-
3261
Properties and performance of high strength fibre reinforced concrete by using steel and polypropylene fibres
Published 2019“…Discrete short fibre reinforcement is being considered to be used for structural applications since it can reduce cracking phenomena, improve ductility and failure mode, and to some extent improve the durability of reinforced concrete. …”
Get full text
Thesis -
3262
On the efficiency of the Malaysian banking Sector: a risk-return perspective
Published 2009“…The results also suggest that all the banks which have managed to appear on the efficiency frontier are mainly based on the relatively higher mean returns rather than lower standard deviations and/or beta. …”
Get full text
Article -
3263
-
3264
The concept of barrier free in healthcare spaces: Labour delivery room design case study
Published 2011“…Literature review on the process of design and activities of labour were conducted prior visits to selected facilities for observation on its usage. Interview of the main players in the design decisions were made pre and post visit where relevant. …”
Get full text
Proceeding Paper -
3265
Origin, ideology and the leadership hierarchy of Al-Shabaab movement
Published 2011“…The main purpose of this research is to explore the history and origin of al-Shabaab movement in East Africa. …”
Get full text
Proceeding Paper -
3266
Development of chitosan-α-mangostin loaded nanoparticles as an anticancer agent
Published 2011“…α-Mangostin is one of the main active constituents that can be isolated from the stem bark of Garcinia malaccensis (GM) and has been documented to exert different cytotoxic activities against many cancerous cell lines. …”
Get full text
Proceeding Paper -
3267
Antimicrobial properties of local vegetable amaranth (Amaranthus Gangeticus)
Published 2008Get full text
Proceeding Paper -
3268
Antimicrobial properties of local green seaweed (Caulerpa Racemosa) in Langkawi
Published 2008Get full text
Proceeding Paper -
3269
Information flows of reporting on terrorism attack by online news portal
Published 2017“…Therefore, this article is specially designed to explore on how the main online news portals in Europe (http://www.euronews.com/) and Africa (http://allafrica.com/) report issues on recent attacks in Paris and Mali. …”
Get full text
Article -
3270
Unexpected ovarian malignancy after conservative laparoscopic surgery: five case series in a half decade of experience
Published 2012“…All patients are alive after a mean follow-up of 9–60 months with two patients developed recurrence. Conclusion The main concern for laparoscopic management of ovarian masses is unexpected malignancy. …”
Get full text
Article -
3271
-
3272
The future skill-sets expectations of IT graduates in Malaysia IT outsourcing industry
Published 2008“…The four-member research team found that technical, soft and problem-solving skills are the main concerns raised by the key informants. This is in line with the literature review and also the present higher education policy concerns by the Malaysia government.…”
Get full text
Get full text
Proceeding Paper -
3273
Watermarking technique based on ISB (Intermediate Significant Bit)
Published 2010“…The technique is based on testing the value of the watermark pixel according to the range of each bit-plane. The main contribution of this research is replacing the classic least significant bits (LSB) technique by a new technique called intermediate significant bits ISB, which improves the robustness and maintains the quality of watermarked images.…”
Get full text
Proceeding Paper -
3274
The Islamic built environments perception in Malaysia
Published 2011“…The main purpose of this paper is to highlight the issues regarding the Islamic built environment in Malaysia. …”
Get full text
Book Chapter -
3275
The Consequences of comprising politics : The United States and the Arab Countries of the Middle East
Published 2009“…Bush revolved around three main issues: waging war on “terrorism,” applying liberal democracy and liberal economy. …”
Get full text
Book -
3276
Electrical automation systems towards intelligent and energy efficiency applications
Published 2011“…This book contains three main parts. Part one of this book presents comprehensive automation application systems to electrical distribution industry and the equipment used. …”
Get full text
Book -
3277
The contribution of Hassan al-Rammah to gunpowder and rocket technology
Published 2011“…The research investigates the role of Hassan al Rammah in developing the rocket technology in the 13th century. The main focus of the research is to highlight the stages of the development of such a technology and how it was utilized by the Muslims in their war against the Mongols and the crusades during the 13th . …”
Get full text
Book Chapter -
3278
A preliminary attempt to compare the epistemological frameworks of the scientific traditions in the West and in Islam
Published 2010“…On the other hand, in the second half of the paper, we will focus on how Islamic epistemology responds to this Descartes dualistic vision and we will see of how Islamic epistemology had already proposed a complex resolution in order to overcome this dualistic vision without overthrowing the basic hierarchy that separates man and nature. Our main source of reference is Professor Syed Muhammad Naquib al- Attasʼs philosophy of science in Islam which we believe is enough to fulfill the purpose of our paper.…”
Get full text
Article -
3279
Wireless sensor networks: current status and future trends
Published 2012“…The book covers the various issues associated with WSNs, including: their structure, activities, and applications. It consists of five main sections divided into 17 chapters. Consequently, this book could be subdivided into five distinct sections.…”
Get full text
Get full text
Get full text
Book -
3280
Intrusion detection and prevention in wireless sensor networks
Published 2013“…This chapter surveys recently proposed works on Intrusion Detection Systems in WSNs, and presents a comprehensive classification of various IDS approaches according to their employed detection techniques. The three main categories explored in this chapter are anomaly detection, misuse detection, and specification-based detection protocols. …”
Get full text
Book Chapter