Search alternatives:
citron » cetron (Expand Search), citro (Expand Search)
ciao » xiao (Expand Search), cao (Expand Search), chao (Expand Search)
citra » mitra (Expand Search), cita (Expand Search)
chitra » chiara (Expand Search)
citron » cetron (Expand Search), citro (Expand Search)
ciao » xiao (Expand Search), cao (Expand Search), chao (Expand Search)
citra » mitra (Expand Search), cita (Expand Search)
chitra » chiara (Expand Search)
-
1
Citra busana dalam Naskhah Melayu Syair Agung
Published 2015“…Objektif kajian ini adalah bertujuan untuk mengenal pasti jenis-jenis citra busana dalam NMSA, menghuraikan bahan, corak, warna, dan buatan busana serta menganalisis fungsi busana yang digambarkan kepada masyarakat dalam teks tersebut. …”
Get full text
Thesis -
2
Citra Wanita yang Memancarkan Nilai Murni dalam Novel Popular yang Diadaptasi daripada Novel Bersiri (S/O: 13234)
Get full text
Monograph -
3
Interference suppression for frequency-hopped multiple-access receiver
Published 2018Get full text
Thesis -
4
-
5
Power spectrum: A detailed dataset on electric demand and environmental interplays
Published 2024Get full text
Article -
6
The use of mobile phones among trishaw operators in Myanmar
Published 2019Get full text
Get full text
Get full text
Journal Article -
7
-
8
A comparison between the predictors of vaccine uptake intentions for influenza and dengue
Published 2025Get full text
Journal Article -
9
-
10
Promoting Sustainable Management Through Technological Innovation /
Published 2023Get full text
software, multimedia -
11
-
12
-
13
KUMPULAN CERPEN : Tujuh Pintu /
Published 2021“…Kathirina Susanna Tati, seorang penulis yang prolifik dalam mengangkat citra budaya tempatan dalam semua hasil karyanya termasuklah genre puisi, novel dan cerpen. …”
text -
14
REVENGE IN VIOLENT HUES /
Published 2024“…The Headmaster has been killed. Welcome to Citra Buana, an academy built to weaponise the dead. …”
text -
15
Contribution of poultry farm practice to the structure and composition of bacterial communities in the soil of poultry farms in Lagos, Nigeria
Published 2025“…Methods: Composite soil samples were collected from two farms (PF01A and PF02B) in a poultry estate and from a pristine environment (CTR) without farming activity. Metagenomic analysis was performed using 16S rRNA gene amplicon sequencing and bioinformatics analysis. …”
Journal article -
16
Bengkel Pemerkasaan Penjenamaan lonjak keterlihatan (visibility) UMPSA
Published 2024“…GENTING HIGHLANDS, 3 Disember 2024 - Universiti Malaysia Pahang Al-Sultan Abdullah (UMPSA) menganjurkan Bengkel Pemerkasaan Penjenamaan yang dijadikan platform untuk menganalisis impak perubahan penjenamaan terhadap identiti dan citra universiti melibatkan pemegang taruh terutamanya alumni, industri, pelajar dan masyarakat.…”
Get full text
Newspaper -
17
SVD-gorank: Recommender system algorithm using SVD and gower's ranking
Published 2025“…Experimental results using the MovieLens-100K, MovieLens-1M, Book-Crossing, Ciao, Epinions, Flixster, and MovieLens-10M datasets can provide the best accuracy results at the Top-N level, especially in the NDCG, MRR, Precision, Hit Rate, and Recall metrics, which are indicators important in recommendation systems that focus on the relevance of recommendations at the top of the list. …”
Get full text
Article -
18
Development of encrypted communication over the NTU nanosatellite
Published 2018“…The popularity of this open source standard has also provided many different modes of AES such as Cipher Block Chianing (CBC) or Counter (CTR) which are also standardized to suit different needs. …”
Get full text
Final Year Project (FYP) -
19
Decoding the transcriptomics of oil palm seed germination
Published 2024“…Auxin (TIR1, AUX/IAA, ARF), brassinosteroid (BRI1, BSK, BIN2, CYCD3), ethylene (ETR, CTR1), and jasmonic acid (JAR1, COI1) pathway genes regulated cell growth and stress response, promoting seedling development. …”
Get full text
Article -
20
SCADPA: Side-channel assisted differential-plaintext attack on bit permutation based ciphers
Published 2018“…Several case studies are presented, using various attacker models and targeting different encryption modes (such as CTR and CBC). We provide a discussion on how to avoid such attack from the design point of view.…”
Get full text
Get full text
Conference Paper