Search alternatives:
hone » honey (Expand Search), bhone (Expand Search), one (Expand Search)
phone » phoney (Expand Search), pbhone (Expand Search), pone (Expand Search)
pore » more (Expand Search)
boney » bonney (Expand Search), bone (Expand Search), money (Expand Search)
boon » book (Expand Search)
hone » honey (Expand Search), bhone (Expand Search), one (Expand Search)
phone » phoney (Expand Search), pbhone (Expand Search), pone (Expand Search)
pore » more (Expand Search)
boney » bonney (Expand Search), bone (Expand Search), money (Expand Search)
boon » book (Expand Search)
-
121
Communication among TAKl, Smad3 and PPAR β/δ and their impact on skin development.
Published 2011Get full text
Research Report -
122
-
123
-
124
Network steganography – an investigation of covert channels in network protocols
Published 2011Get full text
Final Year Project (FYP) -
125
-
126
-
127
-
128
-
129
-
130
-
131
-
132
-
133
Numerical studies of electric double layer effect through microchannel flows
Published 2008Get full text
Thesis -
134
-
135
A tablet computer app for renewable energy engineering calculations
Published 2016Get full text
Final Year Project (FYP) -
136
Development of a multi-rotor UAV : structural material & key component analysis
Published 2018Get full text
Final Year Project (FYP) -
137
Security enhancements to prevent DNS cache poisoning attacks
Published 2018Get full text
Final Year Project (FYP) -
138
-
139
Effect of harvest rate, waste loading, and stocking density on the yield of duckweeds
Published 1979Article -
140
Automatic PoC generation for Android app vulnerability
Published 2021“…Vulnerabilities in mobile applications are becoming more and more common in this fast-paced world where almost everyone possesses a mobile phone. Therefore, using various static analysis tools for scanning of mobile applications helps in identifying potential security vulnerabilities that are hidden within applications. …”
Get full text
Final Year Project (FYP)