Search alternatives:
sheers » sheets (Expand Search), sheer (Expand Search), shears (Expand Search)
chees » cheers (Expand Search), cheese (Expand Search), cheeks (Expand Search)
hackers » trackers (Expand Search)
cher » chen (Expand Search), chee (Expand Search), her (Expand Search)
chern » chenn (Expand Search), cheen (Expand Search), hern (Expand Search), chen (Expand Search)
bears » years (Expand Search), beams (Expand Search), bear (Expand Search)
sheers » sheets (Expand Search), sheer (Expand Search), shears (Expand Search)
chees » cheers (Expand Search), cheese (Expand Search), cheeks (Expand Search)
hackers » trackers (Expand Search)
cher » chen (Expand Search), chee (Expand Search), her (Expand Search)
chern » chenn (Expand Search), cheen (Expand Search), hern (Expand Search), chen (Expand Search)
bears » years (Expand Search), beams (Expand Search), bear (Expand Search)
-
101
Development of a protein nanoparticle platform for targeting EGFR expressing cancer cells
Published 2015Get full text
Get full text
Get full text
Journal Article -
102
21A.350J / SP.484J / STS.086J / WGS.484J The Anthropology of Computing, Fall 2004
Published 2004Subjects: Get full text
Learning Object -
103
Robust delivery of RIG-I agonists using extracellular vesicles for anti-cancer immunotherapy
Published 2022Get full text
Journal Article -
104
-
105
-
106
AI is a viable alternative to high throughput screening: a 318-target study
Published 2024Get full text
Journal Article -
107
Practical fuzzing on open-source projects
Published 2022“…Hackers exploiting software vulnerabilities found in all software programs, resulting in unfavorable outcomes, which is a major concern in software security. …”
Get full text
Final Year Project (FYP) -
108
Evaluation of the music collection at the National Institute of Education Library
Published 2011“…However, the Library fared relatively better, with 71.5% holdings, when a list of "Recommended Readings/References" drawn up by the Institute's academic staff was list-checked.…”
Get full text
Thesis -
109
B-twisted Gaiotto–Witten theory and topological quantum field theory
Published 2025“…The physical theories we model admit alternative realizations as Chern–Simons–Rozansky–Witten theories and supergroup Chern–Simons theories and include as particular examples global forms of <em>gl</em>(1|1)–Chern–Simons theory and toral Chern–Simons theory. …”
Journal article -
110
Theory of Quantum Anomalous Hall Phases in Pentalayer Rhombohedral Graphene Moiré Structures
Published 2024“…Here we show that electron-electron interactions play a crucial role, and present microscopic theoretical calculations demonstrating the emergence of a nearly flat, isolated, Chern-1 band and FQAH phases in this system. We also study the four- and six-layer analogs and identify parameters where a nearly flat isolated Chern-1 band emerges which may be suitable to host FQAH physics.…”
Get full text
Article -
111
A model of information security and competition
Published 2024“…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
Journal article -
112
Contribution of problems and exercises at end chapters plus book interactive online exercises MCQ In: Cryptography and Network Security: Principles and Practice, Global Edition, 8t...
Published 2024“…In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. …”
Book -
113
Development of a human-robot cooperative control system
Published 2014“…During the final year of study in the course for the Bachelor’s in Electrical & Electronics Engineering in Nanyang Technological University, the student was assigned to the Final Year Project for Safe Human-Robot Interaction under the supervision of Associate Professor Cheah Chien Chern. The project’s objective was achieved through the use of a Microsoft Kinect depth sensor to monitor the position of a SCARA robot and determine safety actions to be taken by the robot. …”
Get full text
Final Year Project (FYP) -
114
Effect of iron (III) oxide concentration on the performance of meta-resonators embedded in cementitious matrix
Published 2022Get full text
Journal Article -
115
Enhancing security in generic e-Commerce systems
Published 2010“…One of the most common security features found in today e-Commerce application is the Secure Socket Layer (SSL) connection and even with SSL alone, it may not be sufficient to withstand hackers’ attacks. It may cause great losses to the store owner if their online store is broken into. …”
Get full text
Final Year Project (FYP) -
116
IS activity in Southeast Asia
Published 2015“…The increasing number of recruits from Indonesia and Malaysia to Islamic State reflects the evolving security threat to Southeast Asia. The emerging pattern bears lessons for countries in the region.…”
Get full text
Get full text
Commentary -
117
Investigation of low temperature wafer bonding using intermediate layer
Published 2008Get full text
Thesis -
118
Encrypted smartphone with advanced encryption standard 256
Published 2011“…However, in this digital age, mobile users cannot take the confidentiality of data transfer for granted because of the presence of hackers and the threats that exist. In today’s market, various encryption suites are available for mobile users to send their SMS “safely” and offer different ways of encryption and decryption such as symmetry cryptography and asymmetric cryptography. …”
Get full text
Final Year Project (FYP) -
119
-
120
Optimal network charge for peer-to-peer energy trading: a grid perspective
Published 2022Get full text
Journal Article