Baturaja inscription: a threats to Miańga
Miańga (Minanga) is an area that is now in the administrative region of South Sumatra. This region is a historical area, this is proven by the appearance of this name on two inscriptions, namely the Kedukan Bukit inscription and the Baturaja inscription. One of the newly discovered inscription...
| Main Authors: | Andhifani, Wahyu Rizky, Tedjowasono, Ninny Susanti |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Penerbit Universiti Kebangsaan Malaysia
2024
|
| Online Access: | http://journalarticle.ukm.my/24777/ http://journalarticle.ukm.my/24777/1/Arkeologi_37_2_1.pdf |
Similar Items
Kutai Inscriptions
by: Wan Mamat, Wan Ali
Published: (2013)
by: Wan Mamat, Wan Ali
Published: (2013)
Isi kandung teks, tatabahasa dan paleografi prasasti Jawa kuno dari Temanggung, Jawa Tengah
by: Tedjowasono, Ninny Susanti, et al.
Published: (2023)
by: Tedjowasono, Ninny Susanti, et al.
Published: (2023)
Vocalism in the Continental runic inscriptions
by: Findell, Martin
Published: (2010)
by: Findell, Martin
Published: (2010)
Nestorian Inscriptions in Syro-Turkic From Quanzhou
by: Franzmann, Majella, et al.
Published: (2012)
by: Franzmann, Majella, et al.
Published: (2012)
Wackestones and grainstones geochemistry from Baturaja Formation, South Sumatra Province, Indonesia : origin and depositional environment
by: Irzon, Ronaldo, et al.
Published: (2022)
by: Irzon, Ronaldo, et al.
Published: (2022)
Determining the functions of the pre-Old English runic inscriptions
by: Higgs, Jasmin
Published: (2025)
by: Higgs, Jasmin
Published: (2025)
Yangzhou and Quanzhou: Ongoing Research on Syro-Turkic Inscriptions
by: Franzmann, Majella
Published: (2013)
by: Franzmann, Majella
Published: (2013)
Black and white memories: re-inscription of visual orientalism in embroideries
by: Jelodar, Esmaeil Zeiny, et al.
Published: (2014)
by: Jelodar, Esmaeil Zeiny, et al.
Published: (2014)
Observations on Select Christian Inscriptions in the Syriac Script from Zayton
by: Franzmann, Majella
Published: (2010)
by: Franzmann, Majella
Published: (2010)
Runes, runic inscriptions and runic writing as primary sources for town development
by: Magin, Elisabeth Maria
Published: (2021)
by: Magin, Elisabeth Maria
Published: (2021)
The influence of social psycholinguistic in the interpretation of inscription stone of Machap Melaka 1907
by: Kamaruddin, Rohaidah, et al.
Published: (2022)
by: Kamaruddin, Rohaidah, et al.
Published: (2022)
Thinking locally, acting globally? Stakeholder conflicts over UNESCO World Heritage inscription in Western Australia.
by: Jones, Roy, et al.
Published: (2012)
by: Jones, Roy, et al.
Published: (2012)
Recovering indigenous inscriptions of meaning from the colonial novel: A re-reading of the spatial archetypes in Joseph Conrad’s Lord Jim
by: Ahmad, Siti Nuraishah
Published: (2011)
by: Ahmad, Siti Nuraishah
Published: (2011)
علاقة الأدب العربي بالمخطوطات والنقوشات القديمة: دراسة اكتشافية = The discovery study of Arabic literature & ancient inscriptions connections
by: Yaacob, Solehah@Nik Najah Fadilah
Published: (2016)
by: Yaacob, Solehah@Nik Najah Fadilah
Published: (2016)
Household threat
by: Lee, Kian Seng
Published: (2023)
by: Lee, Kian Seng
Published: (2023)
A study of insider threat behaviour: developing a holistic insider threat model
by: Munshi, Asmaa Mahdi
Published: (2013)
by: Munshi, Asmaa Mahdi
Published: (2013)
Threats to auditor independence
by: Abu Bakar, Nur Barizah
Published: (2006)
by: Abu Bakar, Nur Barizah
Published: (2006)
Tapir under threat
by: New Straits Times,
Published: (2013)
by: New Straits Times,
Published: (2013)
Re-emerging threat
by: Mustapha, Kasmiah
Published: (2016)
by: Mustapha, Kasmiah
Published: (2016)
Facing threat of superbugs
by: Mansor, Rozaihan
Published: (2016)
by: Mansor, Rozaihan
Published: (2016)
Zika virus threat
by: Jennings, L., et al.
Published: (2016)
by: Jennings, L., et al.
Published: (2016)
Threats to Freedom of Speech
by: Zimmermann, A., et al.
Published: (2013)
by: Zimmermann, A., et al.
Published: (2013)
Security monitoring tool system using threat intelligence vs threat hunting
by: Wan Ikbal Ismat Wan Kamal,
Published: (2021)
by: Wan Ikbal Ismat Wan Kamal,
Published: (2021)
A comparative analysis study on information security threat models: a propose for threat factor profiling
by: Sidi, Fatimah, et al.
Published: (2017)
by: Sidi, Fatimah, et al.
Published: (2017)
Suicide is a national security threat
by: Ng, Alvin Lai Oon *
Published: (2022)
by: Ng, Alvin Lai Oon *
Published: (2022)
Countering the threat of Daesh in Malaysia
by: El-Muhammady, Ahmad
Published: (2016)
by: El-Muhammady, Ahmad
Published: (2016)
Tackling the threats of Internet worms
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Zahid: unity under threat
by: Abas, Azura
Published: (2017)
by: Abas, Azura
Published: (2017)
Tackling an emerging biodiversity threat
by: Hassan, Mohd Zafri
Published: (2019)
by: Hassan, Mohd Zafri
Published: (2019)
The Threat to International Higher Education
by: Phillimore, John, et al.
Published: (2011)
by: Phillimore, John, et al.
Published: (2011)
Threat captures attention, but not automatically: Top-down goals modulate attentional orienting to threat distractors
by: Vromen, J., et al.
Published: (2016)
by: Vromen, J., et al.
Published: (2016)
Incest: a threat to children and selected solutions
by: Che Yassin, Khairul Nizam, et al.
Published: (2011)
by: Che Yassin, Khairul Nizam, et al.
Published: (2011)
Indonesian maritime threats: a preliminary study
by: Buddy Suseto,
Published: (2021)
by: Buddy Suseto,
Published: (2021)
Political connections: A threat to auditor independence?
by: Abdul Wahab, Effiezal Aswadi, et al.
Published: (2015)
by: Abdul Wahab, Effiezal Aswadi, et al.
Published: (2015)
Insider threat: A critical review of the literature
by: Munshi, Asmaa, et al.
Published: (2012)
by: Munshi, Asmaa, et al.
Published: (2012)
The threat of Cyberterrorism and the applicability of the convention of cybercrime
by: Zulhuda, Sonny
Published: (2020)
by: Zulhuda, Sonny
Published: (2020)
Opportunities and threats in Malaysian construction industry
by: Sarif, Suhaimi Mhd
Published: (2011)
by: Sarif, Suhaimi Mhd
Published: (2011)
Threats and solutions for ATM security systems
by: Alharaki, Omarah Omar, et al.
Published: (2011)
by: Alharaki, Omarah Omar, et al.
Published: (2011)
The politics of regional security threat in Nigeria
by: Sule, Babayo, et al.
Published: (2022)
by: Sule, Babayo, et al.
Published: (2022)
IPTV network security: threats and countermeasures
by: M. S. A., Noman Ranak, et al.
Published: (2018)
by: M. S. A., Noman Ranak, et al.
Published: (2018)
Similar Items
-
Kutai Inscriptions
by: Wan Mamat, Wan Ali
Published: (2013) -
Isi kandung teks, tatabahasa dan paleografi prasasti Jawa kuno dari Temanggung, Jawa Tengah
by: Tedjowasono, Ninny Susanti, et al.
Published: (2023) -
Vocalism in the Continental runic inscriptions
by: Findell, Martin
Published: (2010) -
Nestorian Inscriptions in Syro-Turkic From Quanzhou
by: Franzmann, Majella, et al.
Published: (2012) -
Wackestones and grainstones geochemistry from Baturaja Formation, South Sumatra Province, Indonesia : origin and depositional environment
by: Irzon, Ronaldo, et al.
Published: (2022)