Showing 201 - 220 results of 300 for search '((pinna OR (ing OR ying)) OR ((peng OR (sspyingna OR plingat)) OR (ping OR (ling OR kong))))', query time: 0.07s Refine Results
  1. 201
  2. 202
  3. 203
  4. 204
  5. 205
  6. 206
  7. 207
  8. 208

    Family mediation in Asia: a special reference to the law and practice in Malaysia by Abdul Hak, Nora

    Published 2007
    “…For this purpose the practice in Singapore, China, Japan and Hong Kong is described. However the focus of the article is the law and practice of conciliation in Malaysia which are governed by the Law Reform (Marriage and Divorce) Act, 1976. …”
    Get full text
    Article
  9. 209
  10. 210

    Exploring critical factors of tourist satisfaction: a study on Islamic tourists destinations in Malaysia by Haque, A. K. M. Ahasanul, Khan, Abdul Highe

    Published 2013
    “…This research will conduct 3 stages of data analysis: exploratory factor analysis; confirmatory factor analysis and structural equation model ing to test the hypothesis. This research is necessary to provide a better understanding of Muslim tourist satisfaction in Malaysian Islamic tourist destination in different facets. …”
    Get full text
    Article
  11. 211

    Development of coated peanut separator and frying skillet machine by Yusof, M Sallehuddin, Fadilullah, M Zul Nadzmi, Hassan, Suhaimi, Maksud, M Idris, Yunos, Muhamad Zaini

    Published 2018
    “…The groundnut is sticking and become like a ping pong size ball and the time consuming to fry is longer. …”
    Get full text
    Article
  12. 212
  13. 213

    ARCASIA architectural timeline chart : Malaysia by Mohd Nawawi, Norwina, Abdul Jamal, Hamdan, Chan, Hean Kee

    Published 2006
    “…Bangladesh, China, Hong Kong, India,Indonesia, Japan, Korea, Macau,Malaysia, Mongolia,Nepal, Pakistan,Philippines, Singapore,Sri Lanka, Thailand, Vietnam. …”
    Get full text
    Book
  14. 214
  15. 215

    Wireshark window authentication based packet captureing scheme to pervent DDoS related security issues in cloud network nodes by Waqar, Ali, Sang, Jun, Naeem, Hamad, Naeem, Rashid, Soomro, Ali Raza

    Published 2015
    “…As a result, the cloud node response is slow as usual and resource on cloud network becomes unavailable. Some Dos attacks are Ping of Death, Teardrop, Snork, Locking authentication, SYN flooding, Operating System Attacks etc. …”
    Get full text
    Get full text
    Proceeding Paper
  16. 216

    Mus'ab 'Umayr: the great martyr of the muslim nation. by Jamaludin, Rosashrakiah, Mahmud, Murni

    Published 2011
    “…The storyline is based on ethical, moral and ha\ ing Islamic perspecti1.e in obtaining good issues in each story. …”
    Get full text
    Book Chapter
  17. 217
  18. 218
  19. 219
  20. 220

    Renal cell carcinoma in a von Hippel-Lindau syndrome; when should pheochromocytoma be anticipated? by Mohd Shah, Azarisman Shah, K, Nor Azmi

    Published 2007
    “…We discuss the risk of renal cell carcinoma a nd ph a e oc h romoc y toma a r i s ing concomitantly in von Hippel-Lindau syndrome, and how best to investigate and manage them.…”
    Get full text
    Article