-
641
Unrolling the text: using scrolls to facilitate academic reading
Published 2019“…We conclude with an example of what happened when one of our staff participants took scrolls back to her third year Design students, and we argue that utilising emancipatory teaching practices can make higher education more inclusive.…”
Get full text
Get full text
Article -
642
Gender and the translation of audiovisual non-profit advertising
Published 2016“…This paper aims to explore to what extent students enrolled on Translation and Advertising courses are gender aware, i.e. whether they perceive that the decisions they take when translating or creating nonprofit advertisements which present gender-related concerns may have an impact on the social perception of gender. …”
Get full text
Article -
643
Network security analytics on the cloud: public vs. private case
Published 2023“…It has many of the advantages of the big public clouds but fundamentally differs from them when it comes to data management, operation interoperability, and costs. …”
Get full text
Conference or Workshop Item -
644
Partnering with AI for instrument development: possibilities and pitfalls
Published 2025“…Recent advances in generative artificial intelligence (AI), specifically large language models (LLMs), provide new possibilities for researchers to partner with AI when developing and refining psychological instruments. …”
Get full text
Article -
645
Trust Evaluation Model in IoT Environment: A Comprehensive Survey
Published 2023“…Trust is used to reduce the risk of insecurity when nodes are connected to the Internet. In an IoT environment, various trust models have been proposed for Wireless Sensor Networks (WSNs) and Radio Frequency Identification (RFID). …”
Get full text
Article -
646
Mahathir as the Prime Minister: Peak of “Paternalistic Leadership” In Malaysia
Published 2023“…The initial stance of this article was taken with reference to a previous study when Mahathir took office as the 4th Prime Minister of Malaysia. …”
Get full text
Article -
647
Trust Evaluation Model in IoT Environment: A Comprehensive Survey
Published 2023“…Trust is used to reduce the risk of insecurity when nodes are connected to the Internet. In an IoT environment, various trust models have been proposed for Wireless Sensor Networks (WSNs) and Radio Frequency Identification (RFID). …”
Get full text
Article -
648
Trust Evaluation Model in IoT Environment: A Comprehensive Survey
Published 2023“…Trust is used to reduce the risk of insecurity when nodes are connected to the Internet. In an IoT environment, various trust models have been proposed for Wireless Sensor Networks (WSNs) and Radio Frequency Identification (RFID). …”
Get full text
Article -
649
Experimental and Numerical Investigations of Underground Coal Gasification (UCG) Using Half-teardrop Shape Cavity
Published 2023“…The CFD results show that the area of high temperature in the UCG cavity is larger when the ER was greater.…”
Get full text
Article -
650
Mahathir as the Prime Minister: Peak of “Paternalistic Leadership” In Malaysia
Published 2023“…The initial stance of this article was taken with reference to a previous study when Mahathir took office as the 4th Prime Minister of Malaysia. …”
Get full text
Article -
651
Modelling and simulation of wireless information and power exchange protocol with power splitting for energy sustainability in device-to-device communications
Published 2019“…The nodes only wake up when they want to send or communicate with other nodes. …”
Get full text
Get full text
Thesis -
652
Battery charging and discharging control of a hybrid energy system using microcontroller
Published 2020“…The control system that has been designed has the ability to choose the right DC source when the battery capacity is less than 80%. This system also has a good ability to choose a battery source when the battery reaches 100% capacity and the DC source has a voltage drop of more than 20%. …”
Get full text
Article -
653
صكوك المضاربة والمشاركة في ضوء البيان الصادر عن هيئة المحاسبة والمراجعة للمؤسسات المالية الإسلامية لعام 2008 : التحديات والفرض Sukuk al-Mudharibah w al-Musharikah fi Dhu'i al-Bay...
Published 2009“…However, when sukuk start to use equity contracts like mudarabah and musharakah, such fixed income characteristic created some anomalous situations and conflicts. …”
Get full text
Article -
654
-
655
-
656
-
657
-
658
Seismic response of retrofitted partially infilled reinforced concrete frames
Published 2023Get full text
Thesis -
659
-
660
Modification of natural rubber by graft copolymerisation of non-ionogenic hydrophilic monomers in latex
Published 1989“…It was found that the grafting efficiency was much higher when using a dissociative initiator which does not attack NR directly (4-4'-azobis(4-cyanovaleric acid)) at ca. 63°C than when using a redox initiator (potassium persulphate-sodium metabisulphite) at 30°C. …”
Get full text
Thesis