Search alternatives:
cheers » cheaters (Expand Search), chees (Expand Search), chers (Expand Search), sheers (Expand Search)
checkers » checks (Expand Search), checked (Expand Search), crackers (Expand Search), checkeds (Expand Search)
hackers » trackers (Expand Search)
checker » checked (Expand Search)
cheer » chee (Expand Search), cher (Expand Search), sheer (Expand Search)
beers » peers (Expand Search), bears (Expand Search), beer (Expand Search)
cheers » cheaters (Expand Search), chees (Expand Search), chers (Expand Search), sheers (Expand Search)
checkers » checks (Expand Search), checked (Expand Search), crackers (Expand Search), checkeds (Expand Search)
hackers » trackers (Expand Search)
checker » checked (Expand Search)
cheer » chee (Expand Search), cher (Expand Search), sheer (Expand Search)
beers » peers (Expand Search), bears (Expand Search), beer (Expand Search)
-
1
Towards explainable and semantically coherent claim extraction for an automated fact-checker
Published 2024Subjects: Get full text
Final Year Project (FYP) -
2
Consolidated Health Economic Evaluation Reporting Standards for Interventions that use Artificial Intelligence (CHEERS-AI)
Published 2024“…The Consolidated Health Economic Evaluation Reporting Standards (CHEERS 2022) provide reporting guidelines for EEs. …”
Journal article -
3
Alginate encapsulation improves probiotics survival in carbonated sodas and beers
Published 2023Subjects: Get full text
Journal Article -
4
Effects of beer advertisings on youth's intention towards alcohol consumption.
Published 2008“…The purpose of this paper is to study the effects of televised beer advertisements on youth's intention to drink as an adult. …”
Get full text
Thesis -
5
Time for a tiger : tiger beer and Singapore's nation building, 1932-1955
Published 2017“…This paper examines the intertwining histories of Tiger Beer and Singapore’s nation building process through print advertisements. …”
Get full text
Final Year Project (FYP) -
6
Empirical studies on director shareholdings of SGX-listed companies.
Published 2008Get full text
Final Year Project (FYP) -
7
-
8
21A.350J / SP.484J / STS.086J / WGS.484J The Anthropology of Computing, Fall 2004
Published 2004Subjects: Get full text
Learning Object -
9
-
10
Memory Checking Requires Logarithmic Overhead
Published 2025“…We study the complexity of memory checkers with computational security and prove the first general tight lower bound. …”
Get full text
Article -
11
Synthesis and testing of asynchronous circuits - micropipeline
Published 2008“…The checker is designed to meet the Totally Self-Checking (TSC) goal based on the existing checker design concepts.…”
Get full text
Thesis -
12
Encapsulation of probiotics for food and beverage applications
Published 2022“…Up to date, no studies have been done to examine the viability of probiotics in popular, well-liked, commercialized carbonated sodas/beers, but it is known that certain components in these matrices (e.g. phosphoric acid in soda, hops and ethanol in beers) can reduce the viability of probiotics. …”
Get full text
Final Year Project (FYP) -
13
100 UMPSA athletes to compete in 10 events at the 2024 SUKUM Championship
Published 2024“…PEKAN, 6 August 2024 – The enthusiastic cheers of “UMPSA! Minda Juara!” echoed as 100 athletes, comprising 65 men and 35 women from Universiti Malaysia Pahang Al-Sultan Abdullah (UMPSA), prepared to represent their university in the upcoming 2024 SUKUM Championship.…”
Get full text
Newspaper -
14
Laser driver (ACC - auto current control) for driving laser diode in LED and laser modes
Published 2008“…The circuit implemented is such that is portable and able to cater for few applications such as visual inspection of a laser diode and fiber checker.…”
Get full text
Thesis -
15
Practical fuzzing on open-source projects
Published 2022“…Hackers exploiting software vulnerabilities found in all software programs, resulting in unfavorable outcomes, which is a major concern in software security. …”
Get full text
Final Year Project (FYP) -
16
A model of information security and competition
Published 2024“…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
Journal article -
17
Contribution of problems and exercises at end chapters plus book interactive online exercises MCQ In: Cryptography and Network Security: Principles and Practice, Global Edition, 8t...
Published 2024“…In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. …”
Book -
18
GPU-accelerated real-time motion planning for safe human-robot collaboration
Published 2024“…We experimentally demonstrate that our method can navigate a 6-DoF robot earlier than a geometric-primitives-based distance checker in a dynamic, collaborative environment. …”
Get full text
Thesis-Doctor of Philosophy -
19
Enhancing security in generic e-Commerce systems
Published 2010“…One of the most common security features found in today e-Commerce application is the Secure Socket Layer (SSL) connection and even with SSL alone, it may not be sufficient to withstand hackers’ attacks. It may cause great losses to the store owner if their online store is broken into. …”
Get full text
Final Year Project (FYP) -
20
On the corrosion resistance of some selective laser melted alloys
Published 2021“…The effects of laser scanning strategy (single melt vs. checker board styles), post-SLM heat treatment, and corroding surface orientation (with respect to the scan and build directions) on the corrosion behavior were examined. …”
Get full text
Journal Article