-
281
-
282
-
283
-
284
-
285
-
286
-
287
-
288
-
289
A case of thyrotoxicosis following peripheral blood stem cell transplantation
Published 2015Get full text
Article -
290
-
291
-
292
-
293
Persepsi pelajar terhadap aspek-aspek penempatan di asrama dan hubungannya dengan pencapaian akademik pelajar : satu tinjauan ke atas Sekolah Menengah Teknik Pasir Mas
Published 2003“…Penyelidikan ini adalah bertujuan untuk meninjau persepsi pelajar terhadap aspek-aspek penempatan di asrama dan hubungannya dengan pencapaian akademik pelajar, bagi pelajar-pelajar Ting. 5 Sek. Men. Teknik Pasir Mas, Kelantan. Seramai 82 orang responden terlibat di dalam kajian ini di mana ia mewakili 30% daripada jumlah keseluruhan pelajar Ting. 5 tahun 2002 yang tinggal di asrama sekolah terbabit. …”
Get full text
Get full text
Get full text
Thesis -
294
Sex differences as a statistical variable
Published 2017“…Moreover, not only do people try to integrate their 'ying' and 'yang' in their personalities, also trans-gender identities are publicly acknowledged, appreciated and respected. …”
Get full text
Book Section -
295
-
296
The investigation of soil dielectric influence towards terrestrial background radiation
Published 2018“…The soil species identified were Kranji, Linau-Sedu, Selangor-Kangkong, Peat, Telemong-Akob, Holyrood-Lunas, Batu Anam-Melaka-Tavy, Rengam-Jerangau, Kulai–Yong Peng and Steepland soils. All the samples were dried, grinded and sieve into fine powder for the elemental compositions and dielectric properties measurement. …”
Get full text
Get full text
Get full text
Thesis -
297
Risk of Escherichia coli O157:H7 transmission linked to the consumption of raw milk
Published 2013Get full text
Article -
298
-
299
Development of coated peanut separator and frying skillet machine
Published 2018“…The groundnut is sticking and become like a ping pong size ball and the time consuming to fry is longer. …”
Get full text
Article -
300
Wireshark window authentication based packet captureing scheme to pervent DDoS related security issues in cloud network nodes
Published 2015“…As a result, the cloud node response is slow as usual and resource on cloud network becomes unavailable. Some Dos attacks are Ping of Death, Teardrop, Snork, Locking authentication, SYN flooding, Operating System Attacks etc. …”
Get full text
Get full text
Proceeding Paper