-
1by Ismail, Najiahtul Syafiqah“... attack. Therefore, this research aimed to improve permission-based detection by integrating permission...”
Published 2022
Get full text
Get full text
Thesis -
2by Esa, Siti Rahmah“... this thesis, themicrostructural evolutions of spherical and flake types pressureless sintered Ag die attached...”
Published 2022
Get full text
Get full text
Thesis -
3by Yeo, Kian Hong“... is to eliminate defects related to the die attach process. Epoxy glue void formation at the chip/substrate...”
Published 2016
Get full text
Get full text
Thesis -
4by Badr Aldeen, Badr Abdallah“... measure and manage the attendance of staff. Sure, most organizations have been tracking time worked...”
Published 2016
Get full text
Get full text
Thesis -
5by Abdollah, Mohd Faizal“... transaction. They have also become the main mean to attack host. The popularity of intrusion tools and script...”
Published 2009
Get full text
Get full text
Thesis -
6by Mohd Hatta, Nuraziera“... used to attract students’ attention for learning the contents. This courseware is specifically...”
Published 2014
Get full text
Get full text
Thesis -
7by Haron, Haliza“... to the attackers. This study will focus on jamming attack and the case study has been done at Kolej Komuniti Masjid...”
Published 2015
Get full text
Get full text
Thesis -
8by Mohd Nasir., Haslinah“...Statistics by Malaysian Institute of Road Safety Research (MIROS) showed that attention loss...”
Published 2019
Get full text
Get full text
Thesis -
9by Mohd Amin, Mohd Norafif“... of shoot on the iron and pointing soft lob standing among petanque athletes.This study uses case study...”
Published 2018
Get full text
Get full text
Thesis -
10by Mohd Salleh, Nurhashikin“... to the formation of cyber communities which attracts violent extremism group. Recently, the violent extremism group...”
Published 2018
Get full text
Get full text
Thesis -
11by Saw, Yee Ching“...Existing laboratory analysis techniques of ATS drug identification have their challenges which...”
Published 2018
Get full text
Get full text
Thesis -
12by Mohamad Salleh, Mohamad Fazli“... and improve the optical power attenuation. This thesis also present the investigation and analysis...”
Published 2016
Get full text
Get full text
Thesis -
13by Abd Rahman, Rozeana“... at lid attachment process for semiconductor devices. Lid attachment is the end of line process...”
Published 2017
Get full text
Get full text
Thesis -
14by Ali, Farith Aqmal“...Generating plasma at atmospheric pressure will have a significant impact on its application since...”
Published 2020
Get full text
Get full text
Thesis -
15by Abu, Md Sahrom“...) in their security posture in attributing cyberattack effectively. However, the massive amount of data from threat...”
Published 2021
Get full text
Get full text
Thesis -
16by Zaid, Zulhilmi“... of attention. Lost of attention, also known as habituation, is highly undesirable while performing tasks which...”
Published 2021
Get full text
Get full text
Thesis -
17by W Azlan, Wan Amirah“...) repetitive TMS (rTMS). All sessions were conducted in attended (attention) and unattended (no attention...”
Published 2017
Get full text
Get full text
Thesis -
18by Mohd Foozy, Cik Feresa“... to send persuasive messages that will attract unwary recipients. In Malaysia, most sectors...”
Published 2017
Get full text
Get full text
Thesis -
19by Said, Mazidah“... determined the relationship between perceived attributes of innovation elements and level of ICT adoption...”
Published 2015
Get full text
Get full text
Thesis -
20by Salih Ali, Nabeel“... applications are affected by the attacks of SQL injection. SQL injection is a prevalent technique...”
Published 2015
Get full text
Get full text
Thesis