Showing 7,381 - 7,389 results of 7,389 for search '((((own OR sun) OR ((torn OR tou) OR tor)) OR ((tour OR our) OR ours)) OR urn)', query time: 0.19s Refine Results
  1. 7381

    Enhanced Approach of Decision Making in Determining Contemporary Critical Preferential Factors and Location Decisions for Residential Project using MCDM Technique (S/O 13903) by Lamsali, Hendrik, Mad Lazim, Halim, Abdul Rahim, Mohd Kamarul Irwan, Osman, Wan Nadzri, Salleh, Mohamed Najib

    Published 2019
    “…Therefore, this research intends to develop an understanding on which residential properties’ attributes, as defined by locational, neighborhood, structural, financial, socio-cultural and.developers’ attributes contribute to home owning preferences among homebuyers in Malaysia. The primary aim of this study is to determine contemporary buyers’ preferential and priority when purchasing new residential property. …”
    Get full text
    Monograph
  2. 7382
  3. 7383

    Synthesis and gas sensing property of electrospun titanium dioxide microfiber for the application of personal protective equipment by Apiwattanadej, Thanit

    Published 2020
    “…To initiate the study, titanium dioxide (TiO2), which is a common chemiresistive metal oxide, has been used as a model sensing material for the gas sensing microfiber fabrication owning to its high sensitivity, fast response and low cost. …”
    Get full text
    Thesis-Master by Research
  4. 7384

    Performance obligations for “revenue from contracts with customers” principle in the shipping industry by Duru, Okan, Mileski, Joan P., Gunes, Ergun

    Published 2023
    “…Purpose: The aim of this paper is to investigate the gap between cost-based and time-based revenue recognition schemes in the accounting of ship-owning corporations, and to propose cost-based revenue recognition (as in general accounting practice) in connection with the performance obligations. …”
    Get full text
    Journal Article
  5. 7385

    基于平衡计分卡和经济增加值 对中央企业绩效评价体系的研究 = A study on the use of balanced scorecard and economic value added in the performance evaluation system of central enterprises... by 胡晓涛 Hu, Xiao Tao

    Published 2010
    “…January 29, 2010, State-owned Assets Supervision and Administration Commission issued a revised "central business executives Interim Measures for performance evaluation", starting in 2010, the full implementation of the central business economic value added (EVA) evaluation. …”
    Get full text
    Thesis
  6. 7386

    Suitability of battery electric vehicles and opportunity charging for urban freight transport : an evaluation framework by Teoh, Tharsis Ghim Han

    Published 2018
    “…Financial suitability is evaluated based on the lifecycle cost analysis of owning and using the electric fleet, while the environmental suitability is analysed based on the well-to-wheels carbon dioxide emissions. …”
    Get full text
    Get full text
    Thesis
  7. 7387

    Towards the Realization of National Automotive Policy (NAP): Modelling the Malaysian Consumers’ Purchase Behavioral Intention towards Energy Efficient Vehicles (EEVs) (S/O 14165) by Mohd Noor, Nor Azila, Mohd Fadhil, Faudziah Hanim, Md Isa, Filzah, Salleh, Hayatul Safrah, Muhammad, Azli

    Published 2021
    “…The sales trend shows that there is a low level of energy efficient vehicle purchased, where energy efficient vehicle only owned 3% of market share in automotive industry. …”
    Get full text
    Monograph
  8. 7388

    Distribution and risk factors of canine heart diseases and survey for owners treatment intention by Noordin, Norhidayah

    Published 2023
    “…A total of 261 respondents who owned or had experience caring for dogs were recruited to determine their level of awareness and knowledge of canine heart disease. …”
    Get full text
    Thesis
  9. 7389

    Physical unclonable function based solutions to unification of user, device and data authentication by Zheng, Yue

    Published 2020
    “…These solutions are typically realized using conventional techniques that require the safekeeping of a secret binary key in the non-volatile memory, or battery-backed SRAM of some device, or a token owned by the user, which have been proven to be vulnerable to various kinds of invasive, semi-invasive and side channel attacks. …”
    Get full text
    Thesis-Doctor of Philosophy