Showing 181 - 200 results of 99,435 for search '(complementacion OR implementation)', query time: 0.26s Refine Results
  1. 181

    Implementation of Health Values in Islamic Education by Cut Eliza Hidayani

    Published 2025-04-01
    “… This study aims to analyze the implementation of health education values in Dayah Bustanul Ulum and Dayah Futuhul Ma'arif Al-Aziziyah, focusing on the behavior of students in implementing cleanliness, healthy eating patterns, exercise, and mental health. …”
    Get full text
    Article
  2. 182

    MANIPULATIVE TACTICS IMPLEMENTATION IN POLITICAL DISCOURSE by Tatyana P. Paliy, Inna N. Poteryakhina

    Published 2024-12-01
    “…Linguistic analysis of modern political discourse and, in particular, identification of the most frequent linguistic means of implementing manipulation in political discourse, is of particular relevance today and is important not just because it expands the theoretical scientific base, but for its practical value for the formation of a mature point of view and critical thinking when dealing with the texts of political discourse. …”
    Get full text
    Article
  3. 183

    Costs of Loyalty Programmes Implementation in Pharmacies by Maria Sierpińska, Agnieszka Woś

    Published 2010-10-01
    “…The paper presents the implementation costs of loyalty programmes in pharmacies. …”
    Get full text
    Article
  4. 184
  5. 185
  6. 186

    Implementing Statistical Multiplexing in DVB-H by Mehdi Rezaei, Imed Bouazizi, Moncef Gabbouj

    Published 2009-01-01
    “…A novel technique for implementing statistical multiplexing (StatMux) of broadcast services over Digital Video Broadcasting for Handhelds (DVB-H) channels is proposed. …”
    Get full text
    Article
  7. 187

    Parallel Implementation of Katsevich's FBP Algorithm by Jiansheng Yang, Xiaohu Guo, Qiang Kong, Tie Zhou, Ming Jiang

    Published 2006-01-01
    “…Basing on this fact, we develop a parallel implementation of Katsevich's FBP algorithm. We do all the numerical experiments on a Linux cluster. …”
    Get full text
    Article
  8. 188

    E-Government Implementation on the Example of Georgia by Tskhadadze Ketevan

    Published 2024-06-01
    “…The term ‘digitalization’ of public administration, used as a synonym for ‘e-government,’ fi rst implies the implementation of fast, secure procedures by an administrative body. …”
    Get full text
    Article
  9. 189
  10. 190

    Evaluation of the Implementation of Waste Bank Activities by Irdam Ahmad

    Published 2022-04-01
    “…ABSTRACT The Waste Bank (WB) was first established in 2008 by a village community in Bantul Regency, DI Yogyakarta Province. The WB implemented 3R (Reduce, Reuse and Recycle), starting from sorting organic and inorganic waste in households, and depositing at the WB. …”
    Get full text
    Article
  11. 191

    On Implementing Technomorph Biology for Inefficient Computing by János Végh

    Published 2025-05-01
    “…Even today, some biological implementation details inspire the implementation of more performant electronic implementations. …”
    Get full text
    Article
  12. 192
  13. 193

    Implementing Inquiry-Based Teaching Methods by Anna J. Warner, Brian E. Myers

    Published 2009-01-01
    “…Myers, focuses on the nature of inquiry and provides basic guidelines and strategies for implementing inquiry-based teaching methods. Includes useful resources. …”
    Get full text
    Article
  14. 194

    Emergency department observation implementation guide by Kyle W. Trecartin, Richard E. Wolfe

    Published 2023-08-01
    “…This paper provides a comprehensive guide for ED leaders on the implementation of ED observation in their departments. …”
    Get full text
    Article
  15. 195
  16. 196

    An Evaluation of the Implementation of Personal Development Planning by Ioanna Palaiologou

    Published 2011-12-01
    “…PDP tutorials were implemented in order to help students improve their academic skills and to enhance their employability. …”
    Get full text
    Article
  17. 197

    Implementing Inquiry-Based Teaching Methods by Anna J. Warner, Brian E. Myers

    Published 2009-01-01
    “…Myers, focuses on the nature of inquiry and provides basic guidelines and strategies for implementing inquiry-based teaching methods. Includes useful resources. …”
    Get full text
    Article
  18. 198

    Challenge and Implementation of Content-Centric Networking by Xinggong Zhang, Tong Niu, Zongming Guo

    Published 2013-08-01
    “…CCN is communication architecture that takes content as a primitive,and retrieves content by name,not by host IP again.It builds on publish/subscribe and network-embedded caching with bandwidth-storage tradeoff.Since it is a clean-slate design,there are many issues to be explored.The concepts,characteristics,network model and recent advances of CCN were introduced.The challenges and some key issues CCN faced were also emphasized.In order to demonstrate the feasibility and implementations,two CCN system samples were also presented.…”
    Get full text
    Article
  19. 199

    Frugal Innovations: Implementation in Regions of Poland by Jacek Woźniak

    Published 2023-01-01
    “…Originality/value: The study raises a new issue in domestic science, concerning the implementation of the attributes of the concept of frugal innovations in various regions of Poland, i.e. the A, B and C regions.…”
    Get full text
    Article
  20. 200

    Mechanism and implementation of Rootkit attack and defense by Fujuan LI, Qun WANG

    Published 2018-12-01
    “…Rootkit is a set of malicious codes that can attack the system kernel and achieve deep hiding,which has posed serious threats to cyber security.Firstly,the basic features of Rootkit/Bootkit were introduced,and the characteristics of Rootkit attacks in user mode and kernel mode were compared and analyzed.Thereafter,the implementation principles and working mechanisms of Hook,DKOM and virtualization technologies involved in Rootkit attacks were emphatically analyzed.Combined with the specific attack behaviors,the main detection methods and defense techniques for Rootkit attacks were discussed at the end.…”
    Get full text
    Article