-
41
-
42
Group portrait of five men and a boy
Photograph -
43
Pembangunan kerangka pengurusan risiko pendidikan luar di Institut Pendidikan Tinggi Malaysia
Published 2018“…Data kualitatif telah dianalisis menggunakan teknik Fuzzy Delphi Method dalam mendapatkan kesepakatan pakar bagi mengenal pasti kedudukan item pengurusan risiko pendidikan luar dan data kuantitatif telah dianalisis menggunakan perisian Winsteps version V3.69.1.11. Kesemua konstruk dan item pengurusan risiko pendidikan luar mempunyai indeks kebolehpercayaan Fleiss Kappa antara 0.73 hingga 0.93, nilai kebolehpercayaan individu ialah 0.94 dan nilai kebolehpercayaan item ialah 0.80. …”
Get full text
Get full text
Get full text
Thesis -
44
Solidification, microstructure and mechanical properties of Mg-2.8Nd-1.5Gd-0.5Zn-0.5Zr cast alloy with erbium addition
Published 2018“…The thermal parameters of Mg-2.8Nd-1.5Gd-0.5Zn-0.5Zr cast alloy with 0.25 wt.% of erbium (Er) were evaluated by the computer-aided cooling curve thermal analysis(CA CCTA), whereas the microstructure analysis was investigated by the optical microscope and scanning electron microscopy. …”
Get full text
Article -
45
Design and Validation of a Compact 3.5GHz Antenna for 5G-based IoT Applications
Published 2023“…In this research, we designed a compact wideband 3.5GHz antenna for 5G-based IoT applications using CST Studio software. …”
Get full text
Article -
46
-
47
Minutes of meeting. 5 March 1987
Published 1987“…Minutes of the meeting of Council of Irish County Associations (CICA), held on 5 March 1987. Three manuscript papers inserted in the minute book 1983-1987.…”
Get full text
Get full text
Minutes -
48
Minutes of meeting. 5 May 1981
Published 1981“…Typewritten minutes of meeting of Leitrim Association in London, held on 5 May 1981. Includes Silver Jubilee guest list and agenda for the meeting on 18 May 1981.…”
Get full text
Minutes -
49
-
50
-
51
Strange hadron production in pp and pPb collisions at root(NN)-N-s=5.02 TeV
Published 2020“…The transverse momentum (pT) distributions of Lambda, Xi(-), and Omega(-) baryons, their antiparticles, and K-S(0) mesons are measured in proton-proton (pp) and proton-lead (pPb) collisions at a nucleon-nucleon center-of-mass energy of 5.02 TeV over a broad rapidity range. The data, corresponding to integrated luminosities of 40.2 nb(-1) and 15.6 mu b(-1) for pp and pPb collisions, respectively, were collected by the CMS experiment. …”
Get full text
Get full text
Article -
52
Culture of five species of Malaysia indigenous freshwater microalgae
Published 2016“…Five species of Malaysia indigenous chlorophycean microalgae were grown in laboratory culture under the comparable environmental condition and the population doubling time (td) as well as maximum growth rate (μmax) each was evaluated. …”
Get full text
Proceeding Paper -
53
Energy efficiency lighting system for a Kolej Kemahiran Tinggi Mara Ledang (KKTM Ledang)
Published 2020Get full text
Conference or Workshop Item -
54
Assessment of animal diversity in Pulau Tinggi, Mersing, Johor for conservation and indicator for potential wildlife tourism
Published 2020“…Pulau Tinggi is a marine park that is located in Mersing, Johor. …”
Get full text
Get full text
Get full text
Thesis -
55
Penerapan kemahiran berfikir aras tinggi dalam pengajaran pendidikan Islam berasaskan kaedah simulasi
Published 2019“…Secara khususnya, objektif kajian ini menfokuskan kepada mengenal pasti tahap pengetahuan guru menggunakan kaedah simulasi sebagai kaedah pengajaran yang disarankan oleh Bahagian Perkembangan Kurikulum (BPK) Kementerian Pendidikan Malaysia (KPM), seterusnya mengenal pasti kebolehan guru dalam menggunakan kaedah simulasi dalam pengajaran, penerapan Kemahiran Berfikir Aras Tinggi (KBAT) dan seterusnya menghasilkan satu garis panduan guru untuk melaksanakan proses pengajaran dan pembelajaran menggunakan kaedah simulasi berasaskan dapatan kajian. …”
Get full text
Get full text
Get full text
Thesis -
56
-
57
-
58
Achieving security for images by LSB and MD5
Published 2012“…This method creates a random dispersion of bits of the message in the picture, and it would be difficult to extract the message without the password key .After creation of the hidden message, the image will pass it in hash function to obtain hashing value using the MD5 technique. This value will be fixed as long as there has been no change to the picture. …”
Get full text
Article -
59
-
60