-
341
Axial stiffness matrix of non-uniform Bernoulli-Euler bar element
Published 2011“…This chapter describes the procedure to develop the axial stiffness matrix of beam element having arbitrary variation of axial stiffness distribution along its span. To obtain analytical formulation, the stiffness matrix is constructed from the flexibility matrix. …”
Get full text
Book Chapter -
342
Islamic law in the LCC : local expansion of subclass BP
Published 2000“…The practice had shoehorned the comprehensive and extensive collection of Islamic law materials into a short span of class numbers, resulting lacking logical order of the discipline and inadvertant proximity of law by subject matter, including an overwhelmingly crowded section in the shelflist. …”
Get full text
Get full text
Monograph -
343
Foreign exchange exposure and impact of policy switch - the case of Malaysian listed firms
Published 2013“…Our sample consists of 158 listed firms and spans the 16 year period, 1990-2005. A multivariate model using four bilateral exchange rates is used to determine firm level exposure while panel data analysis using a random-effects Generalized Least Squares (GLS) model is used to determine system-wide or aggregate sample exposure. …”
Get full text
Article -
344
Critical theatricality in the museum space
Published 2021“…If the terms theatricality and spectacle have been seen as potentially negative by some, symptomatic of an experience economy that risks dumbing down the complexity of culture by appealing to our ever-decreasing attention spans, I refer to these case studies as evidence for a new way in which the theatrical can be used as a powerful, critical tool in the museum experience. …”
Get full text
Article -
345
Hypersonic similitude for planar wedges
Published 2014“…A strip theory in which flow at a span wise location is two dimensional developed by Ghosh is been used. …”
Get full text
Article -
346
Fuzzy based technique for microchip lead inspection using machine vision
Published 2008“…Leads are inspected for count, planarity, offset, pitch and span defects. Firstly, it utilizes fast preprocessing techniques and blobs’ features extraction methods to achieve high inspection rates. …”
Get full text
Proceeding Paper -
347
Development of coated peanut separator and frying skillet machine
Published 2018“…The groundnut is sticking and become like a ping pong size ball and the time consuming to fry is longer. …”
Get full text
Article -
348
Room temperature operated PEDOT: PSS based flexible and disposable NO2 gas sensor
Published 2023“…The gas sensing layer, composed of PEDOT:PSS, is deposited on interdigitated electrodes (IDEs) made from graphene–carbon ink, which are screen printed onto a paper substrate using the drop casting method. …”
Get full text
Article -
349
Oscillating supersonic delta wing with straight leading edges
Published 2012“…Ghosh’s strip theory is been used in which strips at different span wise locations are independent of each other. …”
Get full text
Article -
350
Oscillating supersonic delta wings with straight leading edges
Published 2012“…Ghosh’s strip theory is been used in which strips at different span wise locations are independent of each other. …”
Get full text
Article -
351
Effect of angle of incidence on stability derivatives of a wing
Published 2014“…A Strip theory is used in which strips at different span wise location are independent. This combines with similitude to give a piston theory. …”
Get full text
Article -
352
On phase separation points for one-dimensional models
Published 2009“…In the paper, the one-dimensional model with nearest-neighbor interactions In, n ∈ Z, and the s pin values ±1 is considered. It is known that, under some conditions on parameters of In, a phase transition occurs for this model. …”
Get full text
Article -
353
Measurement and modelling of operational amplifier power supply rejection
Published 1995“…Measured results for 741 and pin-compatible operational amplifiers are tabulated. …”
Get full text
Article -
354
The impact of the teaching of rthics in a Medical and Allied Health Sciences curriculum in International Islamic University Malaysia
Published 2008“…A specifically designed package is incorporated designated as the Islamic Input into the Medical Programme (IIMP). The IIMP spans over the entire 5 years of the medical programme. …”
Get full text
Article -
355
Wireshark window authentication based packet captureing scheme to pervent DDoS related security issues in cloud network nodes
Published 2015“…As a result, the cloud node response is slow as usual and resource on cloud network becomes unavailable. Some Dos attacks are Ping of Death, Teardrop, Snork, Locking authentication, SYN flooding, Operating System Attacks etc. …”
Get full text
Get full text
Proceeding Paper -
356
Rain attenuation prediction of optical wireless system in tropical region
Published 2013“…The effect of rain on optical wireless link is expressed in term of specific rain attenuation. …”
Get full text
Get full text
Proceeding Paper -
357
Knots Verses Graphs
Published 2011“…It has been shown that the universes, LR-graphs and regions of reduced alternating knots (links) are path connected. Connected universe corresponding to reduced alternating knot (link) is unique. …”
Get full text
Proceeding Paper -
358
A novel biased energy distribution (BED) technique for cluster-based routing in wireless sensor networks
Published 2011“…In clustering sensor networks, some of the nodes are elected as aggregators and they compress the data from their cluster members before sending the aggregated data to the sink. Existing clustering routing protocols assume that all the nodes are provided with equal amount of energy but this shortens the network lifetime and makes the network unstable. …”
Get full text
Article -
359
Cooling of motorcyclist helmet with thermoelectric module
Published 2013“…The system consists mainly of a heat sink and thermoelectric module. When electrical voltage is applied to the thermoelectric module, it will create a temperature difference across the thermoelectric module. …”
Get full text
Article -
360
A secure energy-efficient routing protocol for WSN
Published 2007“…We create an energy and distance aware sink-rooted tree in the network which is used for secure data transmissions from the source sensors to the base station. …”
Get full text
Book Chapter