Search alternatives:
beers » peers (Expand Search), bears (Expand Search), beer (Expand Search)
sheets » sheet (Expand Search)
cheer » cheers (Expand Search), chee (Expand Search), cher (Expand Search)
trackers » tracker (Expand Search), traces (Expand Search), tracks (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
checks » check (Expand Search)
beers » peers (Expand Search), bears (Expand Search), beer (Expand Search)
sheets » sheet (Expand Search)
cheer » cheers (Expand Search), chee (Expand Search), cher (Expand Search)
trackers » tracker (Expand Search), traces (Expand Search), tracks (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
checks » check (Expand Search)
-
41
Design and development of an online platform for peer tutorial scheme
Published 2021“…Notably, NTU’s School of Electronic and Electrical Engineering Student Life Development Unit SEENIORS Program, a relatively young peer tutoring scheme aimed at helping academically challenged students in school of EEE, currently only conducts its classes physically. …”
Get full text
Final Year Project (FYP) -
42
Effects of peer pressure on endogenous goal setting and performance
Published 2019“…We investigate whether peer pressure has effects on endogenous goal setting and performance. …”
Get full text
Final Year Project (FYP) -
43
Wearable activity trackers for promoting physical activity : a systematic meta-analytic review
Published 2021Subjects: Get full text
Journal Article -
44
Backdoor attacks in neural networks
Published 2024“…This pervasive integration, while transformative, has brought about a pressing concern: the potential for disastrous consequences arising from malicious backdoor attacks in neural networks. To determine the effects and limitations of these attacks, this project aims to conduct a comprehensive examination of 2 previously proposed backdoor attack strategies, namely Blended and Blind backdoors, along with 2 previously proposed backdoor defence mechanisms, namely Neural Cleanse and Spectral Signatures. …”
Get full text
Final Year Project (FYP) -
45
Defending against phishing attacks
Published 2024Subjects: “…Defending against phishing attacks…”
Get full text
Final Year Project (FYP) -
46
-
47
Attack strategies in birds of prey
Published 2016“…</p> <p>I used onboard cameras and GPS to study attack flights in peregrine falcons (<em>Falco peregrinus</em>), and high-speed ground photogrammetry for attacks in Harris' hawks (<em>Parabuteo unicinctus</em>), to show that two different raptor species effectively implement the same guidance law of pure proportional navigation for intercepting manouevring and non-manouevring prey-targets.…”
Thesis -
48
Plots, attacks, and the measurement of terrorism
Published 2023“…Political scientists typically use executed attacks as the dependent variable and test covariates to identify factors that produce terrorism. …”
Journal article -
49
Biometric efficient identification algorithm and network authentication system with robust liveness check
Published 2010“…Few people like it, as username plus password is neither easy to remember nor strong against attacks. Biometrics offers an alternative to the traditional authentication techniques. …”
Get full text
Thesis -
50
Counter-checking uncertainty calculations in Bayesian operational modal analysis with EM techniques
Published 2024“…While the existing semi-analytical approach is still preferred for Hessian calculations in applications for its high definitive accuracy and speed, the proposed Monte Carlo solution offers a convenient means for counter-checking during code development. Theoretical implications of the identity will be discussed and numerical examples will be given to illustrate implementation aspects.…”
Get full text
Journal Article -
51
A security protocol resistant to intermittent position trace attacks and desynchronization attacks in RFID systems
Published 2013“…The extant RFID security protocols have serious insufficiency and flaws to resistance trace attacks and desynchronization attacks. In this paper, we propose a security protocol that can against the intermittent position trace attacks and desynchronization attacks. …”
Get full text
Get full text
Journal Article -
52
De novo-designed β-sheet heme proteins
Published 2021“…By contrast, there are only a few known β-sheet proteins that bind heme and designs of β-sheets frequently result in amyloid-like aggregates. …”
Get full text
Journal Article -
53
Web-based application development for EEE peer tutoring scheme
Published 2024Get full text
Final Year Project (FYP) -
54
Dynamics of a self-interacting sheet in shear flow
Published 2024“…We use kinetic and energetic arguments to explain why sheets adopt certain conformations within the folded regime. …”
Get full text
Article -
55
Surface wave interactions with submerged horizontal viscoelastic sheets
Published 2022Subjects: Get full text
Journal Article -
56
Assembly of graphene sheets into 3D macroscopic structures
Published 2013“…Integration of graphene sheets, 2D nanoscale building blocks, into 3D macroscopic assemblies and ultimately into a functional system is essential to explore the advanced properties of individual graphene sheets for macroscopic applications. …”
Get full text
Get full text
Journal Article -
57
Gradient-Based Adversarial Training on Transformer Networks for Detecting Check-Worthy Factual Claims
Published 2024“…s claim-spotting model, which tackles the critical task of identifying check-worthy claims from large streams of information. …”
Get full text
Article -
58
-
59
US trade policy on PV panels is a reality check for Southeast Asia ties
Published 2023Get full text
Commentary -
60
Demonstration of attacks on SSL-TLS protocols
Published 2022“…What is the impact of this attack? 5. What are some strategies to mitigate this attack?…”
Get full text
Final Year Project (FYP)