-
321
Epistemology - An Islamic perspective
Published 2011“…In this paper we will discuss the background of epistemology, different areas of epistemology-like source, types (revealed and derived), elements in Islam, principles (Unity of Allah, unity of creation,and unity of thoughts) and limitations.…”
Get full text
Article -
322
Twist analysis of piezoelectric laminated composite plates
Published 2006“…Twist control of helicopter rotors, micromirrors or shafts in torsional oscillation are the active areas of research where smart materials like piezoceramic crystal or shape memory alloy can play vital roles. …”
Get full text
Proceeding Paper -
323
Banding for access related iscaemia : our experience in Kuantan, Malaysia
Published 2014“…One of the recognized treatment strategies is banding of the fistula. We would like to present our result for the past year in employing this strategy in our local community in Kuantan, Malaysia…”
Get full text
Proceeding Paper -
324
Between monotheism and tawhid: a comparative analysis
Published 2013“…In the contemporary academic domains, there are incidents where ‘monotheism’ and ‘tawhid’ are employed as synonymous terms; as if these concepts signify the same conceptual denotations about the belief and the unity of God; and as a result, religious faiths like Judaism, Christianity and Islam, are categorized as monotheists. …”
Get full text
Article -
325
On beauty: an Islamic perspective
Published 2012“…It starts off by identifying the real meaning of beauty in Lisan al-Arab, the famous Arabic lexicon and then attempts to explain the authentic tradition reported in Muslim in which Abdullah ibn Mas'ud relates that "Allah is Elegant and Beautiful and He like elegance and beauty". Here he researcher totally relies on the explanations of the two most noted Muslims in the area of metaphysics, namely Imam al-Ghazali and Ibn Qayyim al-Jawziyya.…”
Get full text
Monograph -
326
Where is the intelligence in computational intelligence?
Published 2005“…However, the term is very frequently used in various fields of computer science like web intelligence, machine intelligence, artificial intelligence and overall in the computational intelligence. …”
Get full text
Proceeding Paper -
327
Arcosanti: grow, don't sprawl
Published 2017“…The mass of Arcosanti seems to emerge from the Sonoran Desert like one of the many rocky formations that mushroom across the plains. …”
Get full text
Article -
328
Implementation and self-checking of different adder circuits
Published 2020“…Basically, all types of the complex adder circuits are made up from the simple adder circuits (or called basic building blocks of adder) like half adder and full adder.…”
Get full text
Book Section -
329
A study of touching behavior for authentication in touch screen smart devices
Published 2016“…Due to increasing demand for safer access in touch screen mobile phones, old strategies like pins, tokens, or passwords have failed to stay abreast of the challenges. …”
Get full text
Get full text
Proceeding Paper -
330
Annexin in plants
Published 2006“…Annexins are a diverse, multigene family of Ca2+-regulated phospholipids and membrane-binding protein. An annexin-like protein in higher plants was first discovered in 1989. …”
Get full text
Proceeding Paper -
331
An artificial-intelligence-based approach for audio steganography
Published 2009“…The robustness specially would be increased against those intentional attacks which try to reveal the hidden message and also some unintentional attacks like noise addition as well.…”
Get full text
Article -
332
Health Risks of Overweight and Obesity - An Over View
Published 2003“…Obesity is a risk factor for the development of various diseases like CHD, hypertension, stroke, NIDDM, osteoarthritis, sleep apnea and cancers of endometrium, breast, prostrate and colon. …”
Get full text
Article -
333
Speech coding techniques and algorithms
Published 2011“…Due to the growing need for bandwidth conservation and enhanced quality in wireless cellular and satellite communication, the research of low bit rate speech coder with acceptable quality is becoming increasingly important. Applications like Digital cellular and satellite telephony, video conferencing and internet voice communications, all have an increasing demand efficient use of bandwidth without compromising the quality…”
Get full text
Book Chapter -
334
Security of present s-box
Published 2012“…Resource efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID (Radio-Frequency IDentification) tags and sensor nodes. …”
Get full text
Proceeding Paper -
335
Ethical dimensions in robot creation industry
Published 2005“…Being one of the salient fields, it has for long intrigued engineers as to how to invent the adjacent human-like machine that could emulate human emotions, styles and patterns in precisely identical mode. …”
Get full text
Article -
336
Integrated coastal management and town planning in Malaysia: concept and practice
Published 2010“…In Malaysia, research on coastal and estuarine areas is still new and fragmented between various disciplines, like coastal geomorphology, coastal engineering and marine biology, which tend to be institutionally or individually oriented. …”
Get full text
Book -
337
The appropriation of the local: public service radio past and present
Published 2021“…Public service broadcasting, what it means and how it has responded to the challenges of competition and, more recently, of digital innovation, is a topic which continues to engage those who, like me, see this form of broadcasting as an essential presence, but who have campaigned for a local, community-based contribution to the public sphere. …”
Get full text
Article -
338
-
339
The United Nations Security Council's sanctions againts Iran: a nuclear aparthed
Published 2007“…Why certain countries, like the United States, United Kingdom, France, Russia and China allowed to prossess nuclear weapons while other countries are not? …”
Get full text
Proceeding Paper -
340
Negative impacts of riba banking on performance of Islamic banking
Published 2011Get full text
Get full text
Proceeding Paper