Showing 301 - 320 results of 10,431 for search '(peers OR (when OR (((checkers OR hackers) OR tracked) OR (checker OR checked))))', query time: 0.16s Refine Results
  1. 301

    Multiplicity dependence of σψ(2S)/σJ/ψ in pp collisions at √𝑠 = 13 TeV by Aaij, R., Abdelmotteleb, A. S. W., Abellan Beteta, C., Abudinén, F., Ackernley, T., Adeva, B., Adinolfi, M., Adlarson, P., Agapopoulou, C., Aidala, C. A., Ajaltouni, Z., Akar, S., Akiba, K., Albicocco, P., Albrecht, J., Alessio, F.

    Published 2024
    “…The ratio of production cross-sections of ψ(2S) over J/ψ mesons are cross-checked with other measurements in di-lepton channels and found to be compatible.…”
    Get full text
    Article
  2. 302

    A temporal study of the effects of online opinions : information sources matter by Huang, Jianxiong, Boh, Wai Fong, Goh, Kim Huat

    Published 2020
    “…This study examines when and why online comments from different sources and platforms influence a movie’s box office receipts over time. …”
    Get full text
    Journal Article
  3. 303

    Lesbian rights and recognition in Singapore : lesbian relationships should be accepted legally and socially. by Yu, Bertinelli Shasha.

    Published 2013
    “…Family, religion and politics can negatively affect one’s lesbian identity while the support from peers can be empowering to their lesbian identity. …”
    Get full text
    Final Year Project (FYP)
  4. 304

    Enhancing security in generic e-Commerce systems by Mak, Foo Keong.

    Published 2010
    “…One of the most common security features found in today e-Commerce application is the Secure Socket Layer (SSL) connection and even with SSL alone, it may not be sufficient to withstand hackers’ attacks. It may cause great losses to the store owner if their online store is broken into. …”
    Get full text
    Final Year Project (FYP)
  5. 305

    Quality assessment of acoustic environment reproduction methods for cinematic virtual reality in soundscape applications by Gan, Woon-Seng, Ooi, Kenneth, Kang, Jian, Feng, Jing, Hong, Joo Young, Lam, Bhan, Ong, Zhen-Ting, Tan, Sze-Tiong

    Published 2018
    “…In the localization of sound sources, both the FOA-tracked binaural and the FOA-2D speaker array exhibited higher spatial acoustic fidelity than FOA-static binaural. …”
    Get full text
    Get full text
    Journal Article
  6. 306

    Membrane compaction in forward osmosis process by Ng, Daniel Yee Fan, Chen, Yunfeng, Dong, Zhili, Wang, Rong

    Published 2021
    “…Membrane compaction is commonly observed in polymeric membranes when subjected to elevated hydraulic pressure, but was rarely discussed in forward osmosis (FO) processes, since there was usually little hydraulic pressure difference across the membrane. …”
    Get full text
    Journal Article
  7. 307

    Adjustable wind selectivity in shearwaters implies knowledge of the foraging landscape by Harris, S, Bishop, C, Bond, S, Fernandes, P, Guilford, T, Lewin, P, Padget, O, Robins, P, Schneider, W, Waggitt, J, Wilmes, S, Cordes, L

    Published 2025
    “…First, shearwaters exhibit lower wind selectivity during homing movement when constrained to target-driven navigation toward the colony. …”
    Journal article
  8. 308

    CFD simulation of bubbly flow in a vertical pipe by Adarsh Gouda

    Published 2013
    “…The motions of the bubbles are tracked using the discrete phase model which is embedded in ANSYSY FLUENT. …”
    Get full text
    Thesis
  9. 309

    Numerical simulation of oxygen delivery in presence of hemoglobin hydrogel based oxygen carriers by Tan, Kai Ying

    Published 2016
    “…Red blood cells have standard shelf life of only 42 days and unable to be checked and sterilized for infective agents like HIV. …”
    Get full text
    Final Year Project (FYP)
  10. 310

    On the corrosion resistance of some selective laser melted alloys by Suryawanshi, Jyoti, Baskaran, T., Prakash, Om, Arya, S. B., Ramamurty, Upadrasta

    Published 2021
    “…The effects of laser scanning strategy (single melt vs. checker board styles), post-SLM heat treatment, and corroding surface orientation (with respect to the scan and build directions) on the corrosion behavior were examined. …”
    Get full text
    Journal Article
  11. 311

    A Multi-tier Model and Filtering Approach to Detect Fake News Using Machine Learning Algorithms by Yu, Chiung Chang, A Hamid, Isredza Rahmi, Abdullah, Zubaile, Kipli, Kuryati, Amnur, Hidra

    Published 2024
    “…The consensus layer acts as the final decision when collision results occur in the first two-tier layer. …”
    Get full text
    Article
  12. 312

    Moving target positioning based on a distributed camera network by Zhao, Long, Liu, Zhen, Li, Tiejun, Huang, Baoqi, Xie, Lihua

    Published 2014
    “…This system can function as complementary positioning information sources to realize moving target positioning in indoor or outdoor environments when global navigation satellite system (GNSS) signals are unavailable. …”
    Get full text
    Get full text
    Journal Article
  13. 313

    Development of an industrial SCADA firewall prototype using single board computer - part 2 by Teo, Joycelyn Li Ting

    Published 2019
    “…Threats such as the rise in hackers, cyber espionage and increased influence of radical activists’ groups cannot be undermined. …”
    Get full text
    Final Year Project (FYP)
  14. 314

    Vision based localization of a moving target by Selvaraj, Prabu

    Published 2014
    “…Localization is performed by tracking robot's position throughout the robot's movement using sensors. …”
    Get full text
    Thesis
  15. 315

    Magical realism and representations of the cold war in Southeast Asia by Lye, Kit Ying

    Published 2016
    “…However, while there are acknowledgements by scholars that religious myths and pre-existing animistic beliefs continue to influence the way that the indigenous people understand their worlds, Southeast Asian authors (unlike many of their postcolonial peers), do not actively employ magical realism in their exploration of history and civil unrest in their writings, and when they do, are not employed to the same degree as postcolonial authors in other regions. …”
    Get full text
    Thesis
  16. 316

    Smart-contract privacy preservation mechanism by Siraj, Muhammed, Ninggal, Mohd. Izuan Hafez, Udzir, Nur Izura, Abdullah, Muhammad Daniel Hafiz, Asmawi, Aziah

    Published 2023
    “…Sensitive records stored in the cloud such as healthcare records, private conversation and credit card information are targets of hackers and privacy abuse. Current information and record management systems have difficulties achieving privacy protection of such sensitive records in a secure, transparent, decentralized and trustless environment. …”
    Get full text
    Article
  17. 317

    Design of blockchain-based P2P energy trading framework and a SCADA system for distributed energy resources in microgrids by Li, Yao

    Published 2022
    “…This project mainly completed the development and implementation of a peer-to-peer (P2P) energy trading framework between prosumers based on an Ethereum private blockchain network. …”
    Get full text
    Thesis-Master by Coursework
  18. 318

    Promoting strategic internal communication in governance to enhance employee creativity in organization by Nur Hidayah, Shamsul Azhar, Fadzida, Ismail, Noor Akma, Abu Bakar

    Published 2024
    “…The results indicate that when internal communication and leadership communication in governance are symmetrical, individuals are more likely to receive feedback from a variety of interpersonal sources, including supervisors, colleagues, and peers from different departments. …”
    Get full text
    Article
  19. 319

    The Importance of Bystanders in Threat Assessment and Management by Borum, Randy, Rowe, Mary

    Published 2025
    “…The principal aim of threat assessment is to prevent (primarily) intentional acts of harm. When tragic incidents of planned violence occur, however, it is almost always uncovered “that someone knew something” about the attack before it happened. …”
    Get full text
    Book chapter
  20. 320

    Reframing stigma in Tourette syndrome: an updated scoping review by Pring, K, Malli, M, Hardy, BW, Rapp, SR, Storch, EA, Mink, JW, Martindale, JM

    Published 2023
    “…On the individual level, youth with PTD had lower self-esteem than peers, often leading to fear of future stigmatization, avoidant behaviors, and self-stigmatization. …”
    Journal article