Search alternatives:
cerys » ceres (Expand Search), cers (Expand Search)
Showing 61 - 80 results of 6,294 for search '(((cerys OR peers) OR ((hackers OR checked) OR checker)) OR beers)', query time: 0.13s Refine Results
  1. 61

    Evaluation of the music collection at the National Institute of Education Library by Yu, Bee Lian.

    Published 2011
    “…However, the Library fared relatively better, with 71.5% holdings, when a list of "Recommended Readings/References" drawn up by the Institute's academic staff was list-checked.…”
    Get full text
    Thesis
  2. 62

    Laser driver (ACC - auto current control) for driving laser diode in LED and laser modes by Tay, Eng Boon.

    Published 2008
    “…The circuit implemented is such that is portable and able to cater for few applications such as visual inspection of a laser diode and fiber checker.…”
    Get full text
    Thesis
  3. 63

    Influence of presumed influence on thinness as a beauty ideal for girls. by Soh, Wai Siong.

    Published 2008
    “…On the other hand, if the “influence on significant others or female peers” exerts an impact on “influence on self”, it will result in desire to be thin.…”
    Get full text
    Thesis
  4. 64

    Challenges of online collaborative learning among special needs university students by Hidayu Shafie, Ireena Nasiha Ibnu, Noori, Abdullah, Nurhilleny Rosly, Nadia Anuar, Nur Husna Serip Mohamad

    Published 0002
    “…Based on the findings of the study, it was found that the SNS in this study mostly had problems communicating with their peers during online collaborative learning. They were not really lacking in collaborative skills, but they were more concerned about their peers’ perspectives on their disabilities, and their abilities to do group work. …”
    Get full text
    Article
  5. 65

    A model of information security and competition by de Cornière, A, Taylor, G

    Published 2024
    “…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
    Journal article
  6. 66

    Contribution of problems and exercises at end chapters plus book interactive online exercises MCQ In: Cryptography and Network Security: Principles and Practice, Global Edition, 8t... by Stallings, Wiliam

    Published 2024
    “…In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. …”
    Book
  7. 67

    Lesbian rights and recognition in Singapore : lesbian relationships should be accepted legally and socially. by Yu, Bertinelli Shasha.

    Published 2013
    “…Family, religion and politics can negatively affect one’s lesbian identity while the support from peers can be empowering to their lesbian identity. …”
    Get full text
    Final Year Project (FYP)
  8. 68

    Enhancing security in generic e-Commerce systems by Mak, Foo Keong.

    Published 2010
    “…One of the most common security features found in today e-Commerce application is the Secure Socket Layer (SSL) connection and even with SSL alone, it may not be sufficient to withstand hackers’ attacks. It may cause great losses to the store owner if their online store is broken into. …”
    Get full text
    Final Year Project (FYP)
  9. 69

    GPU-accelerated real-time motion planning for safe human-robot collaboration by Fujii, Shohei

    Published 2024
    “…We experimentally demonstrate that our method can navigate a 6-DoF robot earlier than a geometric-primitives-based distance checker in a dynamic, collaborative environment. …”
    Get full text
    Thesis-Doctor of Philosophy
  10. 70

    Development of an industrial SCADA firewall prototype using single board computer - part 2 by Teo, Joycelyn Li Ting

    Published 2019
    “…Threats such as the rise in hackers, cyber espionage and increased influence of radical activists’ groups cannot be undermined. …”
    Get full text
    Final Year Project (FYP)
  11. 71

    Smart-contract privacy preservation mechanism by Siraj, Muhammed, Ninggal, Mohd. Izuan Hafez, Udzir, Nur Izura, Abdullah, Muhammad Daniel Hafiz, Asmawi, Aziah

    Published 2023
    “…Sensitive records stored in the cloud such as healthcare records, private conversation and credit card information are targets of hackers and privacy abuse. Current information and record management systems have difficulties achieving privacy protection of such sensitive records in a secure, transparent, decentralized and trustless environment. …”
    Get full text
    Article
  12. 72

    Design of blockchain-based P2P energy trading framework and a SCADA system for distributed energy resources in microgrids by Li, Yao

    Published 2022
    “…This project mainly completed the development and implementation of a peer-to-peer (P2P) energy trading framework between prosumers based on an Ethereum private blockchain network. …”
    Get full text
    Thesis-Master by Coursework
  13. 73

    Encrypted smartphone with advanced encryption standard 256 by Tan, Alvin Chee Munn.

    Published 2011
    “…However, in this digital age, mobile users cannot take the confidentiality of data transfer for granted because of the presence of hackers and the threats that exist. In today’s market, various encryption suites are available for mobile users to send their SMS “safely” and offer different ways of encryption and decryption such as symmetry cryptography and asymmetric cryptography. …”
    Get full text
    Final Year Project (FYP)
  14. 74

    Design and development of a web-based platform for EEE MSc student orientation by Soo, Serena Keng Shuang

    Published 2023
    “…The main aim of the web application is for students to have cultural exchanges, to explore Singapore, and to engage in school life by forming interest groups with like-minded peers.…”
    Get full text
    Final Year Project (FYP)
  15. 75

    Reframing stigma in Tourette syndrome: an updated scoping review by Pring, K, Malli, M, Hardy, BW, Rapp, SR, Storch, EA, Mink, JW, Martindale, JM

    Published 2023
    “…On the individual level, youth with PTD had lower self-esteem than peers, often leading to fear of future stigmatization, avoidant behaviors, and self-stigmatization. …”
    Journal article
  16. 76

    Part I : Ranking of 2004 financial sector reforms and liberalisation of ASEAN 10+5 economies. by Khoo, Miaosi., Seah, Terence Choon Kiat., Shahirah Arshad.

    Published 2008
    “…This study aims to motivate the ASEAN 10+5 economies to push for greater financial reforms and liberalisation by ranking and comparing them with their regional peers.…”
    Get full text
    Final Year Project (FYP)
  17. 77

    Enriching students’ cross-cultural and multilingual communication: the serious play approach utilizing Playmobil pro figures by Meletiadou, Eleni

    Published 2024
    “…Thematic analysis was used to analyse the data which revealed that Playmobil pro facilitated intercultural communication in the post-COVID-19 era as students seemed to be unwilling to work with their peers in face-to-face classes, possibly suffering from trauma. …”
    Get full text
    Article
  18. 78

    On the corrosion resistance of some selective laser melted alloys by Suryawanshi, Jyoti, Baskaran, T., Prakash, Om, Arya, S. B., Ramamurty, Upadrasta

    Published 2021
    “…The effects of laser scanning strategy (single melt vs. checker board styles), post-SLM heat treatment, and corroding surface orientation (with respect to the scan and build directions) on the corrosion behavior were examined. …”
    Get full text
    Journal Article
  19. 79

    Finite element analysis on post-buckling of thin-walled structures using ANSYS by Theint, Yi Mon

    Published 2015
    “…The results obtained were checked against experimental data and led to the development and the revision of design procedures for the pin-ended lipped column and hollow box section.…”
    Get full text
    Final Year Project (FYP)
  20. 80

    Normal People / by Rooney, Sally, author 631806, Faber (Online service) 656045

    Published 2018
    “…Well-off Marianne blossoms at university, becoming pretty and popular, while Connell struggles for the first time in his life to fit in properly with his peers. The two weave in and out of each other's lives during their university years, developing an intense bond that exposes their traumas and insecurities.…”
    Get full text
    software, multimedia