Showing 781 - 800 results of 2,318 for search '((pinn OR when) OR (((skin OR pgk) OR sssyinga) OR ((ping OR peng) OR ming)))', query time: 0.09s Refine Results
  1. 781

    Knowledge by stipulation: the rectification of names by Shahab, Syed Alwi

    Published 2009
    “…The creation of knowledge starts with belief, and only when belief has been converted into a known- by direct experience and encounter, among other things-does it finally coalesce into knowledge. …”
    Get full text
    Article
  2. 782

    On-column refolding of recombinant fungal endoglucanase I by Aizat Jamaluddin, Mohd Jamil, Mohd. Salleh, Hamzah

    Published 2011
    “…In this study, overexpression of (His)6-tagged endoglucanase I from Fusarium oxysporum sp. in E. coli BL21(DE3) resulted to high tendency of endoglucanase I in the form of inactive inclusion bodies when the host cells were cultured between 25-37°C and induced by 0.05-0.20 mM (final concentration) IPTG. …”
    Get full text
    Proceeding Paper
  3. 783

    ISLAM IN CYBER ENVIRONMENT AND THE LEGAL ISSUES IN MALAYSIA by Mohamed, Duryana

    Published 2011
    “…Not only that, the marriage institution is also at stake when a husband can just send an SMS or email to divorce his wife. …”
    Get full text
    Proceeding Paper
  4. 784

    Effects of Impulsive Noise on Fourier Based OFDM and Wavelet Based OFDM by Abdullah, Khaizuran, Ismail, Ahmad Fadzil, Islam, Md. Rafiqul, Hashim, Wahidah

    Published 2011
    “…The BER performances in three scenarios when varying the Poisson recurrence parameter a from small to large are obtained. …”
    Get full text
    Get full text
    Proceeding Paper
  5. 785

    Impulsive noise effects on DWT-OFDM versus FFT-OFDM by Abdullah, Khaizuran, kamarudin, Saidatul Izyanie, Hussin, Nadiatul Fatiha, Jarot, Sigit Puspito Wigati, Ismail, Ahmad Fadzil

    Published 2011
    “…The details about each model and study the BER performance in two scenarios when varying the Poisson recurrence parameter a from small to large are also included. …”
    Get full text
    Proceeding Paper
  6. 786

    Forward masking threshold estimation using neural networks and its application to parallel speech enhancement by Gunawan, Teddy Surya, Khalifa, Othman Omran, Ambikairajah, Eliathamby

    Published 2010
    “…Objective measures using PESQ demonstrates that our proposed forward masking model, provides significant improvements (5-15 %) over four existing models, when tested with speech signals corrupted by various noises at very low signal to noise ratios. …”
    Get full text
    Article
  7. 787

    Analysis of Radio Model Performance for Clustering Sensor Networks by Bello-Salau, H, Salami, A. F., Anwar, Farhat, Islam, Md. Rafiqul

    Published 2011
    “…Cluster-based routing protocols have been found to be more advantageous to other types of routing techniques when there is a relatively huge number of a sensor node to be deployed. …”
    Get full text
    Article
  8. 788

    The rights of victims of crime under Malaysian Law: legal framework and prospect for reforms by Hussin, Nasimah

    Published 2010
    “…As a result, it is claimed, victims rarely experience justice when their case is dealt with by traditional punitive methods. …”
    Get full text
    Article
  9. 789

    National security in Malaysia's digital economy: redefinition, reaction and legal reform by Zulhuda, Sonny

    Published 2011
    “…The challenge is, the more a governance system is exposed to the Internet and ICT, the bigger the risks it would face. When the security of the system is not reliable enough to secure the system, information assets are at stake and the country’s critical information infrastructure (such as defence, communications, energy and medical systems) would become loophole that undermines national security. …”
    Get full text
    Proceeding Paper
  10. 790

    The legality of a living trust as an instrument for Islamic wealth management: a Malaysian perspective by Halim, Akmal Hidayah

    Published 2011
    “…This situation is inconsistent with the rule of Islamic law on gift (hibah) and succession, especially when the beneficiary is a person who has the legal capacity to own property and who may be one of the legal heirs of the deceased-settlor. …”
    Get full text
    Article
  11. 791

    Simulation of a surface transverse wave biosensor for DF-1 cells by Jamil, Nadira, Nordin, Anis Nurashikin, Mel, Maizirwan, Voiculescu, Ioana

    Published 2010
    “…Detection of chemical and biological agents in aqueous solutions is a difficult problem, especially when the detection technique has to be sensitive, power-efficient and very handy. …”
    Get full text
    Proceeding Paper
  12. 792

    Procedure for unfair dismissal claims in Malaysia by Ali Mohamed, Ashgar Ali, Sardar Baig, Farheen Baig

    Published 2009
    “…What happens when an employee loses his job or is unfairly dismissed? …”
    Get full text
    Book
  13. 793

    The rights of victims of crime under Malaysian law: legal framework and prospect for reforms by Hussin, Nasimah

    Published 2010
    “…As a result, it is claimed, victims rarely experience justice when their case is dealt with by traditional punitive methods. …”
    Get full text
    Proceeding Paper
  14. 794

    Modelling manufacturing process using a modified IDEF0 framework a case study of a car door manufacturing plant by Al-Turki , Abdullah, Faris, Waleed Fekry

    Published 2010
    “…The results obtained after the simulation of the modified model was found to be remarkable when it was verified with factory personnel. …”
    Get full text
    Article
  15. 795

    Access to justice: the human dignity of Muslim and women divorce in Malaysia by Kamaruddin, Zaleha

    Published 2009
    “…Divorce should not be a weapon llsed against spouses, but a humane practice which is resorted to in exceptional circumstances; i.e. when it is feared that the limit set by Allah SWT will be transgressed. …”
    Get full text
    Book Chapter
  16. 796

    An empirical comparison of meta analysis models for continuous data with missing standard deviations by Nik Idris, Nik Ruzni, Saidin, Norraida

    Published 2011
    “…Abstract: The choice between the Fixed and Random Effects models for providing an overall meta analysis estimates may affect the accuracy of those estimates. When the study-level standard deviations (SDs) are not completely reported or are “missing” selection of a meta analysis model should be done with more caution. …”
    Get full text
    Article
  17. 797

    A case study on the effect of imputing the missing variability measures in meta analysis by Nik Idris, Nik Ruzni

    Published 2007
    “…One of the common problems with meta analysis data is when the variability measures, specifically, the standard deviations are not reported in the individual studies. …”
    Get full text
    Proceeding Paper
  18. 798

    The invitation to treat and Mu'atah in online contracts by Razali, Siti Salwani

    Published 2009
    “…When dealing with an offer, it is crucial to determine whether a “statement” amounts to an “offer” or a mere “invitation to treat.” …”
    Get full text
    Article
  19. 799

    Design and implementation of fuzzy-based PID controller by Salami, Momoh Jimoh Eyiomika, Bulale I., Yusuf

    Published 2002
    “…One such method is based on fuzzy logic technique which is considered much more appropri.ate when precise mathematical formulation is infeasible or difficult to achieve. …”
    Get full text
    Proceeding Paper
  20. 800

    On selection of models for continuos meta analysis data with incomplete variability measures by Nik Idris, Nik Ruzni, Sarudin, Norraida

    Published 2011
    “…The choice between the fixed and random effects models for providing an overall meta analysis estimates may affect the accuracy of those estimates. When the study-level standard deviations (SDs) are not completely reported or are “missing” selection of a meta analysis model should be done with more caution. …”
    Get full text
    Article