نتایج جستجو برای: requires multilateral studies however
تعداد نتایج: 2905445 فیلتر نتایج به سال:
We show our approach in developing an identity management system with respect to multilateral security. After examining digital pseudonyms and credentials as basic concepts of such a system, we give an introduction to technologies for multilateral security and describe an architecture which enables multilaterally secure communication. By means of dierent scenarios we show requirements of an id...
As the world continues to grapple with a pandemic that struck in January 2020, responses of governments and international organisations control combat it varied albeit different levels success. Some gave rise nationalist as well anti-multilateral -international sentiments actions, including politicisation retreat from multilateral institutions cooperation. However, African Union’s response was ...
since esp received universal attention to smooth the path for academic studies and productions, a great deal of research and studies have been directed towards this area. swales’ (1990) model of ra introduction move analysis has served a pioneering role of guiding many relevant studies and has proven to be productive in terms of helpful guidelines that are the outcome of voluminous productions ...
Type 2 diabetes is one of the major public health challenges in 21st century. Both environmental changes and genetics are attributed for increased risk of type 2 diabetes. Obesity is the most critical and modifiable risk factor and should be targeted for successful management of diabetes. This review article discusses three main approaches to manage obesity. Three management modalities consider...
a pedestrian is every person who is walking, especially along or the width of a street or other place used by cars. growth, development and industrialization of societies, threatens the safety of pedestrians. increase and acceleration of vehicles and traffic, lack of road and street standards, weakness of laws or inappropriate executive guarantees, causing to insecurity and incidence of physica...
This paper is about assessments of the Uruguay Round (UR), and lessons from these for the assessment of the next. The paper offers an overview of the CGE models employed or referenced by international organizations at the close of the UR. This is followed by a summary of the results of those models. These results are compared with actual experience since UR implementation began. Some conclusion...
Donor_s demand equations for alternative forms of aid are derived for three allocation processes: noncooperative Nash-Cournot, cooperative Lindahl, and bureaucratic. Based on OECD data for official development assistance for 1970– 2001, we apply non-nested tests to distinguish between Nash-Cournot and Lindahl reduced-form equations for 15 major donor nations. Noncooperative Nash-Cournot behavio...
Security, in respect of information technology (IT) systems, refers to the fact that protection goals are achieved in spite of intelligent attacks. This paper commences with a brief discussion of the term security in the context of IT systems. Of particular importance is the broadening of the term's meaning which has resulted from the development and more widespread deployment of IT, in particu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید