Showing 81 - 100 results of 6,501 for search '(((peers OR bears) OR (cheers OR (checkers OR checked))) OR check)*', query time: 0.16s Refine Results
  1. 81

    Evaluation of the music collection at the National Institute of Education Library by Yu, Bee Lian.

    Published 2011
    “…Three selected bibliographies were list-checked against the Library's holding in order to determine the extent to which selected titles are available in the collection.The results show that the Library is consistently weak in most subject areas in its music collection. …”
    Get full text
    Thesis
  2. 82

    100 UMPSA athletes to compete in 10 events at the 2024 SUKUM Championship by Siti Nur Azwin, Zulkapri

    Published 2024
    “…PEKAN, 6 August 2024 – The enthusiastic cheers of “UMPSA! Minda Juara!” echoed as 100 athletes, comprising 65 men and 35 women from Universiti Malaysia Pahang Al-Sultan Abdullah (UMPSA), prepared to represent their university in the upcoming 2024 SUKUM Championship.…”
    Get full text
    Newspaper
  3. 83
  4. 84

    Influence of presumed influence on thinness as a beauty ideal for girls. by Soh, Wai Siong.

    Published 2008
    “…On the other hand, if the “influence on significant others or female peers” exerts an impact on “influence on self”, it will result in desire to be thin.…”
    Get full text
    Thesis
  5. 85

    Challenges of online collaborative learning among special needs university students by Hidayu Shafie, Ireena Nasiha Ibnu, Noori, Abdullah, Nurhilleny Rosly, Nadia Anuar, Nur Husna Serip Mohamad

    Published 0002
    “…Based on the findings of the study, it was found that the SNS in this study mostly had problems communicating with their peers during online collaborative learning. They were not really lacking in collaborative skills, but they were more concerned about their peers’ perspectives on their disabilities, and their abilities to do group work. …”
    Get full text
    Article
  6. 86
  7. 87

    Lesbian rights and recognition in Singapore : lesbian relationships should be accepted legally and socially. by Yu, Bertinelli Shasha.

    Published 2013
    “…Family, religion and politics can negatively affect one’s lesbian identity while the support from peers can be empowering to their lesbian identity. …”
    Get full text
    Final Year Project (FYP)
  8. 88

    Effective and efficient topic mining and exploration from geo-textual data by Zhao, Kaiqi

    Published 2018
    “…However, most of the existing methods mine topics from check-in datasets from Foursquare. Because each check-in often consists of limited textual information, and most of the users only shared few check-ins, it is difficult to discover meaningful topics of individuals from the check-in data. …”
    Get full text
    Thesis
  9. 89

    IS activity in Southeast Asia by Liow, Joseph Chinyong, Liow Chin Yong, Joseph

    Published 2015
    “…The increasing number of recruits from Indonesia and Malaysia to Islamic State reflects the evolving security threat to Southeast Asia. The emerging pattern bears lessons for countries in the region.…”
    Get full text
    Get full text
    Commentary
  10. 90

    NTU Q-Count: smart spaces, informed choices by Sri Ganesh Babu Sri Vaishnavi

    Published 2024
    “…The app aims to encourage the disciplined check-in and check-out of study space users through the concept of crowd density reporting, so that students can be aware of real-time crowd data present in study spaces at all times, allowing them to choose the best study spaces according to their needs. …”
    Get full text
    Final Year Project (FYP)
  11. 91

    Waste water for non-portable use : Singapore experience by Phua, Lee Kiang.

    Published 2008
    “…Singapore has implemented effective conservation policies to check rising demand and foster a culture of prudence in how people use scarce water supplies. …”
    Get full text
    Thesis
  12. 92

    Python for Security and Networking : Leverage Python modules and tools in securing your network and applications / by Ortega, José Manuel, author 656338, Packt Publishing (Online service) 656336

    Published 2018
    “…Next, you’ll dive deep into the core networking tasks where you will learn how to check a network’s vulnerability using Python security scripting and understand how to check for vulnerabilities in your network – including tasks related to packet sniffing. …”
    Get full text
    Get full text
    software, multimedia
  13. 93

    Response to Comment on “Unique in the shopping mall: On the reidentifiability of credit card metadata” by de Montjoye, Yves-Alexandre, Pentland, Alex

    Published 2021
    “…The synthetic data set that they “successfully anonymize” bears no resemblance to modern high-dimensional data sets on which their methods fail. …”
    Get full text
    Article
  14. 94

    Design of blockchain-based P2P energy trading framework and a SCADA system for distributed energy resources in microgrids by Li, Yao

    Published 2022
    “…This project mainly completed the development and implementation of a peer-to-peer (P2P) energy trading framework between prosumers based on an Ethereum private blockchain network. …”
    Get full text
    Thesis-Master by Coursework
  15. 95

    Finite element analysis on post-buckling of thin-walled structures using ANSYS by Theint, Yi Mon

    Published 2015
    “…The results obtained were checked against experimental data and led to the development and the revision of design procedures for the pin-ended lipped column and hollow box section.…”
    Get full text
    Final Year Project (FYP)
  16. 96

    Design and development of a web-based platform for EEE MSc student orientation by Soo, Serena Keng Shuang

    Published 2023
    “…The main aim of the web application is for students to have cultural exchanges, to explore Singapore, and to engage in school life by forming interest groups with like-minded peers.…”
    Get full text
    Final Year Project (FYP)
  17. 97

    Reframing stigma in Tourette syndrome: an updated scoping review by Pring, K, Malli, M, Hardy, BW, Rapp, SR, Storch, EA, Mink, JW, Martindale, JM

    Published 2023
    “…On the individual level, youth with PTD had lower self-esteem than peers, often leading to fear of future stigmatization, avoidant behaviors, and self-stigmatization. …”
    Journal article
  18. 98

    Black-box cryptography is dangerous III by Lee, Esther Yu Ling.

    Published 2013
    “…Cryptographic libraries are readily available for developers to use and download however, many a times, developers do not understand or check the exact codes that they have downloaded and are implementing. …”
    Get full text
    Final Year Project (FYP)
  19. 99

    Automated scripts for testing verilog designs with iVerilog by Ng, Gary Jia Hao

    Published 2015
    “…Python scripts were written to check for the coding bugs or errors of the source design through the usage of testbenches. …”
    Get full text
    Final Year Project (FYP)
  20. 100

    Part I : Ranking of 2004 financial sector reforms and liberalisation of ASEAN 10+5 economies. by Khoo, Miaosi., Seah, Terence Choon Kiat., Shahirah Arshad.

    Published 2008
    “…This study aims to motivate the ASEAN 10+5 economies to push for greater financial reforms and liberalisation by ranking and comparing them with their regional peers.…”
    Get full text
    Final Year Project (FYP)