-
241
-
242
-
243
-
244
-
245
Teaching English literature at IIUM: Islamic perspectives on selected twentieth-century texts
Published 2016“…Based on this theoretical premise, this paper will establish the necessity of critically evaluating English literary texts in a Muslim setting and of bringing in Islamic perspectives in pedagogical practices at such an Islamic university as International Islamic University Malaysia (IIUM). …”
Get full text
Get full text
Get full text
Article -
246
-
247
Naqd and Islah : Ibn ‛Ashur’s comprehensive critique and reform efforts regarding Islamic learning and education
Published 2012“…Special attention has been given to highlighting Ibn ‛ÓshËr’s identification of the internal and external factors that led to the decline of Muslim education and left it in a state of crisis, unable to cope with the modern challenges of life. The article also brings into light Ibn ‛Ashur’s theoretical and practical approach rejuvenating Islamic education in accordance with its original spirit and worldview. …”
Get full text
Article -
248
Formulation of hybrid 3D image segmentation algorithm based partial differential equation
Published 2012“…One of the best segmentation methods that can perform 3D segmentation is the level-set method which has its mathematical foundation in partial differential equation (PDE). Owing to its complex nature, it exhibits a level of unacceptable sluggishness on implementation hence a need to hasten up the process by hybridizing it with a faster region-based segmentation method which is inherently a logical approach to segmentation pivoted on thresholding but not as good in segmentation as the former. …”
Get full text
Get full text
Proceeding Paper -
249
Techniques for extraction of bioactive compounds from plant materials: a review
Published 2013Get full text
Article -
250
User-centered web development for GMI alumni website
Published 2010“…In addition, the World Wide Web (WWW)technology is an appropriate partner with the internet that brings pleasant facility in order to facilitate people's daily lives. …”
Get full text
Proceeding Paper -
251
Computational intelligence: It’s application in digital watermarking
Published 2013“…CI has been applied in digital watermarking to improve performance in order to curb piracy. This paper brings to view of computational intelligence techniques specifically the Artificial Neural Network (ANN); generalizations of mathematical models based on biological nervous systems and its applications in digital watermarking. …”
Get full text
Article -
252
Comparison of empirical propagation path loss models for mobile communications in the suburban area of Kuala Lumpur
Published 2011“…They become important tools in both research and industrial communities owing to their speed of implementation and their limited dependence on detailed knowledge of the terrain. …”
Get full text
Proceeding Paper -
253
-
254
Wavelet cesptral coefficients for isolated speech recognition
Published 2013“…In traditional cepstral analysis, the cepstrums are calculated with the use of the Discrete Fourier Transform (DFT). Owing to the fact that the DFT calculation assumes signal stationary between frames which in practice is not quite true, the WCC replaces the DFT block in the traditional cepstrum calculation with the Discrete Wavelet Transform (DWT) hence producing the WCC. …”
Get full text
Article -
255
Information leakage through online social networking: Opening the doorway for advanced persistence threats
Published 2010“…It also describes how OSN becomes an attack vector of APT owing to employees’ social networking behaviour, and finally, recommends security education, training and awareness (SETA) for organisations to combat these threats.…”
Get full text
Proceeding Paper -
256
Information Leakage through online social networking: opening the doorway for advanced persistence threats
Published 2011“…It also describes how OSN becomes an attack vector of APT owing to employees’ social networking behaviour, and finally, discusses security education, training and awareness (SETA) for organizations to combat these threats.…”
Get full text
Article -
257
-
258
Language planning and policy in Nigeria: the prospects of arabic language
Published 2015“…Several efforts are been made to influence the function of Arabic language in Nigeria owing to its long historical antecedents in the country but successive governments have been coming up with different language policies that contribute to the development and decline of the use of Arabic language in Nigeria. …”
Get full text
Get full text
Article -
259
Throughput evaluation for the downlink scenario of co-tier interference in heterogeneous network
Published 2015“…To extend the coverage and capacity of Heterogeneous Networks (HetNets), femtocells (HeNodeBs) has been impressive to deploy in in-house or apartment. Owing to co-channel spectrum involvement these HeNodeB sources Co-Tier interference (CTI) with neighbor HeNodeBs and users of HeNodeB (HUE) in orthogonal frequency division multiplexing Access (OFDMA). …”
Get full text
Article -
260
Joint ventures in construction 2: contract, governance, performance and risk
Published 2012“…Joint Ventures in Construction 2: Contract, Governance, Performance and Risk is the selected proceedings of a series of International Conferences on Multi-national Joint Ventures for Construction Works, held each year since 2005. This book brings together the highlights from the 2008-2011 conferences, focusing on key issues including - contract and associated administrative structures - governance, dispute, and dispute resolution - performance and risk - managing stakeholder expectations. …”
Get full text
Book