Search alternatives:
chee » chen (Expand Search)
cheen » chenn (Expand Search), chen (Expand Search), chien (Expand Search), chuen (Expand Search)
chenrs » chenru (Expand Search)
sheer » sheet (Expand Search), steer (Expand Search), sheep (Expand Search)
cheaters » heaters (Expand Search), chapters (Expand Search), centers (Expand Search)
chee » chen (Expand Search)
cheen » chenn (Expand Search), chen (Expand Search), chien (Expand Search), chuen (Expand Search)
chenrs » chenru (Expand Search)
sheer » sheet (Expand Search), steer (Expand Search), sheep (Expand Search)
cheaters » heaters (Expand Search), chapters (Expand Search), centers (Expand Search)
-
761
Fabrication of gold nanotip arrays using anodic aluminium oxide (AAO) template
Published 2009Get full text
Final Year Project (FYP) -
762
Study of efforts made by government and E-commerce companies into countering fraud
Published 2023Get full text
Final Year Project (FYP) -
763
Computational investigations of HIV-1 protease and protease inhibitors interactions
Published 2014Get full text
Final Year Project (FYP) -
764
Multi-stable configurations for vibration-based energy harvester
Published 2014Get full text
Final Year Project (FYP) -
765
-
766
A study of the roles of colour and shape in the perception of perfume
Published 2015Get full text
Final Year Project (FYP) -
767
Locating surface cracks and static objects on 2D structures using NDT scanning techniques
Published 2017Get full text
Final Year Project (FYP) -
768
A systematic review : motivational factors influencing volunteer participation in sporting events
Published 2018Get full text
Final Year Project (FYP) -
769
Use of hardening soil model for excavation in residual soil
Published 2018Get full text
Final Year Project (FYP) -
770
Predicting the antigenicity and reassortment probability of influenza viruses
Published 2019Get full text
Final Year Project (FYP) -
771
Physical unclonable function based solutions to unification of user, device and data authentication
Published 2020“…The non-repudiation assumption of these conventional techniques is being challenged by emerging artificial-intelligent assisted and malware-based attacks on independently chained weak links (factors), and their limited extension to IoT scenarios, where the sheer number of inexpensive and often insufficiently protected endpoints prevent application of standard, secret-key based techniques. …”
Get full text
Thesis-Doctor of Philosophy -
772
Educational website with cyber offense and defense demonstration
Published 2022Get full text
Final Year Project (FYP) -
773
Study on supply chain challenges in container shipping : the carrier’s perspective
Published 2009Get full text
Final Year Project (FYP) -
774
Enhancing rework techniques in microelectronics components for reusability
Published 2024Get full text
Final Year Project (FYP) -
775
Improving microstructural homogeneity of flash sintered SiC ceramics
Published 2024Get full text
Final Year Project (FYP) -
776
-
777
Self assembled monolayers (SAMs) passivation at TiO2/electrolyte interface in dye sensitized solar cell (DSSC)
Published 2010Get full text
Final Year Project (FYP) -
778
Bunker risk management strategies in liner shipping companies part I : operational measures to reduce bunker risk
Published 2012Get full text
Final Year Project (FYP) -
779
-
780
Studying properties of SLM fabricated parts and relating properties of SLM parts to heat treated metals
Published 2012Get full text
Final Year Project (FYP)