Showing 281 - 300 results of 335 for search '(((elisa OR els) OR esa) OR ((delta OR (mbplla OR mbella)) OR (ella OR (bdella OR idella))))', query time: 0.18s Refine Results
  1. 281
  2. 282

    Bella's empowerment - why the twilight saga is not anti-feminist. by See, Shawn Kai Sheng.

    Published 2013
    “…Rowling and the Fifty Shades of Grey trilogy by E.L. James that have taken the contemporary literary scene by storm, no other novels can arguably match up to the success of Stephenie Meyer’s Twilight series. …”
    Get full text
    Final Year Project (FYP)
  3. 283
  4. 284

    Information encryption processing over wireless LAN by Nguyen, Daniel Vinh Quang.

    Published 2013
    “…The SecureCommunication2.0 and Mobile-Robot Tracking System include different types of encryption technologies such as Digital Encryption Standard (DES), Diffie-Hellman Public Key Algorithm, ElGamal algorithms, Message Digests and Digital Signatures. …”
    Get full text
    Final Year Project (FYP)
  5. 285
  6. 286
  7. 287
  8. 288
  9. 289
  10. 290

    Blockchain and FL-based secure architecture for enhanced external Intrusion detection in smart farming by Singh, Sushil Kumar, Kumar, Manish, Khanna, Ashish, Virdee, Bal Singh

    Published 2025
    “…Our architecture employs Ensemble Learning (EL) for the Local Model at the Ensemble Layer to train each Smart Land's data and offers privacy-prevented security. …”
    Get full text
    Article
  11. 291
  12. 292

    Cache refinement type for side-channel detection of cryptographic software by Jiang, Ke, Bao, Yuyan, Wang, Shuai, Liu, Zhibo, Zhang, Tianwei

    Published 2023
    “…We evaluate CaType in identifying side channel vulnerabilities in real-world crypto software, including RSA, ElGamal, and (EC)DSA from OpenSSL and Libgcrypt. …”
    Get full text
    Conference Paper
  13. 293

    Rethinking small-footprint counter-terrorism: moving from kinetic operations to security force assistance by Bell, Louis

    Published 2015
    “…Drawing on the experiences of U.S. advisory efforts in El Salvador and the Philippines, this paper demonstrates that a counter-terrorism strategy centred on Security Force Assistance holds far more potential than the current enemy-centric policy. …”
    Get full text
    Thesis
  14. 294
  15. 295
  16. 296
  17. 297

    Choice of DLVO approximation method for quantifying the affinity between latex particles and membranes by Lay, Huang Teik, Ong, Chi Siang, Wang, Rong, Chew, Jia Wei

    Published 2023
    “…In particular, while both the Poisson-Boltzmann (P–B) and linear superposition approximation (LSA) equations can quantify the electrostatics (EL) interaction energy component, the former assumes constant potential, while the latter additionally considers constant charge scenarios. …”
    Get full text
    Journal Article
  18. 298

    Material characterization of additive manufactured metal parts for failure analysis by Seow, Mei Qi

    Published 2019
    “…The samples are tested for its mechanical properties via tensile testing, there are differences in mechanical performance such as YS, UTS, EL, ROA is observed. This resulted in the differences of microstructural defects, fractography and porosity analysis using Scanning Electron Microscope (SEM) and Optical Microscope (OM). …”
    Get full text
    Final Year Project (FYP)
  19. 299
  20. 300

    Animation of electronic and optical processes in semiconductors by Yeo, Raymond Chin Keong.

    Published 2009
    “…Many websites and schools such as University of Colorado, Department of Electrical and Computer Engineering [1] and University of Texas at El Paso, Department of electrical and computer engineering [2], have their own version of animation to help in the explanation of semiconductor fundamental. …”
    Get full text
    Final Year Project (FYP)