Search alternatives:
peers » peer (Expand Search)
hackers » trackers (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
Showing 381 - 400 results of 10,187 for search '(peers OR (when OR ((hackers OR attackers) OR (checker OR checked))))', query time: 0.16s Refine Results
  1. 381

    How counselling psychologists address issues of race with clients from black Asian and minority ethnic backgrounds: a discourse analysis by Madre de Deus de Sousa, Filipe Alexandre, Banbury, Samantha, Phillips, Olaide, Lusher, Joanne

    Published 2024
    “…The prejudiced experiences that Black, Asian and Minority Ethnic (BAME) clients report when discussing culture, racial discrimination and race has been documented. …”
    Get full text
    Article
  2. 382

    Strategies of rendering difficult syntactic structures in English-Arabic simultaneous interpreting by Abdulameer, Muhannad Hadi Abdulameer

    Published 2022
    “…When conducted between linguistically different language pairs, simultaneous interpreting encapsulates difficulties when choosing the strategies to be used with certain syntactic structures. …”
    Get full text
    Thesis
  3. 383

    Acid inactivation of soybean lipoxygenase with retention of protein solubility by Cheman, Y.B., Wei, L.S., Nelson, A.I.

    Published 1989
    “…Inactivation of lipoxygenase was found to be irreversible when treated at pH 3.0 and below, irrespective of the acids used. …”
    Article
  4. 384

    Wear behaviour of NiTi shape memory alloys by Yan, Lina

    Published 2016
    “…Further decrease was noticed when the temperature approached the Af. When tested above the Af, the coefficient of friction decreased more significantly under higher loads. …”
    Get full text
    Thesis
  5. 385

    Changes in the mechanical properties of human hair under various conditions by Boo, Khee Meng.

    Published 2010
    “…This project sought to investigate the tensile properties of human hair when subjected to specific conditions which is hair coloring and exposure to chlorine. …”
    Get full text
    Final Year Project (FYP)
  6. 386

    Educated : a memoir / by Westover, Tara 1986- 656335, author

    Published [201
    “…When another brother got himself into college, Tara decided to try a new kind of life. …”
    text
  7. 387

    Challenging the ugliness of beauty : beautification as an instrument of female agency by Chong, Eunice Chin Hui

    Published 2019
    “…I will proceed to illustrate two ways in which beautification can take the form of an informed personal choice. Firstly, when beautification is practiced to reclaim the power of feminine beauty, and secondly, when beautification is practiced for pleasure. …”
    Get full text
    Final Year Project (FYP)
  8. 388

    Detection of damaged supports under railway track based on frequency shift by Wang, Longqi, Zhang, Yao, Lie, Seng Tjhen

    Published 2017
    “…In fact, the natural frequencies drop clearly when the auxiliary mass moves over the damaged support. …”
    Get full text
    Get full text
    Journal Article
  9. 389

    Residual strength of blast damaged reinforced concrete columns by Nair, Anand

    Published 2010
    “…Exterior columns are probably the most vulnerable structural components to attacks from rebel forces. Their failure could possibly trigger a progressive collapse of an entire structure. …”
    Get full text
    Thesis
  10. 390

    Loss analysis of a mix-flow turbine with nozzled twin-entry volute at different admissions by Xue, Yingxian, Yang, Mingyang, Martinez-Botas, Ricardo F., Romagnoli, Alessandro, Deng, Kangyao

    Published 2020
    “…Opposite phenomenon happens when the majority is fed from lower part (near hub). …”
    Get full text
    Journal Article
  11. 391

    Pattern and process in the bill morphology of the Great Tit Parus major by Gosler, A

    Published 1987
    “…This was especially clear in winter, so that heritability estimates for bill characters tended to be significantly higher when the offspring were measured in summer than when measured in winter. …”
    Journal article
  12. 392

    The effect of interactivity on memory. by Tan, Angeline Jac Lynn.

    Published 2011
    “…In addition, there was a significant decline in memory after making decisions that were relevant to the context, but not when decisions were un-relevant. This indicates interference in memory when making decisions that are related to the context. …”
    Get full text
    Final Year Project (FYP)
  13. 393

    A Study on Gender Perception of Emoticon in Computer Mediated Communication (CMC) by Anuar, Herman Shah, Mat Saat, Rafeah, Abu Talib, Zuraidah

    Published 2009
    “…When we use it as if, the face of the sender is in front of the computer screen when receiver receives the message. …”
    Get full text
    Article
  14. 394

    Body . space . generative forms. by Tee, Chor Hiong.

    Published 2011
    “…Man has employed this rule as a geometric principle when he seeks to construct forms of beauty. The human body and its proportions are often used as blueprint of measurements for constructing regulating lines and division of spaces. …”
    Get full text
    Final Year Project (FYP)
  15. 395

    Activity detection and analysis on Android by Ong, Xian Hui

    Published 2015
    “…Tracking and learning the activity patterns of an individual is vital when providing healthcare and awareness to the needy such as the elderly or healthcare patients. …”
    Get full text
    Final Year Project (FYP)
  16. 396

    Effects of geometrical parameters on performance of miniature centrifugal pump by Liu, Guiqin

    Published 2014
    “…The shock loss is 9% of the theoretical head when the blade angle is 45˚ and is 70% when the blade angle is 30˚. …”
    Get full text
    Thesis
  17. 397

    Antidiscriminatory privacy by Cofone, I

    Published 2019
    “…This article offers a theoretical framework for determining, with a view of preventing discrimination, when personal information should flow and when it should not. …”
    Journal article
  18. 398

    A counterexample to the coarse Menger conjecture by Nguyen, T, Scott, A, Seymour, P

    Published 2025
    “…<p>Menger’s well-known theorem from 1927 characterizes when it is possible to find k vertex-disjoint paths between two sets of vertices in a graph G. …”
    Journal article
  19. 399

    Detection of latent fingerprint using optical technique by Seah, Leong Keey., Ong, Lin Seng., Murukeshan, Vadakke Matham.

    Published 2008
    “…Sensitive detection techniques are needed when dealing with very weak fluorescence signals from the test samples. …”
    Get full text
    Research Report
  20. 400

    The Mark of Cain: The crime of terrorism in times of armed conflict as interpreted by the Court of Appeal of England and Wales in R v. Mohammed Gul by Coco, A

    Published 2013
    “…On 22 February 2012, the Court of Appeal of England and Wales was called on to interpret the definition of the crime of terrorism as contained in relevant United Kingdom (UK) legislation. When confronted with defence arguments grounded in international law, the Court denied that attacks by non-state armed groups against governmental armed forces in a non-international armed conflict may be exempted from being labelled as terrorist acts. …”
    Journal article