Search alternatives:
beers » peers (Expand Search), bears (Expand Search), beer (Expand Search)
cheer » cheers (Expand Search), chee (Expand Search), sheer (Expand Search)
hackers » trackers (Expand Search)
cher » chern (Expand Search), chen (Expand Search), chee (Expand Search)
beers » peers (Expand Search), bears (Expand Search), beer (Expand Search)
cheer » cheers (Expand Search), chee (Expand Search), sheer (Expand Search)
hackers » trackers (Expand Search)
cher » chern (Expand Search), chen (Expand Search), chee (Expand Search)
-
61
-
62
Encapsulation of probiotics for food and beverage applications
Published 2022“…Up to date, no studies have been done to examine the viability of probiotics in popular, well-liked, commercialized carbonated sodas/beers, but it is known that certain components in these matrices (e.g. phosphoric acid in soda, hops and ethanol in beers) can reduce the viability of probiotics. …”
Get full text
Final Year Project (FYP) -
63
Practical fuzzing on open-source projects
Published 2022“…Hackers exploiting software vulnerabilities found in all software programs, resulting in unfavorable outcomes, which is a major concern in software security. …”
Get full text
Final Year Project (FYP) -
64
Evaluation of the music collection at the National Institute of Education Library
Published 2011“…However, the Library fared relatively better, with 71.5% holdings, when a list of "Recommended Readings/References" drawn up by the Institute's academic staff was list-checked.…”
Get full text
Thesis -
65
A model of information security and competition
Published 2024“…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
Journal article -
66
Contribution of problems and exercises at end chapters plus book interactive online exercises MCQ In: Cryptography and Network Security: Principles and Practice, Global Edition, 8t...
Published 2024“…In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. …”
Book -
67
Enhancing security in generic e-Commerce systems
Published 2010“…One of the most common security features found in today e-Commerce application is the Secure Socket Layer (SSL) connection and even with SSL alone, it may not be sufficient to withstand hackers’ attacks. It may cause great losses to the store owner if their online store is broken into. …”
Get full text
Final Year Project (FYP) -
68
Investigation of low temperature wafer bonding using intermediate layer
Published 2008Get full text
Thesis -
69
-
70
Application of low frequency noise in the study of VLSI electromigration
Published 2008Get full text
Thesis -
71
Development of an industrial SCADA firewall prototype using single board computer - part 2
Published 2019“…Threats such as the rise in hackers, cyber espionage and increased influence of radical activists’ groups cannot be undermined. …”
Get full text
Final Year Project (FYP) -
72
-
73
Design of insulated gate bipolar transistor using novel structure
Published 2008Get full text
Thesis -
74
Encrypted smartphone with advanced encryption standard 256
Published 2011“…However, in this digital age, mobile users cannot take the confidentiality of data transfer for granted because of the presence of hackers and the threats that exist. In today’s market, various encryption suites are available for mobile users to send their SMS “safely” and offer different ways of encryption and decryption such as symmetry cryptography and asymmetric cryptography. …”
Get full text
Final Year Project (FYP) -
75
Smart-contract privacy preservation mechanism
Published 2023“…Sensitive records stored in the cloud such as healthcare records, private conversation and credit card information are targets of hackers and privacy abuse. Current information and record management systems have difficulties achieving privacy protection of such sensitive records in a secure, transparent, decentralized and trustless environment. …”
Get full text
Article -
76
-
77
-
78
Finite element analysis on post-buckling of thin-walled structures using ANSYS
Published 2015“…The results obtained were checked against experimental data and led to the development and the revision of design procedures for the pin-ended lipped column and hollow box section.…”
Get full text
Final Year Project (FYP) -
79
Developement of electrical equivalent circuit for super capacitor
Published 2011Get full text
Final Year Project (FYP) -
80