-
521
-
522
-
523
-
524
Bella's empowerment - why the twilight saga is not anti-feminist.
Published 2013“…Rowling and the Fifty Shades of Grey trilogy by E.L. James that have taken the contemporary literary scene by storm, no other novels can arguably match up to the success of Stephenie Meyer’s Twilight series. …”
Get full text
Final Year Project (FYP) -
525
-
526
Information encryption processing over wireless LAN
Published 2013“…The SecureCommunication2.0 and Mobile-Robot Tracking System include different types of encryption technologies such as Digital Encryption Standard (DES), Diffie-Hellman Public Key Algorithm, ElGamal algorithms, Message Digests and Digital Signatures. …”
Get full text
Final Year Project (FYP) -
527
-
528
-
529
Numerical simulation of a forced circulation solar water heating system
Published 2024Get full text
Article -
530
Machine learning, IoT and 5G technologies for breast cancer studies: A review
Published 2024Get full text
Article -
531
Putin-Biden summit : China's shadow looms large
Published 2021“…Russia and China, already close, appear to be getting even closer as Moscow seeks to forge a relationship with US President Biden.…”
Get full text
Commentary -
532
-
533
Blockchain and FL-based secure architecture for enhanced external Intrusion detection in smart farming
Published 2025“…Our architecture employs Ensemble Learning (EL) for the Local Model at the Ensemble Layer to train each Smart Land's data and offers privacy-prevented security. …”
Get full text
Article -
534
Targeting the youth : the potentials of the traditional Chinese medicine industry in Singapore.
Published 2008“…This research project focuses on the Traditional Chinese Medicine (TCM) industry in Singapore and its potential in getting the younger generation to be more interested in turning to TCM as an alternative form of healthcare method.…”
Get full text
Final Year Project (FYP) -
535
-
536
Primary type of trust required in the chinese workplace : a qualitative approach.
Published 2013“…Firstly, the results showed that Affective-based trust is the primary type of trust required to getting things done. Secondly, culturally unique attributes of Cognitive and Affective-based trust were identified. …”
Get full text
Final Year Project (FYP) -
537
Circularly polarized patch antennas for nano-satellite communication system
Published 2010“…Patch antennas (rectangular micro-strip antennas) are getting more popular as communication technology improves. …”
Get full text
Final Year Project (FYP) -
538
Cache refinement type for side-channel detection of cryptographic software
Published 2023“…We evaluate CaType in identifying side channel vulnerabilities in real-world crypto software, including RSA, ElGamal, and (EC)DSA from OpenSSL and Libgcrypt. …”
Get full text
Conference Paper -
539
Rethinking small-footprint counter-terrorism: moving from kinetic operations to security force assistance
Published 2015“…Drawing on the experiences of U.S. advisory efforts in El Salvador and the Philippines, this paper demonstrates that a counter-terrorism strategy centred on Security Force Assistance holds far more potential than the current enemy-centric policy. …”
Get full text
Thesis -
540
Characterizing the Life Cycle of Online News StoriesUsing Social Media Reactions
Published 2020Get full text
Presentation