Showing 61 - 80 results of 6,280 for search '((cheers OR peer) OR ((checkers OR hackers) OR checked))', query time: 0.19s Refine Results
  1. 61

    Smart-contract privacy preservation mechanism by Siraj, Muhammed, Ninggal, Mohd. Izuan Hafez, Udzir, Nur Izura, Abdullah, Muhammad Daniel Hafiz, Asmawi, Aziah

    Published 2023
    “…Sensitive records stored in the cloud such as healthcare records, private conversation and credit card information are targets of hackers and privacy abuse. Current information and record management systems have difficulties achieving privacy protection of such sensitive records in a secure, transparent, decentralized and trustless environment. …”
    Get full text
    Article
  2. 62

    A model of information security and competition by de Cornière, A, Taylor, G

    Published 2024
    “…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
    Journal article
  3. 63

    Enhancing security in generic e-Commerce systems by Mak, Foo Keong.

    Published 2010
    “…One of the most common security features found in today e-Commerce application is the Secure Socket Layer (SSL) connection and even with SSL alone, it may not be sufficient to withstand hackers’ attacks. It may cause great losses to the store owner if their online store is broken into. …”
    Get full text
    Final Year Project (FYP)
  4. 64

    Development of an industrial SCADA firewall prototype using single board computer - part 2 by Teo, Joycelyn Li Ting

    Published 2019
    “…Threats such as the rise in hackers, cyber espionage and increased influence of radical activists’ groups cannot be undermined. …”
    Get full text
    Final Year Project (FYP)
  5. 65

    Encrypted smartphone with advanced encryption standard 256 by Tan, Alvin Chee Munn.

    Published 2011
    “…However, in this digital age, mobile users cannot take the confidentiality of data transfer for granted because of the presence of hackers and the threats that exist. In today’s market, various encryption suites are available for mobile users to send their SMS “safely” and offer different ways of encryption and decryption such as symmetry cryptography and asymmetric cryptography. …”
    Get full text
    Final Year Project (FYP)
  6. 66

    Minimal type inference for Linked Data consumers by Ciobanu, Gabriel, Horne, Ross, Sassone, Vladimiro

    Published 2015
    “…We also prove subject reduction and type safety results, which justify our claim that our language is statically type checked and does not throw basic runtime type errors. …”
    Get full text
    Get full text
    Journal Article
  7. 67

    Prevalence of sleep disturbance in patients with ankylosing spondylitis: a systematic review and meta-analysis by Salari, Nader, Sadeghi, Narges, Hosseinian-Far, Amin, Hasheminezhad, Razie, Khazaie, Habibolah, Shohaimi, Shamarina, Mohammadi, Masoud

    Published 2023
    “…Heterogeneity among the identified studies was checked using the I2 index, and the Begg and Mazumdar correlation test examined the existence of published bias. …”
    Get full text
    Article
  8. 68

    Furniture form innovation and human–machine comfort evaluation model based on genetic algorithm by Yifan, Bai, Kamarudin, Khairul Manami, Alli, Hassan

    Published 2024
    “…In the give-up, the advised model’s viability is checked by means of looking at how fixtures from the product’s layout picks had been carried out to assist designers give us fresh thoughts.…”
    Get full text
    Article
  9. 69

    A Multi-tier Model and Filtering Approach to Detect Fake News Using Machine Learning Algorithms by Yu, Chiung Chang, A Hamid, Isredza Rahmi, Abdullah, Zubaile, Kipli, Kuryati, Amnur, Hidra

    Published 2024
    “…The best performance of sequence for both datasets is LR_DT_RF which yields 0.9892 F1-Score, 0.9895 Accuracy, and 0.9790 Matthews Correlation Coefficient (MCC) for ISOT Fake News Dataset, and 0.9913 F1-Score, 0.9853 Accuracy, and 0.9455 MCC for CHECKED Dataset. This research could give researchers an approach for fake news detection on different social platforms and feature-based.…”
    Get full text
    Article
  10. 70
  11. 71

    Finite element analysis on post-buckling of thin-walled structures using ANSYS by Theint, Yi Mon

    Published 2015
    “…The results obtained were checked against experimental data and led to the development and the revision of design procedures for the pin-ended lipped column and hollow box section.…”
    Get full text
    Final Year Project (FYP)
  12. 72

    Average velocity of grains moving over a channel bed by Song, Chengwei

    Published 2016
    “…Therefore, the results in today’s experiment are going to be checked against the results in the past paper. In order to obtain better analytical results, the idea of dimensional analysis is applied in the discussion. …”
    Get full text
    Final Year Project (FYP)
  13. 73

    Design and development of small scale index matching tunnel by Tan, Yu Tiong

    Published 2017
    “…Then, the results of the experiment are cross-checked with the theoretical equations, an analysis is being accounted for the difference in result. …”
    Get full text
    Final Year Project (FYP)
  14. 74

    Greenly prepared antimicrobial cotton fabrics using bioactive agents from Cupressaceae pods by Syed, Murtaza Haider, Mior Ahmad Khushairi, Mohd Zahari, Qutaba, Syed, Norhayati, Abdullah, Syed, Lubna, Abro, Zamir Ahmed

    Published 2022
    “…Finally, the antimicrobial activity of the greenly developed antimicrobial cotton fabrics was checked against Staphylococcus, Escherichia coli, Bacillus and Candida albicans by using the AATCC 100-2004 test method. …”
    Get full text
    Get full text
    Article
  15. 75

    Human factors evaluation of conflict resolution aid in future air traffic control by Pereira, Theresse Vanessa

    Published 2014
    “…In 1929, the airport operator employed him to prevent collisions between aircrafts and his tools of communication were simply a red flag to indicate “hold” and a checked one for “go”. With the advancement of technology over the next few decades, high tech equipment were integrated into air traffic control, such as the radar, to meet the growing number of flights as more people turned to aeroplanes as a means of commercial transport. …”
    Get full text
    Final Year Project (FYP)
  16. 76

    Impact of innovation on performance of shipping companies in Singapore by Nah, Laura Yan Ling

    Published 2009
    “…A survey with 17 Singapore-registered ship-owning companies was conducted and results were checked for validity using the Spearman’s rho and Cronbach’s alpha tests. …”
    Get full text
    Final Year Project (FYP)
  17. 77

    Forecasting air passenger volume in Singapore: Determining the explanatory variables for econometric models by Guo, Rui, Zhong, Zhao Wei

    Published 2017
    “…Before applying for model simulation, correlations among variables were checked. Various combinations of the variables were implemented to establish the models. …”
    Get full text
    Get full text
    Journal Article
  18. 78

    Density, laying date, breeding success and diet of Black Kites Milvus migrans govinda in the city of Delhi (India) by Kumar, N, Mohan, D, Jhala, YV, Qureshi, Q, Sergio, F

    Published 2014
    “…A sample of 151 nests was checked regularly to record laying date, breeding success and diet.…”
    Journal article
  19. 79

    Numerical simulation of oxygen delivery in presence of hemoglobin hydrogel based oxygen carriers by Tan, Kai Ying

    Published 2016
    “…Red blood cells have standard shelf life of only 42 days and unable to be checked and sterilized for infective agents like HIV. …”
    Get full text
    Final Year Project (FYP)
  20. 80

    Safety assessment of autonomous vehicles using simulations by Ketki, Chaudhary

    Published 2018
    “…For different configurations of the afore-mentioned, the simulation data is analysed using MATLAB and checked whether or not it meets safety constraints. …”
    Get full text
    Thesis