Showing 1,921 - 1,940 results of 33,363 for search 'AT*', query time: 0.10s Refine Results
  1. 1921
    by Hamidi, Nurfatini Atiqah
    Published 2021
    ... with more attributes like favorite food, colour and others....
    Get full text
    Thesis
  2. 1922
  3. 1923
  4. 1924
    by Abdullah, Nadiah Atikah
    Published 2011
    ... which support the decision on organizational change that attempt to align their business process...
    Get full text
    Thesis
  5. 1925
  6. 1926
  7. 1927
    by Zaharin, Nur Emira Zara
    Published 2018
    ... to find the factors that attract students in UiTM Shah Alam to buy at KOSISWA. The objectives...
    Get full text
    Thesis
  8. 1928
  9. 1929
    by Rohawi, Nur Syakila
    Published 2021
    ... properties, this study went on to investigate the anti-atherosclerotic and atheroprotective potentials of LAB...
    Get full text
    Thesis
  10. 1930
  11. 1931
    by Mat Nazir, Nurul Nazyddah
    Published 2017
    ... attributes using the Multiple Regression Hedonic Pricing Model (HPM). This study employed a mixed-mode...
    Get full text
    Thesis
  12. 1932
  13. 1933
    by Mohd Salleh, Mohd Nizam
    Published 2009
    ...This project paper deals with the concept of ATM technology and its implementation for the present...
    Get full text
    Thesis
  14. 1934
  15. 1935
    by Alui, Muhammad Rezza
    Published 2012
    ...Rain attenuation has long been recognized as the main source of atmospheric attenuation...
    Get full text
    Thesis
  16. 1936
    by Md Ismail, Norsyazlina
    Published 2016
    ... is conducted to identify the User Attitude in Disseminating Halal Information. The data collection method...
    Get full text
    Thesis
  17. 1937
  18. 1938
  19. 1939
    by Hussein, Safwan Mawlood
    Published 2012
    ...The vast amount of attacks over the Internet makes the computer users and many organizations under...
    Get full text
    Thesis
  20. 1940
    by Mohamad Alias, Mohd Azuan
    Published 2012
    ...Port knocking is technique first introduce in the Black Hat to prevent attackers from discovering...
    Get full text
    Thesis