-
1
-
2by Brun, Jean Pierre, Dubois, Pascale Helene, van der Does de Willebois, Emile, Hauch, Jeanne, Jaïs, Sarah, Mekki, Yannis, Sotiropoulou, Anastasia, Sylvester, Katherine Rose, Uttamchandani, Mahesh“… stolen assets in the context of the United Nations Convention against…”
Published 2014
Get full text
Get full text
-
3by Brun, Jean-Pierre, Sotiropoulou, Anastasia, Gray, Larissa, Scott, Clive, Stephenson, Kevin M.Subjects: “…STOLEN ASSET…”
Published 2020
Get full text
Get full text
-
4
-
5
-
6by Norzikri, Sairi“…Lacking of security in the car lead the higher number of reported stolen car. By using RFID…”
Published 2010
Get full text
Get full text
Get full text
-
7“… be covertly acquired or stolen by an attacker and misused. Therefore, storing biometric templates a secure way…”
Get full text
Get full text
Get full text
-
8by Che Khosni, Farahani“…. Unfortunately, their phones may be damaged or being stolen. They will lose all the important data especially…”
Published 2005
Get full text
Get full text
-
9
-
10
-
11by Kahtan, Hasan, Wan Nor Ashikin, Wan Ahmad Fatthi, Azma, Abdullah, Mansoor, Abdulletee, Noor Aishah, Rosli“… the preliminary research and application of fuzzy logic based controller for braking system of stolen vehicle…”
Published 2018
Get full text
Get full text
Get full text
Get full text
-
12by Kahtan, Hasan, Wan Nor Ashikin, Wan Ahmad Fatthi, Azma, Abdullah, Abdulgabber, Mansoor Abdullateef, Noor Aishah, Rosli“… the preliminary research and application of fuzzy logic based controller for braking system of stolen vehicle…”
Published 2017
Get full text
Get full text
Get full text
-
13“…StAR—the Stolen Asset Recovery Initiative—is a partnership between the World Bank…”
Get full text
Get full text
-
14“… stolen cars, controlling access to car parks and gathering traffic flow statistics. In this paper…”
Get full text
Get full text
Get full text
-
15by Ishak, Izzwan“… such as parking, access control, tolling, border control, stolen car, enforcement, traffic control, and so…”
Published 2007
Get full text
Get full text
-
16“… many like traffic monitoring, tracking stolen cars, managing parking toll, red-light violation…”
Get full text
Get full text
Get full text
Get full text
-
17by Khairul Annuar, Nur Shahirah“…) is no exception to this problem. In order to retain and avoid having the best human talent stolen from their firm…”
Published 2017
Get full text
Get full text
-
18by Mohamad Nor, Mohamad Raimi“… Product (GDP), employment, and development of upstream and downstream fishery-based industries…”
Published 2018
Get full text
Get full text
-
19“… access control and security, such as: tracking of stolen vehicles, traffic violations (speed trap…”
Get full text
Get full text
Get full text
-
20“… control and security, such as: tracking of stolen vehicles, traffic violations (speed trap) and parking…”
Get full text
Get full text
Get full text
Get full text