-
881
نظم القرآن من حيث المنهج لتفسير القرآن الكريم: دراسة تحليلية لمبادئه
Published 2015Get full text
Get full text
Proceeding Paper -
882
-
883
-
884
-
885
-
886
-
887
-
888
-
889
Application of permanent electromagnet for chatter control in end milling of Titanium alloy - Ti6Al4V
Published 2011“…Chatter or vibration with high amplitude appears in the system during end milling at cutting speed 70 m/min when the frequency of chip formation instability, associated with the formation of serrate chip. …”
Get full text
Book Chapter -
890
Population structure, length-weight and length-length relationships, and condition- and form-factors of the Pool barb Puntius sophore (Hamilton, 1822)(Cyprinidae) from the Chalan b...
Published 2012“…Faktor keadaan Fulton (K) yang dikira merangkumi 0.69-2.35, dengan nilai min 1.64±0.30. Berat relatif (Wr) tidak berbeza secara bermakna dengan 100 untuk (p=0.074), menunjukkan habitat seimbang dengan kesediaadaan makanan relatif berbanding dengan kehadiran pemangsa untuk P. sophore. …”
Get full text
Article -
891
Transgenders in Kuantan, Pahang: knowledge and attitude towards HIV/AIDS
Published 2016“…Peratusan tinggi daripada mereka adalah menjual seks (60.6%), dan mempunyai pendapatan yang rendah (tiada pendapatan kepada RM 3000, min = RM1528). 87.9% daripada subjek menunjukkan pengetahuan yang baik dan juga sikap yang positif terhadap HIV/AIDS. …”
Get full text
Article -
892
-
893
Comparison of mechanical properties between different stainless steel archwires
Published 2013“…AIM: The Damon system recommends the use of revolutionary, high-technology Damon edgewise wires [0.019 0.025 inch stainless steel (SS)] for major mechanics and finishing. …”
Get full text
Proceeding Paper -
894
-
895
-
896
-
897
A novel fly optimization algorithm for swarming application
Published 2010Get full text
Proceeding Paper -
898
-
899
Control of mini autonomous surface vessel
Published 2010Get full text
Get full text
Proceeding Paper -
900
Wireshark window authentication based packet captureing scheme to pervent DDoS related security issues in cloud network nodes
Published 2015“…As a result, the cloud node response is slow as usual and resource on cloud network becomes unavailable. Some Dos attacks are Ping of Death, Teardrop, Snork, Locking authentication, SYN flooding, Operating System Attacks etc. …”
Get full text
Get full text
Proceeding Paper