Showing 1 - 20 results of 31 for search 'The Client List', query time: 0.07s Refine Results
  1. 1

    Enhancing a Client-Centred Practice with the Canadian Occupational Performance Measure by A. Enemark Larsen, B. Rasmussen, J. R. Christensen

    Published 2018-01-01
    “…The active participation of clients is an important aspect of rehabilitation quality as conceptualized in client-centred practice (CCP). …”
    Get full text
    Article
  2. 2

    Availability and accessibility of cytotoxic medicines in the WHO model list of essential medicines for childhood cancer in low and lower-middle- income countries: a systematic revi... by Maheeka Seneviwickrama, Sashini Shehana Denagamagei, Surangi Jayakody, Sanjeeva Gunasekera, Guwani Liyanage

    Published 2025-01-01
    “…The alignment of the National Essential Medicine Lists (NEMLs) with the World Health Organization Essential Medicine List for Children (WHO EMC) varied from 40%- 60%. …”
    Get full text
    Article
  3. 3

    AUDIT FEE, AUDITOR’S EXPERIENCE, AND EARNINGS MANAGEMENT: EVIDENCE FROM LISTED MANUFACTURING COMPANIES IN NIGERIA by Muhammed Kamaldeen Usman, Adeoluwa Victoria Adekanye

    Published 2023-11-01
    “…This study examined the effects of audit fee and auditor’s experience on earnings management of listed manufacturing companies in Nigeria. In order to achieve this, Ex-post facto research design was utilized with the population consisting of seventy-six (76) listed manufacturing companies. …”
    Get full text
    Article
  4. 4

    IMPACT OF AUDIT QUALITY ON EARNINGS MANAGEMENT OF CONSUMER GOODS FIRMS IN NIGERIA by Sirajo Bappah, Awwal Saad, Saidu Adamu, Shehu Usman Hassan

    Published 2024-09-01
    “… This study examines the impact of audit quality on earnings management of listed consumer goods firms in Nigeria. The study adopted correlational research design. …”
    Get full text
    Article
  5. 5

    Collaborating Filtering Method Based on Multiple Data Sources by Fushun Ke, Xiaohui Yao

    Published 2015-07-01
    “…The highly efficient utilization of multiple data sources is a key challenge in big data applications.Based on the collaborative filtering recommendation,services pick consumption behaviors of similar clients by clustering to generate the recommendation list.Client clustering contains two units,one is preliminary clustering,and the other is synthetic clustering.Preliminary clustering use client-product score matrixes,telecommunication service identities,client network behaviors and etc.to calculate similarities.Synthetic clustering weights the abundance of data,and then completes the similarity calculation and client clustering.Adjustable weights of data validity were introduced to optimize the system on the basis of click rates and conversion rates of recommendation list.…”
    Get full text
    Article
  6. 6

    Legal Aspects of Regulating Lobbying in the United States of America and Canada by E. A. Kremyanskaya

    Published 2014-04-01
    “…In the article there is the list of information, which should be provided by lobbyists to the control bodies and the author correctly mentions that this list in USA is much wider, comparing to Canadian regulations. …”
    Get full text
    Article
  7. 7

    Experiences of and response to the COVID-19 pandemic at private retail pharmacies in Kenya: a mixed-methods study by Edwine Barasa, Sassy Molyneux, Jacinta Nzinga, Audrey Mumbi, Peter Mwangi Mugo, Daniella Munene, Collins Jaguga, Davy Odhiambo, Elizabeth Ominde-Ogaja, Mercy Maina, Michael Mungoma, Nadia Butt, Sultani Matendechero, Titus Kahiga, Eric Sedah, Sylvia Opanga

    Published 2022-06-01
    “…Objectives To assess experiences of and response to the COVID-19 pandemic at community pharmacies in Kenya.Design, setting and participants This was a mixed-methods study conducted from November 2020 to April 2021, targeting service providers in three counties (Nairobi, Mombasa and Kisumu), selected purposively to represent the main urban centres; pharmacies were selected randomly from a list of licensed pharmacies.Results Of 195 sampled pharmacies, 108 (55%) completed a questionnaire and 103 (53%) received a simulated client call; 18 service providers were interviewed. …”
    Get full text
    Article
  8. 8

    Digital transformation of public administration at the present stage by G. A. Chmut

    Published 2023-02-01
    “…One of the basic values of the modern state is the orientation of all its services towards meeting people’s needs. Client-centricity was included in the list of 42 initiatives for socio-economic development of Russia until 2030, approved by the Russian Government in 2021. …”
    Get full text
    Article
  9. 9
  10. 10

    Rôle des acteurs dans le processus d’élaboration de projets routiers by Shahinaz Sayagh, Agnès Jullien, Anne Ventura

    Published 2014-05-01
    “…The analysis shows the difficulty to express a list of explicit decisional criteria that respond to the stakes of sustainable development. …”
    Get full text
    Article
  11. 11

    Human-Centered Design of an mHealth Tool for Optimizing HIV Index Testing in Wartime Ukraine: Formative Research Case Study by Nancy Puttkammer, Elizabeth Dunbar, Myroslava Germanovych, Mariia Rosol, Matthew Golden, Anna Hubashova, Vladyslav Fedorchenko, Larisa Hetman, Liudmyla Legkostup, Jan Flowers, Olena Nesterova

    Published 2025-01-01
    “…The Computer-Assisted Self-Interview (CASI)–Plus study sought to develop and test a mobile health (mHealth) tool to increase the elicitation of sexual and needle-sharing partners among persons with newly diagnosed HIV. CASI-Plus provides client-facing information on APS methods and uses a standardized, self-guided questionnaire with nonjudgmental language for clients to list partners who would benefit from HIV testing. …”
    Get full text
    Article
  12. 12

    Pavement Manager at Risk in Construction of Hot Mix Asphalt by Hesham Ali, Mohamadtaqi Baqersad

    Published 2018-01-01
    “…The problem is further complicated by the emergence of a large list of new products and techniques that are self-proclaimed to achieve miracles but fall short. …”
    Get full text
    Article
  13. 13

    FACTORS INFLUENCING THE EFFECTIVE CAPTURE OF INDIRECT COSTS IN ACCIDENT REPORTS BY EMERGING CONSTRUCTION CONTRACTORS IN SOUTH AFRICA by Ayodeji .O. Aiyetan, Chikezirim Okorafor

    Published 2020-09-01
    “…Survey results revealed that difficulties in extracting the information top the list with MIS value of 4.67, followed by organisational will with MIS value of 4.61. …”
    Get full text
    Article
  14. 14

    Physical Therapists Use of Diagnostic Ultrasound Imaging in Clinical Practice: A Review of Case Reports by Robert Manske, Katherine Podoll, Alycia Markowski, Maureen Watkins, Lorna Hayward, Murray Maitland

    Published 2023-02-01
    “…The most common indication for USI was a differential diagnosis list that included serious pathologies. Case studies often had more than one indication. …”
    Get full text
    Article
  15. 15

    Changes in the legal regulation of criminal proceedings under martial law by O. V. Salmanov

    Published 2023-06-01
    “…However, the law does not provide a clear list of such situations, so the prosecutor will decide whether the investigating judge can perform his or her functions. …”
    Get full text
    Article
  16. 16

    Dual-stack host discovery method based on SSDP and DNS-SD protocol by Fan SHI, Yao ZHONG, Pengfei XUE, Chengxi XU

    Published 2023-02-01
    “…With the exhaustion of the IPv4 addresses, the promotion and deployment of IPv6 has been accelerating.Dual-stack technology allows devices to enable both IPv4 and IPv6 protocols, which means that users are facing more security risks.Although the existing work can realize the identification and measurement of some dual-stack servers, the following problems still exist.Dual-stack host identification requires deep protocol identification of host services, but this method consumes too much scanning resources.Besides, network service providers may provide consistent services on distributed hosts, making it difficult to guarantee the accuracy of dual-stack host identification through service fingerprints.To solve these problems, the LAN service discovery protocol was used to bind host services to IP addresses, and a dual-stack host discovery method based on SSDP and DNS-SD protocols was proposed.In IPv4 network environment, the target host was induced to actively send a request to the constructed IPv6 server through SSDP protocol, and then the IPv6 address was extracted from the server’s log.Or the service list of the target host and its corresponding AAAA record was enumerated through the DNS-SD protocol and the IPv6 address of the target host was obtained, in order to realize the discovery of the dual stack address pairs.With this method, IPv6 addresses was obtained directly from the IPv4 host, which ensured the accuracy of the discovered dual-stack host.At the same time, only request packets for specific protocols were needed during the discovery process, which greatly saved scanning resources.Based on this method, the SSDP hosts and DNS-SD hosts accidentally exposed to the global IPv4 network were measured.A total number of 158k unique IPv6 addresses were collected, of which 55k were dual-stack host address pairs with globally reachable IPv6 addresses.Unlike existing work that focused on dual-stack servers, this method mainly targeted end-users and client devices, and built a unique set of active IPv6 devices and dual-stack host address pairs that have not been explored so far.Through the analysis of the obtained IPv6 address addressing type, it shows that IPv6 address is mainly generated in a random manner, which greatly reduces the possibility of IPv6 hosts being discovered by scanning.In particular, by measuring the ports and services of dual-stack hosts, we found that the security policy differences of dual-stack hosts on different protocol stacks.Especially, IPv6 protocol stack exposes more high-risk services, expanding the attack surface of hosts.The research results also show that the infeasibility of IPv6 address space traversal scanning mitigates the security risks of IPv6, but incorrect network configuration greatly increases the possibility of these high-risk IPv6 hosts being discovered and users should revisit IPv6 security strategy on dual-stack hosts.…”
    Get full text
    Article
  17. 17

    Research and practice of PON fault intelligent detection and recovery technology by Qi YU, Yanbin SHI, Shipeng QIU

    Published 2016-09-01
    “…Based on current situation that PON network faults are mainly processed around the user account password and terminal problems,and all the complex phenomena and network issues involved are sent to the operation and maintenance department,leading to low failure processing efficiency and high treatment pressure,an end-to-end fault diagnosis and repair method was proposed based on the customer resource tree.Through adopting big data analysis technology and service capability opening technology,an end-to-end fault detection system from service platform to client terminals was built and fault phenomena,conclusions and treatment methods of the nodes in the resource tree were combed,and fault processing scenarios were listed to verify the accuracy of fault detection and fast recovery.The result shows that the failure interception efficiency is improved by 34%.…”
    Get full text
    Article
  18. 18

    THE STATE OF ADOPTION OF LEAN CONSTRUCTION IN THE TANZANIAN CONSTRUCTION INDUSTRY by Nyamagere Gladys SOSPETER, Geraldine John KIKWASI

    Published 2017-06-01
    “…It was consistently found that the main barriers to adoption of lean construction in the Tanzanian construction industry are a lack of technical skills and inadequate design and client information. Generally, there is a low rate of adoption of lean construction in Tanzania, as most of the listed concepts are not yet sufficiently recognised by the respondents. …”
    Get full text
    Article
  19. 19

    Finding and Using a Co-Packer by Alison O’Donoughue, Wendi Jennings, Soohyoun Ahn

    Published 2020-05-01
    “… A contract packager, commonly called a co-packer, is a manufacturer that will produce, package, and/or label a product for clients. This new 7-page factsheet provides a brief overview on the definition of co-packers, advantages and disadvantages of using a co-packer, and the list of things you need to consider when you hire and work with a co-packer. …”
    Get full text
    Article
  20. 20

    Finding and Using a Co-Packer by Alison O’Donoughue, Wendi Jennings, Soohyoun Ahn

    Published 2020-05-01
    “… A contract packager, commonly called a co-packer, is a manufacturer that will produce, package, and/or label a product for clients. This new 7-page factsheet provides a brief overview on the definition of co-packers, advantages and disadvantages of using a co-packer, and the list of things you need to consider when you hire and work with a co-packer. …”
    Get full text
    Article