Suggested Topics within your search.
Suggested Topics within your search.
- English language 55
- Rhetoric 41
- History 31
- Report writing 30
- Management 25
- Grammar 23
- methods 22
- Law 21
- Moral and ethical aspects 18
- Research 18
- College readers 16
- Human anatomy 14
- Philosophy 13
- Handbooks, manuals, etc 12
- Methodology 12
- Problems, exercises, etc 12
- Social conditions 12
- Study and teaching 12
- Politics and government 11
- Academic writing 10
- Leadership 10
- Nursing 10
- Biochemistry 9
- Calculus 9
- Economic development 9
- Human physiology 9
- Mathematics 9
- Policy sciences 9
- Social aspects 9
- Anatomy 8
-
1281
The Boston Women’s Educational and Industrial Union: When Business Undergirded Claims to Political Participation (1877-1920)
Published 2020-05-01“…It is an examination of the ways in which some reform organizations headed and staffed by women could embrace and then flaunt a business ethos in order to increase their standing and authority, especially in the context of public–private partnerships. …”
Get full text
Article -
1282
Jump Diffusion Modelling for the Brazilian Short-Term Interest Rate
Published 2015-01-01“…This structure also allows the verification of the information content of specific events, such as Brazilian monetary policy authority (COPOM) meetings and public bond auctions.…”
Get full text
Article -
1283
PEMBINAAN APARATUR PEMERINTAHAN DALAM PELAKSANAAN TUGAS TUGAS ORGANISASI DI BAGIAN UMUM SEKRETARIAT KANTOR BUPATI KABUPATEN DELI SERDANG
Published 2016-03-01“…In an effort to improve performance, local governments do things that lead to the achievement of the organization at the local authority as mandated in the legislation. Absolute internal improvements done as a provision in the service eksternal.Tujuan this study to see how peminaan conducted by the local government of Deli Serdang Regency to the general secretariat of the apparatus at the office of Regent of Deli Serdang. …”
Get full text
Article -
1284
¿Primos o hermanos? Nacionalismo, integralismo y humanismo cristiano en la Argentina de los años sesenta
Published 2012-09-01“…In this sense, this work considers Christian humanism as «an internal agent of secularization», as its practices and discourse allowed the decrease of the importance of authority in the religious culture.…”
Get full text
Article -
1285
Florida Solid and Hazardous Waste Regulation Handbook: Local Government Structuring
Published 2004-01-01“…These local laws have the authority of the state behind them and you can be prosecuted for violating them, much the same as state laws. …”
Get full text
Article -
1286
An investigation into Calvin's use of Augustine
Published 2008-12-01“… This article briefly investigates the use of Augustine as an authority from the early church in John Calvin’s writings. …”
Get full text
Article -
1287
“Millions of false eyes / Are stuck upon thee.” The scope of surveillance in Measure for Measure
Published 2013-01-01“…To this effect, I first relate the surveillance practices of Shakespeare’s time to some of the play’s prevalent thematic pairs: imprisonment and punishment, authority and the prerogatives of the ruler, divine rule and secular law. …”
Get full text
Article -
1288
Les barrages alpins
Published 2008-03-01“…Today, the use of facilities belonging to EDF (French Electricity Authority) to provide water for winter resorts to make artificial snow represents a new phase. …”
Get full text
Article -
1289
La genèse de l’article 64 du code pénal
Published 2016-04-01“…The whole file shows that a lot of difficulties met later, during the 19th C, by the new system founded on penal irresponsibility, civil incapacity and medicalization of madness, had been anticipated in a very precise and concrete way by the discussions of revolutionary and imperial period.For instance, legal definition of insanity or of competent authority (magistrates, experts, group of wise men), detention of insane, or therapeutic order for those who would have been considered as penally irresponsible were hard-debatted, but wise assemblies preferred not to decide anything.…”
Get full text
Article -
1290
Design of Distance English Teaching Application System Combined with Behavioral Cognitive Settlement
Published 2022-01-01“…In the research, relevant technologies such as settlement system integration, automatic scoring, data encryption, authority control and problem matching are introduced, and the system is improved. …”
Get full text
Article -
1291
Qualifier la gestion de l’eau, se positionner par rapport au conflit : les cas de l’usine de dessalement dans la bande de Gaza et du canal entre la mer Rouge et la mer Morte
Published 2017-04-01“…Through these two examples, this article analyzes the relationships between the Palestinian Authority and financial sponsors on the one hand, and the civil society on the other hand. …”
Get full text
Article -
1292
Noms, étiquette(s) et identités dans Persuasion, de Jane Austen
Published 2014-06-01“…Jane Austen’s last novel, Persuasion, dramatises the tensions inherent in the decline of the ancient landed order and of its traditional sources of authority, as the emergence of a new social hierarchy, in the wake of the Napoleonic wars, was leading to a questioning of signifiers: patronyms and titles are thus subject to constant reassessment in the novel while the honorific term ‘gentleman’ is threatened with devaluation. …”
Get full text
Article -
1293
Murales et rayados de Valparaíso : entre institutionnalisation et vandalisme
Published 2016-05-01“…The diversity of the urban inscriptions sends back to different relationships with the authority, and the wall / rayado cleavage crystallizes the political and media debate around the porteñas’ urban inscriptions. …”
Get full text
Article -
1294
Cloud computing based smartphone social authentication system
Published 2012-09-01“…Cloud computation provided the capabilities to store and compute infinitely,which can filled the gap of resource constrain.So a cloud-computation based social authentication system for smartphones aimed at the problem that the present authentication methods require a long period of validity of the authentication tokens and make the terminals consume large resources was proposed.The system took three types of social networking features into considered,which were different certification authority between the friends,behavior differences between individual and trust level carried by each interactive event.The results of experiments show that the system can effectively solve the problem that system performance will sharply decline when the expiry date of authentication tokens is short.…”
Get full text
Article -
1295
مهارات الوعى المعلوماتى کنواتج للتعلم فى المعاییر القومیة الأکادیمیة القیاسیة لبرامج التعلیم العالى : دراسة تحلیلیة...
Published 2017-01-01“…This article explores whether and how information literacy skills are reflected in the National Academic Reference Standards (NARS), issued by The National Authority for Quality Assurance, Accreditation of Education and examine the connections between the National standards and information literacy standards.The Results indicate that there is significant overlap between the Learning outcomes required of students and information literacy skills, as well as the standards support for information literacy as an important student learning outcome, Despite differences in terms used to describe these skills.…”
Get full text
Article -
1296
Ut commutando donemus : An Approach to Female Artistic Patronage in Northeast Iberia (1000-1100)
Published 2022-06-01“…By focusing on a representative set of women from the period, one of the main goals of this article is to show that, beyond devotional reasons, artistic patronage helped medieval women overcame some of these social constraints and allowed them to exercise different degrees of power and authority.…”
Get full text
Article -
1297
Research progress of sensor-cloud security
Published 2018-03-01“…Through consulting lots of domestic and international literatures about sensor-cloud security,a series of security problems are found,such as reputation problem of service provider,the coupling problem of physical nodes,the leak of authority management,et al,which seriously hinders the further development of sensor-cloud.The secure problems occurring in sensor-cloud were analyzed,the current secure technologies were contrasted ,similarities and differences of various types solutions were discussed and summarized.After that,several future challenges of sensor-cloud security were concluded.Finally,a fog-based structure was proposed to solve the security problems,which would bring new ideas to the sensor-cloud security research.…”
Get full text
Article -
1298
Reorganization of Public Administration in Turkey and Public Libraries
Published 2005-03-01“…For this purpose, related laws such as,“The Law About the Basic Principles and Reorganization of the Public Administration”, “Municipality Law”, “Local Authority Law” and “Metropolitian Municipality Law” issued by Turkish Parliament in 2004 were reviewed. …”
Get full text
Article -
1299
Searchable public key encryption with designated verifier secure against the server
Published 2014-11-01“…In designated verifier searchable public key encryption (dPEKS) schemes,the IND-KGA-SERVER security was proposed to formalize the security against the server.Based on the IND-KGA secure dPEKS,the CA (certificate authority),and the strongly unforgeable and undeniable signature,the solution was proposed to show how to construct dPEKS schemes which are secure against KG (keyword guessing) attacks when the attacker is the server.The solution is a bootstrap from IND-KGA secure to IND-KGA-SERVER secure.…”
Get full text
Article -
1300
معرفات البیانات المترابطة والمکتبات :القصة حتى الآن
Published 2016-04-01“…This paperfocuses on linked data URIs that refer to authority data. We attempt toidentify the specific MARC fields that are capable of hosting linked datainformation. …”
Get full text
Article