Showing 141 - 160 results of 4,571 for search '(((hackers OR checked) OR ((cher OR chenr) OR when)) OR beer)', query time: 0.15s Refine Results
  1. 141

    A model of information security and competition by de Cornière, A, Taylor, G

    Published 2024
    “…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
    Journal article
  2. 142

    Learning automations in game engine by Ju, Peng

    Published 2013
    “…First, design and develop a server-client software version of Beer Game using Java. Second, develop a software entity (AI agent) in the Beer Game software utilizing Memetic approach. …”
    Get full text
    Final Year Project (FYP)
  3. 143

    Practical fuzzing on open-source projects by Ng, Chun Kai

    Published 2022
    “…Hackers exploiting software vulnerabilities found in all software programs, resulting in unfavorable outcomes, which is a major concern in software security. …”
    Get full text
    Final Year Project (FYP)
  4. 144

    Encrypted smartphone with advanced encryption standard 256 by Tan, Alvin Chee Munn.

    Published 2011
    “…Mobile users are enticed by this secondary form of mobile communication because of its generally low cost when compared to making a phone call. However, in this digital age, mobile users cannot take the confidentiality of data transfer for granted because of the presence of hackers and the threats that exist. …”
    Get full text
    Final Year Project (FYP)
  5. 145

    Design and development of small scale index matching tunnel by Tan, Yu Tiong

    Published 2017
    “…Suitable design and sodium thiosulfate is used, to overcome the issue of rapid oxidation of the sodium iodide solution when it is exposed to the atmosphere. Then, the results of the experiment are cross-checked with the theoretical equations, an analysis is being accounted for the difference in result. …”
    Get full text
    Final Year Project (FYP)
  6. 146

    Contribution of problems and exercises at end chapters plus book interactive online exercises MCQ In: Cryptography and Network Security: Principles and Practice, Global Edition, 8t... by Stallings, Wiliam

    Published 2024
    “…In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. …”
    Book
  7. 147

    Plastic heat sink by Tan, Cornelius Ming Han.

    Published 2011
    “…The performances of plastic heat sinks are also determined by thermal imaging heat scans and evaluation of performance of light emitting diode when mounted on the plastic heat sinks. Plastic heat sink model is created to correlate heat dissipation with thermal conductivity. …”
    Get full text
    Final Year Project (FYP)
  8. 148

    Double trouble by Bay, Gladys Yun Ting, Wynn, Thant Sinn Halyn, Soh, Jovina Chui Ling, Loo, Sean Jia Jie

    Published 2019
    “…Ashley and Caden are a pair of exes who co-host the show; their already tenuous post-breakup relationship is tested when an unexpected guest finds their on the show—Dean, Ashley’s other ex-boyfriend. …”
    Get full text
    Final Year Project (FYP)
  9. 149

    Multiplicity dependence of σψ(2S)/σJ/ψ in pp collisions at √𝑠 = 13 TeV by Aaij, R., Abdelmotteleb, A. S. W., Abellan Beteta, C., Abudinén, F., Ackernley, T., Adeva, B., Adinolfi, M., Adlarson, P., Agapopoulou, C., Aidala, C. A., Ajaltouni, Z., Akar, S., Akiba, K., Albicocco, P., Albrecht, J., Alessio, F.

    Published 2024
    “…The ratio of production cross-sections of ψ(2S) over J/ψ mesons are cross-checked with other measurements in di-lepton channels and found to be compatible.…”
    Get full text
    Article
  10. 150

    Design language in packaging. by Wijaya, Merwyn.

    Published 2012
    “…Craid is a fictitious brand of Irish beer that is designed based on this essential role. …”
    Get full text
    Final Year Project (FYP)
  11. 151

    Enhancing security in generic e-Commerce systems by Mak, Foo Keong.

    Published 2010
    “…One of the most common security features found in today e-Commerce application is the Secure Socket Layer (SSL) connection and even with SSL alone, it may not be sufficient to withstand hackers’ attacks. It may cause great losses to the store owner if their online store is broken into. …”
    Get full text
    Final Year Project (FYP)
  12. 152

    Membrane compaction in forward osmosis process by Ng, Daniel Yee Fan, Chen, Yunfeng, Dong, Zhili, Wang, Rong

    Published 2021
    “…Membrane compaction is commonly observed in polymeric membranes when subjected to elevated hydraulic pressure, but was rarely discussed in forward osmosis (FO) processes, since there was usually little hydraulic pressure difference across the membrane. …”
    Get full text
    Journal Article
  13. 153
  14. 154
  15. 155

    Spooky action in the film/novel debate. by Lee, Tracy Marie Shiyin., Luo, Esmonde Jianwen., Wong, Kai Wing., Manoj Prabhoda Chandran., Chee, Kang Xiong.

    Published 2012
    “…The installation follows a Collector, Photographer, Writer and a Collective (a beer garden group that gathers at the local coffeeshop) in their daily life as they contemplate the curious events, and each other, in an attempt to cope with the boredom they face in the neighbourhood. …”
    Get full text
    Final Year Project (FYP)
  16. 156

    Numerical simulation of oxygen delivery in presence of hemoglobin hydrogel based oxygen carriers by Tan, Kai Ying

    Published 2016
    “…Red blood cells have standard shelf life of only 42 days and unable to be checked and sterilized for infective agents like HIV. …”
    Get full text
    Final Year Project (FYP)
  17. 157
  18. 158

    Encapsulation of probiotics for food and beverage applications by Ang, Kai Lin

    Published 2022
    “…Findings from this study have shown that alginate-encapsulated probiotic beads, produced via extrusion method, can exhibit a protective effect in an acidic/bactericidal environment and resulted in a significant improvement in viability as compared to unencapsulated ones in commercialized carbonated sodas/beers. Findings from this study have also found that the viability of probiotics is more well maintained when stored in refrigerated conditions than in room temperature conditions over 14 days. …”
    Get full text
    Final Year Project (FYP)
  19. 159

    A Multi-tier Model and Filtering Approach to Detect Fake News Using Machine Learning Algorithms by Yu, Chiung Chang, A Hamid, Isredza Rahmi, Abdullah, Zubaile, Kipli, Kuryati, Amnur, Hidra

    Published 2024
    “…The consensus layer acts as the final decision when collision results occur in the first two-tier layer. …”
    Get full text
    Article
  20. 160

    Development of an industrial SCADA firewall prototype using single board computer - part 2 by Teo, Joycelyn Li Ting

    Published 2019
    “…Threats such as the rise in hackers, cyber espionage and increased influence of radical activists’ groups cannot be undermined. …”
    Get full text
    Final Year Project (FYP)