Showing 701 - 720 results of 2,276 for search '(((pinga OR peng) OR when) OR (((ssspins OR (sink OR ming)) OR ssspina) OR pin))', query time: 0.09s Refine Results
  1. 701

    Impulsive noise effects on DWT-OFDM versus FFT-OFDM by Abdullah, Khaizuran, kamarudin, Saidatul Izyanie, Hussin, Nadiatul Fatiha, Jarot, Sigit Puspito Wigati, Ismail, Ahmad Fadzil

    Published 2011
    “…The details about each model and study the BER performance in two scenarios when varying the Poisson recurrence parameter a from small to large are also included. …”
    Get full text
    Proceeding Paper
  2. 702

    Forward masking threshold estimation using neural networks and its application to parallel speech enhancement by Gunawan, Teddy Surya, Khalifa, Othman Omran, Ambikairajah, Eliathamby

    Published 2010
    “…Objective measures using PESQ demonstrates that our proposed forward masking model, provides significant improvements (5-15 %) over four existing models, when tested with speech signals corrupted by various noises at very low signal to noise ratios. …”
    Get full text
    Article
  3. 703

    Analysis of Radio Model Performance for Clustering Sensor Networks by Bello-Salau, H, Salami, A. F., Anwar, Farhat, Islam, Md. Rafiqul

    Published 2011
    “…Cluster-based routing protocols have been found to be more advantageous to other types of routing techniques when there is a relatively huge number of a sensor node to be deployed. …”
    Get full text
    Article
  4. 704

    The rights of victims of crime under Malaysian Law: legal framework and prospect for reforms by Hussin, Nasimah

    Published 2010
    “…As a result, it is claimed, victims rarely experience justice when their case is dealt with by traditional punitive methods. …”
    Get full text
    Article
  5. 705

    National security in Malaysia's digital economy: redefinition, reaction and legal reform by Zulhuda, Sonny

    Published 2011
    “…The challenge is, the more a governance system is exposed to the Internet and ICT, the bigger the risks it would face. When the security of the system is not reliable enough to secure the system, information assets are at stake and the country’s critical information infrastructure (such as defence, communications, energy and medical systems) would become loophole that undermines national security. …”
    Get full text
    Proceeding Paper
  6. 706

    The legality of a living trust as an instrument for Islamic wealth management: a Malaysian perspective by Halim, Akmal Hidayah

    Published 2011
    “…This situation is inconsistent with the rule of Islamic law on gift (hibah) and succession, especially when the beneficiary is a person who has the legal capacity to own property and who may be one of the legal heirs of the deceased-settlor. …”
    Get full text
    Article
  7. 707

    Simulation of a surface transverse wave biosensor for DF-1 cells by Jamil, Nadira, Nordin, Anis Nurashikin, Mel, Maizirwan, Voiculescu, Ioana

    Published 2010
    “…Detection of chemical and biological agents in aqueous solutions is a difficult problem, especially when the detection technique has to be sensitive, power-efficient and very handy. …”
    Get full text
    Proceeding Paper
  8. 708

    Procedure for unfair dismissal claims in Malaysia by Ali Mohamed, Ashgar Ali, Sardar Baig, Farheen Baig

    Published 2009
    “…What happens when an employee loses his job or is unfairly dismissed? …”
    Get full text
    Book
  9. 709

    The rights of victims of crime under Malaysian law: legal framework and prospect for reforms by Hussin, Nasimah

    Published 2010
    “…As a result, it is claimed, victims rarely experience justice when their case is dealt with by traditional punitive methods. …”
    Get full text
    Proceeding Paper
  10. 710

    Modelling manufacturing process using a modified IDEF0 framework a case study of a car door manufacturing plant by Al-Turki , Abdullah, Faris, Waleed Fekry

    Published 2010
    “…The results obtained after the simulation of the modified model was found to be remarkable when it was verified with factory personnel. …”
    Get full text
    Article
  11. 711

    Access to justice: the human dignity of Muslim and women divorce in Malaysia by Kamaruddin, Zaleha

    Published 2009
    “…Divorce should not be a weapon llsed against spouses, but a humane practice which is resorted to in exceptional circumstances; i.e. when it is feared that the limit set by Allah SWT will be transgressed. …”
    Get full text
    Book Chapter
  12. 712

    An empirical comparison of meta analysis models for continuous data with missing standard deviations by Nik Idris, Nik Ruzni, Saidin, Norraida

    Published 2011
    “…Abstract: The choice between the Fixed and Random Effects models for providing an overall meta analysis estimates may affect the accuracy of those estimates. When the study-level standard deviations (SDs) are not completely reported or are “missing” selection of a meta analysis model should be done with more caution. …”
    Get full text
    Article
  13. 713

    A case study on the effect of imputing the missing variability measures in meta analysis by Nik Idris, Nik Ruzni

    Published 2007
    “…One of the common problems with meta analysis data is when the variability measures, specifically, the standard deviations are not reported in the individual studies. …”
    Get full text
    Proceeding Paper
  14. 714

    The invitation to treat and Mu'atah in online contracts by Razali, Siti Salwani

    Published 2009
    “…When dealing with an offer, it is crucial to determine whether a “statement” amounts to an “offer” or a mere “invitation to treat.” …”
    Get full text
    Article
  15. 715

    Design and implementation of fuzzy-based PID controller by Salami, Momoh Jimoh Eyiomika, Bulale I., Yusuf

    Published 2002
    “…One such method is based on fuzzy logic technique which is considered much more appropri.ate when precise mathematical formulation is infeasible or difficult to achieve. …”
    Get full text
    Proceeding Paper
  16. 716

    On selection of models for continuos meta analysis data with incomplete variability measures by Nik Idris, Nik Ruzni, Sarudin, Norraida

    Published 2011
    “…The choice between the fixed and random effects models for providing an overall meta analysis estimates may affect the accuracy of those estimates. When the study-level standard deviations (SDs) are not completely reported or are “missing” selection of a meta analysis model should be done with more caution. …”
    Get full text
    Article
  17. 717

    NoMadCar: the interactive design using human computer interaction techniques by Shaikh, Asadullah, Soomro, Safeeullah, Shah , Asadullah, Aziz, Abdul

    Published 2012
    “…Therefore, this paper presents the design that is used to �nd the ways how a user interface in the car can improve the driver's safety when using mobile devices such as phones and mp3 players while driving. …”
    Get full text
    Proceeding Paper
  18. 718

    Awareness of gender-sensitive expressions in the print media by Mohamed Ali, Haja Mohideen

    Published 2010
    “…The study is primarily focused on nouns which are gendered in a way regarded as inappropriate because the noun refers to the wrong gender, or it is expressed in such a manner that it excludes one of the two genders, when both should be rightly included. The paper will confine itself to local (Malaysian) news items. …”
    Get full text
    Proceeding Paper
  19. 719

    Dataset for TPB, Data Security and Perceived Benefits by Yahya, Taher Ben

    Published 2023
    “…However, there is a dilemma when this repeated action is associated with mobile phone recycling since convincing mobile users to recycle sustainably is challenging. …”
    Get full text
    Dataset
  20. 720

    Review article on Critical Management Education : review of L. Perriton and M. Reynolds, Critical Management Education: From Pedagogy of Possibility to Pedagogy of Refusal? Managem... by Schwabenland, Christina

    Published 2004
    “…Perriton and Reynolds build their article on a debate that circled around a challenge by Elizabeth Ellsworth to the field of ‘radical’ education when she published an article in 1989 that suggested that critical educationalists, while espousing Freirean emancipatory ideals, were failing to ‘confront the authoritarianism inherent within most teacher-student relationships’ (Perriton and Reynolds, 2004 p. 62); in other words, that they failed to practice what they preached. …”
    Get full text
    Article