Search alternatives:
beers » peers (Expand Search), bears (Expand Search), bees (Expand Search), beens (Expand Search)
beer » been (Expand Search), peer (Expand Search), bee (Expand Search)
cheer » cheers (Expand Search), chee (Expand Search), sheer (Expand Search)
checkers » checker (Expand Search), checks (Expand Search), crackers (Expand Search)
hackers » trackers (Expand Search)
cher » chern (Expand Search), chen (Expand Search), chee (Expand Search)
beers » peers (Expand Search), bears (Expand Search), bees (Expand Search), beens (Expand Search)
beer » been (Expand Search), peer (Expand Search), bee (Expand Search)
cheer » cheers (Expand Search), chee (Expand Search), sheer (Expand Search)
checkers » checker (Expand Search), checks (Expand Search), crackers (Expand Search)
hackers » trackers (Expand Search)
cher » chern (Expand Search), chen (Expand Search), chee (Expand Search)
-
61
-
62
-
63
Cost-effectiveness of MRI targeted biopsy strategies for diagnosing prostate cancer in Singapore
Published 2022Get full text
Journal Article -
64
Development of a protein nanoparticle platform for targeting EGFR expressing cancer cells
Published 2015Get full text
Get full text
Get full text
Journal Article -
65
21A.350J / SP.484J / STS.086J / WGS.484J The Anthropology of Computing, Fall 2004
Published 2004Subjects: Get full text
Learning Object -
66
Robust delivery of RIG-I agonists using extracellular vesicles for anti-cancer immunotherapy
Published 2022Get full text
Journal Article -
67
-
68
-
69
-
70
Encapsulation of probiotics for food and beverage applications
Published 2022“…Up to date, no studies have been done to examine the viability of probiotics in popular, well-liked, commercialized carbonated sodas/beers, but it is known that certain components in these matrices (e.g. phosphoric acid in soda, hops and ethanol in beers) can reduce the viability of probiotics. …”
Get full text
Final Year Project (FYP) -
71
Learning automations in game engine
Published 2013“…First, design and develop a server-client software version of Beer Game using Java. Second, develop a software entity (AI agent) in the Beer Game software utilizing Memetic approach. …”
Get full text
Final Year Project (FYP) -
72
Practical fuzzing on open-source projects
Published 2022“…Hackers exploiting software vulnerabilities found in all software programs, resulting in unfavorable outcomes, which is a major concern in software security. …”
Get full text
Final Year Project (FYP) -
73
Evaluation of the music collection at the National Institute of Education Library
Published 2011“…However, the Library fared relatively better, with 71.5% holdings, when a list of "Recommended Readings/References" drawn up by the Institute's academic staff was list-checked.…”
Get full text
Thesis -
74
Design language in packaging.
Published 2012“…Craid is a fictitious brand of Irish beer that is designed based on this essential role. …”
Get full text
Final Year Project (FYP) -
75
A model of information security and competition
Published 2024“…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
Journal article -
76
Spooky action in the film/novel debate.
Published 2012“…The installation follows a Collector, Photographer, Writer and a Collective (a beer garden group that gathers at the local coffeeshop) in their daily life as they contemplate the curious events, and each other, in an attempt to cope with the boredom they face in the neighbourhood. …”
Get full text
Final Year Project (FYP) -
77
Contribution of problems and exercises at end chapters plus book interactive online exercises MCQ In: Cryptography and Network Security: Principles and Practice, Global Edition, 8t...
Published 2024“…In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. …”
Book -
78
Enhancing security in generic e-Commerce systems
Published 2010“…One of the most common security features found in today e-Commerce application is the Secure Socket Layer (SSL) connection and even with SSL alone, it may not be sufficient to withstand hackers’ attacks. It may cause great losses to the store owner if their online store is broken into. …”
Get full text
Final Year Project (FYP) -
79
Investigation of low temperature wafer bonding using intermediate layer
Published 2008Get full text
Thesis -
80