Search alternatives:
beer » been (Expand Search), peer (Expand Search), bee (Expand Search)
cheers » cheer (Expand Search), cheaters (Expand Search), checkers (Expand Search)
trackers » tracker (Expand Search), attackers (Expand Search), traces (Expand Search)
beer » been (Expand Search), peer (Expand Search), bee (Expand Search)
cheers » cheer (Expand Search), cheaters (Expand Search), checkers (Expand Search)
trackers » tracker (Expand Search), attackers (Expand Search), traces (Expand Search)
-
41
Learning automations in game engine
Published 2013“…First, design and develop a server-client software version of Beer Game using Java. Second, develop a software entity (AI agent) in the Beer Game software utilizing Memetic approach. …”
Get full text
Final Year Project (FYP) -
42
Live Verification in an Interactive Proof Assistant
Published 2024“…Other tools providing real-time feedback already exist, but ours is the first one that only relies on a small trusted proof checker and that provides a concise summary of the symbolic state at the point in the program currently being edited, as opposed to only indicating whether user-stated assertions or postconditions hold. …”
Get full text
Article -
43
Practical fuzzing on open-source projects
Published 2022“…Hackers exploiting software vulnerabilities found in all software programs, resulting in unfavorable outcomes, which is a major concern in software security. …”
Get full text
Final Year Project (FYP) -
44
Evaluation of the music collection at the National Institute of Education Library
Published 2011“…However, the Library fared relatively better, with 71.5% holdings, when a list of "Recommended Readings/References" drawn up by the Institute's academic staff was list-checked.…”
Get full text
Thesis -
45
100 UMPSA athletes to compete in 10 events at the 2024 SUKUM Championship
Published 2024“…PEKAN, 6 August 2024 – The enthusiastic cheers of “UMPSA! Minda Juara!” echoed as 100 athletes, comprising 65 men and 35 women from Universiti Malaysia Pahang Al-Sultan Abdullah (UMPSA), prepared to represent their university in the upcoming 2024 SUKUM Championship.…”
Get full text
Newspaper -
46
Laser driver (ACC - auto current control) for driving laser diode in LED and laser modes
Published 2008“…The circuit implemented is such that is portable and able to cater for few applications such as visual inspection of a laser diode and fiber checker.…”
Get full text
Thesis -
47
Surrounding-aware correlation filter for UAV tracking with selective spatial regularization
Published 2022“…In this paper, a surrounding-aware tracker with selective spatial regularization (SASR) is presented. …”
Get full text
Journal Article -
48
A model of information security and competition
Published 2024“…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
Journal article -
49
Contribution of problems and exercises at end chapters plus book interactive online exercises MCQ In: Cryptography and Network Security: Principles and Practice, Global Edition, 8t...
Published 2024“…In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. …”
Book -
50
Hybrid sensor fusion for unmanned ground vehicle
Published 2020“…As expected, the proposed two trackers indeed improve the accuracy and robustness compared to the state-of-the-art trackers. …”
Get full text
Thesis-Doctor of Philosophy -
51
Design language in packaging.
Published 2012“…Craid is a fictitious brand of Irish beer that is designed based on this essential role. …”
Get full text
Final Year Project (FYP) -
52
Deep learning network for NAO robot applications
Published 2020“…With the addition of deep learning to eye trackers, it is possible for the device to understand the user’s habits and improve the prediction of the output. …”
Get full text
Final Year Project (FYP) -
53
Enhancing security in generic e-Commerce systems
Published 2010“…One of the most common security features found in today e-Commerce application is the Secure Socket Layer (SSL) connection and even with SSL alone, it may not be sufficient to withstand hackers’ attacks. It may cause great losses to the store owner if their online store is broken into. …”
Get full text
Final Year Project (FYP) -
54
Automatic retrieval of visual continuity errors in movies
Published 2009“…<p>Continuity errors occur in many movies and television series, in spite of careful checking by those employed to minimise them. In this work we develop a scheme for automatically detecting these errors and producing a ranked list of the most likely inconsistencies, working from a commercial DVD release. …”
Conference item -
55
Spooky action in the film/novel debate.
Published 2012“…The installation follows a Collector, Photographer, Writer and a Collective (a beer garden group that gathers at the local coffeeshop) in their daily life as they contemplate the curious events, and each other, in an attempt to cope with the boredom they face in the neighbourhood. …”
Get full text
Final Year Project (FYP) -
56
GPU-accelerated real-time motion planning for safe human-robot collaboration
Published 2024“…We experimentally demonstrate that our method can navigate a 6-DoF robot earlier than a geometric-primitives-based distance checker in a dynamic, collaborative environment. …”
Get full text
Thesis-Doctor of Philosophy -
57
Development of an industrial SCADA firewall prototype using single board computer - part 2
Published 2019“…Threats such as the rise in hackers, cyber espionage and increased influence of radical activists’ groups cannot be undermined. …”
Get full text
Final Year Project (FYP) -
58
Workout detection with embedded AI
Published 2024“…However, traditional fitness trackers struggle with detecting anaerobic exercises like weightlifting, which involve complex and non-repetitive motions. …”
Get full text
Final Year Project (FYP) -
59
Encrypted smartphone with advanced encryption standard 256
Published 2011“…However, in this digital age, mobile users cannot take the confidentiality of data transfer for granted because of the presence of hackers and the threats that exist. In today’s market, various encryption suites are available for mobile users to send their SMS “safely” and offer different ways of encryption and decryption such as symmetry cryptography and asymmetric cryptography. …”
Get full text
Final Year Project (FYP) -
60
Smart-contract privacy preservation mechanism
Published 2023“…Sensitive records stored in the cloud such as healthcare records, private conversation and credit card information are targets of hackers and privacy abuse. Current information and record management systems have difficulties achieving privacy protection of such sensitive records in a secure, transparent, decentralized and trustless environment. …”
Get full text
Article