Browsing by Type Conference Paper

Or, select a letter below to start browsing
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 309 to 328 of 717 < previous   next >
Issue DateTitleAuthor(s)
2019Game-Based Learning in Requirements Engineering: An OverviewSoo, M.T. ; Aris, H. 
2017GaN based μlED drive circuit for Visible Light Communication (VLC) with improved linearity using on-chip optical feedbackZuhdi, A.W.M. ; McKendry, J.J.D. ; Henderson, R.K. ; Gu, E. ; Dawson, M.D. ; Underwood, I. 
2018Gas Emission Prediction for Environmental Sustainability via Heterogeneous Data Sources Correlation with Support Vector RegressionChen, C.P. ; Tiong, S.K. ; Koh, S.P. ; Chooi Albert, F.Y. ; Mohd Yapandi, M.F.K. 
2013Generalized equivalent circuit model for ultra wideband antenna structure with double steps for energy scavengingHeong, O.K. ; Hock, G.C. ; Chakrabarty, C.K. ; Hock, G.T. 
Apr-2017Generation Y – A study on sustainable consumptionVathana Bathmanathan ; Jegatheesan Rajadurai 
2019Genetic algorithm based optimization of overcurrent relay coordination for improved protection of DFIG operated wind farmsRezaei, N. ; Nasir Uddin, M. ; Khairul Amin, I. ; Lutfi Othman, M. ; Marsadek, M. 
2015A goal-based framework on contextual requirements modelling for agent-mediated continual quality improvement (aCQI) in curriculum designIsmail, S. ; Ahmad, M.S. 
2013Green buildings in Malaysia towards greener environment: Challenges for policy makersSuhaida, M.S. ; Tan, K.L. ; Leong, Y.P. 
2017Greenhouse Gas Emission Estimation for Selected Crops and Rice Cultivation in Urban and Non-Urban Areas of SarawakBahrum, N.A. ; Malek, M.A. ; Tan, C.S. 
2018Grey Wolf optimization based power management strategy for battery storage of dfig-wecs in standalone operating modeNasir Uddin, M. ; Khairul Amin, I. ; Rezaei, N. ; Marsadek, M. 
2009Group Based Access Control scheme (GBAC): Keeping information sharing secure in mobile ad-hoc environmentBakar, A.A. ; Ismail, R. ; Ahmad, A.R. ; Manan, J.-L.A. ; Jais, J. 
2009Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networksBakar, A.A. ; Ismail, R. ; Ahmad, A.R. ; Abdul Manan, J.-L. ; Jais, J. 
2019A Guideline of Ultrasonic Inspection on Butt Welded PlatesBurhan, I. ; Mutaiyah, G. ; Hashim, D.I. ; Loganathan, T.M. ; Sultan, M.T.H. 
2013The GUSC model in smart notification system: The quantitative analysis and conceptual modelIsmail, S. ; Suhaimi, S.F.M. ; Ahmad, M.S. 
2016Handwritten signature verification: Online verification using a fuzzy inference systemFaruki, M.J. ; Lun, N.Z. ; Ahmed, S.K. 
2019Hardware implementation of beam formed ultrasonic bird deterrent systemPermal, N. ; Segaran, T.B.R. ; Verayiah, R. ; Nagi, F.H. ; Ramasamy, A.K. ; Ishak, S. 
2017Healthcare employees' perception on information privacy concernsRahim, F.A. ; Ismail, Z. ; Samy, G.N. 
2018Heat transfer enhancement with nanofluids: A review on recent applications and experimentsIsmail, I.A. ; Yusoff, M.Z. ; Ismail, F.B. ; Gunnasegaran, P. 
2017Heat Transfer in a Loop Heat Pipe Using Fe2NiO4-H2O NanofluidGunnasegaran, P. ; Abdullah, M.Z. ; Yusoff, M.Z. 
2015High frequency AC characteristics of 132kV power cableChakrabarty, C.K. ; Avinash, A.R. ; Ahmad Basri, A.G.