Showing 19,821 - 19,840 results of 24,206 for search 'PATRI~', query time: 1.80s Refine Results
  1. 19821

    Augmented reality hologram by Ng, Jing Heng

    Published 2020
    “…Through the enhancements made to the user interface, the newly designed application ultimately aims to reduce the barriers to entry of creating AR objects such that the AR technology is within the reach of the wider public. …”
    Get full text
    Final Year Project (FYP)
  2. 19822

    Blockchain for mobile applications by Soe, Paing Thu

    Published 2020
    “…Blockchain is a decentralized and public ledger system where people store data of transactions without any centralized party having control. It is a technology that enables data security, transparency, and trust. …”
    Get full text
    Final Year Project (FYP)
  3. 19823

    Searchable symmetric encryption by Thio, Brian Yu Li

    Published 2020
    “…The paper aims to study the various Searchable Symmetric Encryption (SSE) schemes available [1,2,3,4,5] to understand the feasibility and efficiency of the schemes in helping to keep our data secure, when a huge amount of data is stored in a third-party cloud server. Each scheme tends to have a different profile of security leakage and efficiency, which can be attributed to the way the scheme is constructed. …”
    Get full text
    Final Year Project (FYP)
  4. 19824

    SSL-TLS security flaws : HEARTBLEED and 3SHAKE attacks by Lonardo, Jeko

    Published 2020
    “…It is a means to protect web applications against malicious third parties that may try to eavesdrop, tamper, or even interrupt the network connections between client and server. …”
    Get full text
    Final Year Project (FYP)
  5. 19825

    Lightweight secure-boot architecture for RISC-V System-on-Chip by Haj-Yahya, Jawad, Wong, Ming Ming, Pudi, Vikramkumar, Bhasin, Shivam, Chattopadhyay, Anupam

    Published 2020
    “…Adding to the challenge, third party service providers need regular access to the system. …”
    Get full text
    Conference Paper
  6. 19826

    Shielding internet intermediaries from copyright liability - a comparative discourse on safe harbours in Singapore and India by Marsoof, Althaf, Gupta, Indranath

    Published 2021
    “…In light of this, safe harbours that provide certain classes of intermediaries with conditional immunity play an important role in maintaining a healthy balance between the interests of right holders and third parties. In the copyright context, the Digital Millennium Copyright Act 1998 (DMCA) enacted in the United States was the first instance where such a safe harbour was afforded to internet intermediaries. …”
    Get full text
    Journal Article
  7. 19827

    Voices of sovereignty : self-translation in post-colonialism literature by Tan, Qin Lin

    Published 2021
    “…This active involvement bestows writers and translators an exclusive role once unimaginable where the authorities of the two parties are now reaching an equilibrium. Translators are finally allowed exert their sovereignty in translation with creativity and autonomy. …”
    Get full text
    Thesis-Master by Coursework
  8. 19828

    Simulation-based risk assessment of sUAV-car collision by Hu, Haoliang

    Published 2021
    “…Finally, a risk assessment was conducted on sUAVs and ground vehicles, the Equivalent level of safety and third-party risks were determined and proposed the concept of establishing corresponding drone electronic fences in urban areas.…”
    Get full text
    Thesis-Master by Coursework
  9. 19829

    The politics of pandemics in China since late imperial times : from religious practice to the emergency disciplinary state by Fang, Xiaoping

    Published 2022
    “…In Mao’s China after 1949, diseases were radically politicized to justify the Party’s political legitimacy. Public health initiatives and interventionist policies designed to control pandemics brought about broader social restructuring and significantly contributed to the rise of an emergency disciplinary state through the integration of both health and political governance. …”
    Get full text
    Get full text
    Journal Article
  10. 19830

    Assessing safe spaces for digital scholarship in the library by Wexelbaum, Rachel

    Published 2021
    “…The attempts of both parties to construct a safe space for digital scholarship in the library can clash based on these divergent perspectives. …”
    Get full text
    Journal Article
  11. 19831

    Ongoing organizational reforms of the People’s Liberation Army Air Force by Allen, Kenneth W., Mulvaney, Brendan S., Char, James

    Published 2021
    “…Since the Chinese Communist Party’s (CCP) Central Military Commission launched a major reorganization of the entire People’s Liberation Army (PLA) in early 2016, the PLA Air Force (PLAAF) has followed up with its own reforms at all levels. …”
    Get full text
    Journal Article
  12. 19832

    Smart contract applications for web devices by Lim, Xing Zhi

    Published 2022
    “…It deploys and maintains Smart Contracts while enforcing contract terms between different parties. It leverages standard Web technologies like ReactJS for Single Page Applications, ExpressJS for RESTful API interactions, Firebase for data storage, making it a standard web application that is familiar to SMEs and accessible through a modern web browser.…”
    Get full text
    Final Year Project (FYP)
  13. 19833

    Situating language in the home and school through the lens of Singapore's Chinese-educated graduates by Lee, Isabel Ying Yi

    Published 2023
    “…Singapore’s ruling party prioritized the fostering of civic unity amongst ethnic groups upon her independence in 1965, with the closure of all vernacular schools by 1987 being arguably the most hard-hitting measure as part of nation-building efforts. …”
    Get full text
    Final Year Project (FYP)
  14. 19834

    Local differential privacy and its applications: a comprehensive survey by Yang, Mengmeng, Guo, Taolin, Zhu, Tianqing, Tjuawinata, Ivan, Zhao, Jun, Lam, Kwok-Yan

    Published 2024
    “…It eliminates the need for a trusted third party by allowing users to perturb their data locally, thus providing better privacy protection. …”
    Get full text
    Journal Article
  15. 19835

    Grammaire lolo: dialecte de xide by Coyaud, Maurice

    Published 2024
    “…Je résume librement ici l'article de Chen Shi-lin, paru dans Zhongguo-yuwen, 1963, n° 4, p. 334 sq. …”
    Get full text
    Journal Article
  16. 19836

    CRISPR-Cas spacer acquisition is a rare event in human gut microbiome by Zhang, An-Ni, Gaston, Jeffry M., Cárdenas, Pablo, Zhao, Shijie, Gu, Xiaoqiong, Alm, Eric J.

    Published 2025
    “…Host-parasite relationships drive the evolution of both parties. In microbe-phage dynamics, CRISPR functions as an adaptive defense mechanism, updating immunity via spacer acquisition. …”
    Get full text
    Journal Article
  17. 19837

    Privacy issues and management in the National Library Board (Singapore) by Wang, Damien Khang Cheh

    Published 2008
    “…While privacy was largely a peripheral concern for many in Singapore, a vocal minority had voiced concerns about privacy-related issues such as unauthorised usage of membership accounts and cards.The literature review surfaced various threats to patron privacy such as poor location of Internet terminals and third-party usage tracking, and established that privacy concerns do affect online transactions. …”
    Get full text
    Thesis
  18. 19838

    A progression of the employee-organization concept : an exploratory study on the employee-employee relationships at workplace by Goh, Eileen Shi Hui, Cai, Liting, Lee, Shawn Shiyang

    Published 2010
    “…In this paper, we seek to identify specifically, the parties to the EERs, their expectations and their reactions to unmet expectations through a qualitative approach. …”
    Get full text
    Final Year Project (FYP)
  19. 19839

    Collaborative, agent-based mobile commerce system: design and application by Wei, Qiang.

    Published 2008
    “…The proposed system model is tried out in the design of a mobile travel service. …”
    Get full text
    Thesis
  20. 19840

    Hidden folk. by Thong, Kaywee., Tan, Sihan., Ye, Xinmin., Arriola, Ashley Christopher John.

    Published 2013
    “…Set in the context of Singapore which in recent years have been rife with scandals, the film hopes to uncover the hidden stories of the parties involved and present a new perspective of these life-changing events. …”
    Get full text
    Final Year Project (FYP)