Showing 41 - 60 results of 7,181 for search '(((ceers OR sheets) OR (cheer OR ((traces OR attackers) OR checks))) OR peer)', query time: 0.19s Refine Results
  1. 41

    Game theoretical, statistical and behavioural aspects of peer evaluation by Tan, Catherine Ser Ping

    Published 2021
    “…The most common solution to the free rider problem is peer evaluation. Although there are many systems for peer evaluation, they are prone to grade inflation or inaccurate, as they do not assign the correct grade to each student, and as a result the system is unfair. …”
    Get full text
    Final Year Project (FYP)
  2. 42

    Design and development of an online platform for peer tutorial scheme by Heng, Nadine Nyi Zheng

    Published 2021
    “…Notably, NTU’s School of Electronic and Electrical Engineering Student Life Development Unit SEENIORS Program, a relatively young peer tutoring scheme aimed at helping academically challenged students in school of EEE, currently only conducts its classes physically. …”
    Get full text
    Final Year Project (FYP)
  3. 43

    Effects of peer pressure on endogenous goal setting and performance by Lim, Wee Meng, Chua, Shannen Qi Shan, Tan, Li Xuan

    Published 2019
    “…We investigate whether peer pressure has effects on endogenous goal setting and performance. …”
    Get full text
    Final Year Project (FYP)
  4. 44

    Backdoor attacks in neural networks by Liew, Sher Yun

    Published 2024
    “…This pervasive integration, while transformative, has brought about a pressing concern: the potential for disastrous consequences arising from malicious backdoor attacks in neural networks. To determine the effects and limitations of these attacks, this project aims to conduct a comprehensive examination of 2 previously proposed backdoor attack strategies, namely Blended and Blind backdoors, along with 2 previously proposed backdoor defence mechanisms, namely Neural Cleanse and Spectral Signatures. …”
    Get full text
    Final Year Project (FYP)
  5. 45

    Defending against phishing attacks by Tan, Justin Jui Kit

    Published 2024
    Subjects: “…Defending against phishing attacks…”
    Get full text
    Final Year Project (FYP)
  6. 46
  7. 47

    Attack strategies in birds of prey by Brighton, C

    Published 2016
    “…</p> <p>I used onboard cameras and GPS to study attack flights in peregrine falcons (<em>Falco peregrinus</em>), and high-speed ground photogrammetry for attacks in Harris' hawks (<em>Parabuteo unicinctus</em>), to show that two different raptor species effectively implement the same guidance law of pure proportional navigation for intercepting manouevring and non-manouevring prey-targets.…”
    Thesis
  8. 48

    Plots, attacks, and the measurement of terrorism by Hegghammer, T, Ketchley, N

    Published 2023
    “…Political scientists typically use executed attacks as the dependent variable and test covariates to identify factors that produce terrorism. …”
    Journal article
  9. 49
  10. 50

    Biometric efficient identification algorithm and network authentication system with robust liveness check by Zhu, Jiaqi

    Published 2010
    “…Few people like it, as username plus password is neither easy to remember nor strong against attacks. Biometrics offers an alternative to the traditional authentication techniques. …”
    Get full text
    Thesis
  11. 51

    Counter-checking uncertainty calculations in Bayesian operational modal analysis with EM techniques by Ma, Xinda, Au, Siu-Kui

    Published 2024
    “…While the existing semi-analytical approach is still preferred for Hessian calculations in applications for its high definitive accuracy and speed, the proposed Monte Carlo solution offers a convenient means for counter-checking during code development. Theoretical implications of the identity will be discussed and numerical examples will be given to illustrate implementation aspects.…”
    Get full text
    Journal Article
  12. 52

    De novo-designed β-sheet heme proteins by D'Souza, Areetha, Bhattacharjya, Surajit

    Published 2021
    “…By contrast, there are only a few known β-sheet proteins that bind heme and designs of β-sheets frequently result in amyloid-like aggregates. …”
    Get full text
    Journal Article
  13. 53
  14. 54

    Dynamics of a self-interacting sheet in shear flow by Funkenbusch, William T., Silmore, Kevin S., Doyle, Patrick S.

    Published 2024
    “…We use kinetic and energetic arguments to explain why sheets adopt certain conformations within the folded regime. …”
    Get full text
    Article
  15. 55
  16. 56

    Assembly of graphene sheets into 3D macroscopic structures by Yin, Shengyan, Niu, Zhiqiang, Chen, Xiaodong

    Published 2013
    “…Integration of graphene sheets, 2D nanoscale building blocks, into 3D macroscopic assemblies and ultimately into a functional system is essential to explore the advanced properties of individual graphene sheets for macroscopic applications. …”
    Get full text
    Get full text
    Journal Article
  17. 57

    Trace metal concentrations in marine prawns off the Malaysian coast by Ismail, Ahmad, Jusoh, Noor Razi, Ghani, Idris A.

    Published 1995
    “…In general, it was found that the levels of trace metals in most of the samples studied were below the maximum permissible limit of the Food Regulations in Malaysia, with the exception of a few samples collected from the coasts of Melaka and Matang, which contained higher levels of Pb and Cd. …”
    Get full text
    Article
  18. 58

    Tracing where and who provenance in Linked Data: A calculus by Dezani-Ciancaglini, Mariangiola, Horne, Ross, Sassone, Vladimiro

    Published 2015
    “…The format reflects the behaviour of processes interacting with Linked Data, tracing where the data has been published and who published it. …”
    Get full text
    Get full text
    Journal Article
  19. 59
  20. 60