Showing 321 - 340 results of 757 for search '((((hone OR phone) OR (pbbponeyy OR oney)) OR monkey) OR (hon OR soon))'s', query time: 0.18s Refine Results
  1. 321

    Open source security issues of the Android operating system by Hong, Hsiang Ted.

    Published 2011
    “…Smart phone is a very common electronic device today compared to ten years ago. …”
    Get full text
    Final Year Project (FYP)
  2. 322

    EFFECTIVE THREAT INVESTIGATION FOR SOC ANALYSTS : The ultimate guide to examining various threats and attacker techniques using security logs / by Yahia, Mostafa, author 656270

    Published 2023
    “…This book provides insights into the most common cyber threats and various attacker techniques to help you hone your incident investigation skills. The book begins by explaining phishing and email attack types and how to detect and investigate them, along with Microsoft log types such as Security, System, PowerShell, and their events. …”
    Get full text
    Get full text
    software, multimedia
  3. 323

    Portable mobile surveillance and detection by Tan, Weishen

    Published 2016
    “…With the increasing number of people using smart phone, old smart phone can be use as a surveillance camera. …”
    Get full text
    Final Year Project (FYP)
  4. 324

    Development of applications for mobile devices I by Panganiban, Nicole Dale

    Published 2016
    “…Although such service was already available online, as the technology continues to progress developers looked into the ease of use of portable digital devices such as mobile phones. Smart phones became a necessity to most people. …”
    Get full text
    Final Year Project (FYP)
  5. 325
  6. 326

    Strain differences in Blastocystis isolates as detected by a single set of polymerase chain reaction primers by Init, I., Mak, J.W., Lokman Hakim, S., Yong, H.S.

    Published 1999
    “…One isolate (M12) obtained from a monkey showed patterns similar to those of human isolates (10203 and KP1) and probably belongs to the same strain. …”
    Article
  7. 327

    Starting from scratch by Koh, Bernice Jia Hong, Goh Shun Jie, Tan, Benjamin, Tan, Joanne Li Ling

    Published 2016
    “…Based on research findings, the problem statement was identified, which helped hone the campaign’s strategy, tactics and goals. …”
    Get full text
    Final Year Project (FYP)
  8. 328

    Improving the well-being outcomes via decent work and job engagement: a findings from Persons With Disabilities (PWDs) in Malaysia by Norizan Baba Rahim, Rasidah Arshad, Zulnaidi Yaacob

    Published 2024
    “…Using purposive sampling technique which involved 143 PWDs in Malaysia via SurveyMonkey, the measurement items were adopted from past research with acceptable reliability, and the hypothesis were tested via Partial Least Squares (PLS) 2.0. …”
    Get full text
    Article
  9. 329

    The antecedents and consequences of a layered architecture of mobile handsets by Lee, Alvin Wei Ming

    Published 2015
    “…Apple iPhone has remade the mobile phone industry. Taken together with its App Store, industry experts are sensing a shift in the competitive landscape. …”
    Get full text
    Thesis
  10. 330

    Mobile visual product search services by Winata, Kaisarudin

    Published 2016
    “…Due to the rapid development of technology, mobiles phone are considered to be an important gadget in everyone’s daily life and lifestyle. …”
    Get full text
    Final Year Project (FYP)
  11. 331
  12. 332

    “雍正西服伏虎图” 与 “雍正伴身西服图” 研究 = A study of Emperor’s Yongzheng western costume portraits by 曾琬瑜 Ching, Elis Wan Yee

    Published 2016
    “…An album of fourteen leaves portrays of Emperor Yongzheng in various disguises like a Daoist magician summoning a fierce dragon, a fisherman daydreaming by a lake shore, a Persian warrior holding his bow and arrow, a Turkish prince receiving a peach from a black monkey, a Tibetan monk meditating in a snow-bound mountain cave, most frequently he assumes the identity of a Chinese scholar watching a waterfall, inscribing a poem on a cliff and etc. …”
    Get full text
    Final Year Project (FYP)
  13. 333
  14. 334

    Mobile app to play team-building games by Jie, Dai

    Published 2019
    “…In this growing era of electronics, it is inevitable for humans to be more reliant and dependant on the use of a smart phone application. This is where TeamBond comes in hand. …”
    Get full text
    Final Year Project (FYP)
  15. 335

    NAO robot with health applications by New, Jun Yang

    Published 2016
    “…Majority of the population are carrying a smart-phone such as Apple or Samsung brand, instead of using old version of hand-phone such as Nokia. …”
    Get full text
    Final Year Project (FYP)
  16. 336

    Mobile app for used item giveaway by Peng, Xiaoyu

    Published 2022
    “…Mobile phone has become an essential part in our daily, most of people spend almost half of their spare time with it. …”
    Get full text
    Final Year Project (FYP)
  17. 337

    Smartphone application in determining the reflection point for line-of-sight wireless systems by Chua, Han Jie.

    Published 2012
    “…With the increasing popularity of smart phone usage, it is advantages to develop smartphone applications that can aids and arouse interest of the students studying wireless communication module.In a wireless system where multi path propagation occurs, the reflection point in a Line of Sight System is of great importance and great interest as the position of the reflection point willl affects the quality of the signal received.In this project, a smart phone application using the Android 2.2 OS was developed to correlate the GPS reading of the user location, to retrieve user various values selection.The program used two reflection point calculation methods namely the Bisection Algorithm method and Solving the Cubic Equation method to calculate thereflection point position.The reflection point will be potrayed onto a graphical map upon calculation.…”
    Get full text
    Final Year Project (FYP)
  18. 338

    Data and mobile device protection by Toh, Kok Keong

    Published 2017
    “…Hence, the objective of this project is to develop a mobile security application that can be run on Android platform to protect the user phone. This project aims to develop a mobile application to provide enhanced security and monitoring usage in which the administrator is given full control over the user phone to monitor the movement. …”
    Get full text
    Final Year Project (FYP)
  19. 339

    Human activity recognition based on smartphone sensors by Rajendran, Abinaya

    Published 2019
    “…The main goal of the work is to utilize the smart phone as data collection module and classify the basic activities based on the collected information. …”
    Get full text
    Thesis
  20. 340

    PRIVATE GAMES / by James Patterson, author 619115, Sullivan, Mark, author 505729

    Published 2012
    “…Head of Private London Peter Knight, who has both a professional and personal relationship with Marshall, is called to the scene. Coming so soon after loss of friends and colleagues in a fatal plane crash, Marshall's murder is an almost intolerable blow to Knight, and it soon becomes clear that not Marshall--but the Games themselves-- are the killer's number one target.…”
    text