-
1by Abdullah, Aishah“...A change in house price is a situation that is very dynamic and unpredictable. The study found...”
Published 2017
Get full text
Thesis -
2by Asadollahi, Hassan“... positive effect. For IVR method, only two transmission ranges could increase the network lifetime...”
Published 2014
Get full text
Thesis -
3by Kordi, Elahe Fazeldeh“... and popular routing algorithms. AODV is severely affected by well-known black hole attack in which a malicious...”
Published 2014
Get full text
Thesis -
4by Araghi, Tanya Koohpayeh“... because of their unique nature in which every node can easily join to network or leave it. Black hole...”
Published 2013
Get full text
Thesis -
5
-
6by Abd. Rahim, Mohd. Hafiz“... kiddies could gain or steal web application user’s sensitive data such as credit card number, user ID...”
Published 2013
Get full text
Thesis -
7by Farhan Kamaruzaman, Anis“... the important of these processes to improve the machining performance that would lead to an increase...”
Published 2014
Thesis -
8by A. Suliman, Hager“... performance could be greatly improved with the Bio-Inspired classifier. The framework of the writer...”
Published 2014
Get full text
Thesis -
9by Kamaruzaman, Anis Farhan“... the important of these processes to improve the machining performance that would lead to an increase...”
Published 2014
Get full text
Thesis -
10by Farahpoor, Mohammadali“... on both of approaches we could analyze and compare current hybrid approach and proposed hybrid approach...”
Published 2014
Thesis -
11by Zainal, Haliza“... could assist the Information Technology managers, system owners and the library management...”
Published 2014
Get full text
Thesis -
12by Nor Hidayah Mohd Jawawi“... or networks. These activities could be due to various vulnerabilities and threats either intentionally...”
Published 2012
Get full text
Thesis -
13by Ahmed Saifeldeen, Ola Maali Moustafa“... network service that could reduce packet loss rate and delay, especially for high priority classes of data...”
Published 2014
Get full text
Thesis -
14by Karimi, Ramin“... with predict greedy forwarding which could handle a recovery strategy for local maximum environment. In PGRP...”
Published 2013
Get full text
Thesis -
15by Omar, Siti Faizah“... for the RBTC analysis. The research has shown that a software manager could use the prototype to quantify...”
Published 2013
Get full text
Thesis -
16by Mohammed Ba Muqabel, Mohammed Salem“... should be ready installed and resistance to various numbers of potential attacks. In Information Security...”
Published 2013
Get full text
Thesis -
17by Haidar, Gayah Gulam“... success in Malaysia, investigating the use of indicators within the factors that could facilitate...”
Published 2014
Get full text
Thesis -
18by Ahmed, Abubakar Elsafi Ali“...Many issues and challenges could be identified when considering integration testing of Component...”
Published 2017
Get full text
Thesis -
19by Ali Bagaber, Abdullah Ahmed“.... After applying the BPR stages on the Alsultan Company, several processes were identified that could...”
Published 2014
Get full text
Thesis -
20by Heydari, Atefeh“... to reshape their business and opinion mining techniques to reach accurate results. Spam Review could...”
Published 2014
Thesis