Search alternatives:
peers » peer (Expand Search)
checkers » checks (Expand Search), crackers (Expand Search), cheaters (Expand Search)
hackers » trackers (Expand Search)
tracked » tracker (Expand Search)
peers » peer (Expand Search)
checkers » checks (Expand Search), crackers (Expand Search), cheaters (Expand Search)
hackers » trackers (Expand Search)
tracked » tracker (Expand Search)
-
301
Multiplicity dependence of σψ(2S)/σJ/ψ in pp collisions at √𝑠 = 13 TeV
Published 2024“…The ratio of production cross-sections of ψ(2S) over J/ψ mesons are cross-checked with other measurements in di-lepton channels and found to be compatible.…”
Get full text
Article -
302
A temporal study of the effects of online opinions : information sources matter
Published 2020“…This study examines when and why online comments from different sources and platforms influence a movie’s box office receipts over time. …”
Get full text
Journal Article -
303
Lesbian rights and recognition in Singapore : lesbian relationships should be accepted legally and socially.
Published 2013“…Family, religion and politics can negatively affect one’s lesbian identity while the support from peers can be empowering to their lesbian identity. …”
Get full text
Final Year Project (FYP) -
304
Enhancing security in generic e-Commerce systems
Published 2010“…One of the most common security features found in today e-Commerce application is the Secure Socket Layer (SSL) connection and even with SSL alone, it may not be sufficient to withstand hackers’ attacks. It may cause great losses to the store owner if their online store is broken into. …”
Get full text
Final Year Project (FYP) -
305
Quality assessment of acoustic environment reproduction methods for cinematic virtual reality in soundscape applications
Published 2018“…In the localization of sound sources, both the FOA-tracked binaural and the FOA-2D speaker array exhibited higher spatial acoustic fidelity than FOA-static binaural. …”
Get full text
Get full text
Journal Article -
306
Membrane compaction in forward osmosis process
Published 2021“…Membrane compaction is commonly observed in polymeric membranes when subjected to elevated hydraulic pressure, but was rarely discussed in forward osmosis (FO) processes, since there was usually little hydraulic pressure difference across the membrane. …”
Get full text
Journal Article -
307
Adjustable wind selectivity in shearwaters implies knowledge of the foraging landscape
Published 2025“…First, shearwaters exhibit lower wind selectivity during homing movement when constrained to target-driven navigation toward the colony. …”
Journal article -
308
CFD simulation of bubbly flow in a vertical pipe
Published 2013“…The motions of the bubbles are tracked using the discrete phase model which is embedded in ANSYSY FLUENT. …”
Get full text
Thesis -
309
Numerical simulation of oxygen delivery in presence of hemoglobin hydrogel based oxygen carriers
Published 2016“…Red blood cells have standard shelf life of only 42 days and unable to be checked and sterilized for infective agents like HIV. …”
Get full text
Final Year Project (FYP) -
310
On the corrosion resistance of some selective laser melted alloys
Published 2021“…The effects of laser scanning strategy (single melt vs. checker board styles), post-SLM heat treatment, and corroding surface orientation (with respect to the scan and build directions) on the corrosion behavior were examined. …”
Get full text
Journal Article -
311
A Multi-tier Model and Filtering Approach to Detect Fake News Using Machine Learning Algorithms
Published 2024“…The consensus layer acts as the final decision when collision results occur in the first two-tier layer. …”
Get full text
Article -
312
Moving target positioning based on a distributed camera network
Published 2014“…This system can function as complementary positioning information sources to realize moving target positioning in indoor or outdoor environments when global navigation satellite system (GNSS) signals are unavailable. …”
Get full text
Get full text
Journal Article -
313
Development of an industrial SCADA firewall prototype using single board computer - part 2
Published 2019“…Threats such as the rise in hackers, cyber espionage and increased influence of radical activists’ groups cannot be undermined. …”
Get full text
Final Year Project (FYP) -
314
Vision based localization of a moving target
Published 2014“…Localization is performed by tracking robot's position throughout the robot's movement using sensors. …”
Get full text
Thesis -
315
Magical realism and representations of the cold war in Southeast Asia
Published 2016“…However, while there are acknowledgements by scholars that religious myths and pre-existing animistic beliefs continue to influence the way that the indigenous people understand their worlds, Southeast Asian authors (unlike many of their postcolonial peers), do not actively employ magical realism in their exploration of history and civil unrest in their writings, and when they do, are not employed to the same degree as postcolonial authors in other regions. …”
Get full text
Thesis -
316
Smart-contract privacy preservation mechanism
Published 2023“…Sensitive records stored in the cloud such as healthcare records, private conversation and credit card information are targets of hackers and privacy abuse. Current information and record management systems have difficulties achieving privacy protection of such sensitive records in a secure, transparent, decentralized and trustless environment. …”
Get full text
Article -
317
Design of blockchain-based P2P energy trading framework and a SCADA system for distributed energy resources in microgrids
Published 2022“…This project mainly completed the development and implementation of a peer-to-peer (P2P) energy trading framework between prosumers based on an Ethereum private blockchain network. …”
Get full text
Thesis-Master by Coursework -
318
Promoting strategic internal communication in governance to enhance employee creativity in organization
Published 2024“…The results indicate that when internal communication and leadership communication in governance are symmetrical, individuals are more likely to receive feedback from a variety of interpersonal sources, including supervisors, colleagues, and peers from different departments. …”
Get full text
Article -
319
The Importance of Bystanders in Threat Assessment and Management
Published 2025“…The principal aim of threat assessment is to prevent (primarily) intentional acts of harm. When tragic incidents of planned violence occur, however, it is almost always uncovered “that someone knew something” about the attack before it happened. …”
Get full text
Book chapter -
320
Reframing stigma in Tourette syndrome: an updated scoping review
Published 2023“…On the individual level, youth with PTD had lower self-esteem than peers, often leading to fear of future stigmatization, avoidant behaviors, and self-stigmatization. …”
Journal article