Suggested Topics within your search.
Suggested Topics within your search.
- Management 58
- Public administration 10
- Marketing 9
- methods 9
- Hospitality industry 8
- Personnel management 8
- Tourism 8
- Entrepreneurship 7
- Information technology 7
- Project management 7
- Educational leadership 6
- Industrial management 6
- Leadership 6
- Organizational behavior 6
- Politics and government 6
- Purchasing 6
- Risk management 6
- School management and organization 6
- Economic conditions 5
- Finance 5
- History 5
- Industrial procurement 5
- Natural resources 5
- Study and teaching 5
- Communication in management 4
- Database management 4
- Decision making 4
- Moral and ethical aspects 4
- Nursing 4
- Planning 4
-
46381
-
46382
-
46383
-
46384
Loss of Appetite in Adult Patients: Effectiveness and Safety of an Appetite Stimulating Medication in an Open-Label, Investigator-Initiated Study in India
Published 2022-01-01“…The study findings suggest that appetite-stimulating medication containing multivitamins, lysine, and zinc could be a suitable treatment option for the management of LOA with no significant safety concerns.…”
Get full text
Article -
46385
-
46386
Urban product in view of the commercial activities in Algiers
Published 2024-01-01Get full text
Article -
46387
Managerial analysis of instruments for raising international financing
Published 2020-07-01Get full text
Article -
46388
Isotretinoin – Induced AGEP: A Case Report
Published 2025-02-01“…This report highlights isotretinoin as a possible trigger for AGEP, emphasizing the crucial role of a thorough history and vigilant clinical assessment in early identification and management of such reactions.Keywords: acute generalized exanthematous pustulosis, isotretinoin, pustular psoriasis, drug reactions…”
Get full text
Article -
46389
-
46390
-
46391
Intrinsic assurance: a systematic approach towards extensible cybersecurity
Published 2023-02-01“…At present, the mainstream cyber security systems are laid out in an alienated style, where security functions are separated from business processes, and security products are isolated from each other.It is difficult to effectively cope with increasingly complicated cyber threats in this architecture.Therefore, it is imperative to move security inward for more resilient and secure network infrastructures.Business scenarios of the cybersecurity sector can be categorized into four perspectives: organization, vendor, regulatory and threat, each of which has different business objectives.Starting from the commonness and individuality of the four perspectives, the needs of this sector was systematically summarized and then the goal of building an extensible cybersecurity capability ecosystem was recognized.As the key to this goal, the intrinsic assurance methodology was proposed.Intrinsic assurance capabilities referred to the abilities of ICT components to natively support security functions such as monitoring, protection and traceability.But intrinsic assurance is not the ultimate security implementation itself, which is a key difference from the existing “endogenous security” or “designed-in security” methodologies.Intrinsic assurance emphasizes the inherent security enabling endowment of network components, whether by activating an innate gift or by encapsulating a given one, both of which logically exhibit autoimmunity from an external viewpoint.One advantage of such a component is the cohesion of business and security, which leads to transparent security posture awareness, customized security policies, and close-fitting security protection.It also simplifies the overall engineering architecture and reduces management complexity through encapsulation of multiple functions into a singleton.Additionally, the Intrinsic Assurance Support Capability Framework was put forward, which summarized and enumerated the security capabilities that conformed to the intrinsic assurance concept.This framework classified the security capabilities into five categories, namely collection, cognition, execution, syndication and resilience respectively, together with their sub-types and underlying ICT technologies.Based on this framework, the enhanced implementations of typical security business scenarios was further introduced in light of intrinsic assurance.…”
Get full text
Article -
46392
Seasonal Influenza Vaccination Uptake Among Australian Healthcare Professionals: An Archetype for Success
Published 2025-01-01Get full text
Article -
46393
Measurement of JMSK PSMZA Lecturer Achievement Based on P & P Monitoring
Published 2018-11-01“…This study was conducted to determine the effect of monitoring the teaching and learning of lecturers based on five domains assessed namely the planning of teaching and instructional, instructional, competence and professionalism of lecturers, management teaching and learning process. The purpose of this study was to measure the performance of the lecturer by identifying the domain which contributed to the excellent score for the teaching and learning process of lecturer of JMSK Polytechnic Sultan Mizan Zainal Abidin. …”
Get full text
Article -
46394
-
46395
Analysis and Evaluation of Seawater Quality in the Northwest of Hainan
Published 2024-09-01Get full text
Article -
46396
Characteristics of Brain Functional Reorganization and Neuromodulation Strategies in Stroke Patients based on fNIRS
Published 2024-01-01“…This analysis can offer theoretical insights for the hierarchical rehabilitation management of stroke and the development of specific neural circuit intervention strategies. …”
Get full text
Article -
46397
Investigating the Prognostic and Oncogenic Roles of Membrane-Associated Ring-CH-Type Finger 9 in Colorectal Cancer
Published 2024-01-01“…Further research is essential to elucidate precise mechanisms by which MARCHF9 enhances tumorigenesis and to explore its therapeutic potential in CRC management.…”
Get full text
Article -
46398
Lithuanian bibliophiles in the XVIII century
Published 2024-08-01“…The author presents short biographical data about the bibliophiles, reveals the origin of their collections, their size, contents, value, management peculiarities, features of the bookplates and book signs, and traces the later fate of the collections when possible. …”
Get full text
Article -
46399
Study on the path of clustering construction of rural primary schools' aesthetic education programs from the perspective of resource integration.
Published 2025-01-01“…It then constructs a curriculum cluster model that shares resources, teachers, management, instructional design, and practical activities, etc. …”
Get full text
Article -
46400
Impacts of pseudomonas fluorescent bacterial fertilizer addition on the soil environment and fruit yield under water stress in greenhouse grape
Published 2025-02-01“…Therefore, W1F2 is recommended as the optimal water and fertilizer management scheme for efficient greenhouse grape production in the arid and semi-arid region of Northwest China.…”
Get full text
Article