-
81
Letter from the Organising Secretary of the APL to J. J. Long
Published 1939“…Typescript letter dated 25 April 1939, to J J Long, from the Organising Secretary, about a public meeting.…”
Get full text
Get full text
Correspondence -
82
An investigation of packet scheduling algorithms for long term evolution-advanced
Published 2012“…This paper investigates the current algorithms of CA and packet scheduling forthe Long Term Evolution-Advanced (LTE-A). In the beginning, the evolution from third generation (3G) to fourth generation (4G) is illustrated in terms of featured performance requirements and the integration of current and future radio access technologies, is also highlighted. …”
Get full text
Proceeding Paper -
83
The long-run and dynamic behaviors of wages, productivity and employment in Malaysia
Published 2008“…Purpose – This paper aims to examine the long-run and dynamic behaviors of real wage-employment-productivity relationship, using Malaysian manufacturing data, and to determine which related labor theories are supported. …”
Get full text
Article -
84
Long memory and volatility dynamics in the US dollar exchange rate
Published 2010“…We model both absolute values of returns and squared returns using long-memory techniques, being particularly interested in volatility modelling and forecasting given their importance for FOREX dealers. …”
Get full text
Article -
85
-
86
Strange hadron production in pp and pPb collisions at root(NN)-N-s=5.02 TeV
Published 2020“…The transverse momentum (pT) distributions of Lambda, Xi(-), and Omega(-) baryons, their antiparticles, and K-S(0) mesons are measured in proton-proton (pp) and proton-lead (pPb) collisions at a nucleon-nucleon center-of-mass energy of 5.02 TeV over a broad rapidity range. The data, corresponding to integrated luminosities of 40.2 nb(-1) and 15.6 mu b(-1) for pp and pPb collisions, respectively, were collected by the CMS experiment. …”
Get full text
Get full text
Article -
87
Reward management: linking employee motivation and organizational performance
Published 2017“…They also illustrate the need to understand the underlying mediating and moderating mechanisms linking reward systems and practices to individual, team, and organizational behavior and outcomes. …”
Get full text
Article -
88
Culture of five species of Malaysia indigenous freshwater microalgae
Published 2016“…Five species of Malaysia indigenous chlorophycean microalgae were grown in laboratory culture under the comparable environmental condition and the population doubling time (td) as well as maximum growth rate (μmax) each was evaluated. …”
Get full text
Proceeding Paper -
89
Government linked companies: The impact of GLCs transformation policy
Published 2010Get full text
Proceeding Paper -
90
Rain rate distribution for microwave link design in Malaysia
Published 2011Get full text
Book Chapter -
91
Performance evaluation of Free-Space-Optic (FSO) links
Published 2011“…Knowing the losses or attenuation within the channel it is then possible to evaluate received power level and link margin, the main figures needed in order to evaluate the performance ofFSO links…”
Get full text
Book Chapter -
92
-
93
Parameterized indoor propagation model for mobile communication links
Published 2016Get full text
Article -
94
Performance metrics for the prediction of link and path availability in VANETs
Published 2009“…The method described makes use of the concept of link availability estimates which are produced on an individual link basis and which may be combined by multiplication to produce a quality metric for the whole route. …”
Get full text
Proceeding Paper -
95
An improved functional link neural network for data classification
Published 2018“…Accordingly, two alternative models namely; Genocchi Functional Link Neural Network (GFLNN) and Chebyshev Wavelets Functional Link Neural Network (CWFLNN) are proposed. …”
Get full text
Get full text
Get full text
Thesis -
96
Achieving security for images by LSB and MD5
Published 2012“…This method creates a random dispersion of bits of the message in the picture, and it would be difficult to extract the message without the password key .After creation of the hidden message, the image will pass it in hash function to obtain hashing value using the MD5 technique. This value will be fixed as long as there has been no change to the picture. …”
Get full text
Article -
97
-
98
-
99
-
100