Showing 61 - 80 results of 389 for search '(beers OR (((cheer OR (checkers OR checks)) OR (hackers OR checked)) OR cher))*', query time: 0.18s Refine Results
  1. 61
  2. 62
  3. 63

    Evaluating geospatial accuracy for equity analyses: a case study of the U.S. National Bridge Inventory by Gandy, CA, Kang, X, Ritsch, N, Armanios, DE

    Published 2023
    “…Phase 3 assesses the feasibility of enhancing location granularity through a hand-checked case study. We find that for coarser geospatial levels (state and county), equity-based analyses may be possible, but for more granular geospatial levels (place and census tract), which is where equity-based analyses are often conducted, the data may need greater buffering and hand checks to ensure accuracy. …”
    Journal article
  4. 64

    Encapsulation of probiotics for food and beverage applications by Ang, Kai Lin

    Published 2022
    “…Up to date, no studies have been done to examine the viability of probiotics in popular, well-liked, commercialized carbonated sodas/beers, but it is known that certain components in these matrices (e.g. phosphoric acid in soda, hops and ethanol in beers) can reduce the viability of probiotics. …”
    Get full text
    Final Year Project (FYP)
  5. 65

    Evaluation of the music collection at the National Institute of Education Library by Yu, Bee Lian.

    Published 2011
    “…However, the Library fared relatively better, with 71.5% holdings, when a list of "Recommended Readings/References" drawn up by the Institute's academic staff was list-checked.…”
    Get full text
    Thesis
  6. 66

    Practical fuzzing on open-source projects by Ng, Chun Kai

    Published 2022
    “…Hackers exploiting software vulnerabilities found in all software programs, resulting in unfavorable outcomes, which is a major concern in software security. …”
    Get full text
    Final Year Project (FYP)
  7. 67

    A model of information security and competition by de Cornière, A, Taylor, G

    Published 2024
    “…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
    Journal article
  8. 68

    Contribution of problems and exercises at end chapters plus book interactive online exercises MCQ In: Cryptography and Network Security: Principles and Practice, Global Edition, 8t... by Stallings, Wiliam

    Published 2024
    “…In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. …”
    Book
  9. 69

    Predicting bank failures : a comparison of the Cox proportional hazards model and time-varying covariates model. by Cheng, Philip Yim Kwong.

    Published 2008
    “…As a contribution to bank regulation by improving the accuracy of predicting failed banks, I first illustrate the use of martingale and other residuals as diagnostic checks for Cox’s proportional hazards model. Second, I discuss and substantiate the claim that a time-varying covariates model is superior to the Cox model as a bank failure model.…”
    Get full text
    Thesis
  10. 70

    Design and implementation of a synthesizable test-bench for testing the LDPC decoder IP by Yang, Shi

    Published 2018
    “…The simulation environment is mainly used for preliminary and functional checks, and the emulation environment is chosen for further verification due to its much higher run speed compared to simulation.…”
    Get full text
    Thesis
  11. 71

    Enhancing security in generic e-Commerce systems by Mak, Foo Keong.

    Published 2010
    “…One of the most common security features found in today e-Commerce application is the Secure Socket Layer (SSL) connection and even with SSL alone, it may not be sufficient to withstand hackers’ attacks. It may cause great losses to the store owner if their online store is broken into. …”
    Get full text
    Final Year Project (FYP)
  12. 72
  13. 73
  14. 74
  15. 75

    Development of an industrial SCADA firewall prototype using single board computer - part 2 by Teo, Joycelyn Li Ting

    Published 2019
    “…Threats such as the rise in hackers, cyber espionage and increased influence of radical activists’ groups cannot be undermined. …”
    Get full text
    Final Year Project (FYP)
  16. 76

    Tournament induced incentives and analysts' boldness. by Yin, Huifang.

    Published 2012
    “…This finding survives several robustness checks and is more pronounced when the interim assessment date is closer to the end of the tournament period, when analysts are inexperienced/non-all-star, and when the market activity is high. …”
    Get full text
    Thesis
  17. 77
  18. 78
  19. 79

    Encrypted smartphone with advanced encryption standard 256 by Tan, Alvin Chee Munn.

    Published 2011
    “…However, in this digital age, mobile users cannot take the confidentiality of data transfer for granted because of the presence of hackers and the threats that exist. In today’s market, various encryption suites are available for mobile users to send their SMS “safely” and offer different ways of encryption and decryption such as symmetry cryptography and asymmetric cryptography. …”
    Get full text
    Final Year Project (FYP)
  20. 80

    Smart-contract privacy preservation mechanism by Siraj, Muhammed, Ninggal, Mohd. Izuan Hafez, Udzir, Nur Izura, Abdullah, Muhammad Daniel Hafiz, Asmawi, Aziah

    Published 2023
    “…Sensitive records stored in the cloud such as healthcare records, private conversation and credit card information are targets of hackers and privacy abuse. Current information and record management systems have difficulties achieving privacy protection of such sensitive records in a secure, transparent, decentralized and trustless environment. …”
    Get full text
    Article