-
1681
Factors that contribute to hIAPP amyloidosis in type 2 diabetes mellitus
Published 2022Get full text
Article -
1682
Islamic values and veil architecture : case study traditional Iranian courtyad houses
Published 2011“…Methods of data collections are based on qualitative and descriptive analysis using case study, which include the following: historical research, in depth literature review and contents analysis, observation, plan analysis, interviews with local people and the expert. …”
Get full text
Proceeding Paper -
1683
Collaboration in construction research – A key to developing effective postdoctoral strategies and research focused university culture
Published 2011“…It also identifies an 11 point plan for new and inexperienced academics which will have benefits for both the individual researcher and the institution. …”
Get full text
Proceeding Paper -
1684
Can Afghanistan be rescued?
Published 2012“…U.S. president Barack Obama entered office with a bold plan to combat Afghanistan's escalating insurgency, empower its government, encourage a political resolution of the conflict, and secure the cooperation of neighboring Pakistan—all in time for U.S. troops to withdraw by the end of 2014. …”
Get full text
Article -
1685
Affording accessibility for disabled children in the school built environments
Published 2008“…The research methodology used includes table research, access audit, observations, plan analyses, checklist, and questionnaires. The data will be analysed based on both qualitative and quantitative approaches. …”
Get full text
Proceeding Paper -
1686
Software design to simulate FMCW radar signal: a case study of INDERA
Published 2010“…This work presents a design of the software that can be utilized not only to generate and analyze the FMCW radar signal, but also reconstruct the received radar signal onto a PPI (Plan Position Indicator) radar display. The software tool completed here will help us in analyzing the actual radar returns as well as the effects of surface scattering. …”
Get full text
Proceeding Paper -
1687
Reuse potential of ablution water from IIUM masjid
Published 2013“…Unfortunately, the water used for ablution is discharged directly to the drain without any plan to recycle and reuse. Quantity and quality of the used water after ablution is determined in this study. …”
Get full text
Proceeding Paper -
1688
V-Band fade dynamics characteristics analysis in tropical region
Published 2010“…Such information was considered very pertinent for Earth-space communication link design and can be used for initial groundwork plan for the engineers as well as researchers. Results: The measured statistics were then fittingly scaled up to fit Earth-satellite link. …”
Get full text
Article -
1689
Implementasi peta dinamis pada radar INDERA
Published 2009“…Pada radar kapal modern, fungsi display radar atau PPI (Plan Position Indicator) biasanya tidak hanya sebatas menampilkan refleksi dari objek disekitarnya akan tetapi juga digabungkan dengan fungsi navigasi dengan menyertakan peta electronik ke dalam layar radar. …”
Get full text
Get full text
Get full text
Proceeding Paper -
1690
Knowledge management initiative and solution: a case study in International Islamic University of Malaysia(IIUM)
Published 2011“…This paper represents KM initiative and solution through investigating resource content and organization culture in IIUM in developing the appropriate KM framework that include set of plan and strategy based on ontology approach.…”
Get full text
Proceeding Paper -
1691
World history from and Islamic perspective: the experience of the International Islamic University Malaysia
Published 2009“…This call was popularized and developed by Ismail Raji al-Faruqi into a set of principles and work-plan that triggered a series of scholarly debates and discussions on the Islamic approach to knowledge and education. …”
Get full text
Book Chapter -
1692
Reducing electrode wear ratio using cryogenic cooling during electrical discharge machining
Published 2009“…Investigation on the effect of cooling on electrode wear and surface roughness of the workpiece has been carried out. Design of experiment plan for rotatable central composite design of second order with four variables at five levels each has been employed to carry out the investigation. …”
Get full text
Article -
1693
Professional Doctorate in Health Psychology thesis portfolio (Palmer : 2020)
Published 2020“…This professional doctorate is made up of a systematic review, a research project, consultancy report, professional skills report, teaching and training plan, teaching and training evaluation, teaching and training recording, and an intervention report , as detailed in the course handbook for the Professional Doctorate in Health Psychology (edition 2015/2016) completed over a period of four and a half years. …”
Get full text
Thesis -
1694
Perception students on teaching and learning using Google Classroom among FPTV student
Published 2021“…The Malaysian Education Development Plan recommends higher education institutions to empower online learning at a global level (Ministry of Education Malaysia, 2015). …”
Get full text
Book Section -
1695
Electricity consumption forecasting using Nonlinear Autoregressive with External (Exogeneous) input neural network
Published 2019“…Electricity consumption forecasting is crucial for utility company to plan for future power system generation. Even though there are previous works of electricity consumption forecasting using Artificial Neural Network (ANN), but most of their data is multivariate data. …”
Get full text
Article -
1696
Comparison of file sanitization techniques in USB based on average file entropy values
Published 2018“…The fast growth of technology today gives the ability for digital devices like smartphones and laptops to have a huge size of storage which is letting people to keep many of their information like contact lists, photos, videos and even personal information. …”
Get full text
Get full text
Get full text
Thesis -
1697
Semantic querying and search in distributed ontologies
Published 2021“…This evolution is primarily based on increasing data on the web by different sectors such as governments, life science researchers, or academic institutes. …”
Get full text
Thesis -
1698
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…With the rapid growth of informatics systems’ technology in this modern age, the Internet of Things (IoT) has become more valuable and vital to everyday life in many ways. IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Article -
1699
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…With the rapid growth of informatics systems’ technology in this modern age, the Internet of Things (IoT) has become more valuable and vital to everyday life in many ways. IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Article -
1700
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…With the rapid growth of informatics systems’ technology in this modern age, the Internet of Things (IoT) has become more valuable and vital to everyday life in many ways. IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Article