Suggested Topics within your search.
Suggested Topics within your search.
- Evaluation 3
- Information technology 3
- Public administration 3
- Evaluation research (Social action programs) 2
- Internet in public administration 2
- Management 2
- Telemedicine 2
- ART / Film & Video 1
- Balanced Scorecard 1
- Camcorders 1
- Certification 1
- Climate change mitigation 1
- Communication in rehabilitation 1
- Comparative method 1
- Complications 1
- Cross-cultural studies 1
- Curricula 1
- Curriculum evaluation 1
- Curriculum planning 1
- Digital watermarking 1
- Economic conditions 1
- Education 1
- Electronic Health Records 1
- Electronic data processing personnel 1
- Electronic reference services (Libraries) 1
- Employee empowerment 1
- English 1
- Entrepreneurship 1
- Estate planning 1
- Ethnology 1
-
181
Implementation of Health Values in Islamic Education
Published 2025-04-01“… This study aims to analyze the implementation of health education values in Dayah Bustanul Ulum and Dayah Futuhul Ma'arif Al-Aziziyah, focusing on the behavior of students in implementing cleanliness, healthy eating patterns, exercise, and mental health. …”
Get full text
Article -
182
MANIPULATIVE TACTICS IMPLEMENTATION IN POLITICAL DISCOURSE
Published 2024-12-01“…Linguistic analysis of modern political discourse and, in particular, identification of the most frequent linguistic means of implementing manipulation in political discourse, is of particular relevance today and is important not just because it expands the theoretical scientific base, but for its practical value for the formation of a mature point of view and critical thinking when dealing with the texts of political discourse. …”
Get full text
Article -
183
Costs of Loyalty Programmes Implementation in Pharmacies
Published 2010-10-01“…The paper presents the implementation costs of loyalty programmes in pharmacies. …”
Get full text
Article -
184
The challenges of implementing carbon tax in Indonesia
Published 2024-12-01Subjects: Get full text
Article -
185
Recent progress in the implementation of sustainable farming
Published 2025-06-01Get full text
Article -
186
Implementing Statistical Multiplexing in DVB-H
Published 2009-01-01“…A novel technique for implementing statistical multiplexing (StatMux) of broadcast services over Digital Video Broadcasting for Handhelds (DVB-H) channels is proposed. …”
Get full text
Article -
187
Parallel Implementation of Katsevich's FBP Algorithm
Published 2006-01-01“…Basing on this fact, we develop a parallel implementation of Katsevich's FBP algorithm. We do all the numerical experiments on a Linux cluster. …”
Get full text
Article -
188
E-Government Implementation on the Example of Georgia
Published 2024-06-01“…The term ‘digitalization’ of public administration, used as a synonym for ‘e-government,’ fi rst implies the implementation of fast, secure procedures by an administrative body. …”
Get full text
Article -
189
-
190
Evaluation of the Implementation of Waste Bank Activities
Published 2022-04-01“…ABSTRACT The Waste Bank (WB) was first established in 2008 by a village community in Bantul Regency, DI Yogyakarta Province. The WB implemented 3R (Reduce, Reuse and Recycle), starting from sorting organic and inorganic waste in households, and depositing at the WB. …”
Get full text
Article -
191
On Implementing Technomorph Biology for Inefficient Computing
Published 2025-05-01“…Even today, some biological implementation details inspire the implementation of more performant electronic implementations. …”
Get full text
Article -
192
Evidence, implementation, and challenges in mechanical ventilation
Published 2025-03-01Get full text
Article -
193
Implementing Inquiry-Based Teaching Methods
Published 2009-01-01“…Myers, focuses on the nature of inquiry and provides basic guidelines and strategies for implementing inquiry-based teaching methods. Includes useful resources. …”
Get full text
Article -
194
Emergency department observation implementation guide
Published 2023-08-01“…This paper provides a comprehensive guide for ED leaders on the implementation of ED observation in their departments. …”
Get full text
Article -
195
-
196
An Evaluation of the Implementation of Personal Development Planning
Published 2011-12-01“…PDP tutorials were implemented in order to help students improve their academic skills and to enhance their employability. …”
Get full text
Article -
197
Implementing Inquiry-Based Teaching Methods
Published 2009-01-01“…Myers, focuses on the nature of inquiry and provides basic guidelines and strategies for implementing inquiry-based teaching methods. Includes useful resources. …”
Get full text
Article -
198
Challenge and Implementation of Content-Centric Networking
Published 2013-08-01“…CCN is communication architecture that takes content as a primitive,and retrieves content by name,not by host IP again.It builds on publish/subscribe and network-embedded caching with bandwidth-storage tradeoff.Since it is a clean-slate design,there are many issues to be explored.The concepts,characteristics,network model and recent advances of CCN were introduced.The challenges and some key issues CCN faced were also emphasized.In order to demonstrate the feasibility and implementations,two CCN system samples were also presented.…”
Get full text
Article -
199
Frugal Innovations: Implementation in Regions of Poland
Published 2023-01-01“…Originality/value: The study raises a new issue in domestic science, concerning the implementation of the attributes of the concept of frugal innovations in various regions of Poland, i.e. the A, B and C regions.…”
Get full text
Article -
200
Mechanism and implementation of Rootkit attack and defense
Published 2018-12-01“…Rootkit is a set of malicious codes that can attack the system kernel and achieve deep hiding,which has posed serious threats to cyber security.Firstly,the basic features of Rootkit/Bootkit were introduced,and the characteristics of Rootkit attacks in user mode and kernel mode were compared and analyzed.Thereafter,the implementation principles and working mechanisms of Hook,DKOM and virtualization technologies involved in Rootkit attacks were emphatically analyzed.Combined with the specific attack behaviors,the main detection methods and defense techniques for Rootkit attacks were discussed at the end.…”
Get full text
Article