Showing 2,201 - 2,220 results of 33,363 for search 'AT*', query time: 0.10s Refine Results
  1. 2201
    by Zawawi, Norshahira
    Published 2018
    ... they are many ways to repay it. Also, the attitude of the borrower is an important factor whether the borrower...
    Get full text
    Thesis
  2. 2202
    by Wan Adzli, Wan Nadia Syaira
    Published 2021
    ...In identifying and analysing of board attributes on corporate social responsibilities (CSR), many...
    Get full text
    Thesis
  3. 2203
    by Baharudin, Muhammad Saufi
    Published 2009
    .... By using massive attack of zombie, the attackers launch a distribution denial of services (ddos) against...
    Get full text
    Thesis
  4. 2204
  5. 2205
    by Roslan, Fairuzan
    Published 2004
    ... of the greatest problems the security community faces is lack of information on the attacker. This is one...
    Get full text
    Thesis
  6. 2206
  7. 2207
    by Ali, Syahid
    Published 2014
    ...Taking and processing student attendance is essential to the academic process which is under...
    Get full text
    Thesis
  8. 2208
    by Aksah, Sauza
    Published 2016
    ...Effective design of atmospheric cues and the effect of these atmospheric cues on consumer...
    Get full text
    Thesis
  9. 2209
  10. 2210
    by Mohamed Kassim, Nur Atikah
    Published 2019
    ...Coaches have the responsibility in guiding the athletes to be successful in their sports...
    Get full text
    Thesis
  11. 2211
  12. 2212
    by Abdul Halim, Nurul Atika Akma
    Published 2016
    ... that catch the attention of Down syndrome students in learning numbers. This project also determines...
    Get full text
    Thesis
  13. 2213
    by Nordin, Nurdiana Ezani
    Published 2015
    ...Nowadays, in managing and recording the student attendance data are still less effective...
    Get full text
    Thesis
  14. 2214
  15. 2215
    by Mohd Faris, Nurshazana Athirah
    Published 2022
    ... important object classes and augmenting them with attributes. It focuses on converting data from an existing...
    Get full text
    Thesis
  16. 2216
  17. 2217
    by Che Mohd Din, Nor Atiqah
    Published 2009
    ... in terms of the return and insertion losses as well as stopband attenuation. An S-structure...
    Get full text
    Thesis
  18. 2218
    by Abd Mutalib, Norehan
    Published 2006
    ...This project presents the application of an ATM network. ATM techniques are applied in integrating...
    Get full text
    Thesis
  19. 2219
    by Rizman, Zairi Ismael
    Published 2002
    ...Attenuation of microwave propagation in the estate of palm oil trees was investigated at microwave...
    Get full text
    Thesis
  20. 2220
    ... password. Man-in-the-Middle (MITM) attack is one of the attacks that can gain unauthorized access without...
    Get full text
    Thesis