Showing 1 - 20 results of 22 for search 'stolen base', query time: 0.12s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
    by Norzikri, Sairi
    Published 2010
    “…Lacking of security in the car lead the higher number of reported stolen car. By using RFID…”
    Get full text
    Get full text
    Get full text
  7. 7
    “… be covertly acquired or stolen by an attacker and misused. Therefore, storing biometric templates a secure way…”
    Get full text
    Get full text
    Get full text
  8. 8
    by Che Khosni, Farahani
    Published 2005
    “…. Unfortunately, their phones may be damaged or being stolen. They will lose all the important data especially…”
    Get full text
    Get full text
  9. 9
    by Cusolito, Ana
    Published 2012
    Subjects: “…STOLEN PUBLIC FUNDS…”
    Get full text
    Get full text
  10. 10
  11. 11
  12. 12
    “… the preliminary research and application of fuzzy logic based controller for braking system of stolen vehicle…”
    Get full text
    Get full text
    Get full text
  13. 13
    by Kotlyar, Dmytro, Pop, Laura
    Published 2019
    “…StAR—the Stolen Asset Recovery Initiative—is a partnership between the World Bank…”
    Get full text
    Get full text
  14. 14
    “… stolen cars, controlling access to car parks and gathering traffic flow statistics. In this paper…”
    Get full text
    Get full text
    Get full text
  15. 15
    by Ishak, Izzwan
    Published 2007
    “… such as parking, access control, tolling, border control, stolen car, enforcement, traffic control, and so…”
    Get full text
    Get full text
  16. 16
    “… many like traffic monitoring, tracking stolen cars, managing parking toll, red-light violation…”
    Get full text
    Get full text
    Get full text
    Get full text
  17. 17
    by Khairul Annuar, Nur Shahirah
    Published 2017
    “…) is no exception to this problem. In order to retain and avoid having the best human talent stolen from their firm…”
    Get full text
    Get full text
  18. 18
  19. 19
    “… access control and security, such as: tracking of stolen vehicles, traffic violations (speed trap…”
    Get full text
    Get full text
    Get full text
  20. 20
    “… control and security, such as: tracking of stolen vehicles, traffic violations (speed trap) and parking…”
    Get full text
    Get full text
    Get full text
    Get full text
Search Tools: RSS Feed Email Search