Showing 721 - 740 results of 5,054 for search '((spinael OR ((spinae OR spenge) OR find)) OR (((rings OR shin) OR (spinal OR eesspinal)) OR ling))', query time: 0.09s Refine Results
  1. 721

    Evaluation of university teaching hospital websites in Nigeria by Mahmud, Murni, O.Raji, Shakirat, Abubakr, Adamu

    Published 2013
    “…The accessibility and availability were also evaluated and the findings indicated each website has their own strengths and weakness that can be capitalized on for proposing guidelines for better design of Hospital Websites.…”
    Get full text
    Article
  2. 722

    Factors determinants the choice of mobile service providers: structural equation modeling approach on Bangladeshi consumers by Haque, A. K. M. Ahasanul, Rahman, Sabbir, Rahman, Mahbubur

    Published 2010
    “…The aim of this study is to find out what were the factors that may have played significant role to select the telecommunication service providers. …”
    Get full text
    Article
  3. 723

    Processing of date palm kernel(DPK)for production of Edible Jam by Mirghani, Mohamed Elwathig Saeed, Al-Mamun, Abdullah, Mustafa, Simma Mahirah

    Published 2010
    “…Finally, this report is the outcome of the research done to find the acceptability of the production of DPK jams.…”
    Get full text
    Proceeding Paper
  4. 724

    Determinants of economic performance of micro-credit clients and prospect of Islamic microfinance in Malaysia by Md Saad, Norma, Duasa, Jarita

    Published 2010
    “…In the first part of the study, we find that the economic performance of AIM participants is significantly determined by the amount of money borrowed from AIM. …”
    Get full text
    Article
  5. 725

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The aim of this paper is implementation of system computation between Cryptography and Steganography which embeds information in unused area 2 within EXE files to find a secure solution to cover file without change the size of cover file. …”
    Get full text
    Article
  6. 726

    Excellent work ethics and moral values in public administration: a comparative appraisal by Mohamad Yunus, Mohamad Ismail

    Published 2010
    “…Hence the mission is to develop more who are well informed in the light of the qualities the community should expect to find in them as public servants with unquestionable integrity, who preserve high ethical standards under all circumstances. …”
    Get full text
    Article
  7. 727

    Analysis of the nuclear potential for heavy-ion systems through large-angle quasi-elastic scattering by Inche Ibrahim, Mohd Lukman, Zamrun, Muhammad, Abu Kassim, Hasan

    Published 2013
    “…The increase in the obtained diffuseness parameters as the energies are increased also seems to have a possible tendency to be a function of the charge product of the target and projectile nuclei. We find that the phenomenon of threshold anomaly might explain our findings here. …”
    Get full text
    Article
  8. 728

    Internationalisation of contemporary Muslim higher education and ummatic development: a case study of the International Islamic University Malaysia by Hashim, Rosnani

    Published 2015
    “…In this Chapter Rosnani analyses the impact of internationalisation of higher education through an examination of the practice of the International Islamic University Malaysia (IIUM). It attempts to find out whether IIUM has benefited from the policy of internationalisation. …”
    Get full text
    Book Chapter
  9. 729

    Optimizing tapered microfiber sensor design and simulation by Al-Askari, Shadi, Hamida, Belal Ahmed, Khan, Sheroz, Harun, Sulaiman Wadi

    Published 2016
    “…The effects of the taper length, the waist length and the waist diameter have been explored in order to find the optimal geometries design. The model provides initial data to the designer to program and control the taper ration and the taper length the fabrication process in order to obtain the highest penetration depth at the highest resolution. …”
    Get full text
    Article
  10. 730

    Activated carbons derived from oil palm empty-fruit bunches: Application to environmental problems by Alam, Md. Zahangir, Muyibi, Suleyman Aremu, Mansor, M F, Wahid, R

    Published 2007
    “…Activated carbons derived from oil palm empty fruit bunches (EFB) were investigated to find the suitability of its application for removal of phenol in aqueous solution through adsorption process. …”
    Get full text
    Article
  11. 731

    Real-time optimization and control of 3DOF helicopter system via extremum seeking algorithm by Ra'afat, Safanah M., Ali, Shahad S., Akmeliawati, Rini

    Published 2015
    “…For these reasons, an advanced controller that is capable of tuning the controller gains adaptively to the sudden changes, has the ability of regulation and finding best tracking performance is required. The Extremum Seeking (ES) control is a paradigm that aims to find an extremum value of an unknown nonlinear mapping. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 732

    Constructing an ontology-based and graph-based knowledge representation of English Quran by Noordin, Mohamad Fauzan, Tengku Sembok, Tengku Mohd., Othman, Roslina, Gusmita, Ria Hari

    Published 2016
    “…Due to many approaches available to construct a KR in providing data for information retrieval process, there is a need to find out in what model the KR could provide a valuable contribution for retrieving information. …”
    Get full text
    Get full text
    Article
  13. 733

    Pronominalization of social actors on universities’ websites: effectiveness and constitutiveness from a critical discourse analysis perspective by Tharmalingam, Selvarajah, Al-Wedyan, Ali M.

    Published 2016
    “…In addition, corpus techniques also aided this study to find the collocates of these two pronouns. Transitivity analysis was conducted to categorise processes associated with each pronoun. …”
    Get full text
    Article
  14. 734

    The influence of self-regard on response of belief in God and awareness of prophetic teaching by Teke, Mustafa, Ismail, Nik Ahmad Hisham, Syed Hassan, Sharifah Sariah, Othman, Nooraini

    Published 2016
    “…Personality and religion relationship has long been studied by Western and Muslim researchers in order to find any association between religious factors and a person's behavior and thought. …”
    Get full text
    Article
  15. 735

    Setting up a new Radiology Center Technology for improvement : Data mining (Image Mining Technique) by Zubir, Nazira

    Published 2016
    “…Data mining scans a huge volume of data to find out the patterns and correlations among the patterns. …”
    Get full text
    Monograph
  16. 736

    The new public financial management in Malaysia by R. Stiles, David, Karbhari, Yusuf, Mohamad, Muslim Har Sani

    Published 2006
    “…Major surveys and in-depth interviews with senior managers in 131 government agencies explore perceptions about the effectiveness of NPFM. Findings – Although technical, socio-political and behavioral issues do arise, we find empirical support for a universalist thesis that NPFM is appropriate in this emerging context. …”
    Get full text
    Proceeding Paper
  17. 737

    Sewage sludge as a renewable resource for citric acid production:optimization of supplementary nutrients by Mohamad Hanapi, Nur Hanis, Alam, Md. Zahangir, Abdul Karim, Mohamed Ismail

    Published 2011
    “…A study of single factor was conducted to find the optimum ranges of parameters for citric acid production followed by the central composite design (CCD) under the responses surface methodology. …”
    Get full text
    Article
  18. 738

    Quality of service multicast routing protocol for large scale MANETs by Qabajeh, Mohammad M., Hassan Abdalla Hashim, Aisha, Khalifa, Othman Omran, Qabajeh, Liana K.

    Published 2009
    “…This work proposed a new efficient approach which aims to find paths between the source and all the multicast group members using paths that meet the bandwidth and delay requirements. …”
    Get full text
    Proceeding Paper
  19. 739

    Evaluation of aircraft wing-tip vortex using PIV by Elsayed, Omer Ali, Asrar, Waqar, Omar, Ashraf Ali

    Published 2009
    “…The purpose of this investigation is to evaluate the main features of the lift generated vortices in order to find ways to alleviate hazardous wake vortex encounters for follower airplanes during start and approach such that the increase in airport capacity can be achieved. …”
    Get full text
    Proceeding Paper
  20. 740

    Experimental analysis of MIPL based mobile IPv6 using single vs dual interface with practical test-beds by Uddin, Mohammad Moshee, Pathan, Al-Sakib Khan, Ahmed, Mohiuddin, Haseeb, Shariq

    Published 2011
    “…Alongside presenting our experimental findings, we also show a comparison of performance between dual interfaces and single interface on a mobile node.…”
    Get full text
    Article