-
1by Elias, Aswan“... of the selected Streamyx links used for analysis and planning. The government through the Communication...”
Published 2004
Get full text
Thesis -
2
-
3by Ibrahim, Ribwar Bakhtyar“... selection will provide higher throughput and reduction in delay from the end-to-end standpoint. Link quality...”
Published 2013
Get full text
Thesis -
4by Eslaminejad, Mohammadreza“... around the sink known as “sink neighborhood problem”. Recently, employing a dual-sink algorithm has...”
Published 2013
Get full text
Thesis -
5
-
6by Mohammed Ba Muqabel, Mohammed Salem“... the organization from achieving their business objectives. Reducing risk to an acceptable level is among the main...”
Published 2013
Get full text
Thesis -
7
-
8by Hakemi, Aida“...Risk is involved in all phases of the software life cycle, and due to these risks, software can...”
Published 2013
Get full text
Thesis -
9by Md. Zain, Zamhariah“.... In this study, the Security-based BYOD Risk Assessment Metamodel (Security-based BYODRAM), a high-level...”
Published 2018
Get full text
Thesis -
10
-
11by Safavi, Nazli Sadat“... in the context of small and medium size enterprise (SME). Ignorance of ERP implementation risks would seem...”
Published 2013
Get full text
Thesis -
12by Mat Noor, Noor Adibah Najihah“... such as cartoon rendering, watercolour painting, silhouette rendering, penand- ink illustration and so on. A plan...”
Published 2017
Get full text
Thesis -
13
-
14by Ali, Saqib“... challenge, encountered in deploying a WMN, is the interference present between the co-located links, which...”
Published 2013
Get full text
Thesis -
15by Mohammad Ali, Ashraf Alzubir“... to deploy the WMN is the interference problem between the links. The interference results in three problems...”
Published 2015
Get full text
Thesis -
16by Abdullah, Muhammad Irsyad“... amount of effort on synthesizing and integrating information from various sources to establish links...”
Published 2007
Get full text
Thesis -
17by Abdullah, Muhammad Irsyad“... amount of effort on synthesizing and integrating information from various sources to establish links...”
Published 2007
Get full text
Thesis -
18by Babaeizadeh, Mahnoush“... Identification Number(PINs). But it is not secure way for authenticating users because of its limitation, as well...”
Published 2014
Get full text
Thesis -
19by Nikmaram, Mehrnaz“.... In such networks, weak communication links and node mobility can lead to highly unpredictable and dynamically...”
Published 2014
Get full text
Thesis -
20by Samsudin, Sarimah“... as identification card for kids below 12 years old. MyKid Initialization System is a system that links two ‘firmware...”
Published 2006
Get full text
Thesis