Search alternatives:
beans » means (Expand Search), beams (Expand Search), beads (Expand Search)
shears » shear (Expand Search)
cheer » cheers (Expand Search), chee (Expand Search), cher (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
beer » been (Expand Search), peer (Expand Search), bee (Expand Search)
beans » means (Expand Search), beams (Expand Search), beads (Expand Search)
shears » shear (Expand Search)
cheer » cheers (Expand Search), chee (Expand Search), cher (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
beer » been (Expand Search), peer (Expand Search), bee (Expand Search)
-
1021
Cryptography in the Wild: An Empirical Analysis of Vulnerabilities in Cryptographic Libraries
Published 2024“…Cryptographic design and implementation issues make up 27.5% of vulnerabilities across all libraries, with side-channel attacks providing a further 19.4%. We find substantial variation among core library components in both complexity levels and vulnerabilities produced: for instance, over one-third of vulnerabilities are located in implementations of the SSL/TLS protocols, providing actionable evidence for codebase quality and security improvements in these libraries.…”
Get full text
Article -
1022
Materials approaches for next-generation encapsulated cell therapies
Published 2024“…Transplanted cells can act as living drug factories capable of secreting therapeutic proteins in vivo, with applications in the treatment of Type 1 diabetes (T1D), blood borne disease, vision disorders, and degenerative neural disease, potentially representing functional cures for chronic conditions. However, attack from the host immune system represents a major challenge, requiring chronic immunosuppression to enable long-lived cell transplantation in vivo. …”
Get full text
Article -
1023
Three-component Friedel-Crafts-type difunctionalization of ynamides with (hetero)arenes and iodine(iii) electrophile
Published 2024“…This transformation is particularly challenging with respect to the stereochemical control, as the pivotal intermediate, the electrophile-bound keteniminium ion, can inherently undergo nucleophilic attack from either side of the cumulated double bonds. …”
Get full text
Journal Article -
1024
PCBleed: Fuzzing for CPU Bugs Through Use of Performance Counters
Published 2024“…Our methodology is distinctive, utilizing performance counters for hardware fuzzing enhancement, and aligns with recent research findings that highlight the versatility of performance counters in debugging, dynamic software profiling, CPU power modeling, malware detection, and cache side-channel attack detection. By incorporating performance counters into the hardware testing paradigm, this research seeks to contribute to the proactive fortification of hardware security through insightful analyses.…”
Get full text
Thesis -
1025
Sleep monitoring by millimeter wave radar sensor
Published 2022“…Nowadays, elderlies who are living alone may face the potential risk of sudden heart attack, without any surveillance from their children or doctors. …”
Get full text
Final Year Project (FYP) -
1026
Business contingency and continuity plan by maritime firms in Singapore - part B: maritime services sector
Published 2022“…The sector is also vulnerable to disruptions, like pandemics and cyber-attacks. It risks facing impacts such as lethargy, an overworked workforce, and miscommunication within the company and between stakeholders. …”
Get full text
Final Year Project (FYP) -
1027
Blind detection of interleaver parameters for non-binary coded sequence
Published 2010“…Moreover, the lower limit of SNR for the satisfactory performance is significantly dropped by reordering the original matrix which scales down the vulnerability of the Gaussian elimination algorithm under the attack of noise.…”
Get full text
Final Year Project (FYP) -
1028
Stalking in universities: responding effectively as an institution while prioritising the safety of victims
Published 2023“…Given the pernicious nature of cyberstalking behaviours, such as surveillance, hacking, image-based sexual attacks and threats of harm, we focus on the responsibility of educational institutions to avoid unnecessary risks and harm to individuals, and the necessity of supporting access to skilled support and justice for individuals who have been victimised. …”
Book Section -
1029
Estimating parameter distributions and developing epidemiological methods and tools to support gastrointestinal outbreak investigation
Published 2018“…Some factors associated with the distribution of incubation period were age, food vehicle, mode of transmission, attack rate and vaccine history. The mathematical model estimated an incubation period of 9.6 days for <em>Salmonella</em> Typhi, and parameters strongly correlated with incubation period included the net population of bacteria in the colon and bacterial growth during systemic infection.…”
Thesis -
1030
Experimental study on durability properties of kenaf fibre-reinforced geopolymer concrete
Published 2023“…Hence, this article aims to understand the performance of kenaf fibre-reinforced geopolymer concrete (KFRGC) in terms of water absorption, porosity, sorptivity, water penetration, and resistance against chloride ions penetration and chemical attacks. The results showed that the addition of KF increased the porosity of the geopolymer, thus increasing the water absorption-related properties. …”
Article -
1031
Aerodynamics of a wing body with different Winglet Cant Angle.
Published 2023“…Computational Fluid Dynamics (CFD) has been used to simulate the Cant angles at constant angle of attack of 00. In this paper the Cant angle was varied from 1050 880 750 600 500 450 350 and the simulation works were performed at three different Flight levels of Sea level, 10000 and 15000 meters. …”
Get full text
Conference or Workshop Item -
1032
A comparative analysis of ENCODE and Cistrome in the context of TF binding signal
Published 2024“…Moreover, the output format of the processing (BED narrowPeak) exposes a feature, the signalValue, which is seldom used in consistency checks, but can offer valuable insight on the quality of the data. …”
Get full text
Journal Article -
1033
Performance of asphalt mixtures modified with nano-eggshell powder
Published 2024“…To achieve this, asphalt mixtures containing 0% (control), 5%, and 9% NESP were developed, and their mechanical properties were investigated through various tests such as moisture damage, Marshall immersion stability, resilient modulus, dynamic creep, double-punch shear, water immersion, and wheel tracking. The results showed that NESP reduced the moisture susceptibility of the mixtures by increasing their tensile strength ratio. …”
Get full text
Article -
1034
The rheology of saltwater taffy
Published 2024“…We use a small amplitude oscillatory shear test to probe the linear viscoelastic properties of commercial taffy. …”
Get full text
Article -
1035
Tectonics of the semi-permanent: Reassembling fit-out architecture
Published 2024“…The uneven wearing that Bolton wrote about in 1911, appears again in the iconic shearing layers diagram from Frank Duffy and Stewart Brand, who make a very similar economic argument, demonstrating that the economically fast-wearing interior layer accumulates the most investment over time, rebuilt on a cycle of every 5-10 years. …”
Get full text
Thesis -
1036
-
1037
Polymeric composites for powder-based additive manufacturing : materials and applications
Published 2020“…Discussion is then made on the processes for manufacturing such polymeric composites into powder form, which include shear pulverization, solution-based methods and melt compounding methods, with a focus on their advantages, limitations and challenges in terms of their productivity and processibility as well as powder printability. …”
Get full text
Journal Article -
1038
Numerical simulation of titanium fibre metallic laminates under various impact loading
Published 2017“…In low impact velocity impact, the front and back panels failed in a petaling shape mode but when the impact velocity is increased to the ballistic level of 400m/s shear plugging was observed. The experimental setup is replicated in the FE model and analyzed for the same velocity and energy levels for both low and high velocity impacts models. …”
Get full text
Thesis -
1039
Nanoscale vibration characterization of multi-layered graphene sheets embedded in an elastic medium
Published 2013“…Effects of Winkler modulus KW, the shear layer modulus Gb, different boundary conditions, aspect ratio β and the number L of graphene layers on nanoscale vibration properties have been examined in detail. …”
Get full text
Get full text
Journal Article -
1040