with the boredom they face in the neighbourhood. …”
Get full text
Final Year Project (FYP) -
157
Numerical simulation of oxygen delivery in presence of hemoglobin hydrogel based oxygen carriers
Published 2016“…Red blood cells have standard shelf life of only 42 days and unable to be checked and sterilized for infective agents like HIV. …”
Get full text
Final Year Project (FYP) -
158
Application of low frequency noise in the study of VLSI electromigration
Published 2008Get full text
Thesis -
159
Encapsulation of probiotics for food and beverage applications
Published 2022“…Findings from this study have shown that alginate-encapsulated probiotic beads, produced via extrusion method, can exhibit a protective effect in an acidic/bactericidal environment and resulted in a significant improvement in viability as compared to unencapsulated ones in commercialized carbonated sodas/beers. Findings from this study have also found that the viability of probiotics is more well maintained when stored in refrigerated conditions than in room temperature conditions over 14 days. …”
Get full text
Final Year Project (FYP) -
160
A Multi-tier Model and Filtering Approach to Detect Fake News Using Machine Learning Algorithms
Published 2024“…The consensus layer acts as the final decision when collision results occur in the first two-tier layer. …”
Get full text
Article