Showing 121 - 140 results of 14,523 for search '(((ching OR (spie OR (ann OR ada))) OR (five OR find)) OR ((spins OR sains) OR ming))', query time: 0.13s Refine Results
  1. 121

    Framework for enhancement of image guided surgery: finding area of tumor volume by Hameed, Shihab A., Aboaba, Abdulfattah A., Khalifa, Othman Omran, Hassan Abdalla Hashim, Aisha, Daoud, Jamal Ibrahim, Saeed, Rashid Abdelhaleem, Mahmoud, Omer

    Published 2012
    “…The other problem discussed in this paper is to find a suitable method to determine the tumor volume in an accurate way that will help surgeon to remove it precisely.…”
    Get full text
    Article
  2. 122

    An efficient approach to mitigate scintillation effects on GPS range-finding in ionosphere by Abdul Rahman, Farah Diyana, Hassan Abdalla Hashim, Aisha, Strangeways, Hal

    Published 2008
    “…Based on the detrend signal, MATLAB function that is polyfit will be used to find the phase and amplitude spectra. Comparison simulations result with Bubble Scintillation Simulation Program, which is programmed to detect plasma bubbles in certain geographical area under ob servations, is executed. …”
    Get full text
    Proceeding Paper
  3. 123
  4. 124
  5. 125

    An unsual finding of brain magnetic resonance imaging in a hypertensive patient by Ngow, Harris Abdullah, Wan Khairina, Wan Mohd Nowalid, Hamidon, Bin Basri

    Published 2009
    “…These hyperintensities spared the grey matter on T2-weighted and FLAIR sequence. These unusual finding on brain MRI was attributed to severe vasogenic cerebral edema resulting from accelerated hypertension.…”
    Get full text
    Article
  6. 126

    Culture of five species of Malaysia indigenous freshwater microalgae by Sallehudin, Nor Jannah, Mustapa, Mokhzanni, Mel , Maizirwan, Ahmad Raus, Raha

    Published 2016
    “…Five species of Malaysia indigenous chlorophycean microalgae were grown in laboratory culture under the comparable environmental condition and the population doubling time (td) as well as maximum growth rate (μmax) each was evaluated. …”
    Get full text
    Proceeding Paper
  7. 127
  8. 128

    Electromygraphy (EMG) signal based hand gesture recognition using Artificial Neural Network (ANN) by Ahsan, Md. Rezwanul, Ibrahimy, Muhammad Ibn, Khalifa, Othman Omran

    Published 2011
    “…The purpose of this paper is to describe the process of detecting different predefined hand gestures (left, right, up and down) using artificial neural network (ANN). ANNs are particularly useful for complex pattern recognition and classification tasks. …”
    Get full text
    Proceeding Paper
  9. 129

    Kerangka pentaksiran pendidikan karakter untuk mata pelajaran sains Sekolah Menengah di Kota Batam by Maskur, Said

    Published 2017
    “…Fasa ketiga melibatkan analisis dan persembahan data yang dilakukan dalam dua tahap iaitu analisis kualitatif dan kuantitatif dengan menggunakan SPSS V. 22.0 dan Microsoft Excel, manakala statistik deskriptif dianalisis menggunakan Analisis structural Equation modeling (SEM) Partial Least Square (PLS) V.2.0. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 130

    Survival analysis and prognostic factor of non-Hodgkin lymphoma treated in Hospital Universiti Sains Malaysia (HUSM) by Che Soh, Nur Sabrina, Bachok, NorSa'adah, Baba, Aziz, Wan Muhammad, Wan Mohd Zahiruddin

    Published 2011
    “…Kaplan-Meier procedure was used to calculate survival estimates while Cox Proportional Hazards Model was used to determine prognostic factors. RESULTS: The overall 5 and 10-years survival rates for NHL in HUSM was 33.2% (95%CI: 25.2, 41.4) and 26.9% (95%CI: 18.7, 35.8) respectively. …”
    Get full text
    Proceeding Paper
  11. 131
  12. 132
  13. 133
  14. 134
  15. 135
  16. 136

    Achieving security for images by LSB and MD5 by Alahmad, Mohammad, Alshaikhli, Imad Fakhri Taha, O. Alhussainan, Sondos

    Published 2012
    “…This method creates a random dispersion of bits of the message in the picture, and it would be difficult to extract the message without the password key .After creation of the hidden message, the image will pass it in hash function to obtain hashing value using the MD5 technique. This value will be fixed as long as there has been no change to the picture. …”
    Get full text
    Article
  17. 137
  18. 138
  19. 139
  20. 140