Showing 1 - 20 results of 41 for search '(((cheers OR ((checkers OR hackers) OR checker)) OR cheer) OR beers)', query time: 0.15s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Effects of beer advertisings on youth's intention towards alcohol consumption. by Yu, Angela Yah Kie.

    Published 2008
    “…The purpose of this paper is to study the effects of televised beer advertisements on youth's intention to drink as an adult. …”
    Get full text
    Thesis
  5. 5

    Time for a tiger : tiger beer and Singapore's nation building, 1932-1955 by Ang, Audre Ru Ying

    Published 2017
    “…This paper examines the intertwining histories of Tiger Beer and Singapore’s nation building process through print advertisements. …”
    Get full text
    Final Year Project (FYP)
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    Memory Checking Requires Logarithmic Overhead by Boyle, Elette, Komargodski, Ilan, Vafa, Neekon

    Published 2025
    “…We study the complexity of memory checkers with computational security and prove the first general tight lower bound. …”
    Get full text
    Article
  11. 11

    Synthesis and testing of asynchronous circuits - micropipeline by Khaing, Kathy.

    Published 2008
    “…The checker is designed to meet the Totally Self-Checking (TSC) goal based on the existing checker design concepts.…”
    Get full text
    Thesis
  12. 12

    Encapsulation of probiotics for food and beverage applications by Ang, Kai Lin

    Published 2022
    “…Up to date, no studies have been done to examine the viability of probiotics in popular, well-liked, commercialized carbonated sodas/beers, but it is known that certain components in these matrices (e.g. phosphoric acid in soda, hops and ethanol in beers) can reduce the viability of probiotics. …”
    Get full text
    Final Year Project (FYP)
  13. 13

    100 UMPSA athletes to compete in 10 events at the 2024 SUKUM Championship by Siti Nur Azwin, Zulkapri

    Published 2024
    “…PEKAN, 6 August 2024 – The enthusiastic cheers of “UMPSA! Minda Juara!” echoed as 100 athletes, comprising 65 men and 35 women from Universiti Malaysia Pahang Al-Sultan Abdullah (UMPSA), prepared to represent their university in the upcoming 2024 SUKUM Championship.…”
    Get full text
    Newspaper
  14. 14

    Laser driver (ACC - auto current control) for driving laser diode in LED and laser modes by Tay, Eng Boon.

    Published 2008
    “…The circuit implemented is such that is portable and able to cater for few applications such as visual inspection of a laser diode and fiber checker.…”
    Get full text
    Thesis
  15. 15

    Practical fuzzing on open-source projects by Ng, Chun Kai

    Published 2022
    “…Hackers exploiting software vulnerabilities found in all software programs, resulting in unfavorable outcomes, which is a major concern in software security. …”
    Get full text
    Final Year Project (FYP)
  16. 16

    A model of information security and competition by de Cornière, A, Taylor, G

    Published 2024
    “…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
    Journal article
  17. 17

    Contribution of problems and exercises at end chapters plus book interactive online exercises MCQ In: Cryptography and Network Security: Principles and Practice, Global Edition, 8t... by Stallings, Wiliam

    Published 2024
    “…In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. …”
    Book
  18. 18

    GPU-accelerated real-time motion planning for safe human-robot collaboration by Fujii, Shohei

    Published 2024
    “…We experimentally demonstrate that our method can navigate a 6-DoF robot earlier than a geometric-primitives-based distance checker in a dynamic, collaborative environment. …”
    Get full text
    Thesis-Doctor of Philosophy
  19. 19

    Enhancing security in generic e-Commerce systems by Mak, Foo Keong.

    Published 2010
    “…One of the most common security features found in today e-Commerce application is the Secure Socket Layer (SSL) connection and even with SSL alone, it may not be sufficient to withstand hackers’ attacks. It may cause great losses to the store owner if their online store is broken into. …”
    Get full text
    Final Year Project (FYP)
  20. 20

    On the corrosion resistance of some selective laser melted alloys by Suryawanshi, Jyoti, Baskaran, T., Prakash, Om, Arya, S. B., Ramamurty, Upadrasta

    Published 2021
    “…The effects of laser scanning strategy (single melt vs. checker board styles), post-SLM heat treatment, and corroding surface orientation (with respect to the scan and build directions) on the corrosion behavior were examined. …”
    Get full text
    Journal Article