-
421
A Hybrid Verilog-A and Equation-defined Subcircuit Approach to MOS Switched Current Analog Cell Simulation
Published 2012“…However, with the growing complexity of these circuits, transient domain simulation times can become prohibitively long, restricting the size of circuit that can be easily investigated. …”
Get full text
Article -
422
Editorial introduction, Religions special issue, Peace, politics, and religion. Volume II
Published 2024“…Religion’s increased prominence can be seen both in the context of conflict and as a tool of conflict resolution, peace-making and peacebuilding. …”
Get full text
Article -
423
Antibacterial potential of Curcuma caesia Roxb ethanol extract against nosocomial infections
Published 2023“…Introduction: Nosocomial infection is one of the infections that occurs in the hospital environment and can cause several diseases, but nosocomial infection can also cause the sufferer to experience sepsis and even die if they do not get treatment. …”
Get full text
Article -
424
Business excellence model: an overarching framework for managing and aligning multiple organisational improvement initiatives
Published 2011“…This paper discusses how the BEM can be used as an overarching framework for managing and/or aligning multiple improvement initiatives within the organisation. …”
Get full text
Article -
425
Energy threshold sensitivity for frame loss
Published 2011“…The energy of speech frames can be one of the ways to express least significant frames. …”
Get full text
Book Chapter -
426
Kurdistan: a new face in the Middle East
Published 2009“…Dr Tar critically analyzes the approaches by which Kurdistan region can be developed and modernized. He believes that Kurdistan is developing smoothly and can be a new face of development in the Middle East.…”
Get full text
Article -
427
Auditory Brainstem Response (ABR) simulator to enhance students understanding towards analyzing ABR waveforms
Published 2011“…BACKGROUND: The auditory brainstem response (ABR) can be defined as a complex response that represents neural activity generated at several anatomical sites in response to particular types of external stimuli (Hood 1998). …”
Get full text
Proceeding Paper -
428
-
429
Study on consumer perception towards online ticketing in Malaysia
Published 2011“…Also, this study considered how price perception and internet security can be utilized to understand the consumers‟ perception. …”
Get full text
Proceeding Paper -
430
Islam and media
Published 2012“…Contrary to what is generally perceived by the West, Islam in its real essence means ‘submission’ and ‘peace,’ a religion that calls for resignation to Allah and promotes and defends peace in the person. As much as the media can disrepute the general Muslim population and Islam, it can also restore and further inform the public of the true image of the religion. …”
Get full text
Article -
431
Comparison of key enablers for the successful comercialization of bioinformatics products in Malaysia and Singapore
Published 2012“…Bioinformatics can be defined as collection, organization and analysis of large amount of biological data. …”
Get full text
Article -
432
Service quality and consumer purchasing intention toward online ticketing: an empirical study in Iran
Published 2012“…Also this research considered how price perception and online trust can be utilized to understand the consumer purchase intention toward online ticketing. …”
Get full text
Proceeding Paper -
433
Synergistic effect on flexural properties of kenaf-glass hybrid composite
Published 2013“…This paper presents the synergistic effect on flexural properties of kenaf-glass (KG) mat reinforced unsaturated polyester (UPE) hybrid composite which can compounded using sheet molding compound (SMC) process. …”
Get full text
Article -
434
Feeding behavior under dark conditions in larvae of sutchi catfish Pangasianodon hypophthalmus
Published 2012“…Larval fish are vulnerable to predators; thus, if they can search for and eat food at night, they can avoid diurnal predators. …”
Get full text
Proceeding Paper -
435
Human behavior state profile mapping based on recalibrated speech affective space model
Published 2012“…Such an approach is derived from hypotheses that: 1) Behavior is influenced by emotion, 2) Emotion can be quantified through speech, 3) Emotion is dynamic and changes over time and 4) the emotion conveyance is conditioned by culture. …”
Get full text
Proceeding Paper -
436
2D visualization of terms and documents in Malay language
Published 2013“…From the 2D graphic, the relationship between Hadis can be found easily. From the questionnaire conducted, 90% participants agree that more relevant documents can be found using the 2D graphics system.…”
Get full text
Get full text
Proceeding Paper -
437
Islam and media
Published 2010“…Contrary to what is generally perceived by the West, Islam in its real essence means ‘submission’ and ‘peace,’ a religion that calls for resignation to Allah and promotes and defends peace in the person. As much as the media can disrepute the general Muslim population and Islam, it can also restore and further inform the public of the true image of the religion. …”
Get full text
Get full text
Proceeding Paper -
438
Knowledge construction and sharing in a networked collaborative environment
Published 2013“…In a networked environment, collaborative approach can be adopted for the purpose of knowledge sharing and knowledge construction. …”
Get full text
Get full text
Proceeding Paper -
439
Influence of Islamic work ethics on organizational commitment amongst construction professionals
Published 2013“…The reviews discover that positive work values of commitment to perfection in task performance, to one’s welfare and to the welfare of others, can be extracted from Islamic values. These Islamic values such as justice and love, selflessness, faith in God and fear of God can personify the positive commitment at work. …”
Get full text
Get full text
Proceeding Paper -
440
Simulation study of a many-to-one mapping for IPv6 address owner identification in an enterprise local area network
Published 2015“…The simulation software given here can easily identify an IPv6 address owner if the IPv6 address is properly generated by the mechanism and it can display particular verification messages.…”
Get full text
Article