Suggested Topics within your search.
Suggested Topics within your search.
- English language 55
- Rhetoric 41
- History 31
- Report writing 30
- Management 25
- Grammar 23
- methods 22
- Law 21
- Moral and ethical aspects 18
- Research 18
- College readers 16
- Human anatomy 14
- Philosophy 13
- Handbooks, manuals, etc 12
- Methodology 12
- Problems, exercises, etc 12
- Social conditions 12
- Study and teaching 12
- Politics and government 11
- Academic writing 10
- Leadership 10
- Nursing 10
- Biochemistry 9
- Calculus 9
- Economic development 9
- Human physiology 9
- Mathematics 9
- Policy sciences 9
- Social aspects 9
- Anatomy 8
-
1061
Advancing education through e-learning innovation: the case of the Crocodile Chemistry program in higher education
Published 2025-02-01“…This study evaluates the effectiveness of the Crocodile Chemistry program in improving students’ understanding of chemical concepts, academic performance, and motivation at the Public Authority for Applied Education and Training (PAAET).MethodsA quasi-experimental design compared an experimental group (n = 102) using Crocodile Chemistry with a control group (n = 103) following traditional laboratory instruction. …”
Get full text
Article -
1062
Effect of microstructure and neutron irradiation defects on deuterium retention in SiC
Published 2025-02-01Get full text
Article -
1063
A systematic review on the effectiveness of anti-doping education for university students
Published 2025-12-01Get full text
Article -
1064
-
1065
On The Possible Leakage of ET-RR1 Liquid Waste Tank: Hydrological and Migration Modes Studies
Published 2005-01-01“…The first Egyptian (ET-RR1) research reactor has been in operation since 1961 at the Egyptian Atomic Energy Authority (EAEA) Inshas site. Therefore, at present, it faces a serious problem due to aging equipment, especially those directly in contact with the environment such as the underground settling tanks of nuclear and radioactive waste. …”
Get full text
Article -
1066
-
1067
-
1068
Vaccinating in Different Settings: Best Practices from Italian Regions
Published 2024-12-01“…Methods: After careful qualitative review of information gathered from scientific articles, official reports (grey literature), contact with regional health authorities, and local health departments, five vaccination strategies across several Italian regions focusing on alternative vaccine providers and/or settings were identified. …”
Get full text
Article -
1069
Pouvoir et légitimité des figures de l’Etat au Chili de 1810 à 1861
Published 2008-07-01“…This article aims at showing how the State’s authority was constituted in Chile between 1810 and 1861. …”
Get full text
Article -
1070
Pengujian UU No. 27 Tahun 2009 Dan UU No. 17 Tahun 2014 Tentang MPR, DPR, DPD & DPRD (MD3) Sebagai Upaya DPD Untuk Mengembalikan Kewenangan Konstitusionalnya
Published 2017-04-01“…Keywords: Judicial Review, Authority, Regional Representative Council (“DPD”) …”
Get full text
Article -
1071
How Peace Operations Work: Power, Legitimacy, and Effectiveness by Jeni Whalan
Published 2025-01-01“…Through a critical analysis of existing literature and case studies, the author presents policy recommendations for improving peacekeeping effectiveness. …”
Get full text
Article -
1072
New chameleon Hashing of secure and privacy-preserving vehicular communications
Published 2014-11-01“…Many services and applications in vehicular ad-hoc networks (VANET) require preserving and secure data communications.To improve driving safety and comfort,the traffic-related status information will be broadcasted regularly and shared among drivers.Without the security and privacy guarantee,attackers could track their interested vehicles by collecting and analyzing their traffic messages.Hence,anonymous message authentication is an essential requirement of VANET.On the other hand,when a vehicle is involved in a dispute event of warning message,the certificate authority should be able to recover the real identity of this vehicle.To deal with this issue,Guo,et al proposed a new privacy-preserving authentication protocol with authority traceability using elliptic curve based chameleon Hashing.Although this scheme has vehicle identification traceability and high computational efficiency than the previous plan,but analysis shows that the scheme does not meet the anonymity.The security of Guo's scheme is analyzed and improvement is made based on Guo’s protocol.…”
Get full text
Article -
1073
Determining Temporary Rates for Hospital Health Care Services: An Affirmative Policy Approach
Published 2024-11-01“…This research examines the enforcement of the Hospital Director's decision regarding temporary service rates and the authority of the temporary regent to establish these rates within the hospital setting. …”
Get full text
Article -
1074
AN ASSESSMENT OF STATE AND CRISIS OF LEGITIMACY IN DEMOCRACY: A FOCUS ON THE FOURTH REPUBLIC
Published 2024-01-01“…However, the Nigerian state seems to have been hijacked by a few, who use the authority inherent to serve and protect their interests. …”
Get full text
Article -
1075
Le débat juridique et religieux sur la sorcellerie en Libye
Published 2024-12-01“…In 2024, the Authority succeeded in enacting Law No. 6, which criminalizes witchcraft, conjuring, divination, and related practices. …”
Get full text
Article -
1076
-
1077
Wrong-Route Errors Involving Haloperidol: Beware of Its Unintended Intravenous Administration
Published 2024-12-01Get full text
Article -
1078
-
1079
-
1080
Feminism and the Cold War in the U.S. Occupation of Japan, 1945 – 1952
Published 2011-02-01“…-Japan relations thus opened with richly gendered and racialized symbolism: the United State’s imposition of white masculine military authority over Japan, now a defeated and subjugated nation in the Far East.…”
Get full text
Article