Search alternatives:
beens » been (Expand Search), teens (Expand Search), beans (Expand Search), beenns (Expand Search)
bee » been (Expand Search)
checks » check (Expand Search)
beens » been (Expand Search), teens (Expand Search), beans (Expand Search), beenns (Expand Search)
bee » been (Expand Search)
checks » check (Expand Search)
-
241
‘Maturing out’ as dilemmatic: transitions towards relatively light drinking practices among UK University students
Published 2021“…One dilemma was characterised by managing to drink less (or nothing) without cutting off social options with university friends/peers. A second dilemma concerned not wishing to fully abandon the pleasures and increased social confidence that alcohol consumption could afford. …”
Get full text
Article -
242
Alcohol Use and Its Relation with Demographic, Environmental, and Psychological Factors among Adolescents in Nabawan, Sabah
Published 2024“…Analysis revealed that older age adolescents 18 years and 19 years, respectively (adjusted odds ratio [aOR], 3.93; P=0.021; aOR, 5.38; P=0.003), having parents (aOR, 4.11; P=0.001) and peers (aOR, 11.57; P<0.001) who consume alcohol were significantly associated with alcohol use. …”
Get full text
Article -
243
Blockchain for RegTech: streamlining know your customer (KYC) pipelines
Published 2022“…With Decentralised Finance being developed to replace traditional financial services and transactions of virtual land being conducted on the Metaverse, these ecosystems often involve large amounts of money and require regulatory compliance checks. This calls for a solution that can interoperate effectively with these emerging technologies. …”
Get full text
Final Year Project (FYP) -
244
Perennial semantic data terms of use for decentralized web
Published 2024“…This constitutes a “perennial” DToU language, where the policy authoring only occurs once, and we can conduct ongoing automated checks across users, applications and activity cycles. …”
Conference item -
245
Magical realism and representations of the cold war in Southeast Asia
Published 2016“…However, while there are acknowledgements by scholars that religious myths and pre-existing animistic beliefs continue to influence the way that the indigenous people understand their worlds, Southeast Asian authors (unlike many of their postcolonial peers), do not actively employ magical realism in their exploration of history and civil unrest in their writings, and when they do, are not employed to the same degree as postcolonial authors in other regions. …”
Get full text
Thesis -
246
Get a Copy Find a copy in the library Internet of Things and Connected Technologies : Conference Proceedings on 5th International Conference on Internet of Things and Connected Tec...
Published [202“…This book presents the recent research adoption of a variety of enabling wireless communication technologies like RFID tags, BLE, ZigBee, etc., and embedded sensor and actuator nodes, and various protocols like CoAP, MQTT, DNS, etc., that has made Internet of things (IoT) to step out of its infancy to become smart things. …”
text -
247
Mobile application for optical character recognition (OCR) of digits
Published 2021“…To further improve the recognition accuracy, an API is created for sanity checks based on the domain knowledge adopted from clinicians. …”
Get full text
Final Year Project (FYP) -
248
Universal resilience patterns in labor markets
Published 2021“…Further, cities that increase their job connectivity see increasing wage bills, and workers of embedded occupations enjoy higher wages than their peers elsewhere. Finally, we show how job connectivity may clarify the augmenting and deleterious impact of automation in US cities. …”
Get full text
Article -
249
Experiences of recreational running among persons with visual impairment (VI) in Singapore
Published 2022“…Little research has been done on physical activity (PA) and exercise among people with visual impairments (VI) in Singapore. …”
Get full text
Final Year Project (FYP) -
250
Floquet Codes without Parent Subsystem Codes
Published 2024“…However, unlike the honeycomb code, it possesses an explicit CSS structure and its gauge checks do not form a subsystem code. Nevertheless, we show that our dynamic protocol conserves logical information and possesses a threshold for error correction. …”
Get full text
Article -
251
Membrane compaction in forward osmosis process
Published 2021“…The TFC membranes were continuously tested in FO experiments for 24 h by using DI water as feed and NaCl solutions of different concentrations as draw solution, and their performances were checked again using fresh feed solutions. At the end of FO experiments, all TFC membranes experienced water flux and salt flux decline to different extents. …”
Get full text
Journal Article -
252
Android apps development for image/video processing - (B)
Published 2023“…In addition, users can easily share their edited images with their peers on social media platforms at their fingertips. …”
Get full text
Final Year Project (FYP) -
253
A public relations campaign to promote arts and culture in Singapore in collaboration with Nerf Creative.
Published 2012“…This paper presents the promotional campaign for art and design collective “Float Like A Butterfly, Sting Like A Bee” (FLABSLAB), an initiative between four final year students from Nanyang Technological University Wee Kim Wee School of Communication and Information and advertising agency Nerf Creative Pte Ltd, in Singapore. …”
Get full text
Final Year Project (FYP) -
254
Application development on an Android smart-phone
Published 2012“…The application intercepts all incoming messages and checks them for a certain password which uniquely identifies the owner. …”
Get full text
Final Year Project (FYP) -
255
Secure and secret cooperation in robotic swarms
Published 2021“…We propose a system where robots in a swarm, to cooperate towards mission completion, have to "prove" their integrity to their peers by exchanging cryptographic proofs. We show the implications of this approach for two different swarm robotics missions: foraging and maze formation. …”
Get full text
Get full text
Article -
256
Secure and secret cooperation in robot swarms
Published 2021“…We propose a system where robots in a swarm, to cooperate toward mission completion, have to “prove” their integrity to their peers by exchanging cryptographic proofs. We show the implications of this approach for two different swarm robotics missions: foraging and maze formation. …”
Get full text
Article -
257
The Importance of Bystanders in Threat Assessment and Management
Published 2025“…Numerous studies of targeted violence (e.g., mass shootings and school shootings), have demonstrated that peers and bystanders often have knowledge of an attacker’s intentions, concerning communication, and troubling behavior before the attack occurs. …”
Get full text
Book chapter -
258
Evaluation and fabrication of damaged composite material using non-destructive testing
Published 2019“…Since composites are extensively employed in many areas, it is important to determine the existence of surface and sub-surface defects before production and during regular maintenance checks. As time goes on, wear and tear occur to a material. …”
Get full text
Final Year Project (FYP) -
259
Three essays on frictions of trade
Published 2018“…Neighbours of both countries would have been impacted due to the spillover effects.</p>…”
Thesis -
260