نتایج جستجو برای: requires multilateral studies however

تعداد نتایج: 2905445  

Journal: :Computer Networks 2001
Sebastian Clauß Marit Köhntopp

We show our approach in developing an identity management system with respect to multilateral security. After examining digital pseudonyms and credentials as basic concepts of such a system, we give an introduction to technologies for multilateral security and describe an architecture which enables multilaterally secure communication. By means of di€erent scenarios we show requirements of an id...

Journal: :Southern African Public Law 2022

As the world continues to grapple with a pandemic that struck in January 2020, responses of governments and international organisations control combat it varied albeit different levels success. Some gave rise nationalist as well anti-multilateral -international sentiments actions, including politicisation retreat from multilateral institutions cooperation. However, African Union’s response was ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید مدنی آذربایجان - دانشکده زبانهای خارجی 1391

since esp received universal attention to smooth the path for academic studies and productions, a great deal of research and studies have been directed towards this area. swales’ (1990) model of ra introduction move analysis has served a pioneering role of guiding many relevant studies and has proven to be productive in terms of helpful guidelines that are the outcome of voluminous productions ...

Akula Annapurna, Bitra Veera Raghavulu, Dampanaboina Kavitha,

Type 2 diabetes is one of the major public health challenges in 21st century. Both environmental changes and genetics are attributed for increased risk of type 2 diabetes. Obesity is the most critical and modifiable risk factor and should be targeted for successful management of diabetes. This review article discusses three main approaches to manage obesity. Three management modalities consider...

Journal: :Acta Universitatis Agriculturae et Silviculturae Mendelianae Brunensis 2013

Journal: :مجله علوم اعصاب شفای خاتم 0
mahmoud zamani department of private law, tehran university, tehran, iran maryam borhani haghighi a. shefa neuroscience research center, khatam alanbia hospital, tehran, iran b. department of anatomy, tehran university of medical sciences, tehran, iran

a pedestrian is every person who is walking, especially along or the width of a street or other place used by cars. growth, development and industrialization of societies, threatens the safety of pedestrians. increase and acceleration of vehicles and traffic, lack of road and street standards, weakness of laws or inappropriate executive guarantees, causing to insecurity and incidence of physica...

2001
Joseph Francois

This paper is about assessments of the Uruguay Round (UR), and lessons from these for the assessment of the next. The paper offers an overview of the CGE models employed or referenced by international organizations at the close of the UR. This is followed by a summary of the results of those models. These results are compared with actual experience since UR implementation began. Some conclusion...

2006
Raechelle Mascarenhas Todd Sandler

Donor_s demand equations for alternative forms of aid are derived for three allocation processes: noncooperative Nash-Cournot, cooperative Lindahl, and bureaucratic. Based on OECD data for official development assistance for 1970– 2001, we apply non-nested tests to distinguish between Nash-Cournot and Lindahl reduced-form equations for 15 major donor nations. Noncooperative Nash-Cournot behavio...

Journal: :it+ti - Informationstechnik und Technische Informatik 1996
Kai Rannenberg Andreas Pfitzmann Günter Müller

Security, in respect of information technology (IT) systems, refers to the fact that protection goals are achieved in spite of intelligent attacks. This paper commences with a brief discussion of the term security in the context of IT systems. Of particular importance is the broadening of the term's meaning which has resulted from the development and more widespread deployment of IT, in particu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید