Suggested Topics within your search.
Suggested Topics within your search.
- Management 58
- Public administration 10
- Marketing 9
- methods 9
- Hospitality industry 8
- Personnel management 8
- Tourism 8
- Entrepreneurship 7
- Information technology 7
- Project management 7
- Educational leadership 6
- Industrial management 6
- Leadership 6
- Organizational behavior 6
- Politics and government 6
- Purchasing 6
- Risk management 6
- School management and organization 6
- Economic conditions 5
- Finance 5
- History 5
- Industrial procurement 5
- Natural resources 5
- Study and teaching 5
- Communication in management 4
- Database management 4
- Decision making 4
- Moral and ethical aspects 4
- Nursing 4
- Planning 4
-
46581
Bilateral Atypical Femoral Fractures in a Patient with Multiple Myeloma Treated with Intravenous Bisphosphonate Therapy
Published 2014-01-01“…Bisphosphonates are currently the standard approach to managing bone disease in multiple myeloma. Bisphosphonates have high bone affinity that inhibits osteoclastic activity and additionally reduces the growth factors released from malignant or osteoblastic cells, thereby impairing abnormal bone remodeling which leads to osteolysis. …”
Get full text
Article -
46582
Mover-se na Metrópole de Piratininga: as políticas públicas de mobilidade para a Grande São Paulo
Published 2016-12-01“…The present article aims to analyse the aplicability of the public policies of mobility in the São Paulo Metropolitan Region by the state companies who manage the transport (Metrô and CPTM). The formulation, execution and evaluation of the public policies of mobility/accessibility has been scheduled in the last governments either regional or local, with the intention to reduce the traffic of vehicles and improve the users’ flow of public transport in the urban territory. …”
Get full text
Article -
46583
Weakly coupled traveling waves for a model of growth and competition in a flow reactor
Published 2005-10-01“…This means, lacking an adequate nutrient, two competingorganisms will manage to survive in a more economical way.…”
Get full text
Article -
46584
Applied modeling of the objects in the e-laboratory environment
Published 2003-12-01“…Flexible learning environment means the system able not only to present and manage learning material, collect information about the users, give statistics on them and learning material, but even able to adapt its behavior to the specific learner needs. …”
Get full text
Article -
46585
Port site hernia following transperitoneal laparoscopic pyeloplasty
Published 2025-03-01“…Herein, we present such a case in which the patient was managed conservatively. To our knowledge this is the first reported case in literature.…”
Get full text
Article -
46586
Conditional privacy-protection remote user authentication mechanism for WBAN
Published 2016-10-01“…A conditional privacy-protection remote user authentication scheme based on a certificateless group signature was proposed,which can accomplish the anonymous mutual authentication between the user and the remote doctors.In addition,when the doctors perceived that users were in case of an emergency,the mechanism enabled the only group manager (GM) to expose the real identity information of users and given users timely assistance.The scheme can provide the anonymity,traceability,mutual authentication,non-reputation and some other security features.The performance analysis results show the scheme is more suitable for WBAN.…”
Get full text
Article -
46587
Secure Pesticide Storage: Security Against Terrorist Threats
Published 2005-06-01“… Many farmers and managers of pesticide storage facilities had concerns about biosecurity and agroterrorism even before the Oklahoma City bombing and the September 11, 2001 terrorist attacks on our nation. …”
Get full text
Article -
46588
Complete Heart Block Following Anaphylaxis: A Case Report and Literature Review
Published 2024-11-01“…This report underscores the importance of monitoring and managing cardiovascular effects in patients experiencing severe allergic reactions, particularly when using certain antibiotics like cefixime.…”
Get full text
Article -
46589
External iliac artery injury with posterior pelvic ring injury in Korea: two case reports
Published 2023-06-01“…The most important factors in the managements are the immediate bleeding control and restoration of distal blood flow. …”
Get full text
Article -
46590
"Die skurwe liefde om te besit": teologiese riglyne vir sake-etiek
Published 2004-06-01“…Section 2 focuses on three key concepts, namely man as manager of God’s property; the central love command and the religious conviction of man. …”
Get full text
Article -
46591
-
46592
-
46593
Le mouvement de désinvestissement des énergies fossiles : une nouvelle phase de mobilisation pour le climat ?
Published 2017-03-01“…The fossil fuel divestment movement, born in 2010 in the United-States, spread rapidly through American universities and managed to gather other support later on such as religious organisations, cities or philanthropic foundations. …”
Get full text
Article -
46594
Stent assisted coil embolization for post-surgical ruptured recurrence of anterior communicating aneurysm
Published 2024-12-01“…These lesions can be difficult to manage by either a classical microsurgical approach or endosaccular coiling. …”
Get full text
Article -
46595
Data integrity verification based on model cloud federation of TPA
Published 2018-08-01“…Aiming at the untrustworthiness of third-party auditor (TPA) in the publicity verification model,a data integrity verification model based on the cloud federation of TPA was proposed.Firstly,the cloud federation of TPA’s architecture was designed and the main functional components and function of the system platform was defined.The federation could manage and control the TPA cloud members.Secondly,TPA was designed in detail by using trusted computing technology and blockchain technology to ensure the credibility of the TPA execution environment and workflow.Finally,the data integrity verification model was built by using cloud federation of TPA.The correctness,security and effectiveness of the model were analyzed theoretically and experimentally.…”
Get full text
Article -
46596
N.I. VAVILOV, THE FOUNDER OF THE CENTRAL PLANT BREEDING AND GENETICAL STATION. ON THE 90th ANNIVERSARY OF VIR PUSHKIN LABORATORIES
Published 2014-12-01“…Vavilov shows that he was not only a great scientist but also a remarkable science manager. He founded the All-Russia Institute of Plant Industry (VIR) and a network of experimental stations. …”
Get full text
Article -
46597
Boltzmann’s Six-Moment One-Dimensional Nonlinear System Equations with the Maxwell-Auzhan Boundary Conditions
Published 2016-01-01“…Then we obtain the initial value problem for Riccati equation. We have managed to obtain a particular solution of this equation in an explicit form.…”
Get full text
Article -
46598
Przestrzeń zabaw ryzykownych w przedszkolu leśnym
Published 2022-10-01“…The key issue in recognition is the teachers’ attitude to risky play. Children learn to manage risk, make decisions, solve problems, assess their own physical fitness, but taking such actions requires appropriate suport from adults. …”
Get full text
Article -
46599
Key of SDN/NFV development:development and challenge of orchestrator
Published 2017-04-01“…Network function virtualization (NFV) and software defined networking (SDN) have been widely recognized as the main direction of the development of the next generation telecom network,and as the brain of the future network,orchestrator is the key for the operators to manage the network flexibly and maximize the advantages of new technologies.Firstly,the core position of orchestrator in the next generation network was described,and the technical architecture of orchestrator was introduced.Then,the development of orchestrator in the perspective of standardization and open source were introduced and analyzed.Finally,the relationship between standardization and open source was elaborated,including the integration of orchestrator and OSS,the support of orchestrator for SDN and the idea to realize the intelligent and automatic network operation relying on orchestrator.…”
Get full text
Article -
46600
Mentoring as a Form of Transformation in Academia
Published 2024-02-01“…Despite this challenge, a number of women have managed to succeed irrespective of the institutional culture and structures of exclusion. …”
Get full text
Article