-
19821
Augmented reality hologram
Published 2020“…Through the enhancements made to the user interface, the newly designed application ultimately aims to reduce the barriers to entry of creating AR objects such that the AR technology is within the reach of the wider public. …”
Get full text
Final Year Project (FYP) -
19822
Blockchain for mobile applications
Published 2020“…Blockchain is a decentralized and public ledger system where people store data of transactions without any centralized party having control. It is a technology that enables data security, transparency, and trust. …”
Get full text
Final Year Project (FYP) -
19823
Searchable symmetric encryption
Published 2020“…The paper aims to study the various Searchable Symmetric Encryption (SSE) schemes available [1,2,3,4,5] to understand the feasibility and efficiency of the schemes in helping to keep our data secure, when a huge amount of data is stored in a third-party cloud server. Each scheme tends to have a different profile of security leakage and efficiency, which can be attributed to the way the scheme is constructed. …”
Get full text
Final Year Project (FYP) -
19824
SSL-TLS security flaws : HEARTBLEED and 3SHAKE attacks
Published 2020“…It is a means to protect web applications against malicious third parties that may try to eavesdrop, tamper, or even interrupt the network connections between client and server. …”
Get full text
Final Year Project (FYP) -
19825
Lightweight secure-boot architecture for RISC-V System-on-Chip
Published 2020“…Adding to the challenge, third party service providers need regular access to the system. …”
Get full text
Conference Paper -
19826
Shielding internet intermediaries from copyright liability - a comparative discourse on safe harbours in Singapore and India
Published 2021“…In light of this, safe harbours that provide certain classes of intermediaries with conditional immunity play an important role in maintaining a healthy balance between the interests of right holders and third parties. In the copyright context, the Digital Millennium Copyright Act 1998 (DMCA) enacted in the United States was the first instance where such a safe harbour was afforded to internet intermediaries. …”
Get full text
Journal Article -
19827
Voices of sovereignty : self-translation in post-colonialism literature
Published 2021“…This active involvement bestows writers and translators an exclusive role once unimaginable where the authorities of the two parties are now reaching an equilibrium. Translators are finally allowed exert their sovereignty in translation with creativity and autonomy. …”
Get full text
Thesis-Master by Coursework -
19828
Simulation-based risk assessment of sUAV-car collision
Published 2021“…Finally, a risk assessment was conducted on sUAVs and ground vehicles, the Equivalent level of safety and third-party risks were determined and proposed the concept of establishing corresponding drone electronic fences in urban areas.…”
Get full text
Thesis-Master by Coursework -
19829
The politics of pandemics in China since late imperial times : from religious practice to the emergency disciplinary state
Published 2022“…In Mao’s China after 1949, diseases were radically politicized to justify the Party’s political legitimacy. Public health initiatives and interventionist policies designed to control pandemics brought about broader social restructuring and significantly contributed to the rise of an emergency disciplinary state through the integration of both health and political governance. …”
Get full text
Get full text
Journal Article -
19830
Assessing safe spaces for digital scholarship in the library
Published 2021“…The attempts of both parties to construct a safe space for digital scholarship in the library can clash based on these divergent perspectives. …”
Get full text
Journal Article -
19831
Ongoing organizational reforms of the People’s Liberation Army Air Force
Published 2021“…Since the Chinese Communist Party’s (CCP) Central Military Commission launched a major reorganization of the entire People’s Liberation Army (PLA) in early 2016, the PLA Air Force (PLAAF) has followed up with its own reforms at all levels. …”
Get full text
Journal Article -
19832
Smart contract applications for web devices
Published 2022“…It deploys and maintains Smart Contracts while enforcing contract terms between different parties. It leverages standard Web technologies like ReactJS for Single Page Applications, ExpressJS for RESTful API interactions, Firebase for data storage, making it a standard web application that is familiar to SMEs and accessible through a modern web browser.…”
Get full text
Final Year Project (FYP) -
19833
Situating language in the home and school through the lens of Singapore's Chinese-educated graduates
Published 2023“…Singapore’s ruling party prioritized the fostering of civic unity amongst ethnic groups upon her independence in 1965, with the closure of all vernacular schools by 1987 being arguably the most hard-hitting measure as part of nation-building efforts. …”
Get full text
Final Year Project (FYP) -
19834
Local differential privacy and its applications: a comprehensive survey
Published 2024“…It eliminates the need for a trusted third party by allowing users to perturb their data locally, thus providing better privacy protection. …”
Get full text
Journal Article -
19835
Grammaire lolo: dialecte de xide
Published 2024“…Je résume librement ici l'article de Chen Shi-lin, paru dans Zhongguo-yuwen, 1963, n° 4, p. 334 sq. …”
Get full text
Journal Article -
19836
CRISPR-Cas spacer acquisition is a rare event in human gut microbiome
Published 2025“…Host-parasite relationships drive the evolution of both parties. In microbe-phage dynamics, CRISPR functions as an adaptive defense mechanism, updating immunity via spacer acquisition. …”
Get full text
Journal Article -
19837
Privacy issues and management in the National Library Board (Singapore)
Published 2008“…While privacy was largely a peripheral concern for many in Singapore, a vocal minority had voiced concerns about privacy-related issues such as unauthorised usage of membership accounts and cards.The literature review surfaced various threats to patron privacy such as poor location of Internet terminals and third-party usage tracking, and established that privacy concerns do affect online transactions. …”
Get full text
Thesis -
19838
A progression of the employee-organization concept : an exploratory study on the employee-employee relationships at workplace
Published 2010“…In this paper, we seek to identify specifically, the parties to the EERs, their expectations and their reactions to unmet expectations through a qualitative approach. …”
Get full text
Final Year Project (FYP) -
19839
Collaborative, agent-based mobile commerce system: design and application
Published 2008“…The proposed system model is tried out in the design of a mobile travel service. …”
Get full text
Thesis -
19840
Hidden folk.
Published 2013“…Set in the context of Singapore which in recent years have been rife with scandals, the film hopes to uncover the hidden stories of the parties involved and present a new perspective of these life-changing events. …”
Get full text
Final Year Project (FYP)