-
481
-
482
-
483
Some applications of generalised linear models
Published 1990“…This technique is applied to standard link functions as well as to the family of composite link functions. …”
Get full text
Thesis -
484
-
485
Photolysis of 1-Octene and Molybdenum Hexacarbonyl in Tetrahydrofuran
Published 1977Get full text
Article -
486
Baik buruk nikah di Thailand
Published 2007“…Persoalannya, kenapa lelaki dan wanita Islam di Malaysia perlu membelanjakan wang yang banyak untuk berkahwin di selatan Thailand sedangkan di Malaysia proses perkahwinan di pejabat kadi lebih tersusun dan terjamin?…”
Get full text
Article -
487
Physico-mechanical properties of polymer concrete containing micro-filler of palm oil fuel ash
Published 2018“…Objective of this study is to present a research conducted on ground (fine) and unground (coarse) POFA in polymer concrete (PC) followed by determination on the physico-mechanical properties of PC. …”
Article -
488
Bitumen modification using oil palm fruit ash for stone mastic asphalt
Published 2024Get full text
Thesis -
489
Empowering society for better corporate social responsibility (CSR): The case of Malaysia
Published 2013“…. © Penerbit Universiti Sains Malaysia, 2013. …”
Get full text
Article -
490
Profiling the first-degree graduates' employability: a longitudinal analysis
Published 2008Get full text
Book Chapter -
491
Fikrah Dr. Salam: 3 tahun tak 'disentuh'
Published 2009“…1- Wang hasil peragaan dedah aurat tak halal 2- Mahu kawin tetapi kekasih masih belajar …”
Get full text
Get full text
Article -
492
-
493
Development of coated peanut separator and frying skillet machine
Published 2018“…The groundnut is sticking and become like a ping pong size ball and the time consuming to fry is longer. …”
Get full text
Article -
494
Influence of mesh sizes and orientations on expanded aluminium sheets on tensile performances
Published 2022“…According to the results of the experiment, specimens with fine mesh have higher tensile stress, which is 44.90 MPa for fine mesh specimens with a 30° orientation, compared to medium and coarse mesh sizes, which have the lowest strength, which is 7.06 MPa for coarse mesh specimens with a 60° orientation. …”
Get full text
Conference or Workshop Item -
495
Cryptanalysis of improved password authentication scheme with smart cards
Published 2008“…We prove that, in spite of the improvement of Yang-Wang-Chang's scheme, Kim et al.'s solution is still vulnerable to a type of forgery attack. …”
Get full text
Proceeding Paper -
496
The Exploration of the Characteristics of Concrete Incorporating Ultrafine Coal Bottom Ash and Spent Garnet
Published 2024“…Two such materials, ultrafine coal bottom ash (uCBA) and spent garnet (SG), have shown potential as substitutes for cement and fine aggregate, respectively. This research examines the effectiveness of uCBA as a partial replacement for cement and SG as a partial replacement for fine aggregate in concrete, at varying levels of 3%, 6%, and 9% for uCBA and 10%, 20%, and 30% for SG. …”
Get full text
Article -
497
The Exploration of the Characteristics of Concrete Incorporating Ultrafine Coal Bottom Ash and Spent Garnet
Published 2024“…Two such materials, ultrafine coal bottom ash (uCBA) and spent garnet (SG), have shown potential as substitutes for cement and fine aggregate, respectively. This research examines the effectiveness of uCBA as a partial replacement for cement and SG as a partial replacement for fine aggregate in concrete, at varying levels of 3%, 6%, and 9% for uCBA and 10%, 20%, and 30% for SG. …”
Get full text
Article -
498
Gender categorization between Islam and science: the problem of integration from Islamic jurisprudence perspective
Published 2016“…Pengelasan jurudikal perduaan bagi manusia kepada lelaki (Dhakar) dan perempuan (untha) dirukunkan mengikut kesimpulan sains. Walau bagaimanapun, konfigurasi hermafrodit (khuntha) dalam jurisprudens Islam memberi satu masalah di mana berlaku ketakselarasan yang dapat diperhatikan di antara sains dan undang-undang Islam. …”
Get full text
Article -
499
Wireshark window authentication based packet captureing scheme to pervent DDoS related security issues in cloud network nodes
Published 2015“…As a result, the cloud node response is slow as usual and resource on cloud network becomes unavailable. Some Dos attacks are Ping of Death, Teardrop, Snork, Locking authentication, SYN flooding, Operating System Attacks etc. …”
Get full text
Get full text
Proceeding Paper -
500
The role of values in determining graduates' employability and satisfaction of academic programmes
Published 2008Get full text
Book Chapter