-
2061
Change management and its contribution to the success of IT project implementation
Published 2013“…It has been shown that the numbers of IT projects failure are currently high and this due to various factors but the main factor stated was poor project management. Additionally, time gets change from day-to-day rapidly and creating a dynamic organization becomes very challenging. …”
Get full text
Article -
2062
Involvement of corporate entities in Waqaf management: experiences of Malaysia and Singapore
Published 2013“…The main focus of this paper is to examine the corporate management models of selected waqaf entities in Malaysia and Singapore. …”
Get full text
Article -
2063
Experimental study of flank wear in high speed turning of stainless steel AISI 304
Published 2013“…One of the main approaches to reduce the machining time in metal cutting is High Speed Turning (HST). …”
Get full text
Article -
2064
The entitlement of the Bayt al-Mal to a muslim praepositus’ estates; an analysis on the right of a Muslim to bequeath without obtaining a consent from the Bayt al-Mal
Published 2012“…It originated during the Prophet Muhammad s.a.w. time but not as an institution. Its main function is to administer wealth contributed and acquired by Muslims through various sources. …”
Get full text
Article -
2065
Knowledge Transfer Program (KTP) from International Islamic University Malaysia (IIUM): leveraging MyEntrepreneur2Cloud and Network of Mosque (NoM) to obliterate poverty in Malaysi...
Published 2013“…Eradicating poverty has become the main concern in most developed countries. In this paper, the authors elaborate on how Knowledge Transfer Program (KTP) from International Islamic University Malaysia (IIUM) would support Malaysia to obliterate the poverty. …”
Get full text
Proceeding Paper -
2066
The state of the art in intrusion prevention and detection
Published 2014“…To tackle intrusion of various kinds, we commonly hear about Intrusion Detection System (IDS) and Intrusion Prevention System (IPS), or a combination of both called, IDPS (Intrusion Detection and Prevention System). The main task of an IDS is to defend a computer system or computer network by detecting an attack and possibly repealing it. …”
Get full text
Get full text
Book -
2067
Recognition techniques for online Arabic handwriting recognition systems
Published 2012“…Most of the researches on online text recognition have divided the recognition system into these three main phases which are preprocessing phase, feature extraction phase and recognition phase which considers as the most important phase and the heart of the whole system. …”
Get full text
Proceeding Paper -
2068
Shari’ah governance for Islamic capital market: a step forward
Published 2013“…It has been acknowledged by the scholars on the need for this development to cater for the Islamic banking, Takaful and Islamic capital market industries. These three main industries are interrelated and dependent on each other in order to ensure that the whole Islamic financial system is in compliance with the Islamic principles. …”
Get full text
Article -
2069
Feature extraction techniques of online handwriting arabic text recognition
Published 2013“…Most of the online text recognition systems consist of three main phases which are preprocessing, feature extraction, and recognition phase. …”
Get full text
Get full text
Proceeding Paper -
2070
Utilization of mobile apps among student with learning disability from Islamic perspective
Published 2013“…Living in a society in which information and communication technology (ICT) is so pervasive is quite challenging. The main purpose of this paper is to discuss the literature on use of mobile application technology for students with learning disability (SLD) in Malaysia environment from Islamic perspective. …”
Get full text
Get full text
Proceeding Paper -
2071
حوار الأديان بين بناء جسور التفاهم وحفظ الهوية (Inter-religious dialogue between building bridges of mutual understanding and preservation of identity)...
Published 2010“…Therefore, this article is an attempt to analyse the issues pertaining to the concepts,principles, objectives, approaches and organization of inter-religious dialogue in the light of the increasing global phenomenon of utilizing this means to promote certain vested interests, to dilute cultural identities of certain peoples, and to win the “war of ideas”. The main argument in this essay is that for any interreligious dialogue to achieve its noble objectives mentioned above, it is necessary that it be established on sound and non-partisan principles and guidelines.…”
Get full text
Article -
2072
Work-Family Conflict, Work- and Family-Role Salience, and Women's Well-Being
Published 2004“…The author observed a direct effect of role salience in the prediction of job satisfaction; work salience was positively related to job satisfaction, over and above the main-effect terms of work-interfering-with-family (WIF) conflict and family-interfering-with-work (FIW) conflict. …”
Get full text
Article -
2073
Knowledge and accessibility of Muslim women to the law on post-divorce financial support
Published 2010“…The main objective of the study was to determine the Muslim women's knowledge and accesibility to the law on post divorce financial support particularly that which relates to 'iddah maintenance, mut'ah,arrears of maintenance and child maintenance. …”
Get full text
Article -
2074
Let’s move to “Universal Corporate Governance Theory”
Published 2013“…Therefore, these governance failures motivate the researchers to revisit and evaluate corporate governance theories from the ethical point of view. The main aim of this study is to propose “The Universal Corporate Governance Theory” which is developed based on the ethical teachings of Christians, Judaism, Islam, Sikh, Hinduism and Buddhism. …”
Get full text
Article -
2075
Adequacy of legal protection for women against domestic violence: revisiting the current policies & laws in Malaysia
Published 2013“…In Malaysia, the issue of domestic violence on women is one of the main agendas of the government’s policy on women. …”
Get full text
Get full text
Proceeding Paper -
2076
Determinants of risk tolerance on financial asset ownership: a case of Malaysia
Published 2013“…The present study intends to shed new light on the issue of determinants of risk tolerance among Malaysians using data obtained from a survey. The main analysis is based on ordinary least square (OLS) method of regression using level of financial risk tolerance as the dependent variable and socio–economic factors as regressors. …”
Get full text
Article -
2077
Antecedents of zakat payers’trust in an emerging zakat sector : an exploratory study
Published 2013“…Design/methodology/approach – Based on the literature review and experience survey, a context specific questionnaire was developed as the main method of quantitative data collection. The instrument was administered to a sample of Muslim professionals who observe religious seclusion in the last ten days of the Islamic fasting month (itqaf) in 12 purposely selected mosques across four states and the federal capital territory. …”
Get full text
Article -
2078
Validating the model of predictors of academic self-handicapping behavior
Published 2013“…The main aim of the present study is to validate the model of predictors of self-handicapping behavior (POASH) on the data derived from undergraduate students in an ongoing co-curriculum compulsory course. …”
Get full text
Proceeding Paper -
2079
Natural ventilation around open ground floor or pilotis of high rise residential building: harmonization of modern with traditional housing in tropical areas
Published 2012“…In Malaysian villages, traditional Malay houses are the most common type of housing. One of the main features of these traditional houses, which are located in hot and humid areas of Malaysia, is an open ground floor created by using pilotis, which raises the first floor of the house, leaving the ground floor open (Fig. 1). …”
Get full text
Proceeding Paper -
2080
Design a tacit knowledge sharing system
Published 2013“…Knowledge can be classified into two main parts: tacit knowledge and explicit knowledge. …”
Get full text
Article