Search alternatives:
peers » peer (Expand Search)
beer » been (Expand Search), peer (Expand Search), ber (Expand Search), beenr (Expand Search)
bear » besar (Expand Search), year (Expand Search), near (Expand Search)
bee » been (Expand Search)
hackers » trackers (Expand Search)
peers » peer (Expand Search)
beer » been (Expand Search), peer (Expand Search), ber (Expand Search), beenr (Expand Search)
bear » besar (Expand Search), year (Expand Search), near (Expand Search)
bee » been (Expand Search)
hackers » trackers (Expand Search)
-
161
-
162
CRISPR/Cas9 RNP-assisted validation of palmarumycin biosynthetic gene cluster in Lophiotrema sp. F6932
Published 2023Get full text
Journal Article -
163
21A.350J / SP.484J / STS.086J / WGS.484J The Anthropology of Computing, Fall 2004
Published 2004Subjects: Get full text
Learning Object -
164
Synthesis of epoxidized poly(ester carbonate)-b-polyimide-b-poly(ester carbonate) : reactive single-walled carbon nanotube dispersants enable synergistic reinforcement around multi...
Published 2020“…Herein, PI-derived block copolymers are synthesized via ring-opening copolymerization of lactide (LA) (a control monomer) and allyl-bearing 2-methyl-2-(allyloxycarbonyl)-propylene carbonate (MAC) from the OH-terminal ends of the PI block to produce PLA-PI-PLA (TB1, a control) and PMAC-PI-PMAC (TB2). …”
Get full text
Journal Article -
165
-
166
Molecular docking-aided identification of small molecule inhibitors targeting β-catenin-TCF4 interaction
Published 2022Get full text
Journal Article -
167
-
168
-
169
-
170
Longitudinal assessment of antibiotic resistance gene profiles in gut microbiomes of infants at risk of eczema
Published 2021Get full text
Journal Article -
171
-
172
-
173
-
174
Learning automations in game engine
Published 2013“…First, design and develop a server-client software version of Beer Game using Java. Second, develop a software entity (AI agent) in the Beer Game software utilizing Memetic approach. …”
Get full text
Final Year Project (FYP) -
175
Practical fuzzing on open-source projects
Published 2022“…Hackers exploiting software vulnerabilities found in all software programs, resulting in unfavorable outcomes, which is a major concern in software security. …”
Get full text
Final Year Project (FYP) -
176
Influence of presumed influence on thinness as a beauty ideal for girls.
Published 2008“…On the other hand, if the “influence on significant others or female peers” exerts an impact on “influence on self”, it will result in desire to be thin.…”
Get full text
Thesis -
177
Integration of LoRa IoT with cloud platform in stingless beehive remote monitoring system
Published 2025“…Stingless bee colonies require constant monitoring to ensure hive health and optimal honey production. …”
Get full text
Article -
178
Challenges of online collaborative learning among special needs university students
Published 0002“…Based on the findings of the study, it was found that the SNS in this study mostly had problems communicating with their peers during online collaborative learning. They were not really lacking in collaborative skills, but they were more concerned about their peers’ perspectives on their disabilities, and their abilities to do group work. …”
Get full text
Article -
179
A model of information security and competition
Published 2024“…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
Journal article -
180
Contribution of problems and exercises at end chapters plus book interactive online exercises MCQ In: Cryptography and Network Security: Principles and Practice, Global Edition, 8t...
Published 2024“…In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. …”
Book