-
101by Partowazar, Baharak“... these factors, other external factors such as September 11 attacks, labeling Iran as “axis of evil” by George...”
Published 2016
Get full text
Thesis -
102by Abu Bakar, Hafizal“... ratio at angle of attack range from 0° - 12° the recorded value is smaller than the published data due...”
Published 2011
Get full text
Thesis -
103by Ayad, Mustafa Abdsalam“... to authenticate a client, depending on the smart card usage. The major attacks that affect the smart card...”
Published 2002
Get full text
Thesis -
104by Salih, Moslih Amer“... by exposing the mortar to extreme environments, namely elevated temperatures and sulfate attack...”
Published 2015
Get full text
Thesis -
105by Sulong, Mek Rahmah“...) test for any Subkeys. These contribute to some attacks in the Key Schedule. Thus, a new transformation...”
Published 2008
Get full text
Thesis -
106by Lim, Jefferey Seng Heng“... to attacks by few diseases such as anthracnose and Chili Mozaic Virus (CMV). Anthracnose is being considered...”
Published 2013
Get full text
Thesis -
107by Marjani, Mohammad Ebrahim“... (karate player) to avoid the opponent’s attacks, and to assume optimal position for efficient performance...”
Published 2013
Get full text
Thesis -
108by Morufu, Olalere“... lost mobile device of an employee, by shoulder surfing password attacks and password guessing attacks...”
Published 2016
Get full text
Thesis -
109by Olufemi, Osaji Emmanuel“... protection scheme design. The high-cost of implementations, cyber-attack, and latency concerns from...”
Published 2020
Get full text
Thesis -
110by Ahmad, Mohd Najib“... attack of 10%-50% leaf damage may cause 43% yield loss. The population of bagworms if not controlled...”
Published 2020
Get full text
Thesis -
111by Rashid, Mustafa Noori“... to attackers and the cloud provider. By applying the proxy signature technique, the group leader can...”
Published 2018
Get full text
Thesis -
112by Wong, Sin Yeng“... mPa.s) and were susceptible to biological attack after two days at ambient. The incorporation...”
Published 2001
Get full text
Thesis -
113by Osman, Noorzaliza“... divided into playing position (defence, attack and centre) and team performance (high and low). A body fat...”
Published 2008
Get full text
Thesis -
114by Abu, Ahmad Zaidee“... of Distorted DC permutation (DDP), it was considered to be having medium security based on some basic attack...”
Published 2008
Get full text
Thesis -
115by Mohammad Salehi, .“.... Consequently, Android is the main target of attackers on mobile and portable devices. In order to protect users...”
Published 2019
Get full text
Thesis -
116by Mahad, Zahari“... features available on AAβ cryptosystem to avoid being attacked by enemies. Finally, we amend the Rabin...”
Published 2014
Get full text
Thesis -
117by M. Balakrishnan, M. B. Usha“... of this utopianism. Dostoevsky's characterization is perhaps an attack on the degeneration of man and the values...”
Published 2002
Get full text
Thesis -
118by Abdulraheem, Waleed Khalid Amin“... side channel attack (SCA). The first objective of this thesis is to introduce a new scalar recoding...”
Published 2019
Get full text
Thesis -
119by Mohd Pilus, Mohd Nordin“...In recent years there is an increasing incidence of bomb attacks on civil engineering structures...”
Published 2007
Get full text
Thesis -
120by Loo, Rebecca Ting Jiin“... into the real data such as kidney catheter data, Worcester Heart Attack study and also Stanford Heart...”
Published 2016
Get full text
Thesis