Showing 1,021 - 1,040 results of 1,144 for search '(((beans OR shears) OR (cheer OR (attackers OR check))) OR beer)', query time: 0.14s Refine Results
  1. 1021

    Cryptography in the Wild: An Empirical Analysis of Vulnerabilities in Cryptographic Libraries by Blessing, Jenny, Specter, Michael A., Weitzner, Daniel J.

    Published 2024
    “…Cryptographic design and implementation issues make up 27.5% of vulnerabilities across all libraries, with side-channel attacks providing a further 19.4%. We find substantial variation among core library components in both complexity levels and vulnerabilities produced: for instance, over one-third of vulnerabilities are located in implementations of the SSL/TLS protocols, providing actionable evidence for codebase quality and security improvements in these libraries.…”
    Get full text
    Article
  2. 1022

    Materials approaches for next-generation encapsulated cell therapies by Krishnan, Siddharth R., Langer, Robert, Anderson, Daniel G.

    Published 2024
    “…Transplanted cells can act as living drug factories capable of secreting therapeutic proteins in vivo, with applications in the treatment of Type 1 diabetes (T1D), blood borne disease, vision disorders, and degenerative neural disease, potentially representing functional cures for chronic conditions. However, attack from the host immune system represents a major challenge, requiring chronic immunosuppression to enable long-lived cell transplantation in vivo. …”
    Get full text
    Article
  3. 1023

    Three-component Friedel-Crafts-type difunctionalization of ynamides with (hetero)arenes and iodine(iii) electrophile by Kikuchi, Jun, Nagata, Toya, Ito, Shingo, Yoshikai, Naohiko

    Published 2024
    “…This transformation is particularly challenging with respect to the stereochemical control, as the pivotal intermediate, the electrophile-bound keteniminium ion, can inherently undergo nucleophilic attack from either side of the cumulated double bonds. …”
    Get full text
    Journal Article
  4. 1024

    PCBleed: Fuzzing for CPU Bugs Through Use of Performance Counters by Muradyan, Natalie

    Published 2024
    “…Our methodology is distinctive, utilizing performance counters for hardware fuzzing enhancement, and aligns with recent research findings that highlight the versatility of performance counters in debugging, dynamic software profiling, CPU power modeling, malware detection, and cache side-channel attack detection. By incorporating performance counters into the hardware testing paradigm, this research seeks to contribute to the proactive fortification of hardware security through insightful analyses.…”
    Get full text
    Thesis
  5. 1025

    Sleep monitoring by millimeter wave radar sensor by Ma, Yuchen

    Published 2022
    “…Nowadays, elderlies who are living alone may face the potential risk of sudden heart attack, without any surveillance from their children or doctors. …”
    Get full text
    Final Year Project (FYP)
  6. 1026

    Business contingency and continuity plan by maritime firms in Singapore - part B: maritime services sector by Matin Ahmad Bin Kamal

    Published 2022
    “…The sector is also vulnerable to disruptions, like pandemics and cyber-attacks. It risks facing impacts such as lethargy, an overworked workforce, and miscommunication within the company and between stakeholders. …”
    Get full text
    Final Year Project (FYP)
  7. 1027

    Blind detection of interleaver parameters for non-binary coded sequence by He, Pan.

    Published 2010
    “…Moreover, the lower limit of SNR for the satisfactory performance is significantly dropped by reordering the original matrix which scales down the vulnerability of the Gaussian elimination algorithm under the attack of noise.…”
    Get full text
    Final Year Project (FYP)
  8. 1028

    Stalking in universities: responding effectively as an institution while prioritising the safety of victims by Short, Emma, Barnes, James

    Published 2023
    “…Given the pernicious nature of cyberstalking behaviours, such as surveillance, hacking, image-based sexual attacks and threats of harm, we focus on the responsibility of educational institutions to avoid unnecessary risks and harm to individuals, and the necessity of supporting access to skilled support and justice for individuals who have been victimised. …”
    Book Section
  9. 1029

    Estimating parameter distributions and developing epidemiological methods and tools to support gastrointestinal outbreak investigation by Awofisayo-Okuyelu, A

    Published 2018
    “…Some factors associated with the distribution of incubation period were age, food vehicle, mode of transmission, attack rate and vaccine history. The mathematical model estimated an incubation period of 9.6 days for <em>Salmonella</em> Typhi, and parameters strongly correlated with incubation period included the net population of bacteria in the colon and bacterial growth during systemic infection.…”
    Thesis
  10. 1030

    Experimental study on durability properties of kenaf fibre-reinforced geopolymer concrete by Noor Abbas, Al-Ghazali, Abdul Aziz, Farah Nora Aznieta, Abdan, Khalina, Mohd Nasir, Noor Azline, Fahim Huseien, Ghasan

    Published 2023
    “…Hence, this article aims to understand the performance of kenaf fibre-reinforced geopolymer concrete (KFRGC) in terms of water absorption, porosity, sorptivity, water penetration, and resistance against chloride ions penetration and chemical attacks. The results showed that the addition of KF increased the porosity of the geopolymer, thus increasing the water absorption-related properties. …”
    Article
  11. 1031

    Aerodynamics of a wing body with different Winglet Cant Angle. by Bakhai, Mit Piyush, Mat, Shabudin, Musa, Nur Amalina

    Published 2023
    “…Computational Fluid Dynamics (CFD) has been used to simulate the Cant angles at constant angle of attack of 00. In this paper the Cant angle was varied from 1050 880 750 600 500 450 350 and the simulation works were performed at three different Flight levels of Sea level, 10000 and 15000 meters. …”
    Get full text
    Conference or Workshop Item
  12. 1032

    A comparative analysis of ENCODE and Cistrome in the context of TF binding signal by Perna, Stefano, Pinoli, Pietro, Ceri, Stefano, Wong, Limsoon

    Published 2024
    “…Moreover, the output format of the processing (BED narrowPeak) exposes a feature, the signalValue, which is seldom used in consistency checks, but can offer valuable insight on the quality of the data. …”
    Get full text
    Journal Article
  13. 1033

    Performance of asphalt mixtures modified with nano-eggshell powder by Zghair Chfat, Alattafi Hadi, Haryati, Yaacob, Nurul Hidayah, Mohd Kamaruddin, Al-Saffar, Zaid Hazim, Putra Jaya, Ramadhansyah

    Published 2024
    “…To achieve this, asphalt mixtures containing 0% (control), 5%, and 9% NESP were developed, and their mechanical properties were investigated through various tests such as moisture damage, Marshall immersion stability, resilient modulus, dynamic creep, double-punch shear, water immersion, and wheel tracking. The results showed that NESP reduced the moisture susceptibility of the mixtures by increasing their tensile strength ratio. …”
    Get full text
    Article
  14. 1034

    The rheology of saltwater taffy by Chan, San To, Haward, Simon J., Fried, Eliot, McKinley, Gareth H.

    Published 2024
    “…We use a small amplitude oscillatory shear test to probe the linear viscoelastic properties of commercial taffy. …”
    Get full text
    Article
  15. 1035

    Tectonics of the semi-permanent: Reassembling fit-out architecture by Schnitzler, Jenna

    Published 2024
    “…The uneven wearing that Bolton wrote about in 1911, appears again in the iconic shearing layers diagram from Frank Duffy and Stewart Brand, who make a very similar economic argument, demonstrating that the economically fast-wearing interior layer accumulates the most investment over time, rebuilt on a cycle of every 5-10 years. …”
    Get full text
    Thesis
  16. 1036
  17. 1037

    Polymeric composites for powder-based additive manufacturing : materials and applications by Yuan, Shangqin, Shen, Fei, Chua, Chee Kai, Zhou, Kun

    Published 2020
    “…Discussion is then made on the processes for manufacturing such polymeric composites into powder form, which include shear pulverization, solution-based methods and melt compounding methods, with a focus on their advantages, limitations and challenges in terms of their productivity and processibility as well as powder printability. …”
    Get full text
    Journal Article
  18. 1038

    Numerical simulation of titanium fibre metallic laminates under various impact loading by Selvadurai Shanmugasundram

    Published 2017
    “…In low impact velocity impact, the front and back panels failed in a petaling shape mode but when the impact velocity is increased to the ballistic level of 400m/s shear plugging was observed. The experimental setup is replicated in the FE model and analyzed for the same velocity and energy levels for both low and high velocity impacts models. …”
    Get full text
    Thesis
  19. 1039

    Nanoscale vibration characterization of multi-layered graphene sheets embedded in an elastic medium by Lin, R. M.

    Published 2013
    “…Effects of Winkler modulus KW, the shear layer modulus Gb, different boundary conditions, aspect ratio β and the number L of graphene layers on nanoscale vibration properties have been examined in detail. …”
    Get full text
    Get full text
    Journal Article
  20. 1040