Suggested Topics within your search.
Suggested Topics within your search.
- Evaluation 3
- Information technology 3
- Public administration 3
- Evaluation research (Social action programs) 2
- Internet in public administration 2
- Management 2
- Telemedicine 2
- ART / Film & Video 1
- Balanced Scorecard 1
- Biological Factors 1
- Camcorders 1
- Certification 1
- Climate change mitigation 1
- Communication in rehabilitation 1
- Comparative method 1
- Complications 1
- Cross-cultural studies 1
- Curricula 1
- Curriculum evaluation 1
- Curriculum planning 1
- Digital watermarking 1
- Drugs 1
- Economic conditions 1
- Education 1
- Electronic Health Records 1
- Electronic data processing personnel 1
- Electronic reference services (Libraries) 1
- Employee empowerment 1
- English 1
- English language 1
-
701
Implementation of the Agreement on the succession of the former SFRY
Published 2024-01-01Get full text
Article -
702
The Implementation of Multicultural Values in Arabic Learning
Published 2022-12-01“…The results of this study explain that the implementation of multicultural values in Arabic lessons in Madrasah has the values of democracy, humanism, and tolerance so that students can learn Arabic among their friends without the need to look at ethnicity, race, or culture. …”
Get full text
Article -
703
THE SPECIFICITY OF COACHING PROGRAMS – THEIR IMPLEMENTATION IN SCHOOL
Published 2025-06-01“…We aimed to find out the opinions of the students about the role of coaching in school and to formulate, based on these opinions, an answer to the question regarding the need to implement instructional coaching programs. The purpose of the research is to provide a conceptual basis by reporting on the results of the research on the topic and to know the perceptions of the future teachers regarding coaching programs, respectively the need to implement them in school. …”
Get full text
Article -
704
ORGANIC VITICULTURE: REAL OPPORTUNITIES FOR IMPLEMENTATION
Published 2019-01-01Get full text
Article -
705
Implementation of artificial intelligence for brand equity
Published 2025-12-01Get full text
Article -
706
Implementation of Health Values in Islamic Education
Published 2025-04-01“… This study aims to analyze the implementation of health education values in Dayah Bustanul Ulum and Dayah Futuhul Ma'arif Al-Aziziyah, focusing on the behavior of students in implementing cleanliness, healthy eating patterns, exercise, and mental health. …”
Get full text
Article -
707
MANIPULATIVE TACTICS IMPLEMENTATION IN POLITICAL DISCOURSE
Published 2024-12-01“…Linguistic analysis of modern political discourse and, in particular, identification of the most frequent linguistic means of implementing manipulation in political discourse, is of particular relevance today and is important not just because it expands the theoretical scientific base, but for its practical value for the formation of a mature point of view and critical thinking when dealing with the texts of political discourse. …”
Get full text
Article -
708
Costs of Loyalty Programmes Implementation in Pharmacies
Published 2010-10-01“…The paper presents the implementation costs of loyalty programmes in pharmacies. …”
Get full text
Article -
709
Recent progress in the implementation of sustainable farming
Published 2025-06-01Get full text
Article -
710
Parallel Implementation of Katsevich's FBP Algorithm
Published 2006-01-01“…Basing on this fact, we develop a parallel implementation of Katsevich's FBP algorithm. We do all the numerical experiments on a Linux cluster. …”
Get full text
Article -
711
E-Government Implementation on the Example of Georgia
Published 2024-06-01“…The term ‘digitalization’ of public administration, used as a synonym for ‘e-government,’ fi rst implies the implementation of fast, secure procedures by an administrative body. …”
Get full text
Article -
712
-
713
Evaluation of the Implementation of Waste Bank Activities
Published 2022-04-01“…ABSTRACT The Waste Bank (WB) was first established in 2008 by a village community in Bantul Regency, DI Yogyakarta Province. The WB implemented 3R (Reduce, Reuse and Recycle), starting from sorting organic and inorganic waste in households, and depositing at the WB. …”
Get full text
Article -
714
Evidence, implementation, and challenges in mechanical ventilation
Published 2025-03-01Get full text
Article -
715
Emergency department observation implementation guide
Published 2023-08-01“…This paper provides a comprehensive guide for ED leaders on the implementation of ED observation in their departments. …”
Get full text
Article -
716
-
717
An Evaluation of the Implementation of Personal Development Planning
Published 2011-12-01“…PDP tutorials were implemented in order to help students improve their academic skills and to enhance their employability. …”
Get full text
Article -
718
Challenge and Implementation of Content-Centric Networking
Published 2013-08-01“…CCN is communication architecture that takes content as a primitive,and retrieves content by name,not by host IP again.It builds on publish/subscribe and network-embedded caching with bandwidth-storage tradeoff.Since it is a clean-slate design,there are many issues to be explored.The concepts,characteristics,network model and recent advances of CCN were introduced.The challenges and some key issues CCN faced were also emphasized.In order to demonstrate the feasibility and implementations,two CCN system samples were also presented.…”
Get full text
Article -
719
Frugal Innovations: Implementation in Regions of Poland
Published 2023-01-01“…Originality/value: The study raises a new issue in domestic science, concerning the implementation of the attributes of the concept of frugal innovations in various regions of Poland, i.e. the A, B and C regions.…”
Get full text
Article -
720
Mechanism and implementation of Rootkit attack and defense
Published 2018-12-01“…Rootkit is a set of malicious codes that can attack the system kernel and achieve deep hiding,which has posed serious threats to cyber security.Firstly,the basic features of Rootkit/Bootkit were introduced,and the characteristics of Rootkit attacks in user mode and kernel mode were compared and analyzed.Thereafter,the implementation principles and working mechanisms of Hook,DKOM and virtualization technologies involved in Rootkit attacks were emphatically analyzed.Combined with the specific attack behaviors,the main detection methods and defense techniques for Rootkit attacks were discussed at the end.…”
Get full text
Article