Search alternatives:
cheers » cheer (Expand Search), cheaters (Expand Search)
checkers » checker (Expand Search), checks (Expand Search), crackers (Expand Search)
hackers » trackers (Expand Search)
cheers » cheer (Expand Search), cheaters (Expand Search)
checkers » checker (Expand Search), checks (Expand Search), crackers (Expand Search)
hackers » trackers (Expand Search)
-
61
Smart-contract privacy preservation mechanism
Published 2023“…Sensitive records stored in the cloud such as healthcare records, private conversation and credit card information are targets of hackers and privacy abuse. Current information and record management systems have difficulties achieving privacy protection of such sensitive records in a secure, transparent, decentralized and trustless environment. …”
Get full text
Article -
62
A model of information security and competition
Published 2024“…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
Journal article -
63
Enhancing security in generic e-Commerce systems
Published 2010“…One of the most common security features found in today e-Commerce application is the Secure Socket Layer (SSL) connection and even with SSL alone, it may not be sufficient to withstand hackers’ attacks. It may cause great losses to the store owner if their online store is broken into. …”
Get full text
Final Year Project (FYP) -
64
Development of an industrial SCADA firewall prototype using single board computer - part 2
Published 2019“…Threats such as the rise in hackers, cyber espionage and increased influence of radical activists’ groups cannot be undermined. …”
Get full text
Final Year Project (FYP) -
65
Encrypted smartphone with advanced encryption standard 256
Published 2011“…However, in this digital age, mobile users cannot take the confidentiality of data transfer for granted because of the presence of hackers and the threats that exist. In today’s market, various encryption suites are available for mobile users to send their SMS “safely” and offer different ways of encryption and decryption such as symmetry cryptography and asymmetric cryptography. …”
Get full text
Final Year Project (FYP) -
66
Minimal type inference for Linked Data consumers
Published 2015“…We also prove subject reduction and type safety results, which justify our claim that our language is statically type checked and does not throw basic runtime type errors. …”
Get full text
Get full text
Journal Article -
67
Prevalence of sleep disturbance in patients with ankylosing spondylitis: a systematic review and meta-analysis
Published 2023“…Heterogeneity among the identified studies was checked using the I2 index, and the Begg and Mazumdar correlation test examined the existence of published bias. …”
Get full text
Article -
68
Furniture form innovation and human–machine comfort evaluation model based on genetic algorithm
Published 2024“…In the give-up, the advised model’s viability is checked by means of looking at how fixtures from the product’s layout picks had been carried out to assist designers give us fresh thoughts.…”
Get full text
Article -
69
A Multi-tier Model and Filtering Approach to Detect Fake News Using Machine Learning Algorithms
Published 2024“…The best performance of sequence for both datasets is LR_DT_RF which yields 0.9892 F1-Score, 0.9895 Accuracy, and 0.9790 Matthews Correlation Coefficient (MCC) for ISOT Fake News Dataset, and 0.9913 F1-Score, 0.9853 Accuracy, and 0.9455 MCC for CHECKED Dataset. This research could give researchers an approach for fake news detection on different social platforms and feature-based.…”
Get full text
Article -
70
TDSF: Two-phase tamper detection in semi-fragile watermarking using two-level integer wavelet transform
Published 2025“…The initial phase will check four segments to determine the tampered bit or not. …”
Get full text
Article -
71
Finite element analysis on post-buckling of thin-walled structures using ANSYS
Published 2015“…The results obtained were checked against experimental data and led to the development and the revision of design procedures for the pin-ended lipped column and hollow box section.…”
Get full text
Final Year Project (FYP) -
72
Average velocity of grains moving over a channel bed
Published 2016“…Therefore, the results in today’s experiment are going to be checked against the results in the past paper. In order to obtain better analytical results, the idea of dimensional analysis is applied in the discussion. …”
Get full text
Final Year Project (FYP) -
73
Design and development of small scale index matching tunnel
Published 2017“…Then, the results of the experiment are cross-checked with the theoretical equations, an analysis is being accounted for the difference in result. …”
Get full text
Final Year Project (FYP) -
74
Greenly prepared antimicrobial cotton fabrics using bioactive agents from Cupressaceae pods
Published 2022“…Finally, the antimicrobial activity of the greenly developed antimicrobial cotton fabrics was checked against Staphylococcus, Escherichia coli, Bacillus and Candida albicans by using the AATCC 100-2004 test method. …”
Get full text
Get full text
Article -
75
Human factors evaluation of conflict resolution aid in future air traffic control
Published 2014“…In 1929, the airport operator employed him to prevent collisions between aircrafts and his tools of communication were simply a red flag to indicate “hold” and a checked one for “go”. With the advancement of technology over the next few decades, high tech equipment were integrated into air traffic control, such as the radar, to meet the growing number of flights as more people turned to aeroplanes as a means of commercial transport. …”
Get full text
Final Year Project (FYP) -
76
Impact of innovation on performance of shipping companies in Singapore
Published 2009“…A survey with 17 Singapore-registered ship-owning companies was conducted and results were checked for validity using the Spearman’s rho and Cronbach’s alpha tests. …”
Get full text
Final Year Project (FYP) -
77
Forecasting air passenger volume in Singapore: Determining the explanatory variables for econometric models
Published 2017“…Before applying for model simulation, correlations among variables were checked. Various combinations of the variables were implemented to establish the models. …”
Get full text
Get full text
Journal Article -
78
Density, laying date, breeding success and diet of Black Kites Milvus migrans govinda in the city of Delhi (India)
Published 2014“…A sample of 151 nests was checked regularly to record laying date, breeding success and diet.…”
Journal article -
79
Numerical simulation of oxygen delivery in presence of hemoglobin hydrogel based oxygen carriers
Published 2016“…Red blood cells have standard shelf life of only 42 days and unable to be checked and sterilized for infective agents like HIV. …”
Get full text
Final Year Project (FYP) -
80
Safety assessment of autonomous vehicles using simulations
Published 2018“…For different configurations of the afore-mentioned, the simulation data is analysed using MATLAB and checked whether or not it meets safety constraints. …”
Get full text
Thesis