Showing 201 - 220 results of 107,686 for search '(complement OR (implement OR implementing))', query time: 0.31s Refine Results
  1. 201

    MANIPULATIVE TACTICS IMPLEMENTATION IN POLITICAL DISCOURSE by Tatyana P. Paliy, Inna N. Poteryakhina

    Published 2024-12-01
    “…Linguistic analysis of modern political discourse and, in particular, identification of the most frequent linguistic means of implementing manipulation in political discourse, is of particular relevance today and is important not just because it expands the theoretical scientific base, but for its practical value for the formation of a mature point of view and critical thinking when dealing with the texts of political discourse. …”
    Get full text
    Article
  2. 202

    Costs of Loyalty Programmes Implementation in Pharmacies by Maria Sierpińska, Agnieszka Woś

    Published 2010-10-01
    “…The paper presents the implementation costs of loyalty programmes in pharmacies. …”
    Get full text
    Article
  3. 203
  4. 204

    Parallel Implementation of Katsevich's FBP Algorithm by Jiansheng Yang, Xiaohu Guo, Qiang Kong, Tie Zhou, Ming Jiang

    Published 2006-01-01
    “…Basing on this fact, we develop a parallel implementation of Katsevich's FBP algorithm. We do all the numerical experiments on a Linux cluster. …”
    Get full text
    Article
  5. 205

    E-Government Implementation on the Example of Georgia by Tskhadadze Ketevan

    Published 2024-06-01
    “…The term ‘digitalization’ of public administration, used as a synonym for ‘e-government,’ fi rst implies the implementation of fast, secure procedures by an administrative body. …”
    Get full text
    Article
  6. 206
  7. 207

    Evaluation of the Implementation of Waste Bank Activities by Irdam Ahmad

    Published 2022-04-01
    “…ABSTRACT The Waste Bank (WB) was first established in 2008 by a village community in Bantul Regency, DI Yogyakarta Province. The WB implemented 3R (Reduce, Reuse and Recycle), starting from sorting organic and inorganic waste in households, and depositing at the WB. …”
    Get full text
    Article
  8. 208
  9. 209

    Emergency department observation implementation guide by Kyle W. Trecartin, Richard E. Wolfe

    Published 2023-08-01
    “…This paper provides a comprehensive guide for ED leaders on the implementation of ED observation in their departments. …”
    Get full text
    Article
  10. 210
  11. 211

    An Evaluation of the Implementation of Personal Development Planning by Ioanna Palaiologou

    Published 2011-12-01
    “…PDP tutorials were implemented in order to help students improve their academic skills and to enhance their employability. …”
    Get full text
    Article
  12. 212

    Challenge and Implementation of Content-Centric Networking by Xinggong Zhang, Tong Niu, Zongming Guo

    Published 2013-08-01
    “…CCN is communication architecture that takes content as a primitive,and retrieves content by name,not by host IP again.It builds on publish/subscribe and network-embedded caching with bandwidth-storage tradeoff.Since it is a clean-slate design,there are many issues to be explored.The concepts,characteristics,network model and recent advances of CCN were introduced.The challenges and some key issues CCN faced were also emphasized.In order to demonstrate the feasibility and implementations,two CCN system samples were also presented.…”
    Get full text
    Article
  13. 213

    Frugal Innovations: Implementation in Regions of Poland by Jacek Woźniak

    Published 2023-01-01
    “…Originality/value: The study raises a new issue in domestic science, concerning the implementation of the attributes of the concept of frugal innovations in various regions of Poland, i.e. the A, B and C regions.…”
    Get full text
    Article
  14. 214

    Mechanism and implementation of Rootkit attack and defense by Fujuan LI, Qun WANG

    Published 2018-12-01
    “…Rootkit is a set of malicious codes that can attack the system kernel and achieve deep hiding,which has posed serious threats to cyber security.Firstly,the basic features of Rootkit/Bootkit were introduced,and the characteristics of Rootkit attacks in user mode and kernel mode were compared and analyzed.Thereafter,the implementation principles and working mechanisms of Hook,DKOM and virtualization technologies involved in Rootkit attacks were emphatically analyzed.Combined with the specific attack behaviors,the main detection methods and defense techniques for Rootkit attacks were discussed at the end.…”
    Get full text
    Article
  15. 215

    Design and Implementation of MVB Repeater Codec by ZHU Xiang, WANG Lide, NIE Xiaobo, SHEN Ping

    Published 2016-01-01
    “…The design processes of the repeater’s decoder and encoder were analyzed in detail, including the repeater time delay analysis and calculation, the judgment and truncation of super-long MVB frames, the time delay setting and implementation of the interframe spacing adjustment, etc. …”
    Get full text
    Article
  16. 216

    Disputed aspects of the reputation management implementation by Vitaliy Shkromyda

    Published 2020-11-01
    “…The scientific value of the research is to supplement the theoretical and methodological basis of reputation management, in particular in terms of addressing the disputed aspects of its implementation in the companies’ activities.…”
    Get full text
    Article
  17. 217
  18. 218

    THE DESIGN AND IMPLEMENTATION OF AN AUTOMATED CNC TYPEWRITER by George-Cristian Ene, Gabriela Bucur

    Published 2024-07-01
    “…The paper also describes the implementation of the typewriter. It starts from a detailed diagram of the wiring and connections between the component elements, up to the presentation and commentary of how to create the program for the microcontroller used. …”
    Get full text
    Article
  19. 219
  20. 220