Suggested Topics within your search.
Suggested Topics within your search.
- History 24
- Law 24
- English language 16
- Philosophy 14
- methods 13
- Anesthesia 12
- Biochemistry 10
- Methodology 10
- Research 10
- Criminal law 7
- English 7
- French language 7
- Law and legislation 7
- Management 7
- Molecular biology 7
- Social service 7
- Women 7
- Academic writing 6
- Administrative law 6
- Contracts 6
- Politics and government 6
- Psychology 6
- Social conditions 6
- Social sciences 6
- Study and teaching 6
- literature 6
- Authorship 5
- Constitutional law 5
- Domestic relations 5
- Education, Higher 5
-
204501
-
204502
BALANCED SCORECARD SİSTEMİNİN HAZIR GİYİM İŞLETMESİNDE UYGULANMASI
Published 2010-12-01Get full text
Article -
204503
اتجاهات طلاب اقسام المکتبات والمعلومات بالجامعات المصرية نحو الاختبارات الالکترونية
Published 2021-06-01“…The study recommended holding courses in electronic tests for students and faculty members, spreading the culture of applying electronic tests among university students and faculty members…”
Get full text
Article -
204504
A Párt és a Munka. Szempontok Lukács György filozófiájának szisztematikus-történeti kutatásához
Published 2023-10-01Get full text
Article -
204505
-
204506
-
204507
TÜRK MÜZİĞİEĞİTİMİVEREN DEVLET KONSERVATUVARLARINDA KORO EĞİTİMİ
Published 2006-08-01Get full text
Article -
204508
MUHASEBEDE ULUSLARARASI UYUM VE AVRUPA BİRLİĞİ SÜRECİNDE TÜRKİYE’DE MUHASEBE UYUMLAŞTIRMA ÇALIŞMALARI
Published 2004-06-01Get full text
Article -
204509
-
204510
TARGET SUBSIDIES AS A FILM SCREENING DEVELOPMENT TOOL IN RUSSIAN REGIONS
Published 2019-05-01Get full text
Article -
204511
-
204512
A Handoff Algorithm of Dynamic Decisions with Extenics for Wireless Cellular Networks
Published 2010-01-01Get full text
Article -
204513
Design and application research on management information system security architecture in digital campus
Published 2014-10-01“…Aiming at the university management information system security threats and challenges,a security architecture named 1C4GS was proposed.First connotation and function of five important components of 1C4GS was expounded,which named security management center,security communication network,security region boundary,security computing environment and security application.Then we used “basic personal data reporting system” as an example to construct the management information system security arrangement application based on 1C4AS,this arrangement application integrated a variety of security technologies and strategies such as transparent data encryption,user Identify,form edit cache as a whole to,and achieved the management information system’s network security,border security,computing environment security and application security.…”
Get full text
Article -
204514
A STUDY ON THE COMPETITION STRATEGIES IMPLEMENTED IN THE AIRLINE COMPANIES IN TURKEY
Published 2009-06-01Get full text
Article -
204515
Modeling Rainfall Variability over Urban Areas: A Case Study for Kuwait
Published 2012-01-01Get full text
Article -
204516
Crime e Castigo: "Pecados Publicos" e Disciplinamento Social na Diocese de Viseu (1684-1689)
Published 2006-11-01Get full text
Article -
204517
Centralna Biblioteka Uniwersytecka Karola I w Bukareszcie
Published 2015-12-01Get full text
Article -
204518
-
204519
The transition of food systems towards sustainability: The role of digitalization
Published 2024-12-01Get full text
Article -
204520
İsveç Sinemasından Bir Auteur: Ingmar Bergman ve “Yedinci Mühür”
Published 2013-11-01Get full text
Article