Showing 1 - 20 results of 676 for search 'AT*', query time: 0.12s Refine Results
  1. 1
    by Ismail, Najiahtul Syafiqah
    Published 2022
    ... attack. Therefore, this research aimed to improve permission-based detection by integrating permission...
    Get full text
    Get full text
    Thesis
  2. 2
    by Esa, Siti Rahmah
    Published 2022
    ... this thesis, themicrostructural evolutions of spherical and flake types pressureless sintered Ag die attached...
    Get full text
    Get full text
    Thesis
  3. 3
    by Yeo, Kian Hong
    Published 2016
    ... is to eliminate defects related to the die attach process. Epoxy glue void formation at the chip/substrate...
    Get full text
    Get full text
    Thesis
  4. 4
    by Badr Aldeen, Badr Abdallah
    Published 2016
    ... measure and manage the attendance of staff. Sure, most organizations have been tracking time worked...
    Get full text
    Get full text
    Thesis
  5. 5
    by Abdollah, Mohd Faizal
    Published 2009
    ... transaction. They have also become the main mean to attack host. The popularity of intrusion tools and script...
    Get full text
    Get full text
    Thesis
  6. 6
    by Mohd Hatta, Nuraziera
    Published 2014
    ... used to attract students’ attention for learning the contents. This courseware is specifically...
    Get full text
    Get full text
    Thesis
  7. 7
    by Haron, Haliza
    Published 2015
    ... to the attackers. This study will focus on jamming attack and the case study has been done at Kolej Komuniti Masjid...
    Get full text
    Get full text
    Thesis
  8. 8
    by Mohd Nasir., Haslinah
    Published 2019
    ...Statistics by Malaysian Institute of Road Safety Research (MIROS) showed that attention loss...
    Get full text
    Get full text
    Thesis
  9. 9
    by Mohd Amin, Mohd Norafif
    Published 2018
    ... of shoot on the iron and pointing soft lob standing among petanque athletes.This study uses case study...
    Get full text
    Get full text
    Thesis
  10. 10
    by Mohd Salleh, Nurhashikin
    Published 2018
    ... to the formation of cyber communities which attracts violent extremism group. Recently, the violent extremism group...
    Get full text
    Get full text
    Thesis
  11. 11
    by Saw, Yee Ching
    Published 2018
    ...Existing laboratory analysis techniques of ATS drug identification have their challenges which...
    Get full text
    Get full text
    Thesis
  12. 12
    by Mohamad Salleh, Mohamad Fazli
    Published 2016
    ... and improve the optical power attenuation. This thesis also present the investigation and analysis...
    Get full text
    Get full text
    Thesis
  13. 13
    by Abd Rahman, Rozeana
    Published 2017
    ... at lid attachment process for semiconductor devices. Lid attachment is the end of line process...
    Get full text
    Get full text
    Thesis
  14. 14
    by Ali, Farith Aqmal
    Published 2020
    ...Generating plasma at atmospheric pressure will have a significant impact on its application since...
    Get full text
    Get full text
    Thesis
  15. 15
    by Abu, Md Sahrom
    Published 2021
    ...) in their security posture in attributing cyberattack effectively. However, the massive amount of data from threat...
    Get full text
    Get full text
    Thesis
  16. 16
    by Zaid, Zulhilmi
    Published 2021
    ... of attention. Lost of attention, also known as habituation, is highly undesirable while performing tasks which...
    Get full text
    Get full text
    Thesis
  17. 17
    by W Azlan, Wan Amirah
    Published 2017
    ...) repetitive TMS (rTMS). All sessions were conducted in attended (attention) and unattended (no attention...
    Get full text
    Get full text
    Thesis
  18. 18
    by Mohd Foozy, Cik Feresa
    Published 2017
    ... to send persuasive messages that will attract unwary recipients. In Malaysia, most sectors...
    Get full text
    Get full text
    Thesis
  19. 19
    by Said, Mazidah
    Published 2015
    ... determined the relationship between perceived attributes of innovation elements and level of ICT adoption...
    Get full text
    Get full text
    Thesis
  20. 20
    by Salih Ali, Nabeel
    Published 2015
    ... applications are affected by the attacks of SQL injection. SQL injection is a prevalent technique...
    Get full text
    Get full text
    Thesis