Suggested Topics within your search.
Suggested Topics within your search.
- English language 55
- Rhetoric 41
- History 31
- Report writing 30
- Management 25
- Grammar 23
- methods 22
- Law 21
- Moral and ethical aspects 18
- Research 18
- College readers 16
- Human anatomy 14
- Philosophy 13
- Handbooks, manuals, etc 12
- Methodology 12
- Problems, exercises, etc 12
- Social conditions 12
- Study and teaching 12
- Politics and government 11
- Academic writing 10
- Leadership 10
- Nursing 10
- Biochemistry 9
- Calculus 9
- Economic development 9
- Human physiology 9
- Mathematics 9
- Policy sciences 9
- Social aspects 9
- Anatomy 8
-
11081
The Milk Income Loss Contract Program for Dairy Producers
Published 2005-02-01“… The Milk Income Loss Contract (MILC) Program financially compensates dairy producers when domestic milk prices fall below a specified level. The program is authorized by the 2002 Farm Security and Rural Investment Act and has no set funding level. …”
Get full text
Article -
11082
Security mechanism in access control based on non-cooperative game
Published 2014-11-01“…Access control technology is an important information security technology to protect the sensitive information and critical resources in computer system and network.But traditional access control methods could only respond to access requests of users passively and can’t meet the changing dynamic network environment.In order to improve the ability to respond to malicious attacks and threats in access control system,a security mechanism is designed,which is suitable for access control,based on non-cooperative game theory in the game.When the subject makes an access request to the object,there will be a non-cooperative game between them to get Nash equilibrium.Then the security mechanism will compare the probabilities in the Nash equilibrium to the setting thresholds to get the conclusion that whether to authorize the subject or not.Experiment proves the effectiveness of the security mechanisms.…”
Get full text
Article -
11083
SOCIAL ENTREPRENEURSHIP: DEFINING THE CONCEPT AND KEY COMPONENTS
Published 2024-12-01“…This paper examines the definition and essential components of social entrepreneurship, which include a social mission, innovation, financial sustainability, and scalability. To this ends, the author employed a qualitative research method. Drawing from theoretical perspectives such as stakeholder theory, triple bottom line, and institutional theory, the results of the study provide a comprehensive understanding of how social entrepreneurs innovate to address social issues. …”
Get full text
Article -
11084
Approach to amphibole in Zaydari Nasaviâs Nafthat-o-Almasdour
Published 2013-12-01“…“Nafthat-o-Almasdour” book is one of the excellent examples of technical and stilted prose in the seventh century. The author of this work with complete mastery and benefit from a variety of literal and spiritual figures of speech has revealed his art in the word processing. …”
Get full text
Article -
11085
Transhumane Entwicklungen in Dietmar Daths Roman Venus siegt (2015)
Published 2022-07-01“…This article analyses Dietmar Dath’s novel Venus siegt (2015) by focusing on the topics of transhuman evolution and artificial intelligence. The author, giving his imagination free rein, elaborates on the subject of biotechnology which involves genetic modifications by which human beings, transforming into cyborgs, are connected with mechanical and cybernetic machines. …”
Get full text
Article -
11086
¿Birds of passage? La integración social de la población refugiada en España
Published 2018-05-01“…For that purpose, the authors analyze the current situation of the issue in Europe and particularly in Spain, collects the main data on the sociodemographic profile of the refugees, and finally, exposes the results obtained in the research. …”
Get full text
Article -
11087
USSR and revival of Indonesian Communist Party
Published 2009-04-01“…For more than two generations, historians have been asking themselves whether Moscow participated in the organizational and ideological revival of the Indonesian Communist Party (PKI) in 1951-53. Some authors believe that the Indonesian communists defined the new party strategy and tactics independently from either Moscow or Beijing. …”
Get full text
Article -
11088
A Comparative Review of Iran and Germany Tenth Grade English Textbook
Published 2020-02-01“…The results show that 10th grade English books in Iran are mostly based on learning through the analysis of language components such as grammar, vocabulary, and reading skills, and the authors of the book have paid less attention to practical aspects such as conversation and practice. …”
Get full text
Article -
11089
A Modified Reverse Remplissage Procedure for Management of a Locked Posterior Shoulder Dislocation
Published 2020-01-01“…Surgical management is required and decided on the delay between the trauma and the diagnosis and the importance of the RHS (in percentage). The authors present a chronic locked posterior shoulder dislocation in a 32-year-old active male with a reverse Hill-Sachs lesion of more than 40%. …”
Get full text
Article -
11090
La santé sexuelle et reproductive en Tunisie. Institutions médicales, lois et itinéraires thérapeutiques des femmes après la révolution
Published 2017-11-01“…Their conversation - which is the result of a 10-month collaboration - tackles different topics related to the institutions in charge of sexual and reproductive health, the laws regulating the access to these services, the therapeutic itineraries of women and the attitudes of health care providers. The authors particularly explore the local representations of the female body, the socioeconomic profiles of women using government sexual and reproductive health clinics, the knowledge of the law among patients and health practitioners, the application of sexual and reproductive rights in Tunisia, the impact of the revolution of 2011 and of the economic crisis on the public health services, men’s involvement in sexual and reproductive practices.…”
Get full text
Article -
11091
PROJECTS METHOD IN ORGANIZING OF GRAPHICAL TRAINING
Published 2016-12-01“…This urgent problem is indicated in the Program of Education Development in the Russian Federation in the years 2016-2020. The authors represent an analysis of innovations that accompany projecting-engineering activity, including using of up-to-date design technologies within the scope of the basic graphical training of students. …”
Get full text
Article -
11092
Inter-domain routing security mechanism for crossing autonomous system alliance
Published 2014-10-01“…Through studying and analyzing SE-BGP (security enhanced BGP),it was found that it couldn’t validate the cross-alliance AS (autonomous system) and defense the self-launched active attack.To solve the security problems,two-layer cross-alliance hierarchical structure CAHS (cross-alliance hierarchical structure) was designed.Based on CAHS,using the idea of passport visa and the features of AdHASH (additive hash),a cross-alliance BGP security mechanism SCA-BGP (secure crossing alliance for BGP) was proposed.The mechanism has higher security,which is able to effectively validate the identities and behavior authorization of the cross-alliance AS as well as the message carried by them.The experiment results show that SCA-BGP can effectively reduce the certificate scale and extra time overhead to get better scalability and convergence performance.…”
Get full text
Article -
11093
L’écriture de soi, et ses modalités de constitution en archives
Published 2012-05-01“…How is the link between the notions of “testimony”, “stories” and “archives” conceived and manipulated by the actors who use them (IER, authors, publishers, readers), and why attribute this terminology to them? …”
Get full text
Article -
11094
THE PERMISSIBLE INPUT OF BIOGENIC ELEMENTS TO WATER BODIES WITH SLOWED AND MODERATE WATER EXCHANGE
Published 2020-08-01“…Determination of the admissible increase of the total phosphorous inflow to water bodies of phytoplankton, phytoplankton/macrophyte and macrophyte types is to be done through determination of the permissible, from the point of view of the water user, increase of either the biomass or the phytoplankton, or the supreme aquatic vegetation. The author gives the equations for determination of the permissible inflow of the total phosphorous to phytoplankton, phytoplankton/macrophyte and macrophyte water bodies…”
Article -
11095
THE CONSEQUENCES OF USING DIFFERENT VARIANTS OF IMPLEMENTATION OF REDISTRIBUTIVE PAYMENT – A CASE STUDY OF POLAND
Published 2019-12-01“…The article describes a diagnostic study measuring the degree of concentration of the aid which is currently distributed under the direct support system for farmers in Poland; it also presents the regional differentiation in aid concentration. The author conducted a simulation test quantifying the redistributive effects of applying various variants of an instrument equalising the amounts of support granted to farms. …”
Get full text
Article -
11096
Novel Analytical and Numerical Approximations to the Forced Damped Parametric Driven Pendulum Oscillator: Chebyshev Collocation Method
Published 2022-01-01“…The obtained results help many authors to understand the mechanism of many phenomena related to the plasma physics, classical mechanics, quantum mechanics, optical fiber, and electronic circuits.…”
Get full text
Article -
11097
Evaluation of the fulfillment grade and clinical management of the treatment with immunotherapy in allergic patients.
Published 2006-08-01“…Gustavo Aldereguia Lima¨ Hospital, where 100 patients from the external allergy consulter were evaluated for a year. Authorized personnel checked out the level of fulfilment of the security rules, clinical betterment was evaluated with a daily control of symptoms correlated with clinical history of allergy, and satisfaction was evaluated through a questionaire.…”
Get full text
Article -
11098
Stages of a Startup Lifecycle: Essence, Signs, Problems and Ways to Prevent Them
Published 2021-07-01“…A detailed analysis of the stages of the startup lifecycle, essential characteristics and signs of these stages, potential problems and ways to prevent the identified problems are described for each of the approaches. The author noted the correlation of the stages, identified on the basis of various criteria, proposed a table of correspondence between these stages and pointed out the need to identify asymmetries by comparing them.…”
Get full text
Article -
11099
Analysis on traveling time of Internet
Published 2007-01-01“…Based on the giant data samples authorized by CAIDA,it found that the Internet traveling time was typically distributed by multi-modal and heavy-tailed when the Internet traveling time was statistically analyzed.Furthermore,a research on the relationship between the traveling diameter and the traveling time from the whole and local data samples supposed that link delay was the leading cause for the great variance of the traveling time,and a revising algorithm was proposed to process the raw data samples to obtain link delay.The statistical analysis of link delay presented that the ratio of the biggest link delay to the traveling time in more than 90% of paths was over 1/4.Then a definition of dominant delay was put forward.The traveling time is affected greatly by dominant delay,which makes the similar diameter’s traveling time distinct.…”
Get full text
Article -
11100
Casuarina cunninghamiana Miq. (River sheoak) in Florida and its Potential as a Windbreak Plant for Citrus Groves
Published 2008-07-01“…Includes references and a summary of regulatory authorities. Published by the UF Department of Horticultural Sciences, May 2008. …”
Get full text
Article