-
321
An investigation of base flow control by wall pressure analysis in a suddenly expansion nozzle
Published 2016“…For some combination of the NPR and L/D ratio the flow field in the duct becomes oscillatory which; indicates that the flow in the duct is dominated by the waves however, it remained same even when the control in the form of micro jets are activated. …”
Get full text
Article -
322
Prototype modeling of security system with metal detector
Published 2007“…If the item is not registered then, the alarm will give a warning when it passes through the electromagnetic gate. …”
Get full text
Proceeding Paper -
323
Home financing through the Musharakah Mutanaqisah contracts: Some practical issues
Published 2009“…This paper discusses these issues. When not profitable for the banks when rentals rates fall short of interest rates, the MMP can be implemented through cooperatives, which can be also an investment avenue for members.…”
Get full text
Article -
324
An analysis of Zakat expenditure and real output: theory and empirical evidence
Published 2009“…Likewise zakat disbursement is increased when the economy is in the downswing to increase aggregate spending. …”
Get full text
Proceeding Paper -
325
Home Financing through the Musharakah Mutanaqisah Contracts: Some Practical Issues
Published 2007“…This paper discusses these issues. When not profitable for the banks when rentals rates fall short of interest rates, the MMP can be implemented through cooperatives, which can be also an investment avenue for members. …”
Get full text
Proceeding Paper -
326
Unrolling the text: using scrolls to facilitate academic reading
Published 2019“…We conclude with an example of what happened when one of our staff participants took scrolls back to her third year Design students, and we argue that utilising emancipatory teaching practices can make higher education more inclusive.…”
Get full text
Get full text
Article -
327
Gender and the translation of audiovisual non-profit advertising
Published 2016“…This paper aims to explore to what extent students enrolled on Translation and Advertising courses are gender aware, i.e. whether they perceive that the decisions they take when translating or creating nonprofit advertisements which present gender-related concerns may have an impact on the social perception of gender. …”
Get full text
Article -
328
Network security analytics on the cloud: public vs. private case
Published 2023“…It has many of the advantages of the big public clouds but fundamentally differs from them when it comes to data management, operation interoperability, and costs. …”
Get full text
Conference or Workshop Item -
329
Partnering with AI for instrument development: possibilities and pitfalls
Published 2025“…Recent advances in generative artificial intelligence (AI), specifically large language models (LLMs), provide new possibilities for researchers to partner with AI when developing and refining psychological instruments. …”
Get full text
Article -
330
Trust Evaluation Model in IoT Environment: A Comprehensive Survey
Published 2023“…Trust is used to reduce the risk of insecurity when nodes are connected to the Internet. In an IoT environment, various trust models have been proposed for Wireless Sensor Networks (WSNs) and Radio Frequency Identification (RFID). …”
Get full text
Article -
331
Mahathir as the Prime Minister: Peak of “Paternalistic Leadership” In Malaysia
Published 2023“…The initial stance of this article was taken with reference to a previous study when Mahathir took office as the 4th Prime Minister of Malaysia. …”
Get full text
Article -
332
Trust Evaluation Model in IoT Environment: A Comprehensive Survey
Published 2023“…Trust is used to reduce the risk of insecurity when nodes are connected to the Internet. In an IoT environment, various trust models have been proposed for Wireless Sensor Networks (WSNs) and Radio Frequency Identification (RFID). …”
Get full text
Article -
333
Trust Evaluation Model in IoT Environment: A Comprehensive Survey
Published 2023“…Trust is used to reduce the risk of insecurity when nodes are connected to the Internet. In an IoT environment, various trust models have been proposed for Wireless Sensor Networks (WSNs) and Radio Frequency Identification (RFID). …”
Get full text
Article -
334
Experimental and Numerical Investigations of Underground Coal Gasification (UCG) Using Half-teardrop Shape Cavity
Published 2023“…The CFD results show that the area of high temperature in the UCG cavity is larger when the ER was greater.…”
Get full text
Article -
335
Mahathir as the Prime Minister: Peak of “Paternalistic Leadership” In Malaysia
Published 2023“…The initial stance of this article was taken with reference to a previous study when Mahathir took office as the 4th Prime Minister of Malaysia. …”
Get full text
Article -
336
Modelling and simulation of wireless information and power exchange protocol with power splitting for energy sustainability in device-to-device communications
Published 2019“…The nodes only wake up when they want to send or communicate with other nodes. …”
Get full text
Get full text
Thesis -
337
Battery charging and discharging control of a hybrid energy system using microcontroller
Published 2020“…The control system that has been designed has the ability to choose the right DC source when the battery capacity is less than 80%. This system also has a good ability to choose a battery source when the battery reaches 100% capacity and the DC source has a voltage drop of more than 20%. …”
Get full text
Article -
338
Effect of calcination temperature on bilayer TiO2/ZnO and ZnO/TiO2 thin films
Published 2018“…Thin films are produced on glass substrate via spin coating method at speed of 3000 rpm and were calcined at different calcination temperatures that are 400 oC, 500 oC, and 600 oC. …”
Get full text
Get full text
Get full text
Thesis -
339
صكوك المضاربة والمشاركة في ضوء البيان الصادر عن هيئة المحاسبة والمراجعة للمؤسسات المالية الإسلامية لعام 2008 : التحديات والفرض Sukuk al-Mudharibah w al-Musharikah fi Dhu'i al-Bay...
Published 2009“…However, when sukuk start to use equity contracts like mudarabah and musharakah, such fixed income characteristic created some anomalous situations and conflicts. …”
Get full text
Article -
340