Search alternatives:
peers » peer (Expand Search)
beer » been (Expand Search), peer (Expand Search), bear (Expand Search), beenr (Expand Search)
bee » been (Expand Search)
hackers » trackers (Expand Search)
peers » peer (Expand Search)
beer » been (Expand Search), peer (Expand Search), bear (Expand Search), beenr (Expand Search)
bee » been (Expand Search)
hackers » trackers (Expand Search)
-
161
The first twisted-wing parasitoid in Eocene amber from north-eastern China (Strepsiptera: Myrmecolacidae)
Published 2015Journal article -
162
Development of an industrial SCADA firewall prototype using single board computer - part 2
Published 2019“…Threats such as the rise in hackers, cyber espionage and increased influence of radical activists’ groups cannot be undermined. …”
Get full text
Final Year Project (FYP) -
163
Smart-contract privacy preservation mechanism
Published 2023“…Sensitive records stored in the cloud such as healthcare records, private conversation and credit card information are targets of hackers and privacy abuse. Current information and record management systems have difficulties achieving privacy protection of such sensitive records in a secure, transparent, decentralized and trustless environment. …”
Get full text
Article -
164
Design of blockchain-based P2P energy trading framework and a SCADA system for distributed energy resources in microgrids
Published 2022“…This project mainly completed the development and implementation of a peer-to-peer (P2P) energy trading framework between prosumers based on an Ethereum private blockchain network. …”
Get full text
Thesis-Master by Coursework -
165
Encrypted smartphone with advanced encryption standard 256
Published 2011“…However, in this digital age, mobile users cannot take the confidentiality of data transfer for granted because of the presence of hackers and the threats that exist. In today’s market, various encryption suites are available for mobile users to send their SMS “safely” and offer different ways of encryption and decryption such as symmetry cryptography and asymmetric cryptography. …”
Get full text
Final Year Project (FYP) -
166
-
167
Location Selection for Beekeeping in Optimizing Honey Production using Linear Programming Model (S/O 14038)
Published 2020“…Meliponiculture is an activity of raising stingless bees to obtain bee products, mainly honey. Honey production by bees varies depending on various factors which also affect its amount and quality. …”
Get full text
Monograph -
168
Design and development of a web-based platform for EEE MSc student orientation
Published 2023“…The main aim of the web application is for students to have cultural exchanges, to explore Singapore, and to engage in school life by forming interest groups with like-minded peers.…”
Get full text
Final Year Project (FYP) -
169
Reframing stigma in Tourette syndrome: an updated scoping review
Published 2023“…On the individual level, youth with PTD had lower self-esteem than peers, often leading to fear of future stigmatization, avoidant behaviors, and self-stigmatization. …”
Journal article -
170
Part I : Ranking of 2004 financial sector reforms and liberalisation of ASEAN 10+5 economies.
Published 2008“…This study aims to motivate the ASEAN 10+5 economies to push for greater financial reforms and liberalisation by ranking and comparing them with their regional peers.…”
Get full text
Final Year Project (FYP) -
171
-
172
A low-power IoT platform based smart plug for smart home system
Published 2016“…Presently, there are three most popular wireless communication technologies including Bluetooth, ZigBee, and Wi-Fi which are adopted in the intelligent home system. …”
Get full text
Thesis -
173
Enriching students’ cross-cultural and multilingual communication: the serious play approach utilizing Playmobil pro figures
Published 2024“…Thematic analysis was used to analyse the data which revealed that Playmobil pro facilitated intercultural communication in the post-COVID-19 era as students seemed to be unwilling to work with their peers in face-to-face classes, possibly suffering from trauma. …”
Get full text
Article -
174
-
175
Finite element analysis on post-buckling of thin-walled structures using ANSYS
Published 2015“…The results obtained were checked against experimental data and led to the development and the revision of design procedures for the pin-ended lipped column and hollow box section.…”
Get full text
Final Year Project (FYP) -
176
-
177
Normal People /
Published 2018“…Well-off Marianne blossoms at university, becoming pretty and popular, while Connell struggles for the first time in his life to fit in properly with his peers. The two weave in and out of each other's lives during their university years, developing an intense bond that exposes their traumas and insecurities.…”
Get full text
software, multimedia -
178
The Inspiration Design Toolkit: A Human-Centered Design Tool for a System Engineering Course
Published 2024“…The aim of the IDT is to improve the participants’ learning experience and course engagement, increase opportunities for them to interact with their peers and teaching team, enable them to practice and reinforce the concepts through the creation of their own IDT cards, and share the cards in the discussion to increase learners’ engagement with course material and peers. …”
Get full text
Article -
179
Machine learning for industrial IOT
Published 2023“…This paper concludes by proposing an algorithm for peer-to-peer Federated Learning where clients search for peers up to the 𝑘th degree and perform the best actions with 𝑛 peers under bandwidth constraints. …”
Get full text
Final Year Project (FYP) -
180
Best practices and factors to enhance transfer of training in Oman
Published 2014“…The list includes training designers, trainers, supervisor, managers, peers, top management, and customers or clients of the organizations. …”
Get full text
Thesis