Showing 101 - 120 results of 6,994 for search '(peers OR ((((cheer OR cheaters) OR sheet) OR chapters) OR (hackers OR checker)))', query time: 0.16s Refine Results
  1. 101

    Practical fuzzing on open-source projects by Ng, Chun Kai

    Published 2022
    “…Hackers exploiting software vulnerabilities found in all software programs, resulting in unfavorable outcomes, which is a major concern in software security. …”
    Get full text
    Final Year Project (FYP)
  2. 102

    Laser driver (ACC - auto current control) for driving laser diode in LED and laser modes by Tay, Eng Boon.

    Published 2008
    “…The circuit implemented is such that is portable and able to cater for few applications such as visual inspection of a laser diode and fiber checker.…”
    Get full text
    Thesis
  3. 103

    Influence of presumed influence on thinness as a beauty ideal for girls. by Soh, Wai Siong.

    Published 2008
    “…On the other hand, if the “influence on significant others or female peers” exerts an impact on “influence on self”, it will result in desire to be thin.…”
    Get full text
    Thesis
  4. 104

    Challenges of online collaborative learning among special needs university students by Hidayu Shafie, Ireena Nasiha Ibnu, Noori, Abdullah, Nurhilleny Rosly, Nadia Anuar, Nur Husna Serip Mohamad

    Published 0002
    “…Based on the findings of the study, it was found that the SNS in this study mostly had problems communicating with their peers during online collaborative learning. They were not really lacking in collaborative skills, but they were more concerned about their peers’ perspectives on their disabilities, and their abilities to do group work. …”
    Get full text
    Article
  5. 105

    A model of information security and competition by de Cornière, A, Taylor, G

    Published 2024
    “…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
    Journal article
  6. 106

    Bacterial type VI secretion system helps prevent cheating in microbial communities by Filloux, Alain

    Published 2024
    “…Although microbial “societies” do not have such rules codified, they nonetheless implement molecular strategies to restrict foes and cheaters within their respective populations and communities.…”
    Get full text
    Journal Article
  7. 107

    System of floating solar farm with vertical curtain and different anchoring configuration by Chern, Adam

    Published 2022
    “…Three parameters of the set-up were tested: surface penetration of vertical sheet, length of horizontal sheet and separation distance between the two sheets. …”
    Get full text
    Final Year Project (FYP)
  8. 108

    Surface wave interaction with a vertical viscoelastic barrier by Bi, Cheng, Wu, Mao See, Law, Adrian Wing-Keung

    Published 2022
    “…In this study, the surface wave interaction with a thin vertical submerged viscoelastic sheet as a wave barrier is investigated analytically without pre-assumption of the sheet dynamic behavior. …”
    Get full text
    Journal Article
  9. 109
  10. 110

    Memory Checking Requires Logarithmic Overhead by Boyle, Elette, Komargodski, Ilan, Vafa, Neekon

    Published 2025
    “…We study the complexity of memory checkers with computational security and prove the first general tight lower bound. …”
    Get full text
    Article
  11. 111

    Lesbian rights and recognition in Singapore : lesbian relationships should be accepted legally and socially. by Yu, Bertinelli Shasha.

    Published 2013
    “…Family, religion and politics can negatively affect one’s lesbian identity while the support from peers can be empowering to their lesbian identity. …”
    Get full text
    Final Year Project (FYP)
  12. 112

    Enhancing security in generic e-Commerce systems by Mak, Foo Keong.

    Published 2010
    “…One of the most common security features found in today e-Commerce application is the Secure Socket Layer (SSL) connection and even with SSL alone, it may not be sufficient to withstand hackers’ attacks. It may cause great losses to the store owner if their online store is broken into. …”
    Get full text
    Final Year Project (FYP)
  13. 113

    Trends in Innovation and Entrepreneurship Research : Ecosystems, Digital Technologies and Responses to Shocks / by Brem, Alexander, editor 552956, Jin, Chen, 1968-, editor 498471, World Scientific (Online service) 655444

    Published [202
    “…The chapters in the book focus on recent developments in the field of technological innovation and entrepreneurship. …”
    Get full text
    software, multimedia
  14. 114

    Membrane-induced tau amyloid fibrils by El Mammeri, Nadia, Gampp, Olivia, Duan, Pu, Hong, Mei

    Published 2024
    “…The intrinsically disordered protein tau aggregates into β-sheet amyloid fibrils that spread in human brains afflicted with Alzheimer’s disease and other neurodegenerative diseases. …”
    Get full text
    Article
  15. 115

    Investigations into high resolution imaging of the aqueous outflow system and cornea by Hong, Jesmond Xun Jie

    Published 2018
    “…This thesis in this context aims to investigate the potential of Bessel beam and light sheet fluorescence microscopy for ocular disease diagnosis. …”
    Get full text
    Thesis-Doctor of Philosophy
  16. 116

    GPU-accelerated real-time motion planning for safe human-robot collaboration by Fujii, Shohei

    Published 2024
    “…We experimentally demonstrate that our method can navigate a 6-DoF robot earlier than a geometric-primitives-based distance checker in a dynamic, collaborative environment. …”
    Get full text
    Thesis-Doctor of Philosophy
  17. 117

    Development of an industrial SCADA firewall prototype using single board computer - part 2 by Teo, Joycelyn Li Ting

    Published 2019
    “…Threats such as the rise in hackers, cyber espionage and increased influence of radical activists’ groups cannot be undermined. …”
    Get full text
    Final Year Project (FYP)
  18. 118

    Taking eService-Learning to the Next Level / by Strait, Jean R., 1965-, editor 656157, Shumer, Robert D., 1947-, editor 656160, Nordyke, Katherine J., editor 656159, IAP Books (Online service) 656161

    Published 2023
    “…The chapters in this book provide an excellent story of the growth of e-learning and eService-learning over the past many years. …”
    Get full text
    software, multimedia
  19. 119

    Smart-contract privacy preservation mechanism by Siraj, Muhammed, Ninggal, Mohd. Izuan Hafez, Udzir, Nur Izura, Abdullah, Muhammad Daniel Hafiz, Asmawi, Aziah

    Published 2023
    “…Sensitive records stored in the cloud such as healthcare records, private conversation and credit card information are targets of hackers and privacy abuse. Current information and record management systems have difficulties achieving privacy protection of such sensitive records in a secure, transparent, decentralized and trustless environment. …”
    Get full text
    Article
  20. 120

    Design of blockchain-based P2P energy trading framework and a SCADA system for distributed energy resources in microgrids by Li, Yao

    Published 2022
    “…This project mainly completed the development and implementation of a peer-to-peer (P2P) energy trading framework between prosumers based on an Ethereum private blockchain network. …”
    Get full text
    Thesis-Master by Coursework