Showing 61 - 80 results of 390 for search '((beers OR beer) OR (((cheer OR checkers) OR (hackers OR checked)) OR cher))*', query time: 0.18s Refine Results
  1. 61
  2. 62
  3. 63
  4. 64
  5. 65
  6. 66
  7. 67
  8. 68
  9. 69
  10. 70

    Encapsulation of probiotics for food and beverage applications by Ang, Kai Lin

    Published 2022
    “…Up to date, no studies have been done to examine the viability of probiotics in popular, well-liked, commercialized carbonated sodas/beers, but it is known that certain components in these matrices (e.g. phosphoric acid in soda, hops and ethanol in beers) can reduce the viability of probiotics. …”
    Get full text
    Final Year Project (FYP)
  11. 71

    Learning automations in game engine by Ju, Peng

    Published 2013
    “…First, design and develop a server-client software version of Beer Game using Java. Second, develop a software entity (AI agent) in the Beer Game software utilizing Memetic approach. …”
    Get full text
    Final Year Project (FYP)
  12. 72

    Practical fuzzing on open-source projects by Ng, Chun Kai

    Published 2022
    “…Hackers exploiting software vulnerabilities found in all software programs, resulting in unfavorable outcomes, which is a major concern in software security. …”
    Get full text
    Final Year Project (FYP)
  13. 73

    Evaluation of the music collection at the National Institute of Education Library by Yu, Bee Lian.

    Published 2011
    “…However, the Library fared relatively better, with 71.5% holdings, when a list of "Recommended Readings/References" drawn up by the Institute's academic staff was list-checked.…”
    Get full text
    Thesis
  14. 74

    Design language in packaging. by Wijaya, Merwyn.

    Published 2012
    “…Craid is a fictitious brand of Irish beer that is designed based on this essential role. …”
    Get full text
    Final Year Project (FYP)
  15. 75

    A model of information security and competition by de Cornière, A, Taylor, G

    Published 2024
    “…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
    Journal article
  16. 76

    Spooky action in the film/novel debate. by Lee, Tracy Marie Shiyin., Luo, Esmonde Jianwen., Wong, Kai Wing., Manoj Prabhoda Chandran., Chee, Kang Xiong.

    Published 2012
    “…The installation follows a Collector, Photographer, Writer and a Collective (a beer garden group that gathers at the local coffeeshop) in their daily life as they contemplate the curious events, and each other, in an attempt to cope with the boredom they face in the neighbourhood. …”
    Get full text
    Final Year Project (FYP)
  17. 77

    Contribution of problems and exercises at end chapters plus book interactive online exercises MCQ In: Cryptography and Network Security: Principles and Practice, Global Edition, 8t... by Stallings, Wiliam

    Published 2024
    “…In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. …”
    Book
  18. 78

    Enhancing security in generic e-Commerce systems by Mak, Foo Keong.

    Published 2010
    “…One of the most common security features found in today e-Commerce application is the Secure Socket Layer (SSL) connection and even with SSL alone, it may not be sufficient to withstand hackers’ attacks. It may cause great losses to the store owner if their online store is broken into. …”
    Get full text
    Final Year Project (FYP)
  19. 79
  20. 80