Showing 101 - 120 results of 6,991 for search '(peers OR (((cheers OR sheet) OR chapters) OR (hackers OR checker)))', query time: 0.14s Refine Results
  1. 101

    Challenges of online collaborative learning among special needs university students by Hidayu Shafie, Ireena Nasiha Ibnu, Noori, Abdullah, Nurhilleny Rosly, Nadia Anuar, Nur Husna Serip Mohamad

    Published 0002
    “…Based on the findings of the study, it was found that the SNS in this study mostly had problems communicating with their peers during online collaborative learning. They were not really lacking in collaborative skills, but they were more concerned about their peers’ perspectives on their disabilities, and their abilities to do group work. …”
    Get full text
    Article
  2. 102

    A model of information security and competition by de Cornière, A, Taylor, G

    Published 2024
    “…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
    Journal article
  3. 103

    System of floating solar farm with vertical curtain and different anchoring configuration by Chern, Adam

    Published 2022
    “…Three parameters of the set-up were tested: surface penetration of vertical sheet, length of horizontal sheet and separation distance between the two sheets. …”
    Get full text
    Final Year Project (FYP)
  4. 104

    Surface wave interaction with a vertical viscoelastic barrier by Bi, Cheng, Wu, Mao See, Law, Adrian Wing-Keung

    Published 2022
    “…In this study, the surface wave interaction with a thin vertical submerged viscoelastic sheet as a wave barrier is investigated analytically without pre-assumption of the sheet dynamic behavior. …”
    Get full text
    Journal Article
  5. 105
  6. 106

    Memory Checking Requires Logarithmic Overhead by Boyle, Elette, Komargodski, Ilan, Vafa, Neekon

    Published 2025
    “…We study the complexity of memory checkers with computational security and prove the first general tight lower bound. …”
    Get full text
    Article
  7. 107

    Lesbian rights and recognition in Singapore : lesbian relationships should be accepted legally and socially. by Yu, Bertinelli Shasha.

    Published 2013
    “…Family, religion and politics can negatively affect one’s lesbian identity while the support from peers can be empowering to their lesbian identity. …”
    Get full text
    Final Year Project (FYP)
  8. 108

    Enhancing security in generic e-Commerce systems by Mak, Foo Keong.

    Published 2010
    “…One of the most common security features found in today e-Commerce application is the Secure Socket Layer (SSL) connection and even with SSL alone, it may not be sufficient to withstand hackers’ attacks. It may cause great losses to the store owner if their online store is broken into. …”
    Get full text
    Final Year Project (FYP)
  9. 109

    Trends in Innovation and Entrepreneurship Research : Ecosystems, Digital Technologies and Responses to Shocks / by Brem, Alexander, editor 552956, Jin, Chen, 1968-, editor 498471, World Scientific (Online service) 655444

    Published [202
    “…The chapters in the book focus on recent developments in the field of technological innovation and entrepreneurship. …”
    Get full text
    software, multimedia
  10. 110

    Membrane-induced tau amyloid fibrils by El Mammeri, Nadia, Gampp, Olivia, Duan, Pu, Hong, Mei

    Published 2024
    “…The intrinsically disordered protein tau aggregates into β-sheet amyloid fibrils that spread in human brains afflicted with Alzheimer’s disease and other neurodegenerative diseases. …”
    Get full text
    Article
  11. 111

    Investigations into high resolution imaging of the aqueous outflow system and cornea by Hong, Jesmond Xun Jie

    Published 2018
    “…This thesis in this context aims to investigate the potential of Bessel beam and light sheet fluorescence microscopy for ocular disease diagnosis. …”
    Get full text
    Thesis-Doctor of Philosophy
  12. 112

    GPU-accelerated real-time motion planning for safe human-robot collaboration by Fujii, Shohei

    Published 2024
    “…We experimentally demonstrate that our method can navigate a 6-DoF robot earlier than a geometric-primitives-based distance checker in a dynamic, collaborative environment. …”
    Get full text
    Thesis-Doctor of Philosophy
  13. 113

    Development of an industrial SCADA firewall prototype using single board computer - part 2 by Teo, Joycelyn Li Ting

    Published 2019
    “…Threats such as the rise in hackers, cyber espionage and increased influence of radical activists’ groups cannot be undermined. …”
    Get full text
    Final Year Project (FYP)
  14. 114

    Taking eService-Learning to the Next Level / by Strait, Jean R., 1965-, editor 656157, Shumer, Robert D., 1947-, editor 656160, Nordyke, Katherine J., editor 656159, IAP Books (Online service) 656161

    Published 2023
    “…The chapters in this book provide an excellent story of the growth of e-learning and eService-learning over the past many years. …”
    Get full text
    software, multimedia
  15. 115

    Smart-contract privacy preservation mechanism by Siraj, Muhammed, Ninggal, Mohd. Izuan Hafez, Udzir, Nur Izura, Abdullah, Muhammad Daniel Hafiz, Asmawi, Aziah

    Published 2023
    “…Sensitive records stored in the cloud such as healthcare records, private conversation and credit card information are targets of hackers and privacy abuse. Current information and record management systems have difficulties achieving privacy protection of such sensitive records in a secure, transparent, decentralized and trustless environment. …”
    Get full text
    Article
  16. 116

    Design of blockchain-based P2P energy trading framework and a SCADA system for distributed energy resources in microgrids by Li, Yao

    Published 2022
    “…This project mainly completed the development and implementation of a peer-to-peer (P2P) energy trading framework between prosumers based on an Ethereum private blockchain network. …”
    Get full text
    Thesis-Master by Coursework
  17. 117

    Encrypted smartphone with advanced encryption standard 256 by Tan, Alvin Chee Munn.

    Published 2011
    “…However, in this digital age, mobile users cannot take the confidentiality of data transfer for granted because of the presence of hackers and the threats that exist. In today’s market, various encryption suites are available for mobile users to send their SMS “safely” and offer different ways of encryption and decryption such as symmetry cryptography and asymmetric cryptography. …”
    Get full text
    Final Year Project (FYP)
  18. 118

    CNT work function modification for transparent electrode application in organic photovoltaics by Low, Keith Ying Jie.

    Published 2010
    “…The results show that sheet resistance of the Cnt went down by more that 45% and there was in significant increase in the work function at concentration 4M of HNO3, a p- dopant. …”
    Get full text
    Final Year Project (FYP)
  19. 119

    Design and development of a web-based platform for EEE MSc student orientation by Soo, Serena Keng Shuang

    Published 2023
    “…The main aim of the web application is for students to have cultural exchanges, to explore Singapore, and to engage in school life by forming interest groups with like-minded peers.…”
    Get full text
    Final Year Project (FYP)
  20. 120

    Reframing stigma in Tourette syndrome: an updated scoping review by Pring, K, Malli, M, Hardy, BW, Rapp, SR, Storch, EA, Mink, JW, Martindale, JM

    Published 2023
    “…On the individual level, youth with PTD had lower self-esteem than peers, often leading to fear of future stigmatization, avoidant behaviors, and self-stigmatization. …”
    Journal article