Search alternatives:
cers » ceres (Expand Search), cars (Expand Search), cnrs (Expand Search)
cerys » ceres (Expand Search)
bears » years (Expand Search), beams (Expand Search), bear (Expand Search)
hackers » trackers (Expand Search)
checks » check (Expand Search)
chees » cheers (Expand Search), cheese (Expand Search), cheeks (Expand Search)
chers » cheras (Expand Search), cheers (Expand Search), cher (Expand Search)
chern » chen (Expand Search)
cers » ceres (Expand Search), cars (Expand Search), cnrs (Expand Search)
cerys » ceres (Expand Search)
bears » years (Expand Search), beams (Expand Search), bear (Expand Search)
hackers » trackers (Expand Search)
checks » check (Expand Search)
chees » cheers (Expand Search), cheese (Expand Search), cheeks (Expand Search)
chers » cheras (Expand Search), cheers (Expand Search), cher (Expand Search)
chern » chen (Expand Search)
-
61
Dynamic trapping and manipulation of biological cells with optical tweezers
Published 2014Get full text
Get full text
Journal Article -
62
The effect of the union paper case on stock price and volume behaviour of Malaysian stocks
Published 2014Get full text
Final Year Project (FYP) -
63
Authorised trading centres - an exploratory study
Published 2014Get full text
Final Year Project (FYP) -
64
-
65
-
66
-
67
-
68
21A.350J / SP.484J / STS.086J / WGS.484J The Anthropology of Computing, Fall 2004
Published 2004Subjects: Get full text
Learning Object -
69
AI is a viable alternative to high throughput screening: a 318-target study
Published 2024Get full text
Journal Article -
70
Practical fuzzing on open-source projects
Published 2022“…Hackers exploiting software vulnerabilities found in all software programs, resulting in unfavorable outcomes, which is a major concern in software security. …”
Get full text
Final Year Project (FYP) -
71
Cost of the national malaria control program and cost-effectiveness of indoor residual spraying and insecticide-treated bed net interventions in two districts of Madagascar
Published 2024“…The cost-effectiveness ratio (CER) of ITN intervention was then compared to the CER of IRS intervention to identify the most cost-effective intervention. …”
Journal article -
72
B-twisted Gaiotto–Witten theory and topological quantum field theory
Published 2025“…The physical theories we model admit alternative realizations as Chern–Simons–Rozansky–Witten theories and supergroup Chern–Simons theories and include as particular examples global forms of <em>gl</em>(1|1)–Chern–Simons theory and toral Chern–Simons theory. …”
Journal article -
73
Theory of Quantum Anomalous Hall Phases in Pentalayer Rhombohedral Graphene Moiré Structures
Published 2024“…Here we show that electron-electron interactions play a crucial role, and present microscopic theoretical calculations demonstrating the emergence of a nearly flat, isolated, Chern-1 band and FQAH phases in this system. We also study the four- and six-layer analogs and identify parameters where a nearly flat isolated Chern-1 band emerges which may be suitable to host FQAH physics.…”
Get full text
Article -
74
A model of information security and competition
Published 2024“…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
Journal article -
75
Contribution of problems and exercises at end chapters plus book interactive online exercises MCQ In: Cryptography and Network Security: Principles and Practice, Global Edition, 8t...
Published 2024“…In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. …”
Book -
76
Development of a human-robot cooperative control system
Published 2014“…During the final year of study in the course for the Bachelor’s in Electrical & Electronics Engineering in Nanyang Technological University, the student was assigned to the Final Year Project for Safe Human-Robot Interaction under the supervision of Associate Professor Cheah Chien Chern. The project’s objective was achieved through the use of a Microsoft Kinect depth sensor to monitor the position of a SCARA robot and determine safety actions to be taken by the robot. …”
Get full text
Final Year Project (FYP) -
77
Encrypted smartphone with advanced encryption standard 256
Published 2011“…However, in this digital age, mobile users cannot take the confidentiality of data transfer for granted because of the presence of hackers and the threats that exist. In today’s market, various encryption suites are available for mobile users to send their SMS “safely” and offer different ways of encryption and decryption such as symmetry cryptography and asymmetric cryptography. …”
Get full text
Final Year Project (FYP) -
78
Effect of iron (III) oxide concentration on the performance of meta-resonators embedded in cementitious matrix
Published 2022Get full text
Journal Article -
79
Enhancing security in generic e-Commerce systems
Published 2010“…One of the most common security features found in today e-Commerce application is the Secure Socket Layer (SSL) connection and even with SSL alone, it may not be sufficient to withstand hackers’ attacks. It may cause great losses to the store owner if their online store is broken into. …”
Get full text
Final Year Project (FYP) -
80
IS activity in Southeast Asia
Published 2015“…The increasing number of recruits from Indonesia and Malaysia to Islamic State reflects the evolving security threat to Southeast Asia. The emerging pattern bears lessons for countries in the region.…”
Get full text
Get full text
Commentary