Showing 41 - 52 results of 52 for search '"Attacker"', query time: 0.03s Refine Results
  1. 41
    by Mohd Ali, Zurriati
    Published 2015
    .... The experimental works were performed on a scale model and tested in a low speed wind tunnel. Angles of attack, a...
    Get full text
    Thesis
  2. 42
    by Mohammed Azkhar, Nurul Haizi
    Published 2015
    ...'s profits, improve the user's experience, and defend against certain attacks. By Using SCRUM approach list...
    Get full text
    Thesis
  3. 43
    by Samsudin, Nur Zulaikha
    Published 2014
    ... the September 11 attack Cargo crime includes hijacking, warehouse theft, lost in transit and many more...
    Get full text
    Thesis
  4. 44
    by Mohd Aminnur Hakim Sabtu
    Published 2017
    ..., midfielder, right and left winger, attacking midfielder and striker. There are 32 football characteristic...
    Get full text
    Thesis
  5. 45
    by Mohd Yusof, Nor Azeala
    Published 2021
    ... to be vulnerable to any type of attack. Many algorithms such as AES, LED, KTANTAN, KATAN, L-Block, SIMON, SPECK...
    Get full text
    Thesis
  6. 46
    by Mokhtar, Hamizah
    Published 2018
    ... that has capability to resist chemical attack and high thermal stability. Silica can be extracted from...
    Get full text
    Thesis
  7. 47
  8. 48
    by Mustapha, Ghazirah
    Published 2018
    ... emphasised in Seni Silat Cekak Malaysia (SSCM). This is because the ability to fend off an attack with bare...
    Get full text
    Thesis
  9. 49
    by Shavarebi, Kamran
    Published 2016
    ... to access the durability performance of SSA concrete, resistance to carbonation, sulphate attack and gas...
    Get full text
    Thesis
  10. 50
  11. 51
    by Mohd Nasir, Rizal Effendy
    Published 2013
    ... envelope (OFE) within its allowed angle of attacks. It was found that the BWB airplane without SAS, despite...
    Get full text
    Thesis
  12. 52