Email virus scanner V1.1 / Nur Firdaus Ghazali
Email Virus Scanner adalah sebuah system pengimbas mudah alih dan senang digunakan. Sistem ini bersaiz kecil jadi ia mudah dibawa ke mana-mana dan tidak perlu dipasang di dalam sistem pengoperasian. Sasaran utama sistem ini adalah pelajar Fakulti Sains Komputer Dan Teknologi Maklumat, Universiti Mal...
| Main Author: | Nur Firdaus, Ghazali |
|---|---|
| Format: | Thesis |
| Published: |
2004
|
| Subjects: | |
| Online Access: | http://studentsrepo.um.edu.my/10316/ http://studentsrepo.um.edu.my/10316/1/Nur_Firdaus_Ghazali.pdf |
Similar Items
Data transmission using aes encryption via email and sms
by: Arif Hanafi, Sharif Katullah
Published: (2013)
by: Arif Hanafi, Sharif Katullah
Published: (2013)
Email categorization using support vector machine
by: Mohd. Daud, Mariah
Published: (2004)
by: Mohd. Daud, Mariah
Published: (2004)
Booking system of ICT equipment using barcode scanner
by: Mathanraja, Many
Published: (2014)
by: Mathanraja, Many
Published: (2014)
Automatic email classification system / Phang Siew Ting
by: Phang , Siew Ting
Published: (2003)
by: Phang , Siew Ting
Published: (2003)
Secured email using steganography / Syaiful Annuar Omar
by: Syaiful Annuar, Omar
Published: (2005)
by: Syaiful Annuar, Omar
Published: (2005)
Detecting Duplicate Entry in Email Field using Alliance Rules-based Algorithm
by: Arif, Hanafi, et al.
Published: (2016)
by: Arif, Hanafi, et al.
Published: (2016)
Sistem Map Interaktif-Universiti Malaya / Mohammad Ghazali Abdul Rahman
by: Mohammad Ghazali, Abdul Rahman
Published: (2002)
by: Mohammad Ghazali, Abdul Rahman
Published: (2002)
Network scanner / Anisyahayati Ismail
by: Anisyahayati, Ismail
Published: (2005)
by: Anisyahayati, Ismail
Published: (2005)
Internet information server scanner : scanning on URL vulnerabilities / Tan Yu Jin.
by: Tan, Yu Jin
Published: (2002)
by: Tan, Yu Jin
Published: (2002)
Halal Barcode Scanner Prototype in Android using Client Side Processing with Json Technology
by: Noor Munirah, Marzuki, et al.
Published: (2014)
by: Noor Munirah, Marzuki, et al.
Published: (2014)
Hermes ransomware v2.1 action monitoring using next generation security operation center (NGSOC) complex correlation rules
by: Yau, Ti Dun, et al.
Published: (2022)
by: Yau, Ti Dun, et al.
Published: (2022)
Student attendance system using barcode scanner
by: Nur Zalfarina, Azmee
Published: (2014)
by: Nur Zalfarina, Azmee
Published: (2014)
Testing model using risk poker technique for scrum-based software development projects / Siti Noor Hasanah Ghazali
by: Siti Noor Hasanah , Ghazali
Published: (2017)
by: Siti Noor Hasanah , Ghazali
Published: (2017)
1MSPOT
by: Muhamad Kamal Fahmi, Mohd Yuseri
Published: (2014)
by: Muhamad Kamal Fahmi, Mohd Yuseri
Published: (2014)
On Analysis and Effectiveness of Signature Based in Detecting Metamorphic Virus
by: Imran Edzereiq, Kamarudin, et al.
Published: (2013)
by: Imran Edzereiq, Kamarudin, et al.
Published: (2013)
Design and implementation cloud computing (TOC, Abstract, chapter 1 and Reference only)
by: Norliza Hashim,
Published: (2014)
by: Norliza Hashim,
Published: (2014)
Management system for managing P1 and P2 students in counselling unit
by: Nur Syafiqah, Mohamad Sasudin
Published: (2018)
by: Nur Syafiqah, Mohamad Sasudin
Published: (2018)
Solving 0/1 Knapsack Problem Using Hybrid HS and Jaya Algorithms
by: Alomoush, Alaa A., et al.
Published: (2018)
by: Alomoush, Alaa A., et al.
Published: (2018)
Nasyid Portal(11) Nasyid.Com / Noorulashikin Yahya
by: Noorulashikin, Yahya
Published: (2005)
by: Noorulashikin, Yahya
Published: (2005)
Solving 0/1 Knapsack Problem using Opposition-based Whale Optimization Algorithm (OWOA)
by: Alamri, Hammoudeh S., et al.
Published: (2019)
by: Alamri, Hammoudeh S., et al.
Published: (2019)
Permodelan molekul dan permodelan kepala / Syed Mohamad Nur Aldi Ghazali
by: Syed Mohamad Nur Aldi , Ghazali
Published: (2004)
by: Syed Mohamad Nur Aldi , Ghazali
Published: (2004)
An information kiosk on Malaysian cuisine 1 Citra Rasa Malaysia on line / Aniza Sabjan
by: Aniza, Sabjan
Published: (2002)
by: Aniza, Sabjan
Published: (2002)
A Model Driven Analysis of the 802.11 CSMA/CA Protocol through SD2PN
by: M. A., Ameedeen, et al.
Published: (2014)
by: M. A., Ameedeen, et al.
Published: (2014)
v-Faculty / Leong Kee Foo
by: Leong , Kee Foo
Published: (2001)
by: Leong , Kee Foo
Published: (2001)
Integration of Horde Email System and Mobile Application System
by: Sofiah, Othman
Published: (2010)
by: Sofiah, Othman
Published: (2010)
Tools for Jawi character recognition / Nur Hassinah Hassan
by: Nur Hassinah, Hassan
Published: (2000)
by: Nur Hassinah, Hassan
Published: (2000)
Knowledge design in rule-based system architecture for C tutorial / V. Thavachelvi a/p Velautham.
by: Velautham, V. Thavachelvi
Published: (2005)
by: Velautham, V. Thavachelvi
Published: (2005)
Transfer Learning on Inception ResNet V2 For Expiry Reminder: A Mobile Application Development
by: Ong, Wi Yi
Published: (2020)
by: Ong, Wi Yi
Published: (2020)
Scanning barcode 1d vs barcode 2d / Azura Shatar
by: Azura, Shatar
Published: (2003)
by: Azura, Shatar
Published: (2003)
Features Selection in the Proposed Draft Sheet C1 for General Elections in
Indonesia
by: Erin, Efriansyah, et al.
Published: (2023)
by: Erin, Efriansyah, et al.
Published: (2023)
A method for predicting defects in System Testing for V-Model
by: Muhammad Dhiauddin Mohamed Suffian,, et al.
Published: (2012)
by: Muhammad Dhiauddin Mohamed Suffian,, et al.
Published: (2012)
Virtual hairstyle studio (V-Hair) / Lee Ean Har
by: Lee , Ean Har
Published: (2003)
by: Lee , Ean Har
Published: (2003)
Computer-based instrumentation system for temperature measurement using thermocouple in visual basic application (C.I.S.T.V.A.)
by: Muhamad Akmal, Ishak
Published: (2008)
by: Muhamad Akmal, Ishak
Published: (2008)
Utilizing Support Vector Machines to Recognize Pattern Numbers on Sheet C1 Ballots
by: Agustian, David, et al.
Published: (2022)
by: Agustian, David, et al.
Published: (2022)
Online Counselling Assistant (OCA ver 1.0) / Hana Salwani Mohd Zaini
by: Hana Salwani , Mohd Zaini
Published: (2001)
by: Hana Salwani , Mohd Zaini
Published: (2001)
Sistem Kiosk Perkahwinan Islam versi 1.0 (SIPKOM) / Nor Shafina Muftahuddin
by: Nor Shafina , Muftahuddin
Published: (2001)
by: Nor Shafina , Muftahuddin
Published: (2001)
EndNoteX1 for Windows
by: Perpustakaan, Hamzah Sendut
by: Perpustakaan, Hamzah Sendut
EndNoteX1 for Mac
by: Perpustakaan, Hamzah Sendut
by: Perpustakaan, Hamzah Sendut
Performance Analysis on the Effect of G.729, Speex and GSM Speech Codec on 802.11g Wireless Local Area Network over VoIP using Packet Jitter
by: Imran Edzereiq, Kamarudin, et al.
Published: (2013)
by: Imran Edzereiq, Kamarudin, et al.
Published: (2013)
Analyzing the Web-Based Library Information System at SMKN 1 Talang Ubi
by: Marlindawati, ., et al.
Published: (2024)
by: Marlindawati, ., et al.
Published: (2024)
Similar Items
-
Data transmission using aes encryption via email and sms
by: Arif Hanafi, Sharif Katullah
Published: (2013) -
Email categorization using support vector machine
by: Mohd. Daud, Mariah
Published: (2004) -
Booking system of ICT equipment using barcode scanner
by: Mathanraja, Many
Published: (2014) -
Automatic email classification system / Phang Siew Ting
by: Phang , Siew Ting
Published: (2003) -
Secured email using steganography / Syaiful Annuar Omar
by: Syaiful Annuar, Omar
Published: (2005)