Suggested Topics within your search.
Suggested Topics within your search.
- Law 6
- Domestic relations 3
- Methodology 3
- Study and teaching 3
- methods 3
- Administrative law 2
- Constitutional law 2
- Etiology 2
- General 2
- Genetics 2
- Genital Diseases, Female 2
- History 2
- History and criticism 2
- Human rights 2
- Mass media 2
- Nursing 2
- Sociology 2
- therapy 2
- Academic writing 1
- Act of the general application 1
- Adaptations 1
- Adaptive control systems 1
- Adjustment (Psychology) 1
- Alimentary canal 1
- Anesthesia 1
- Board books 1
- Cardiac Surgical Procedures 1
- Child 1
- Children 1
- Children with disabilities 1
-
9081
L’évaluation, un outil de l’ergonome pour transformer le contexte d’intervention
Published 2010-05-01“…By communicating intervention process indicators with the other stakeholders, the ergonomist changes the context in which he acts during the intervention. By also using result indicators, the ergonomist can show the contribution of the intervention and attempt to better adapt his methods, considering the advantages or obstacles present in the context of the intervention.…”
Get full text
Article -
9082
University libraries and the indispensable changes in Medical Sciences
Published 2009-03-01“…We discuss the new challenges in information and knowledge management and conditions in Medical Science field to adapt traditional methods to the new environment. …”
Get full text
Article -
9083
Object-field. The multi-resolution study of topological optimization
Published 2020-06-01“…We believe that a solution to this limit lies in a change of scale in the design method, with multi-resolution systems, where each grain of matter can adapt to the structural information present at the macro scale. …”
Get full text
Article -
9084
Dynamic situation gateway based system cooperation access gatel model
Published 2013-08-01“…In order to adapt the centralized access control between the application system subject and object in the envi-ronment of network configurations, a dynamic situation based system cooperation access gatel model — DSGAC was proposed. …”
Get full text
Article -
9085
SOCIAL TECHNOLOGY OF UNIVERSITY INTERACTION MANAGEMENT WITH STAKEHOLDERS AS A TOOL FOR INCREASING COMPETITIVENESS
Published 2019-06-01“…The article has been devoted to the possibilities of using an interdisciplinary approach of sociology of management to adapt the management system of an organization of high education to the challenges of the «external» and «internal» environment using the potential of the theory of stakeholders in order to harmonize interests and increase competitiveness. …”
Get full text
Article -
9086
Book review: Tenterfield: My happy childhood in care, by Margaret Irvine Edinburgh, Fledgling Press, 2010, 226 pp, ISBN 978-1-905916-26-9
Published 2011-02-01“…When I first saw this book, I was slightly taken aback by the tide. This personal reaction caused me co reflect a little on how residential care is represented in the wider world. …”
Article -
9087
Faults Identification and Corrective Actions in Rotating Machinery at Rated Speed
Published 2006-01-01“…This paper explores the possibility to adapt this method to the situation when the vibration data are available at one rotating speed only, which in real machines is generally the normal operating speed. …”
Get full text
Article -
9088
Improvement and Experimental Study of Loading Mode of Vacuum Preloading Method
Published 2021-01-01Get full text
Article -
9089
Development of the conceptual and terminological apparatus of warehousing logistics in the works of Russian and foreign authors
Published 2022-07-01“…The main approaches to the basic concepts of warehousing logistics in the works of russian and foreign authors are considered. the peculiarities of understanding the terms “warehouse”, “warehousing”, “warehousing system” are revealed. the main historical stages of the development of warehouses and storage facilities are reflected. based on the information provided, the following key features are highlighted: the warehouse is a complex system with its own interconnections and internal processes; a modern warehouse economy should be formed according to an optimized logistics system, of which it is a part, and be able to adapt to the slightest fluctuations and changes in this system; difficulties arising in the field of building a warehousing system can be solved with the help of a competently and clearly developed warehouse model based on the application of a logistics approach and the development of an adaptive warehouse management algorithm.…”
Get full text
Article -
9090
Improving Inservice Teacher Workshops in Florida
Published 2005-12-01“…Project Learning Tree (PLT) workshops are used as an example of how nonformal education facilitators could adapt their workshops to better address the new professional development system. …”
Get full text
Article -
9091
« Mauvaise fatigue » et contrôle de soi : une approche sociohistorique
Published 2002-05-01“…New pathological categories emerged, ranging from acedia to chronic fatigue syndrome, to give a socially recognized meaning to this new form of fatigue experienced by individuals who found it difficult to adapt to the new requirements, and often to convey a sense of normality. …”
Get full text
Article -
9092
Aide-toi, la viralité t’aidera. Ou de la création et diffusion des proverbes dans les médias
Published 2024-12-01“…This study will show not only that virality and proverbs share many features, but also that proverbs can adapt to new realities (which may allow them to evolve in the future without disappearing). …”
Get full text
Article -
9093
Efficient ID-based multicast authentication protocol in wireless sensor networks
Published 2009-01-01“…In order to overcome the drawback of the existent multicast authentication protocol in WSN,the PKC-based services for WSN was explored and an efficient ID-based multicast authentication protocol was presented.The protocol with message recovery provided the feature that the message was recoverable from the signature and hence the computa-tional cost and communication overhead of the protocol had been reduced greatly.This protocol was proved secure against existential forgery under adaptive chosen message and ID attack in the random oracle model.The performance analysis results show that the proposed scheme can effectively reduce resource cost,adapt the characteristics of WSN and is clearly superior to the HESS,Zhang and BLS protocols.…”
Get full text
Article -
9094
Traffic identification of network business based on multi-layer cascade algorithm
Published 2015-12-01“…The contradiction between traffic demand and network bandwidth is the main problem of the current network.Traffic management is one of the effective solutions,at the same time it can improve the quality of service of the network,and network traffic identification is the basis of fine traffic management.The traffic identification method of network business based on multi-layer cascade algorithm was proposed,after the research of network traffic identification and machine learning techniques.This method can adapt to the situation of the complex network traffic flow,and can balance the contradiction between the time performance and the accuracy of the machine learning algorithm.Furthermore the cascade algorithm of this method takes the cost imbalance into account,and takes more attention to the identification of important business,so it can help enhance user experience.…”
Get full text
Article -
9095
Gentrification in the Global South: new insights from Chinese Studies
Published 2020-11-01“…However, the challenges of studying gentrification in any country are to transfer and adapt the broad paradigm that could capture the complexities of local conditions. …”
Get full text
Article -
9096
Les Temps des territoires. Introduction du dossier thématique
Published 2018-06-01“…It discusses notably the recurrent use of reference conditions to conduct a project, or the injunction to adapt to climate change. These papers examine the meaning that inhabitants and actors give to the territories trajectories and the resulting retrospective or prospective constructions. …”
Get full text
Article -
9097
6G endogenous security:architecture and key technologies
Published 2020-01-01“…At the beginning of design for the traditional mobile communication systems,security is considered as an independent technology,relying on “patch” and “plug-in” to realize the security protection of wireless communica-tion.The sixth-generation (6G) mobile communication system is designed based on software-defined slicing platform,edge computing,artificial intelligence and big data mining to adapt to different application scenarios and performance objectives,making the traditional network security mechanisms difficult to guarantee 6G's requirements for embed-ded security.6G endogenous security was proposed,the architecture and key technologies of 6G endogenous security were described,the security threats in the new technologies were discussed which 6G would adopt,and the chal-lenges and future research directions of 6G endogenous security were provided.…”
Get full text
Article -
9098
Histoire des approches de la santé et de la sécurité au travail au 41, rue Gay-Lussac, Paris
Published 2012-05-01Get full text
Article -
9099
Effect of Surfactant on Growth of ZnO Nanodumbbells and Their Characterization
Published 2017-01-01Get full text
Article -
9100
THE PROBLEM OF CONTROL WHILE IMPLEMENTING ORGANIZATIONAL CHANGES AT THE UNIVERSITIES
Published 2020-02-01Get full text
Article