Showing 61 - 80 results of 6,296 for search '((((hackers OR ((checks OR check) OR checker)) OR cheaters) OR beers) OR peers)*', query time: 0.18s Refine Results
  1. 61

    Single-Shot Decoding of Good Quantum LDPC Codes by Gu, Shouzhen, Tang, Eugene, Caha, Libor, Choe, Shin Ho, He, Zhiyang, Kubica, Aleksander

    Published 2024
    “…Quantum Tanner codes constitute a family of quantum low-density parity-check codes with good parameters, i.e., constant encoding rate and relative distance. …”
    Get full text
    Article
  2. 62

    Practical fuzzing on open-source projects by Ng, Chun Kai

    Published 2022
    “…Hackers exploiting software vulnerabilities found in all software programs, resulting in unfavorable outcomes, which is a major concern in software security. …”
    Get full text
    Final Year Project (FYP)
  3. 63

    Laser driver (ACC - auto current control) for driving laser diode in LED and laser modes by Tay, Eng Boon.

    Published 2008
    “…The circuit implemented is such that is portable and able to cater for few applications such as visual inspection of a laser diode and fiber checker.…”
    Get full text
    Thesis
  4. 64

    Influence of presumed influence on thinness as a beauty ideal for girls. by Soh, Wai Siong.

    Published 2008
    “…On the other hand, if the “influence on significant others or female peers” exerts an impact on “influence on self”, it will result in desire to be thin.…”
    Get full text
    Thesis
  5. 65

    Challenges of online collaborative learning among special needs university students by Hidayu Shafie, Ireena Nasiha Ibnu, Noori, Abdullah, Nurhilleny Rosly, Nadia Anuar, Nur Husna Serip Mohamad

    Published 0002
    “…Based on the findings of the study, it was found that the SNS in this study mostly had problems communicating with their peers during online collaborative learning. They were not really lacking in collaborative skills, but they were more concerned about their peers’ perspectives on their disabilities, and their abilities to do group work. …”
    Get full text
    Article
  6. 66

    A model of information security and competition by de Cornière, A, Taylor, G

    Published 2024
    “…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
    Journal article
  7. 67

    Bacterial type VI secretion system helps prevent cheating in microbial communities by Filloux, Alain

    Published 2024
    “…Although microbial “societies” do not have such rules codified, they nonetheless implement molecular strategies to restrict foes and cheaters within their respective populations and communities.…”
    Get full text
    Journal Article
  8. 68

    Contribution of problems and exercises at end chapters plus book interactive online exercises MCQ In: Cryptography and Network Security: Principles and Practice, Global Edition, 8t... by Stallings, Wiliam

    Published 2024
    “…In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. …”
    Book
  9. 69

    Evaluating geospatial accuracy for equity analyses: a case study of the U.S. National Bridge Inventory by Gandy, CA, Kang, X, Ritsch, N, Armanios, DE

    Published 2023
    “…Phase 3 assesses the feasibility of enhancing location granularity through a hand-checked case study. We find that for coarser geospatial levels (state and county), equity-based analyses may be possible, but for more granular geospatial levels (place and census tract), which is where equity-based analyses are often conducted, the data may need greater buffering and hand checks to ensure accuracy. …”
    Journal article
  10. 70

    Predicting bank failures : a comparison of the Cox proportional hazards model and time-varying covariates model. by Cheng, Philip Yim Kwong.

    Published 2008
    “…As a contribution to bank regulation by improving the accuracy of predicting failed banks, I first illustrate the use of martingale and other residuals as diagnostic checks for Cox’s proportional hazards model. Second, I discuss and substantiate the claim that a time-varying covariates model is superior to the Cox model as a bank failure model.…”
    Get full text
    Thesis
  11. 71

    Lesbian rights and recognition in Singapore : lesbian relationships should be accepted legally and socially. by Yu, Bertinelli Shasha.

    Published 2013
    “…Family, religion and politics can negatively affect one’s lesbian identity while the support from peers can be empowering to their lesbian identity. …”
    Get full text
    Final Year Project (FYP)
  12. 72

    Effective and efficient topic mining and exploration from geo-textual data by Zhao, Kaiqi

    Published 2018
    “…However, most of the existing methods mine topics from check-in datasets from Foursquare. Because each check-in often consists of limited textual information, and most of the users only shared few check-ins, it is difficult to discover meaningful topics of individuals from the check-in data. …”
    Get full text
    Thesis
  13. 73

    Design and implementation of a synthesizable test-bench for testing the LDPC decoder IP by Yang, Shi

    Published 2018
    “…The simulation environment is mainly used for preliminary and functional checks, and the emulation environment is chosen for further verification due to its much higher run speed compared to simulation.…”
    Get full text
    Thesis
  14. 74

    Enhancing security in generic e-Commerce systems by Mak, Foo Keong.

    Published 2010
    “…One of the most common security features found in today e-Commerce application is the Secure Socket Layer (SSL) connection and even with SSL alone, it may not be sufficient to withstand hackers’ attacks. It may cause great losses to the store owner if their online store is broken into. …”
    Get full text
    Final Year Project (FYP)
  15. 75

    NTU Q-Count: smart spaces, informed choices by Sri Ganesh Babu Sri Vaishnavi

    Published 2024
    “…The app aims to encourage the disciplined check-in and check-out of study space users through the concept of crowd density reporting, so that students can be aware of real-time crowd data present in study spaces at all times, allowing them to choose the best study spaces according to their needs. …”
    Get full text
    Final Year Project (FYP)
  16. 76

    Waste water for non-portable use : Singapore experience by Phua, Lee Kiang.

    Published 2008
    “…Singapore has implemented effective conservation policies to check rising demand and foster a culture of prudence in how people use scarce water supplies. …”
    Get full text
    Thesis
  17. 77

    Python for Security and Networking : Leverage Python modules and tools in securing your network and applications / by Ortega, José Manuel, author 656338, Packt Publishing (Online service) 656336

    Published 2018
    “…Next, you’ll dive deep into the core networking tasks where you will learn how to check a network’s vulnerability using Python security scripting and understand how to check for vulnerabilities in your network – including tasks related to packet sniffing. …”
    Get full text
    Get full text
    software, multimedia
  18. 78

    GPU-accelerated real-time motion planning for safe human-robot collaboration by Fujii, Shohei

    Published 2024
    “…We experimentally demonstrate that our method can navigate a 6-DoF robot earlier than a geometric-primitives-based distance checker in a dynamic, collaborative environment. …”
    Get full text
    Thesis-Doctor of Philosophy
  19. 79

    Development of an industrial SCADA firewall prototype using single board computer - part 2 by Teo, Joycelyn Li Ting

    Published 2019
    “…Threats such as the rise in hackers, cyber espionage and increased influence of radical activists’ groups cannot be undermined. …”
    Get full text
    Final Year Project (FYP)
  20. 80

    Smart-contract privacy preservation mechanism by Siraj, Muhammed, Ninggal, Mohd. Izuan Hafez, Udzir, Nur Izura, Abdullah, Muhammad Daniel Hafiz, Asmawi, Aziah

    Published 2023
    “…Sensitive records stored in the cloud such as healthcare records, private conversation and credit card information are targets of hackers and privacy abuse. Current information and record management systems have difficulties achieving privacy protection of such sensitive records in a secure, transparent, decentralized and trustless environment. …”
    Get full text
    Article