-
261
Characterisation of network structure in recycled rubber
Published 2016“…However, only a limited amount of untreated crumb can be used in new tyres due to significant property loss. …”
Get full text
Thesis -
262
Resilience of an embedded architecture using hardware redundancy
Published 2014“…Without fault tolerant mechanisms, many of these faults can become errors at the application or system level, which in turn, can result in catastrophic failures. …”
Get full text
Thesis -
263
Fraud and corruption in the international governmental organisation: identifying the extent to which the investigation function of oversight offices in international organisations...
Published 2013“…In doing so, the thesis addresses two fundamental questions: (i) to what extent can the internal investigation function be considered as policing; and, (ii) how accountable is the investigation function? …”
Get full text
Thesis -
264
Conflicting forms of use: the potential of and limits to the use of the internet as a public sphere
Published 2007“…To this end it considers the claim that the Internet is or can be a public sphere. To do this there are two related spheres of enquiry: the `public sphere' and `the Internet'. …”
Get full text
Thesis -
265
Rethinking jewellery for Korea: a practice-led approach to creating high-visibility wearables
Published 2021“…This is an area for further development, where investigation of materials can lead to cultural transformations, including environmentally-conscious changes.…”
Get full text
Thesis -
266
Impasse-driven problem solving: the multidimensional nature of feeling stuck
Published 2024“…We demonstrate that the feeling of insight can be reliably elicited by experiencing and resolving impasse but also in the absence of impasse, which suggests that there is more than one path to an insight experience. …”
Get full text
Get full text
Article -
267
Deliberative discussions as a research method: a qualitative and mixed methods approach to exploring young Europeans’ identities and values
Published 2023“…Exploring such areas through traditional interviews and questionnaires can present problems in that they can unduly prompt answers. …”
Get full text
Get full text
Article -
268
Analysis of Variable Frequency Drive for Induction Motor using Matlab Software
Published 2024“…However, the inability to regulate the speed of the load can present significant challenges in terms of machinery maintenance and energy consumption. …”
Get full text
Article -
269
A simulation model of solid concrete beam containing Palm Oil Fuel Ash (POFA) and Expeneded Polystyrene (EPS) using finite element method
Published 2021“…In this case for concrete beam construction, Palm Oil Fuel Ash (POFA) and Expanded polystyrenes (EPS) would be used to substitute several percent of cement and aggregate. The use of POFA can produce high strength concrete and can also reduce waste disposal and EPS can produce lightweight concrete. …”
Get full text
Article -
270
Mechanical properties of concrete containing palm oil fuel ash and modified expanded polystyrene beads as replacement materials using finite element method
Published 2020“…Information on Modified EPS and POFA can be filled in this software. Furthermore, it can also analyze mechanical properties of concrete that containing. …”
Get full text
Conference or Workshop Item -
271
Employability of local trained skill labour in construction industry
Published 2017“…Development in Malaysia is booming which can be witnessed by the various construction projects that currently in progress, especially in the state of Johor which has the highest value of construction work completed for the third quarter of 2016. …”
Get full text
Get full text
Thesis -
272
A dual-watermarking with QR code against cropping and resizing attack
Published 2016“…If enlarging and shrinking are combined to the same watermarked image, watermark can still be extracted and scanned. Final result for cropping attack shows that watermark can be successfully extracted when image is cropped up to 36 percent. …”
Get full text
Get full text
Get full text
Thesis -
273
The influence of relaxation with electromyography and Islamic prayer programs for female Muslim
Published 2012“…Chronic work-related stress can fray nerves, keep you up at night and contribute to significant and independent risk problems such as heart disease and depression. …”
Get full text
Article -
274
The effect of sintering temperature of silica water filter produced by slip casting method
Published 2024“…The types of silica that can be obtained from the rice husk waste product included crystalline and amorphous silica. …”
Get full text
Conference or Workshop Item -
275
Remote temperature sensing with low-threshold-power using erbium-doped fiber laser
Published 2021“…With remote sensing, any damage of structures can be detected immediately, thus appropriate action can be taken quickly. …”
Get full text
Get full text
Get full text
Thesis -
276
Design and fabrication of an intelligent irrigation control system
Published 2010“…This intelligent Irrigation control system is suitable for universities, research centers and farms where a control of the soil water content is required. The system can be used to study the water requirements for crops so irrigation can be scheduled efficiently.…”
Get full text
Proceeding Paper -
277
Design of an automated rail transit system controller: Malaysia perspective
Published 2009“…The controller can control the power to the tracks, and the direction of the trains. …”
Get full text
Article -
278
VircoSpray - a sprayable virgin coconut oil
Published 2010“…For army, the spray can be included in the ration due to its lightness and simplicity. …”
Get full text
Get full text
Proceeding Paper -
279
The use of social networks in education : challenges and opportunities.
Published 2011“…Technology can have a reciprocal relationship with teaching. …”
Get full text
Book Chapter -
280
Introduction to fingerprint verification
Published 2011“…Fingerprints consider by people as unique and can be used to identify someone. This trust comes from governmental and law enforcement use of fingerprints. …”
Get full text
Book Chapter