Showing 46,581 - 46,600 results of 51,844 for search '"management', query time: 0.21s Refine Results
  1. 46581

    Bilateral Atypical Femoral Fractures in a Patient with Multiple Myeloma Treated with Intravenous Bisphosphonate Therapy by Ichiro Tonogai, Tomohiro Goto, Daisuke Hamada, Toshiyuki Iwame, Shinji Yoshioka, Takahiko Tsutsui, Yuichiro Goda, Hiroshi Egawa, Koichi Sairyo

    Published 2014-01-01
    “…Bisphosphonates are currently the standard approach to managing bone disease in multiple myeloma. Bisphosphonates have high bone affinity that inhibits osteoclastic activity and additionally reduces the growth factors released from malignant or osteoblastic cells, thereby impairing abnormal bone remodeling which leads to osteolysis. …”
    Get full text
    Article
  2. 46582

    Mover-se na Metrópole de Piratininga: as políticas públicas de mobilidade para a Grande São Paulo by Gullit Torres Dias

    Published 2016-12-01
    “…The present article aims to analyse the aplicability of the public policies of mobility in the São Paulo Metropolitan Region by the state companies who manage the transport (Metrô and CPTM). The formulation, execution and evaluation of the public policies of mobility/accessibility has been scheduled in the last governments either regional or local, with the intention to reduce the traffic of vehicles and improve the users’ flow of public transport in the urban territory. …”
    Get full text
    Article
  3. 46583

    Weakly coupled traveling waves for a model of growth and competition in a flow reactor by Wenzhang Huang

    Published 2005-10-01
    “…This means, lacking an adequate nutrient, two competingorganisms will manage to survive in a more economical way.…”
    Get full text
    Article
  4. 46584

    Applied modeling of the objects in the e-laboratory environment by Antanas Andrius Bielskis, Olegas Ramašauskas

    Published 2003-12-01
    “…Flexible learning environment means the system able not only to present and manage learning material, collect information about the users, give statistics on them and learning material, but even able to adapt its behavior to the specific learner needs. …”
    Get full text
    Article
  5. 46585

    Port site hernia following transperitoneal laparoscopic pyeloplasty by Ashraf F. Hefny, Hamda Musafir, Asma Al Shamsi, Sherif A. Fathi

    Published 2025-03-01
    “…Herein, we present such a case in which the patient was managed conservatively. To our knowledge this is the first reported case in literature.…”
    Get full text
    Article
  6. 46586

    Conditional privacy-protection remote user authentication mechanism for WBAN by Jin CAO, Yi-qing ZHENG, Hui LI

    Published 2016-10-01
    “…A conditional privacy-protection remote user authentication scheme based on a certificateless group signature was proposed,which can accomplish the anonymous mutual authentication between the user and the remote doctors.In addition,when the doctors perceived that users were in case of an emergency,the mechanism enabled the only group manager (GM) to expose the real identity information of users and given users timely assistance.The scheme can provide the anonymity,traceability,mutual authentication,non-reputation and some other security features.The performance analysis results show the scheme is more suitable for WBAN.…”
    Get full text
    Article
  7. 46587

    Secure Pesticide Storage: Security Against Terrorist Threats by Frederick M. Fishel

    Published 2005-06-01
    “… Many farmers and managers of pesticide storage facilities had concerns about biosecurity and agroterrorism even before the Oklahoma City bombing and the September 11, 2001 terrorist attacks on our nation. …”
    Get full text
    Article
  8. 46588

    Complete Heart Block Following Anaphylaxis: A Case Report and Literature Review by Nergiz Aydin, Yakup Alsancak, Ahmet Soylu

    Published 2024-11-01
    “…This report underscores the importance of monitoring and managing cardiovascular effects in patients experiencing severe allergic reactions, particularly when using certain antibiotics like cefixime.…”
    Get full text
    Article
  9. 46589

    External iliac artery injury with posterior pelvic ring injury in Korea: two case reports by Joosuk Ahn, Ji Wan Kim

    Published 2023-06-01
    “…The most important factors in the managements are the immediate bleeding control and restoration of distal blood flow. …”
    Get full text
    Article
  10. 46590

    "Die skurwe liefde om te besit": teologiese riglyne vir sake-etiek by L. O. K. Lategan

    Published 2004-06-01
    “…Section 2 focuses on three key concepts, namely man as manager of God’s property; the central love command and the religious conviction of man. …”
    Get full text
    Article
  11. 46591
  12. 46592
  13. 46593

    Le mouvement de désinvestissement des énergies fossiles : une nouvelle phase de mobilisation pour le climat ? by Fanny Lajarthe, Edwin Zaccai

    Published 2017-03-01
    “…The fossil fuel divestment movement, born in 2010 in the United-States, spread rapidly through American universities and managed to gather other support later on such as religious organisations, cities or philanthropic foundations. …”
    Get full text
    Article
  14. 46594

    Stent assisted coil embolization for post-surgical ruptured recurrence of anterior communicating aneurysm by Alexandra Rusu, N. Dobrin, Giorgiana Ion, Z. Faiyad, A. Chiriac

    Published 2024-12-01
    “…These lesions can be difficult to manage by either a classical microsurgical approach or endosaccular coiling. …”
    Get full text
    Article
  15. 46595

    Data integrity verification based on model cloud federation of TPA by Junfeng TIAN, Tianle LI

    Published 2018-08-01
    “…Aiming at the untrustworthiness of third-party auditor (TPA) in the publicity verification model,a data integrity verification model based on the cloud federation of TPA was proposed.Firstly,the cloud federation of TPA’s architecture was designed and the main functional components and function of the system platform was defined.The federation could manage and control the TPA cloud members.Secondly,TPA was designed in detail by using trusted computing technology and blockchain technology to ensure the credibility of the TPA execution environment and workflow.Finally,the data integrity verification model was built by using cloud federation of TPA.The correctness,security and effectiveness of the model were analyzed theoretically and experimentally.…”
    Get full text
    Article
  16. 46596

    N.I. VAVILOV, THE FOUNDER OF THE CENTRAL PLANT BREEDING AND GENETICAL STATION. ON THE 90th ANNIVERSARY OF VIR PUSHKIN LABORATORIES by E. V. Truskinov

    Published 2014-12-01
    “…Vavilov shows that he was not only a great scientist but also a remarkable science manager. He founded the All-Russia Institute of Plant Industry (VIR) and a network of experimental stations. …”
    Get full text
    Article
  17. 46597

    Boltzmann’s Six-Moment One-Dimensional Nonlinear System Equations with the Maxwell-Auzhan Boundary Conditions by A. Sakabekov, Y. Auzhani

    Published 2016-01-01
    “…Then we obtain the initial value problem for Riccati equation. We have managed to obtain a particular solution of this equation in an explicit form.…”
    Get full text
    Article
  18. 46598

    Przestrzeń zabaw ryzykownych w przedszkolu leśnym by Patrycja Brudzińska

    Published 2022-10-01
    “…The key issue in recognition is the teachers’ attitude to risky play. Children learn to manage risk, make decisions, solve problems, assess their own physical fitness, but taking such actions requires appropriate suport from adults. …”
    Get full text
    Article
  19. 46599

    Key of SDN/NFV development:development and challenge of orchestrator by Peng ZHAO, Xiaodong DUAN

    Published 2017-04-01
    “…Network function virtualization (NFV) and software defined networking (SDN) have been widely recognized as the main direction of the development of the next generation telecom network,and as the brain of the future network,orchestrator is the key for the operators to manage the network flexibly and maximize the advantages of new technologies.Firstly,the core position of orchestrator in the next generation network was described,and the technical architecture of orchestrator was introduced.Then,the development of orchestrator in the perspective of standardization and open source were introduced and analyzed.Finally,the relationship between standardization and open source was elaborated,including the integration of orchestrator and OSS,the support of orchestrator for SDN and the idea to realize the intelligent and automatic network operation relying on orchestrator.…”
    Get full text
    Article
  20. 46600

    Mentoring as a Form of Transformation in Academia by Hleliwe Khumalo, Ayanda Kevin Ndlovu

    Published 2024-02-01
    “…Despite this challenge, a number of women have managed to succeed irrespective of the institutional culture and structures of exclusion. …”
    Get full text
    Article