Showing 3,661 - 3,680 results of 8,374 for search '(((pinn OR (mice OR spike)) OR (pinge OR find)) OR (spinal OR (pin OR (min OR main))))', query time: 0.09s Refine Results
  1. 3661

    Unexpected ovarian malignancy after conservative laparoscopic surgery: five case series in a half decade of experience by Abd. Wahab, Noraziana, Chalermchockchareonkit, Amphan, Chaisilwattan, Pongsakdi, Mustafa, Kamarul Bahyah

    Published 2012
    “…All patients are alive after a mean follow-up of 9–60 months with two patients developed recurrence. Conclusion The main concern for laparoscopic management of ovarian masses is unexpected malignancy. …”
    Get full text
    Article
  2. 3662

    Severe blunt external laryngotracheal trauma: surgical outcome by Raja Lope Ahmad, Raja Ahmad Al'konee

    Published 2009
    “…The aim of surgical reconstruction is to minimize the debilitating morbidity from the trauma by restoring as much as possible the main laryngeal functions of airway and speech. We reviewed four cases of severe blunt external laryngotracheal trauma and assessed the outcome of the surgical interventions. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3663

    The future skill-sets expectations of IT graduates in Malaysia IT outsourcing industry by Ahlan, Abdul Rahman, Arshad, Yusri, Suhaimi, Mohd Adam, Hussin, Husnayati

    Published 2008
    “…The four-member research team found that technical, soft and problem-solving skills are the main concerns raised by the key informants. This is in line with the literature review and also the present higher education policy concerns by the Malaysia government.…”
    Get full text
    Get full text
    Proceeding Paper
  4. 3664

    Watermarking technique based on ISB (Intermediate Significant Bit) by Zeki, Akram M., Abdul Manaf, Azizah, Olanweraju, Rashidah Funke

    Published 2010
    “…The technique is based on testing the value of the watermark pixel according to the range of each bit-plane. The main contribution of this research is replacing the classic least significant bits (LSB) technique by a new technique called intermediate significant bits ISB, which improves the robustness and maintains the quality of watermarked images.…”
    Get full text
    Proceeding Paper
  5. 3665

    Electrical automation systems towards intelligent and energy efficiency applications

    Published 2011
    “…This book contains three main parts. Part one of this book presents comprehensive automation application systems to electrical distribution industry and the equipment used. …”
    Get full text
    Book
  6. 3666

    The contribution of Hassan al-Rammah to gunpowder and rocket technology by Ahmed Ghazal, Belal, Ismail, Ahmad Faris

    Published 2011
    “…The research investigates the role of Hassan al Rammah in developing the rocket technology in the 13th century. The main focus of the research is to highlight the stages of the development of such a technology and how it was utilized by the Muslims in their war against the Mongols and the crusades during the 13th . …”
    Get full text
    Book Chapter
  7. 3667
  8. 3668

    A preliminary attempt to compare the epistemological frameworks of the scientific traditions in the West and in Islam by Saparmin, Norzakiah

    Published 2010
    “…On the other hand, in the second half of the paper, we will focus on how Islamic epistemology responds to this Descartes dualistic vision and we will see of how Islamic epistemology had already proposed a complex resolution in order to overcome this dualistic vision without overthrowing the basic hierarchy that separates man and nature. Our main source of reference is Professor Syed Muhammad Naquib al- Attasʼs philosophy of science in Islam which we believe is enough to fulfill the purpose of our paper.…”
    Get full text
    Article
  9. 3669

    Wireless sensor networks: current status and future trends

    Published 2012
    “…The book covers the various issues associated with WSNs, including: their structure, activities, and applications. It consists of five main sections divided into 17 chapters. Consequently, this book could be subdivided into five distinct sections.…”
    Get full text
    Get full text
    Get full text
    Book
  10. 3670

    Intrusion detection and prevention in wireless sensor networks by Abduvaliyev, Abror, Pathan, Al-Sakib Khan, Zhou, Jianying, Roman, Rodrigo, Wong, Wai-Choong

    Published 2013
    “…This chapter surveys recently proposed works on Intrusion Detection Systems in WSNs, and presents a comprehensive classification of various IDS approaches according to their employed detection techniques. The three main categories explored in this chapter are anomaly detection, misuse detection, and specification-based detection protocols. …”
    Get full text
    Book Chapter
  11. 3671

    Evaluation of different control policies of semi-active MR fluid damper of a quarter-car model by Rahman, Mahmudur, Rashid, Muhammad Mahbubur, Abdul Muthalif, Asan Gani, Kasemi, Banna

    Published 2012
    “…The quarter-car model is executed using step input with two most common and effective control algorithm in vehicle suspension control which are linear quadratic regulator control, and Proportional Integral Derivative control algorithm. The main objective of this study is to evaluate performances of these control algorithms.…”
    Get full text
    Article
  12. 3672
  13. 3673

    Watershed and river basin management by Zainudin, Zaki, Koning, Wendell, Weyand, Michael, Kelderman, Peter, Crabtree, Bob

    Published 2012
    “…We review six emerging trends related to water science, research and management. One of the main issues, which have come under the close scrutiny of the W&RBM SG, is international transboundary water management, where a position paper was produced, elaborating various issues related to the subject matter and was presented at the IWA 2010 Young Water Professionals (YWP) conference in Kuala Lumpur, Malaysia. …”
    Get full text
    Book Chapter
  14. 3674

    Comparative analysis between bloom’s and Malik Badri’s taxonomies of thinking process by Abdullah, Norillah, Syed Hassan, Sharifah Sariah

    Published 2011
    “…The methodology of this research is based on the philosophical analysis and historical development of Bloom taxonomy and Malik Badri in order to identify the main differences between their taxonomies of the thinking process.…”
    Get full text
    Get full text
    Proceeding Paper
  15. 3675

    Modelling of impact on sandwich structure for fast maintenance loops by Castanie, Bruno, Aminanda, Yulfian, Schwob, Cyrille

    Published 2012
    “…The modeling of low velocity/low energy impact, which can lead to a decrease of the structure strength by 50%, remains a designer’s main problem. Since this type of impact has the same effect as quasi-static indentation, the study first focuses on the behavior of honeycomb cores under compression. …”
    Get full text
    Proceeding Paper
  16. 3676

    Assessing the Viability of the 2005 Protocol to the Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation by Hamid, Abdul Ghafur@Khin Maung Sein, Kyaw Hla Win @ Md. Hassan Ahmed, Hassan

    Published 2012
    “…This is the reason why although the 2005 Protocol entered into force on 28 July 2010, until present, there are only 22 States parties, most of which are not major maritime countries. The main objective of this paper therefore is to identify shortcomings of the 2005 Protocol and assess its viability. …”
    Get full text
    Article
  17. 3677

    Employability Skills Development Approaches: An Application of Importance-Performance Analysis and Analytic Network Process by Islam, Rafikul, Abdul Hamid, Mohd Shukri, Abd. Manaf, Noor Hazilah

    Published 2012
    “…Therefore, higher education institutions must evaluate the effectiveness of employability skills development approaches on graduates’ employability skills. The main objectives of this study are to determine importance weights of Malaysian graduates’ employability skills and to identify the most effective employability skills development approaches. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 3678

    Adequacy of legislation in protecting the rights of muslim women against spousal violence in Malaysia by Che Soh @ Yusoff, Roslina, Abdul Hak, Nora, Ibrahim, Norliah

    Published 2012
    “…In the Muslim community, spousal violence has become one of the main issues of concern due to different interpretations of Islamic teaching on gender roles between men and women within varying historical and cultural contexts. …”
    Get full text
    Article
  19. 3679

    The Qur`anic approach on science as source of ideas and research motivation by Shogar, Ibrahim

    Published 2011
    “…The main objective of this study is reflection on the Qur`anic approach on science. …”
    Get full text
    Book Chapter
  20. 3680

    Web-Based Database and SMS to Facilitate Healthcare Medical Emergency by Hameed, Shihab A., M. Sharifudeen, Shahina Shabnam, Chek Nuh, Nur Hafizah, Salim, Nur Huda, Hassan Abdalla Hashim, Aisha, Khalifa, Othman Omran

    Published 2011
    “…The fully computerizing and combining of such medical systems will lead to produce a Novel Integrated Healthcare Medical Emergency Model (IHMEM). IHMEM includes three main parts: The web based database, the intelligent agent, and the mobility. …”
    Get full text
    Proceeding Paper