-
21by Mohd Zaki, Mohammad Hafizudden“... pitting attack. One way of protecting the aluminium is through coating with less reactive metal...”
Published 2018
Get full text
Thesis -
22by Dul Ngajis, Ele Elyiana“... hurricane that had attack some U.S. country make the researcher come out with the title of disaster recovery...”
Published 2007
Get full text
Thesis -
23by Aziz, Syaidahtul Badriyah“... are motivated by their different background and need. Physical attack, such as node cloning gives...”
Published 2015
Get full text
Thesis -
24by Atefi, Kayvan“..., therefore the results may no longer be applicable and are not reliable within the current attacks. Further...”
Published 2019
Get full text
Thesis -
25by Yahya, Nor Hayati“... and is the result of a destructive attack by chemical or electrochemical reactions with its environment...”
Published 2002
Get full text
Thesis -
26by Mohamed Suffian, Mohd. Harridon“..., intrusion by means of SYN attack, intrusion by means of 'URG Flag' packets, and intrusion via web Contents...”
Published 2003
Get full text
Thesis -
27by Hambali, Raden Siti Amirah“... acid conversion from epoxidized oleic acid was unsuccessful due to self-attack during the carbonation...”
Published 2022
Get full text
Thesis -
28by Badiruddeen, Nik Ahmad Khalil“... at the same conditions with actual flying BWB size at various angles of attack. Lift coefficient (CL), drag...”
Published 2010
Get full text
Thesis -
29by Mohamad Taher, Ediwarman“... attack to Shapadu Corporation's ICT infrastructure....”
Published 2013
Get full text
Thesis -
30by Mohammad, Nur Jumaatul Hidayati“..., the expected results are the user will able to control the attack of insects at the same time able to control...”
Published 2020
Get full text
Thesis -
31by Zainuddin, Suraya“... total communication failure. In addition, traffic fragmentation is used in numerous network attacks...”
Published 2015
Get full text
Thesis -
32Performance analysis of video call SIP and SIP-TLS in different LAN environments / Zulkarnain Zainalby Zainal, Zulkarnain“..., is vulnerable to known Internet attacks, while at the same time it introduces new security problems in the VoIP...”
Published 2007
Get full text
Thesis -
33Greenhouse smart insect repeller with security system project report / Mohd Safwan Aiman Mohd Sallehby Mohd Salleh, Mohd Safwan Aiman“.... Throughout this research, the expected results are the user will able to control the attack of insects...”
Published 2019
Get full text
Thesis -
34by Mat Ariffin, Nur Adrianna“... attacked by diseases were characterized by a low reflectance probably due to the low chlorophyll content...”
Published 2020
Get full text
Thesis -
35“... of techniques for this piece is attacking the string with thumb pull and muting the string with right or left...”
Get full text
Thesis -
36by Zulkifli, Normah Erra“...'s economy had been attacked by the sudden crises, where it literally distracts the banking characteristics...”
Published 2022
Get full text
Thesis -
37by Nasruddin, Haziqah“... instead of vertigo attack; however, exploration on this area rarely been done. This study aimed...”
Published 2023
Get full text
Thesis -
38by Suboh, Siti Fatimah“... tested human pathogens is by attacking the cell wall and membrane of bacterial and fungal cells...”
Published 2023
Get full text
Thesis -
39by Nik Omar, Nik Azmi“... of MyKad. This thesis therefore proposed a new MyKad Testing Strategy model for logical attacks...”
Published 2006
Get full text
Thesis -
40by Saiful Annur, Muhamad Safiq“...= -5.394,/? < 0.05), attackers (Z= -3,280, p < 0.05) and also the midfielders (Z= -3.823,p< 0.05...”
Published 2013
Get full text
Thesis