Suggested Topics within your search.
Suggested Topics within your search.
- Accounting 1
- Beauty operators 1
- Celebrities 1
- Coming of Age 1
- Communication policy 1
- Community Mental Health Services 1
- Community mental health services 1
- Community-Institutional Relations 1
- Domestic relations 1
- FICTION 1
- Fashion 1
- Finance 1
- Hospitality industry 1
- Humorous 1
- Image consultants 1
- Information Technology 1
- Internet 1
- Managerial accounting 1
- Matrices and linear spaces 1
- Outcome and Process Assessment (Health Care) 1
- Telecommunication policy 1
- Women 1
-
21
Brokering Britain, Educating Citizens Exploring ESOL and Citizenship.
Published 2020-06-01Subjects: Get full text
Article -
22
-
23
-
24
-
25
-
26
-
27
-
28
Large Carpenter Bees as Agricultural Pollinators
Published 2010-01-01“…Current challenges to the commercialization of these attempts lie in the difficulties of mass-rearing Xylocopa, and in the high levels of nectar robbing exhibited by the bees.…”
Get full text
Article -
29
ANALYZING THE NEGATIVE IMPACT OF INSECURITY ON FOREIGN DIRECT INVESTMENT IN NIGERIA
Published 2022-05-01“…However, both the government and the citizenry directly and indirectly pay for the additional cost incurred by investors to keep their business running thereby robbing the country greater gains from FDI. …”
Get full text
Article -
30
(Re)discovering Street A in Nea Paphos, Cyprus. Results of Trial Trench III at Maloutena (season 2021)
Published 2024-11-01“…As a result, it was possible to distinguish three phases of site development: Early Hellenistic, Middle Hellenistic, and Early Roman, followed by a phase related to robbing activity dated to the Byzantine period, and the final phase associated with natural processes on the abandoned site. …”
Get full text
Article -
31
The riflemen union in the Independence war
Published 1998-12-01“…The fighters of Russian General Bermont-Avalov had not yet been banished when the Polish soldiers started robbing the local population on the Lithuania-Poland border. …”
Get full text
Article -
32
Assertive outreach : current perspectives /
Published 2011Table of Contents: “…/ Andrew Molodynski and Tom Burns -- Multi-professional working in assertive outreach / Hannah Steer and Steve Onyett -- Fidelity and flexibility / Caroline Williams, Rob MacPherson, and Mike Firn -- Cognitive behaviour therapy for assertive outreach service users / Robert Griffiths, Caroline Williams, and Neil Harris -- Dual diagnosis : putting policy into practice / Rory Allott, Ian Wilson, and Mike Firn -- Use of medication in assertive outreach / Rob MacPherson and Tom Edwards -- Relatives, friends, and carers' experiences : involvement and support / Simon Wharne ... …”
View in OPAC
Book -
33
Communications policy in transition : the Internet and beyond /
Published 2001Table of Contents: “…Clark -- 5 The InterNAT: Policy Implications of the Internet Architecture -- Debate 141 -- Hans Kruse, William Yurcik, and Lawrence Lessig -- 6 The Potential for Scrutiny of Internet Peering Policies in -- Multilateral Forums 159 -- Rob Frieden -- 7 Wireline vs. Wireless Internet Access: Comparing the United States -- and Japan 195 -- Emily Moto Murase --III Dilemmas in Development of Communications Infrastructure -- 8 Developing Telecommunications Infrastructure: State and Local -- Policy Collisions 221 -- Sharon Strover and Lon Berquist -- 9 From C to Shining C: Competition and Cross-Subsidy in -- Communications 241 -- Gregory L. …”
Table of contents
View in OPAC
Conference Proceeding Book -
34
Researches on role-based middleware in wireless sensor networks
Published 2011-01-01“…According to the diversity and difference of the role played by nodes in WSN,the role mapping framework model in WSN was proposed.A role-based middleware for wireless sensor networks(RobMSN) was designed based on that model.From the view of the formal semantics and specifications of the middleware,the role mapping specifications solve the problem of semantic conflicts in role mapping abstract,making the role mapping context fully reflected in the role specifications of middleware.Applications will be mapped as the specific roles of node which played in the wireless sensor networks using RobMSN,it can be cross-platform and implement dynamic application services.Finally,an appli-cation development example was used to illustrate the design and development process of RobMSN middleware.…”
Get full text
Article -
35
Dental implant placement accuracy with robotic surgery compared to free-hand, static and dynamic computer assisted techniques: Systematic review and meta-analysis
Published 2025-01-01“…Data on coronal, apical, and angular deviations were extracted for meta-analysis. The risk of bias (RoB) was assessed using the QUIN RoB and JBI RoB tools. …”
Get full text
Article -
36
Ghrelin Increases Beta-Catenin Level through Protein Kinase A Activation and Regulates OPG Expression in Rat Primary Osteoblasts
Published 2015-01-01“…Accordingly, conditioned media from rOB treated with ghrelin decreased the number of multinucleated TRAcP+ cells as compared with the conditioned media from untreated-control rOB. …”
Get full text
Article -
37
Evaluation of caesarean rates according to Robson classification using a newly developed smart phone application in a tertiary center in Sri Lanka: a comparative study
Published 2025-01-01“…Methods The study utilized RobsApp® for data collection in the Professorial Unit of De Soysa Hospital for Women (DSHW), Sri Lanka. …”
Get full text
Article -
38
Burying Bob
Published 2020-06-01“… The death of Robert Mugabe, or 'Rob' as he was irreverently known by many Zimbabweans, was always likely to be something of an event. …”
Get full text
Article -
39
Effects of inulin-type fructans supplementation on cardiovascular disease risk factors: a protocol for a systematic review and meta-analysis of randomised controlled trials
Published 2022-07-01“…We will assess the study risk of bias (RoB) using V.2 of the Cochrane RoB tool for RCTs (RoB 2) and the certainty of the evidence using the Grading of Recommendations, Assessment, Development and Evaluations (GRADE) approach. …”
Get full text
Article -
40
Theft and robbery in Chrysostom's time
Published 2009-12-01“…He ascribed it to the working of demons. When we are robbed, we are confronted with various choices: we can curse the robber, or we can plot against him, or we can thank God. …”
Get full text
Article