Search alternatives:
chern » chen (Expand Search)
sheer » shear (Expand Search), sheet (Expand Search), steer (Expand Search)
cheeks » cheers (Expand Search), cheek (Expand Search)
checks » check (Expand Search)
checkers » checker (Expand Search), checked (Expand Search), hackers (Expand Search)
chern » chen (Expand Search)
sheer » shear (Expand Search), sheet (Expand Search), steer (Expand Search)
cheeks » cheers (Expand Search), cheek (Expand Search)
checks » check (Expand Search)
checkers » checker (Expand Search), checked (Expand Search), hackers (Expand Search)
-
6121
Python for Security and Networking : Leverage Python modules and tools in securing your network and applications /
Published 2018“…Next, you’ll dive deep into the core networking tasks where you will learn how to check a network’s vulnerability using Python security scripting and understand how to check for vulnerabilities in your network – including tasks related to packet sniffing. …”
Get full text
Get full text
software, multimedia -
6122
ChatGPT robotic process automation and AI chatbots for education
Published 2023“…Multiple techniques, including introspection and fact-checking, were implemented to ensure response precision. …”
Get full text
Final Year Project (FYP) -
6123
The 1 → 3 massive splitting functions from QCD factorization and SCET
Published 2024“…We find agreement between these two approaches, providing a strong check of our results. Additionally, we also check all iterated and soft limits of our results, finding agreement with predictions from factorization. …”
Get full text
Article -
6124
Mathematical models for waste water treatment using activated carbon
Published 2008“…The purpose of study to check the applicability of model for the adsorption process in wastewater treatment using activated carbon.…”
Get full text
Thesis -
6125
-
6126
A test for the reliability of loan loss provisions reported by commercial bank management and relevance of macro economic variables.
Published 2008“…Loan loss provisions and problem loans reported by commercial banks management could be doubtful at times. As a check on the reliability of the loan data, we propose the usage of loan loss provisions and problem loans as the means to classify failed and survived banks.…”
Get full text
Final Year Project (FYP) -
6127
Black-box cryptography is dangerous III
Published 2013“…Cryptographic libraries are readily available for developers to use and download however, many a times, developers do not understand or check the exact codes that they have downloaded and are implementing. …”
Get full text
Final Year Project (FYP) -
6128
Automated scripts for testing verilog designs with iVerilog
Published 2015“…Python scripts were written to check for the coding bugs or errors of the source design through the usage of testbenches. …”
Get full text
Final Year Project (FYP) -
6129
US-China Conflict : Will ASEAN Centrality Be Derailed?
Published 2019“…The US-China trade war is fast escalating into a political one with security implications as US senators re-introduced a sanctions bill to check Beijing on its expansionism in the South China Sea and East China Sea. …”
Get full text
Get full text
Commentary -
6130
Japan in disaster : managing energy vulnerabilities
Published 2012“…The nuclear crises should come as a reality check for other states pursuing nuclear energy plans, including ASEAN’s.…”
Get full text
Get full text
Commentary -
6131
Design and development of a web-based platform for EEE MSc student orientation
Published 2023“…The main aim of the web application is for students to have cultural exchanges, to explore Singapore, and to engage in school life by forming interest groups with like-minded peers.…”
Get full text
Final Year Project (FYP) -
6132
Reframing stigma in Tourette syndrome: an updated scoping review
Published 2023“…On the individual level, youth with PTD had lower self-esteem than peers, often leading to fear of future stigmatization, avoidant behaviors, and self-stigmatization. …”
Journal article -
6133
Conceptualize, design, simulate and develop a contact tracing scheme based on the Android platform
Published 2021“…The method of contact tracing is for people to check in to the locations that they have visited. …”
Get full text
Final Year Project (FYP) -
6134
Evaluation of low-cost RFID hardware for automated equipment tracking in first-response vehicles
Published 2014“…First-response vehicles often need to arrive at the scene as fast as they can, however they have a lot of equipment to be brought to the scene. Just checking the correct items and equipment needed could take up to several hours. …”
Get full text
Final Year Project (FYP) -
6135
Next point of interest (POI) recommendation
Published 2019“…This project also involves the evaluation of some common recommender system techniques, applied to POI check-ins. From the evaluation, we get a few important discoveries in order to utilize POI recommendation models in different scenarios. …”
Get full text
Final Year Project (FYP) -
6136
Abelian codes in principal ideal group algebras
Published 2013“…For abelian codes in a PIGA, which can be viewed as cyclic codes over a semisimple group algebra, it is shown that every abelian code in a PIGA admits generator and check elements. These are analogous to the generator and parity-check polynomials of cyclic codes. …”
Get full text
Get full text
Get full text
Journal Article -
6137
The effects of instructional and motivational self-talk on vertical jump performance and kinematics
Published 2019“…After each trail, participants were put through a manipulation check to assess adherence to self-talk conditions. …”
Get full text
Final Year Project (FYP) -
6138
Facial expression quantification and analysis
Published 2008“…This dissertation mentions some of the latest techniques available in the above field and proposes two design techniques that exceed the performance of their peers in both technical aspects and applications.…”
Get full text
Thesis -
6139
A boundary element approach for solving plane elastostatic equations of anisotropic functionally graded materials
Published 2021“…The proposed boundary element method is applied to solve some specific problems to check its validity and accuracy.…”
Get full text
Journal Article -
6140
Ten quick tips for ensuring machine learning model validity
Published 2024“…The 10 quick tips described here discuss useful practices on how to check AI/ ML models from 2 perspectives—the user and the developer.…”
Get full text
Journal Article