Showing 121 - 140 results of 1,448 for search '((((shears OR (chees OR cheese)) OR ((checkers OR checked) OR check)) OR cheers) OR bear)*', query time: 0.18s Refine Results
  1. 121
  2. 122
  3. 123
  4. 124
  5. 125
  6. 126
  7. 127
  8. 128
  9. 129

    Evaluation of the music collection at the National Institute of Education Library by Yu, Bee Lian.

    Published 2011
    “…Three selected bibliographies were list-checked against the Library's holding in order to determine the extent to which selected titles are available in the collection.The results show that the Library is consistently weak in most subject areas in its music collection. …”
    Get full text
    Thesis
  10. 130

    100 UMPSA athletes to compete in 10 events at the 2024 SUKUM Championship by Siti Nur Azwin, Zulkapri

    Published 2024
    “…PEKAN, 6 August 2024 – The enthusiastic cheers of “UMPSA! Minda Juara!” echoed as 100 athletes, comprising 65 men and 35 women from Universiti Malaysia Pahang Al-Sultan Abdullah (UMPSA), prepared to represent their university in the upcoming 2024 SUKUM Championship.…”
    Get full text
    Newspaper
  11. 131
  12. 132

    Effective and efficient topic mining and exploration from geo-textual data by Zhao, Kaiqi

    Published 2018
    “…However, most of the existing methods mine topics from check-in datasets from Foursquare. Because each check-in often consists of limited textual information, and most of the users only shared few check-ins, it is difficult to discover meaningful topics of individuals from the check-in data. …”
    Get full text
    Thesis
  13. 133

    NTU Q-Count: smart spaces, informed choices by Sri Ganesh Babu Sri Vaishnavi

    Published 2024
    “…The app aims to encourage the disciplined check-in and check-out of study space users through the concept of crowd density reporting, so that students can be aware of real-time crowd data present in study spaces at all times, allowing them to choose the best study spaces according to their needs. …”
    Get full text
    Final Year Project (FYP)
  14. 134

    Waste water for non-portable use : Singapore experience by Phua, Lee Kiang.

    Published 2008
    “…Singapore has implemented effective conservation policies to check rising demand and foster a culture of prudence in how people use scarce water supplies. …”
    Get full text
    Thesis
  15. 135

    Python for Security and Networking : Leverage Python modules and tools in securing your network and applications / by Ortega, José Manuel, author 656338, Packt Publishing (Online service) 656336

    Published 2018
    “…Next, you’ll dive deep into the core networking tasks where you will learn how to check a network’s vulnerability using Python security scripting and understand how to check for vulnerabilities in your network – including tasks related to packet sniffing. …”
    Get full text
    Get full text
    software, multimedia
  16. 136

    Environmental audit in Singapore by Chua, Boon Hua

    Published 2015
    “…In addition, neither the public nor firms are willing to bear the costs of environmental audit.…”
    Get full text
    Final Year Project (FYP)
  17. 137

    An autonomous ultrasonic fastener holes inspection system of an aircraft lower wing skin by Lim, Chee Wei.

    Published 2008
    “…Fasteners like rivets and bolts bear a large part of the stress and thus require frequent inspection for cracks around the fastener's holes. …”
    Get full text
    Thesis
  18. 138

    Average velocity of grains moving over a channel bed by Song, Chengwei

    Published 2016
    “…Therefore, the results in today’s experiment are going to be checked against the results in the past paper. In order to obtain better analytical results, the idea of dimensional analysis is applied in the discussion. …”
    Get full text
    Final Year Project (FYP)
  19. 139

    Finite element analysis on post-buckling of thin-walled structures using ANSYS by Theint, Yi Mon

    Published 2015
    “…The results obtained were checked against experimental data and led to the development and the revision of design procedures for the pin-ended lipped column and hollow box section.…”
    Get full text
    Final Year Project (FYP)
  20. 140

    Black-box cryptography is dangerous III by Lee, Esther Yu Ling.

    Published 2013
    “…Cryptographic libraries are readily available for developers to use and download however, many a times, developers do not understand or check the exact codes that they have downloaded and are implementing. …”
    Get full text
    Final Year Project (FYP)