Showing 1 - 20 results of 120 for search 'Houla~', query time: 2.25s Refine Results
  1. 1
    by Abdullah, Aishah
    Published 2017
    ...A change in house price is a situation that is very dynamic and unpredictable. The study found...
    Get full text
    Thesis
  2. 2
    by Asadollahi, Hassan
    Published 2014
    ... positive effect. For IVR method, only two transmission ranges could increase the network lifetime...
    Get full text
    Thesis
  3. 3
    by Kordi, Elahe Fazeldeh
    Published 2014
    ... and popular routing algorithms. AODV is severely affected by well-known black hole attack in which a malicious...
    Get full text
    Thesis
  4. 4
    by Araghi, Tanya Koohpayeh
    Published 2013
    ... because of their unique nature in which every node can easily join to network or leave it. Black hole...
    Get full text
    Thesis
  5. 5
  6. 6
    by Abd. Rahim, Mohd. Hafiz
    Published 2013
    ... kiddies could gain or steal web application user’s sensitive data such as credit card number, user ID...
    Get full text
    Thesis
  7. 7
    by Farhan Kamaruzaman, Anis
    Published 2014
    ... the important of these processes to improve the machining performance that would lead to an increase...
    Thesis
  8. 8
    by A. Suliman, Hager
    Published 2014
    ... performance could be greatly improved with the Bio-Inspired classifier. The framework of the writer...
    Get full text
    Thesis
  9. 9
    by Kamaruzaman, Anis Farhan
    Published 2014
    ... the important of these processes to improve the machining performance that would lead to an increase...
    Get full text
    Thesis
  10. 10
    by Farahpoor, Mohammadali
    Published 2014
    ... on both of approaches we could analyze and compare current hybrid approach and proposed hybrid approach...
    Thesis
  11. 11
    by Zainal, Haliza
    Published 2014
    ... could assist the Information Technology managers, system owners and the library management...
    Get full text
    Thesis
  12. 12
    by Nor Hidayah Mohd Jawawi
    Published 2012
    ... or networks. These activities could be due to various vulnerabilities and threats either intentionally...
    Get full text
    Thesis
  13. 13
    ... network service that could reduce packet loss rate and delay, especially for high priority classes of data...
    Get full text
    Thesis
  14. 14
    by Karimi, Ramin
    Published 2013
    ... with predict greedy forwarding which could handle a recovery strategy for local maximum environment. In PGRP...
    Get full text
    Thesis
  15. 15
    by Omar, Siti Faizah
    Published 2013
    ... for the RBTC analysis. The research has shown that a software manager could use the prototype to quantify...
    Get full text
    Thesis
  16. 16
    ... should be ready installed and resistance to various numbers of potential attacks. In Information Security...
    Get full text
    Thesis
  17. 17
    by Haidar, Gayah Gulam
    Published 2014
    ... success in Malaysia, investigating the use of indicators within the factors that could facilitate...
    Get full text
    Thesis
  18. 18
    by Ahmed, Abubakar Elsafi Ali
    Published 2017
    ...Many issues and challenges could be identified when considering integration testing of Component...
    Get full text
    Thesis
  19. 19
    by Ali Bagaber, Abdullah Ahmed
    Published 2014
    .... After applying the BPR stages on the Alsultan Company, several processes were identified that could...
    Get full text
    Thesis
  20. 20
    by Heydari, Atefeh
    Published 2014
    ... to reshape their business and opinion mining techniques to reach accurate results. Spam Review could...
    Thesis