Search alternatives:
beens » been (Expand Search), teens (Expand Search), beans (Expand Search)
cheer » cheers (Expand Search), chee (Expand Search), cher (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
beens » been (Expand Search), teens (Expand Search), beans (Expand Search)
cheer » cheers (Expand Search), chee (Expand Search), cher (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
-
61
-
62
The political economy of FDI location : why don't political checks and balances and treaty constraints matter?
Published 2009“…I ask whether domestic political checks and balances and international legal instruments that aim to protect FDI enable governments to commit credibly to avoid future policies that diminish the value of suck FDI. …”
Get full text
Get full text
Working Paper -
63
-
64
Shear lag analysis by the adaptive finite element method
Published 2014“…The adaptive finite element analysis procedure proposed in Part 1 of this study is employed to solve the shear lag problems for complex plated structures with more general and complex geometries including core walls with openings, multi-cell box girders and box girders with curved flanges. …”
Get full text
Get full text
Journal Article -
65
Investigation of bed shear stresses subject to external turbulence
Published 2012“…The fluctuating bed shear stress has largely been investigated only for uniform channel flows and boundary layers. …”
Get full text
Get full text
Journal Article -
66
Effects of hemodynamic shear stress on circulating tumor cells
Published 2014“…Metastasis has been observed to be an inefficient process, but a consensus has not been reached as to which steps of metastasis are potentially rate-limiting. …”
Get full text
Final Year Project (FYP) -
67
Dynamics of a self-interacting sheet in shear flow
Published 2024“…Finally, we calculate the stresslet and find that, even in the absence of thermal fluctuations and multiple sheet interactions, shear-thinning followed by shear-thickening behavior can appear.…”
Get full text
Article -
68
Measuring shear wave velocity using bender elements
Published 2011“…The use of bender element to measure shear wave velocity is popular due to its simplicity. …”
Get full text
Get full text
Journal Article -
69
Influence of shear stress on cyclic behavior of marine sand
Published 2014“…Undrained Cyclic bearing capacity of soil deposits depends upon the number of loading cycles, vertical effective stress, cyclic shear strain amplitude, relative density, and combination of cyclic and average shear stress. …”
Get full text
Get full text
Get full text
Journal Article -
70
Development of interactive software (shear force and bending moment)
Published 2022“…It shall be capable of serving as a learning platform, as well as providing pertinent information in response to user interaction with the graphical user interface (GUI). Shear force and bending moment diagrams will also be generated to better visualize and convey the concept of shear force and bending moment for future learners. …”
Get full text
Final Year Project (FYP) -
71
Shear strength of reinforced and prestressed concrete deep beams
Published 2009“…The influence of main steel ratio p, concrete strength fc', shear span-to-overall-height ratio a/h (or shear span-to-effective-depth ratio a/d), overall height h and prestress force on deep beams are investigated.…”
Get full text
Thesis -
72
The Stabbing of Wiranto : Growing Trend of Knife Attacks
Published 2019“…The incident highlights the continuation of the knife attack trend among terrorists and the militant threat arising from Indonesian pro-IS family units.…”
Get full text
Get full text
Commentary -
73
Class-based attack on graph convolution network
Published 2022“…Prevalent use of graph structure data for classification tasks has brought attention to the robustness of graph convolutional networks. Recent study has been shown that graph convolutional networks are vulnerable to adversary attacks, causing a severe threat to real world application. …”
Get full text
Final Year Project (FYP) -
74
Assessing the Islamic State’s commitment to attacking the West
Published 2015“…This article looks at what IS has said and done with regard to attacks in the West. We examine IS statements and take stock of IS-related attack plots in Western Europe, North America, and Australia from January 2011 through June 2015 using a new dataset of jihadi plots and a new typology of links between organizations and attackers. …”
Journal article -
75
Leveraging imperfect restoration for data availability attack
Published 2024Subjects: Get full text
Get full text
Conference Paper -
76
2020 Jolo suicide attack : evolving tactics
Published 2020“…The 24 August 2020 suicide bombing in Jolo which involved female attackers has brought attention to the emergence of the pro-Islamic State (IS) Hatib Hajan Sawadjaan faction of the Abu Sayyaf Group and its tactic of engaging women for this role.…”
Get full text
Commentary -
77
Protecting neural networks from adversarial attacks
Published 2024“…This project investigates how Searchable Symmetric Encryption (SSE) can be applied to neural networks as a form of protection from adversarial attacks and the viability of such an implementation. …”
Get full text
Final Year Project (FYP) -
78
Collusion attacks for digital fingerprinting of image and video
Published 2008“…In this thesis, three existing linear and non-linear collusion attacks on image/video fingerprinting, namely averaging collusion attack, maximum-minimum collusion attack, and Stone's zero-correlation collusion attack, are studied and analysed. …”
Get full text
Thesis -
79
Investigation on effective solutions against insider attacks
Published 2018Get full text
Final Year Project (FYP) -
80
Co-resident attacks on public cloud infrastructures
Published 2019“…This report proposes a novel virtual machine (VM) placement technique called "Grouped Instance" in response to the rise of co-location side-channel attack in public cloud infrastructure. This is a simple yet effective algorithm, of which origin is to limit the spreading area of malicious users by restricting the VM placement area of a user into a small group of users. …”
Get full text
Final Year Project (FYP)