Showing 61 - 80 results of 6,276 for search '(((hackers OR checks) OR (ceres OR cereus)) OR peer)', query time: 0.12s Refine Results
  1. 61

    A model of information security and competition by de Cornière, A, Taylor, G

    Published 2024
    “…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
    Journal article
  2. 62

    Studies on coordination chemistry of a nitrogen–sulfur donor ligand with lighter and heavier metal ions and biological activities of its complexes by H. Tarafder, M. Tofazzal, Asmadi, A., Talib, Siti M. S., Ali, A. M., Crouse, K. A.

    Published 2001
    “…[Fe(SBDTCA)3], [Sb(SBDTCA)3] and [Sb(SBDTCA)2Cl · H2O] were strongly effective against bacteria giving clear inhibition zones with Pseudomonas aeruginosa and Bacillus cereus. The compounds showed poor antifungal activity. …”
    Article
  3. 63

    Molecular characterization of Bacillus, lactic acid bacteria and yeast as potential probiotic isolated from fermented food by Cissé, Hama, Kagambèga, Boureima, Sawadogo, Adama, Tankoano, Abel, Sangaré, Gaston, Traoré, Yves, Ouoba, Irene, Savadogo, Aly

    Published 2019
    “…Based on colonies characteristics and cells morphology, biochemical tests and gene sequencing, the isolates were identified as Bacillus cereus sensu lato (13), Bacillus pumilus group (03) with one strain (LCG1) presumed LAB was identified as Bacillus australimaris or Bacillus pumilus by 16S rRNA sequencing, Enterococcus durans (03), Lactobacillus paracasei (03), Lactobacillus plantarum (04), Leuconostoc pseudomesenteroides (01), Saccharomyces cerevisiae (04), Kluyveromyces marxianus (01), Candida tropicalis (01), Pichia kudriavzevii (01), Clavispora lusitaniae (02), Rhodotorula mucilaginosa (01) and, Cyberlindnera fabianii (01). …”
    Get full text
    Article
  4. 64

    A Multi-satellite Perspective on “Hot Tower” Characteristics in the Equatorial Trough Zone by Pilewskie, J, Stephens, G, Takahashi, H, L’Ecuyer, T

    Published 2024
    “…Cloud vertical profiles from CloudSat and CALIPSO measurements supply convective core diameters and proxies for intensity and convective activity, and these proxies are augmented with brightness temperature data from geostationary satellite observations, precipitation information from IMERG, and cloud radiative properties from CERES. Less than 35% of all deep cores are classified as hot towers, and we estimate that 800–1700 hot towers occur at any given time over the course of a day, with the mean maximum core and hot tower frequency occurring at the time of year when peak convective intensity and precipitation occur. …”
    Journal article
  5. 65

    Enhancing security in generic e-Commerce systems by Mak, Foo Keong.

    Published 2010
    “…One of the most common security features found in today e-Commerce application is the Secure Socket Layer (SSL) connection and even with SSL alone, it may not be sufficient to withstand hackers’ attacks. It may cause great losses to the store owner if their online store is broken into. …”
    Get full text
    Final Year Project (FYP)
  6. 66

    Tournaments of financial analysts by Yin, Huifang, Zhang, Huai

    Published 2013
    “…This finding survives several robustness checks and is more pronounced when the interim assessment date is closer to the end of the tournament period, when analysts are inexperienced, and when the market activity is high. …”
    Get full text
    Get full text
    Journal Article
  7. 67

    Can good ESG performance help companies resist external shocks? by Yang, Xin, Sheikh Hassan, Ahmad Fahmi, Karbhari, Yusuf

    Published 2024
    “…Our results remain robust even after a series of rigorous robustness checks.…”
    Get full text
    Article
  8. 68

    Evaluating geospatial accuracy for equity analyses: a case study of the U.S. National Bridge Inventory by Gandy, CA, Kang, X, Ritsch, N, Armanios, DE

    Published 2023
    “…Phase 3 assesses the feasibility of enhancing location granularity through a hand-checked case study. We find that for coarser geospatial levels (state and county), equity-based analyses may be possible, but for more granular geospatial levels (place and census tract), which is where equity-based analyses are often conducted, the data may need greater buffering and hand checks to ensure accuracy. …”
    Journal article
  9. 69

    Predicting bank failures : a comparison of the Cox proportional hazards model and time-varying covariates model. by Cheng, Philip Yim Kwong.

    Published 2008
    “…As a contribution to bank regulation by improving the accuracy of predicting failed banks, I first illustrate the use of martingale and other residuals as diagnostic checks for Cox’s proportional hazards model. Second, I discuss and substantiate the claim that a time-varying covariates model is superior to the Cox model as a bank failure model.…”
    Get full text
    Thesis
  10. 70

    Isolation and identification of tannin-degrading bacteria from goat feces, ruminal fluid, and rumen gut by Muhammad Syafiq Suhaimi, Fayyadhah Asyiqin Zailani, Nur Farah Syuhada Mohd Zaki, Farizan Aris, Mohd Taufiq Mat Jalil, Nurul Aili Zakaria

    Published 2024
    “…Molecular identification revealed the presence of Bacillus cereus (TDB536), Lysinibacillus macroides (TDB17), Acinetobacter nosocomialis (TDB18, 20, 23, 24, 30, 35), and Staphylococcus saprophyticus (TDB40). …”
    Get full text
    Article
  11. 71

    Development of an industrial SCADA firewall prototype using single board computer - part 2 by Teo, Joycelyn Li Ting

    Published 2019
    “…Threats such as the rise in hackers, cyber espionage and increased influence of radical activists’ groups cannot be undermined. …”
    Get full text
    Final Year Project (FYP)
  12. 72

    Design and implementation of a synthesizable test-bench for testing the LDPC decoder IP by Yang, Shi

    Published 2018
    “…The simulation environment is mainly used for preliminary and functional checks, and the emulation environment is chosen for further verification due to its much higher run speed compared to simulation.…”
    Get full text
    Thesis
  13. 73

    Encrypted smartphone with advanced encryption standard 256 by Tan, Alvin Chee Munn.

    Published 2011
    “…However, in this digital age, mobile users cannot take the confidentiality of data transfer for granted because of the presence of hackers and the threats that exist. In today’s market, various encryption suites are available for mobile users to send their SMS “safely” and offer different ways of encryption and decryption such as symmetry cryptography and asymmetric cryptography. …”
    Get full text
    Final Year Project (FYP)
  14. 74

    Enumeration, isolation, identification and probiotic characterisation of lactic acid bacteria from Nigerian human breast milk by Abdullahi, Binta Sambo

    Published 2019
    “…Again all eleven LAB produced antibacterial metabolites that inhibited the growth of all the four indicator bacteria (Bacillus cereus, Escherichia coli, Salmonella Enteritidis and Staphylococcus aureus) in both unbuffered and buffered agar spot tests. …”
    Get full text
    Thesis
  15. 75

    Effect of Dactylaria higginsii on interference of Cyperus rotundus with L. esculentum by Kadir, J.B., Charudattan, R., Stall, W.M., Bewick, T.A.

    Published 1999
    “…At 106 conidia ml-1, D. higginsii reduced the interference from C. rotundus, controlled C. rotundus better, and increased L. esculentum yield compared to the weedy checks.…”
    Article
  16. 76

    Effective 5D BIM requirements for risk mitigation during pre-contract stage. by Nazirul Fariq, Nazirul Fariq, Ismail, Syuhaida, Ab. Rani, Nur Izzati

    Published 2022
    “…Risk mitigation strategies are proposed to make a positive impact on the 5D BIM implementation, which consist of regular checks and balances, improve skills and knowledge through training and acquire suitable 5D BIM applications. …”
    Get full text
    Article
  17. 77

    Tournament induced incentives and analysts' boldness. by Yin, Huifang.

    Published 2012
    “…This finding survives several robustness checks and is more pronounced when the interim assessment date is closer to the end of the tournament period, when analysts are inexperienced/non-all-star, and when the market activity is high. …”
    Get full text
    Thesis
  18. 78

    Tea leaf [Camellia sinensis (L.) Kuntze] extract-synthesized silver nanoparticles as antimicrobial agent against foodborne pathogens by Loo, Yuet Ying

    Published 2018
    “…The antibacterial activity of silver nanaoparticles was tested against 12 foodborne pathogens namely Escherichia coli, Escherichia coli O157:H7, Klebsiella pneumoniae, Staphylococcus aureus, Bacillus cereus, Salmonella Typhimurium, Salmonella Enteritidis, Enterococcus faecalis, Enterococcus durans, Listeria monocytogenes, Bacillus subtilissubsp. spizizenii, and Methicillin-resistant Staphylococcus aureus. …”
    Get full text
    Thesis
  19. 79

    Influence of non-linear wave load models on monopile supported offshore wind turbines for extreme conditions by Ryan, GV, Tang, T, McAdam, RA, Adcock, TAA

    Published 2025
    “…These models are compared to the widely used constrained wave approach, showing that significant differences are predicted for steel and geotechnical design checks. This suggests that the industry standard approach may be inappropriate for the design of monopile structures against extreme wave loads.…”
    Journal article
  20. 80

    Mediation effects of language anxiety and prior learning experience on academic speaking challenges and strategies among Libyan students in Malaysian universities by Halali, Ahlam Ali Salim, Ismail, Lilliati, Abd Samad, Arshad, Razali, Abu Bakar, Noordin, Nooreen

    Published 2023
    “…Field notes and member checks were used for validation. Correlational procedures, structural equation modeling (SEM), and bootstrapping resampling analyses were conducted to examine the relationships between variables, validate study models, and test research hypotheses. …”
    Get full text
    Article