Search alternatives:
implement » implementing (Expand Search)
Showing 2,101 - 2,120 results of 107,686 for search '(complement OR implement)', query time: 0.26s Refine Results
  1. 2101

    Implementation of ESG principles at water supply enterprises in the context of digitalization by V. P. Poluyanov

    Published 2023-11-01
    “…The same principles form the basis of the ESG approach.The purpose of the work is to substantiate the main directions for implementing ESG principles in the strategy for sustainable development of water supply.The work proposes the content of key components for the implementation of ESG principles in Russian water supply. …”
    Get full text
    Article
  2. 2102
  3. 2103

    The relativistic attitude in development: reflections on the implementation of the Ethiopian multinational Constitution by Marco Bassi

    Published 2019-12-01
    “…The relativistic attitude is first defined and then considered in terms of compatibility with the Ethiopian multinational Constitution, adopted in 1995 but never really implemented. Under the pressure of the Qeerroo movement the ruling coalition in Ethiopia is today opening up to democracy and effective decentralisation. …”
    Get full text
    Article
  4. 2104

    From speech signal to syntactic structure: A computational implementation by Tina Bögel, Tianyi Zhao

    Published 2025-01-01
    “…This paper presents a new computational implementation bridging several modules of grammar from phonetics to phonology to syntax. …”
    Get full text
    Article
  5. 2105
  6. 2106

    Considerations on Risk in Supply Chain Management Information Systems Implementation by Valentin-Petru Măzăreanu

    Published 2013-02-01
    “…By using this approach, in this paper, we present the most common risks and risk sources encountered in the implementation projects of SCM type information systems. …”
    Get full text
    Article
  7. 2107

    Understanding Acceleration-Based Load Metrics: From Concepts to Implementation by João Freitas, Alexandre Moreira, João Carvalho, Filipe Conceição, Luisa Estriga

    Published 2025-04-01
    “…Synthetic data were employed to investigate conceptual differences, while experimental accelerometric data (463 time series) from a set of elite handball training sessions (involving 16 players) were used to implement the corrected equations and analyze statistical relationships. …”
    Get full text
    Article
  8. 2108

    Use of Semantic Indicators of Risk during Implementation of Customs Control by Andrey Arkadyevich Dmitriev

    Published 2018-04-01
    “…The article is devoted to the actual matter of semantics risk indicatorsas one of the instruments of customs controlsautomations enchasing in the circumstances of automatic cargos enters technology implementation. The author clears up the matter on the example of semantics indicators using whilst quality and safety control of cargoes, which cross over the custom border. …”
    Get full text
    Article
  9. 2109

    TECHNICAL, ECONOMIC AND LEGAL ASPECTS REGARDING THE IMPLEMENTATION OF HOLIDAY TICKETS by Romeo Cătălin CREȚU, Petrică ȘTEFAN, Ioan Iulian ALECU, Cătălin Constantin VOINEA-MIC, Iulian MUNTEAN

    Published 2019-01-01
    “…In this paper, we analyzed the legal framework for the issue and implementation of holiday vouchers, as well as economic issues related to the effects on the increase in the number of tourists and the revenues from tourism. …”
    Get full text
    Article
  10. 2110
  11. 2111

    Research and implementation of intelligent endogenous technology for SDN cooperative controller by Le ZHANG, Yanqin WU, Ke ZHANG, Dongfeng MAO, Song JIANG, Huawei HU

    Published 2021-12-01
    “…In the face of new demands and challenges such as business diversification, data quantification and cloud network integration, the ideas and methods of cloud network operation are changing.As the core capability of the new generation of cloud network operation system, SDN controller was deeply integrated with artificial intelligence technology.The key technologies and application practices of full-process closed-loop autonomy capability including intention analysis, cloud network intelligence perception, guarantee, optimization and automatic execution were studied to form intelligent endogenous capability of SDN controller.Firstly, the SDN controller intelligent endogenous development background and significance were clarified.And then, the ability of intelligent endogenous architecture and distribution of core competence were illustrated, which gradually form the whole process of the closed loop cloud network autonomy.Finally, focusing on 5G slice, SRv6 scene of new technology new business use cases, the intelligent perception, independent guarantee, automatic optimization of the key aspects of technology, and the effect of implementation and application were resolved.Through capability architecture design, key capability research and development, implementation verification and layout in standardization, the internal intelligence of SDN controller would gradually mature and enable smart operation of cloud network.…”
    Get full text
    Article
  12. 2112

    Implementation of e-Government and Artificial Intelligence in Polish Public Administration by Włodyka Ewa Maria

    Published 2024-12-01
    “…In response to the research questions, it can be observed that Poland is a country where the government endeavors to comprehensively implement solutions in the field of e-administration. …”
    Get full text
    Article
  13. 2113
  14. 2114
  15. 2115
  16. 2116
  17. 2117

    Implementation Of The Concept Of Religious Moderation In Islamic Religious Education For Students by Rasyidatun Mahdiyyah, Jasminto Jasminto

    Published 2025-06-01
    “…This study aims to explore the concept of religious moderation among students, describe the implementation of Islamic religious education, and analyze the integration of religious moderation principles within Islamic education at SD Negeri Grogol 2 Diwek Jombang. …”
    Get full text
    Article
  18. 2118

    A Model Based Security Testing Method for Protocol Implementation by Yu Long Fu, Xiao Long Xin

    Published 2014-01-01
    “…In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.…”
    Get full text
    Article
  19. 2119
  20. 2120