Showing 461 - 469 results of 469 for search '((ping OR (ching OR spike)) OR ((((pans OR span) OR (ssspinggk OR spines)) OR sspiea) OR pin))', query time: 0.06s Refine Results
  1. 461
  2. 462

    The significance of perceptions and cultural engagement in the evolution of a European commercial and soft power diplomacy with the emerging Asian giants by Vergeron, Karine Lisbonne-de

    Published 2017
    “…The focus of my submission is on external perceptions of Europe from the perspectives of the two new great powers in Asia: China and India. It spans over nine years of research. When the work started in 2006, the EU was in deep crisis just a year after the uncertainty that was unleashed by the rejection in France and the Netherlands of the then Constitutional Treaty. …”
    Get full text
    Thesis
  3. 463

    Effective vector variance in modeling Malaysia highway traffic network by Mohd Asrah, Norhaidah

    Published 2019
    “…The current practice to analyse a network is by using social network analysis (SNA) with the following three steps: (i) the network is considered as an undirected weighted complete graph (UWCG), (ii) the important information in the network is filtered using minimal spanning tree (MST), and (iii) the topological properties of each node is investigated using certain centrality measures. …”
    Get full text
    Thesis
  4. 464

    2012 International Design Exchange Project, the 3rd Hidden Space Project, High street by Newman, Kaye, Harris, Janette, Park, Young Tae, Kim, Hong Ki, Kim, Suk Young, Ahn, Sung Hee

    Published 2012
    “…The interventions allows for views and vistas from the street and from within spanning the depth of London across the city giving the viewer a sense of inclusion and belonging.…”
    Get full text
    Book
  5. 465

    Novel approaches to applied cybersecurity in privacy, encryption, security systems, web credentials, and education by Ruiz, Rodrigo de Souza

    Published 2021
    “…In a nutshell, the thesis presents a coherent and novel narrative to applied cybersecurity in five categories spanning software, systems, and education.…”
    Get full text
    Thesis
  6. 466

    Permanent employment dressed up as Fixed-Term Contract: a review of Ahmad Zahri Mirza Abdul Hamid v Aims Cyberjaya Sdn Bhd by Ali Mohamed, Ashgar Ali

    Published 2020
    “…The recent Federal Court’s decision in Ahmad Zahri Mirza Abdul Hamid v Aims Cyberjaya Sdn Bhd reaffirmed the security of tenure of employees in the private sector in Malaysia and the earlier decisions of the superior courts in Hong Leong Equipment Sdn Bhd v Liew Fook Chuan & Anor,2Ang Beng Teik v Pan Global Textile Bhd, Penang,3and The New Straits Times Press (Malaysia) Bhd v Chong Lee Fah,4 among others were cited with approval. …”
    Get full text
    Article
  7. 467

    New panel unit root and cointegration tests of purchasing power parity by Cerrato, Mario

    Published 2003
    “…We construct and use a unique data set consisting of twenty emerging market economies and black market nominal exchange rates, spanning over 1973M1-1993M12. As far as we know such a big data set has never been used in the studies of PPP using black market nominal exchange rates. …”
    Get full text
    Thesis
  8. 468
  9. 469

    Environmental impacts of greywater use for irrigation on home gardens by Radin Mohamed, Radin Maya Saphira

    Published 2011
    “…The new ZTLs were tested to compare the quantity and quality of leachate collected with that from the conventional pan lysimeter, in a pilot-scale study. The results indicate that the new lysimeter designated as ZTL (NI), was effective at collecting leachate and was suitable to install at household sites. …”
    Get full text
    Thesis