Search alternatives:
beens » been (Expand Search), teens (Expand Search), beans (Expand Search)
shears » shear (Expand Search)
cheers » cheer (Expand Search), cheaters (Expand Search), checkers (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
beens » been (Expand Search), teens (Expand Search), beans (Expand Search)
shears » shear (Expand Search)
cheers » cheer (Expand Search), cheaters (Expand Search), checkers (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
-
41
Plots, attacks, and the measurement of terrorism
Published 2023“…Political scientists typically use executed attacks as the dependent variable and test covariates to identify factors that produce terrorism. …”
Journal article -
42
Biometric efficient identification algorithm and network authentication system with robust liveness check
Published 2010“…Few people like it, as username plus password is neither easy to remember nor strong against attacks. Biometrics offers an alternative to the traditional authentication techniques. …”
Get full text
Thesis -
43
Counter-checking uncertainty calculations in Bayesian operational modal analysis with EM techniques
Published 2024“…While the existing semi-analytical approach is still preferred for Hessian calculations in applications for its high definitive accuracy and speed, the proposed Monte Carlo solution offers a convenient means for counter-checking during code development. Theoretical implications of the identity will be discussed and numerical examples will be given to illustrate implementation aspects.…”
Get full text
Journal Article -
44
A security protocol resistant to intermittent position trace attacks and desynchronization attacks in RFID systems
Published 2013“…The extant RFID security protocols have serious insufficiency and flaws to resistance trace attacks and desynchronization attacks. In this paper, we propose a security protocol that can against the intermittent position trace attacks and desynchronization attacks. …”
Get full text
Get full text
Journal Article -
45
Web-based application development for EEE peer tutoring scheme
Published 2024Get full text
Final Year Project (FYP) -
46
Localised and bifurcating structures in planar shear flows
Published 2020“…In the present thesis, those flow structures, i.e. quadrupolar flows and streamwise vortices have been treated analytically : By exploiting the geometric scale separation inscribed in all planar shear flows, equations governing the large-scale flow surrounding turbulent spots has been derived from the Navier-Stokes equations and solved analytically. …”
Get full text
Thesis-Doctor of Philosophy -
47
Wearable bioadhesive ultrasound shear wave elastography
Published 2024“…In this study, we introduce wearable bioadhesive ultrasound elastography (BAUS-E), which can generate acoustic radiation force impulse (ARFI) to induce shear waves for the continuous monitoring of modulus changes. …”
Get full text
Article -
48
Shear annealing of a self-interacting sheet
Published 2024“…Previous computational studies have observed 2D sheets in shear and extensional flows, but have focused on steady flows, even though the dynamics of these materials might exhibit hysteresis. …”
Get full text
Article -
49
Modified triaxial apparatus for shearing-infiltration test
Published 2011“…A triaxial apparatus was modified and developed for performing shearing-infiltration tests under saturated and unsaturated conditions. …”
Get full text
Get full text
Journal Article -
50
Shear behaviour of high-strength concrete beams
Published 2008“…The rapidly increasing use of high strength concrete as an alternative to the more classical materials (normal strength concrete) requires knowledge by the design engineer of HSC behaviour in shear. The experimental investigation conducted in this project is important to evaluate the current design methods used for shear design of HSC beams, and the theoretical model proposed in this research for reinforced concrete element is capable of predicting not only the ultimate shear strength but also the load-deformation response of concrete elements subjected to in-plane shear and normal stresses.…”
Get full text
Thesis -
51
-
52
-
53
Gradient-Based Adversarial Training on Transformer Networks for Detecting Check-Worthy Factual Claims
Published 2024“…s claim-spotting model, which tackles the critical task of identifying check-worthy claims from large streams of information. …”
Get full text
Article -
54
US trade policy on PV panels is a reality check for Southeast Asia ties
Published 2023Get full text
Commentary -
55
Demonstration of attacks on SSL-TLS protocols
Published 2022“…Over the last decade there have been multiple attacks on SSL-TLS in order to break the encryption and obtain the sensitive information that was encrypted. …”
Get full text
Final Year Project (FYP) -
56
Study on attacks against federated learning
Published 2022“…The focus is on the coordinated backdoor attack with model-dependant triggers for attack methodology and robust learning rates for defence methodology. …”
Get full text
Final Year Project (FYP) -
57
Differential privacy and membership inference attacks
Published 2023“…Membership inference is a type of attack that identifies the members of the training dataset. …”
Get full text
Final Year Project (FYP) -
58
Developing student feedback literacy through self and peer assessment interventions
Published 2021Subjects: Get full text
Journal Article -
59
-
60
The political economy of FDI location : why don't political checks and balances and treaty constraints matter?
Published 2009“…I ask whether domestic political checks and balances and international legal instruments that aim to protect FDI enable governments to commit credibly to avoid future policies that diminish the value of suck FDI. …”
Get full text
Get full text
Working Paper