Showing 821 - 840 results of 1,221 for search '"Attacker"', query time: 0.05s Refine Results
  1. 821
    by Mohd Aminnur Hakim Sabtu
    Published 2017
    ..., midfielder, right and left winger, attacking midfielder and striker. There are 32 football characteristic...
    Get full text
    Thesis
  2. 822
    by Yusoff, Maryam Jamielah
    Published 2015
    ... to development of T2D through modification of immune response products dosage that exert attacks on host cell...
    Get full text
    Thesis
  3. 823
    by Miskon, Muhammad Izuan
    Published 2020
    ... speed, v in the range of 20 m s -1 to 40 m s -1 and the angle of attack, a in the range of 0° to 20...
    Get full text
    Thesis
  4. 824
    by Thabit, Reema Ahmed Abdalla
    Published 2022
    ... text steganography to protect against visual and statistical attack issues....
    Get full text
    Thesis
  5. 825
    by Safaei, Mahmood
    Published 2019
    ... factors such as noise, weak received signal strength or intrusion attacks. The process of detecting highly...
    Get full text
    Thesis
  6. 826
    ... that the proposed scheme has the ability to detect the location of tampering accurately for attacks of insertion...
    Get full text
    Thesis
  7. 827
    by Lai, Hoong Chuin
    Published 2018
    ... at various angles of attack ranging from 0°to 45°with intervals of 5°, with both flow Reynolds numbers...
    Get full text
    Thesis
  8. 828
    by Ahmad, Fatimah Shafinaz
    Published 2021
    ... to the possibility of being attacked or harmed, either physically or emotionally. Environmental vulnerability as a...
    Get full text
    Thesis
  9. 829
    by Mohd Yusof, Nor Azeala
    Published 2021
    ... to be vulnerable to any type of attack. Many algorithms such as AES, LED, KTANTAN, KATAN, L-Block, SIMON, SPECK...
    Get full text
    Thesis
  10. 830
    by Gana, Modu Lawan
    Published 2019
    ... both in terms of attack frequencies and fatalities rate in communities. This study therefore...
    Get full text
    Thesis
  11. 831
    by Abubakar, Saidu Isah
    Published 2018
    ..., k, ks, and zs. Furthermore, this research work develops four successful cryptanalysis attacks...
    Get full text
    Thesis
  12. 832
    by Hoe, Pik Kheng
    Published 2010
    ... plantations on peat as it attacks the living tissues of the plants. Biological control using Metarhizium...
    Get full text
    Thesis
  13. 833
    by Hoe, Pik Kheng
    Published 2010
    ... plantations on peat as it attacks the living tissues of the plants. Biological control using Metarhizium...
    Get full text
    Thesis
  14. 834
    by Wong, Woon Keong
    Published 2020
    ...-storey feature with open space ground floor. Such building type is highly vulnerable to seismic attack...
    Get full text
    Thesis
  15. 835
    by Rafieizonooz, Mahdi
    Published 2017
    ... exhibited good influence in terms of resistance to chemical attacks than the control specimen. On the other...
    Get full text
    Thesis
  16. 836
    by Idris, Amidora
    Published 2012
    ... better 3D visualization during seizure attacks. Finally, two major applications of the technique...
    Thesis
  17. 837
    by Brohi, Sarfraz Nawaz
    Published 2015
    ... and integrity concerns. Malicious attackers have violated the cloud storages to steal, view, manipulate...
    Get full text
    Thesis
  18. 838
    by Yusof, Yusnita
    Published 2006
    ... (MDI) technique and information about the identification and control of asthma attacks...
    Get full text
    Thesis
  19. 839
    by Farsidilla Basuki, Febbie
    Published 2015
    .... Recent increase in terrorist attacks gave governments the momentum to use „war on terror‟ validations...
    Get full text
    Thesis
  20. 840
    by Tey, Sheik Kyin
    Published 2018
    ... of currency crisis and supports the first-generation model of speculative attacks; (5) the responses...
    Get full text
    Thesis