Suggested Topics within your search.
Suggested Topics within your search.
Security, International
2
1942-1949
1
80s?
1
Asia, Southeast
1
Australia
1
Australia. <br> Intelligence service
1
Australia. <br> National security
1
Bibliography
1
Biography
1
Campaigns
1
Congresses
1
Democracy United States
1
English fiction
1
Financial crises
1
Generals
1
History
1
Intelligence service
1
International cooperation
1
International policy
1
Juvenile fiction
1
Military intelligence
1
Pacific Area
1
Political science
1
Politics and government
1
Privatization United States
1
Public utilities Deregulation United States
1
Public utilities Rates United States
1
Public utilities United States State supervision
1
Secret service-United States
1
World war, 1939-1945
1
-
1by Shahrul Afzam, Mohamad“…Computer is an important asset in development of technology nowadays.We can assume that each person…”
Published 2010
Get full text
Get full text
Get full text
-
2
-
3“…. The M2M communications presented countless solicitations that can over-burden the access channel…”
Get full text
Get full text
Get full text
Get full text
Get full text
-
4“… communications presented countless solicitations that can over-burden the access channel of the present LTE…”
Get full text
Get full text
Get full text
-
5
-
6by Balfaqih, Mohammed, Nordin, Rosdiadee, Balfaqih, Zain, Haseeb, Shariq, Hassan Abdalla Hashim, Aisha“… and authentication methods in CAPWAP centralized WLAN during MAC layer handoff process. This can be considered as a…”
Published 2015
Get full text
Get full text
Get full text
-
7
-
8by Ali, Md Jahan“…. These problems can be resolved by mitigating the limitation of the existing Media Access Control (MAC) protocols…”
Published 2018
Get full text
Get full text
Get full text
-
9by Abdul Satar, Azwan“… as the analysis and development process of constructing it. The goal is to design a wireless sniffer that can…”
Published 2007
Get full text
Get full text
-
10by Horst H. Liebner“… Fleet of 1650 can become the subject for an integrated study by philologists, historians…”
Published 2007
Get full text
Get full text
Get full text
-
11“… IMM traffic but it cannot give guarantee because of the randomness of some EDCA schedulers or proposed…”
Get full text
Get full text
Get full text
-
12
-
13
-
14by Shabani, Hikma, Ahmed, Musse Mohamud, Khan, Sheroz, Hameed, Shihab A., Habaebi, Mohamed Hadi“…. The use of wireless sensor network (WSN) can, however, lead to a more flexible and powerful protection…”
Published 2014
Get full text
Get full text
Get full text
-
15
-
16by Osman, Noor Diyana“… in the presence of metal artifacts induced by spinal implants. Metal artifacts can severely affect the quality…”
Published 2015
Get full text
Get full text
-
17by Osman, Noor Diyana“… in the presence of metal artifacts induced by spinal implants. Metal artifacts can severely affect the quality…”
Published 2014
Get full text
Get full text
-
18by Musa, Anuar“… interference which limit the applications of RF technologies in certain scenarios. For example, RF signals can…”
Published 2017
Get full text
Get full text
-
19
-
20by MacCrackenage, Michael C.“… actions, it seems unlikely that atmospheric composition can be stabilized at a level that will avoid…”
Published 2012
Get full text