نتایج جستجو برای: but also around nations

تعداد نتایج: 3835473  

2004
Kallol K. Bagchi Karl Putnam Zaiyong Tang

Information technology (IT) expenditures in different developing nations of the world have been impressive but controversial lately. Research is needed to know how IT expenditures are growing in these nations. Do stages of IT development or price drops in IT infrastructure influence such growth? We intend to explore these issues with various growth models, using data from 14 nations (constraine...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده ادبیات و علوم انسانی 1390

educational researchers have provided evidence that teachers’ emotional intelligence has strong effects on various aspects of teaching and learning. yet, in the field of teaching english to speakers of other languages (tesol), inquiry into teachers’ emotional intelligence is nearly limited. given its documented powerful impact on teaching practices and student learning, it is critical to pursue...

Journal: :RFC 2014
Tirumaleswar Reddy Ram Mohan Ravindranath Muthu Arul Mozhi Perumal Alper E. Yegin

This document discusses some of the security problems and practical problems with the current Session Traversal Utilities for NAT (STUN) authentication for Traversal Using Relays around NAT (TURN) messages. Status of This Memo This document is not an Internet Standards Track specification; it is published for informational purposes. This document is a product of the Internet Engineering Task Fo...

Lucky Osaretin Odia

Growing number of scholars in sociology has come to terms that sociology, like everything else, is a product of particular historical conditions. As there is sociology of everything. You can turn on your sociological eye no matter where you are or what you are doing, taking for example, the latent reasoning usually adopted by sociologist in viewing issues as against some others who ignorantly e...

2005
Guido Bertucci

Re es so ou ur rc ce es s f fo or r E Ef ff fe ec ct ti iv ve e P Pu ub bl li ic c A Ad dm mi in ni is st tr ra at ti io on n i in n a a G Gl lo ob ba al li iz ze ed d W Wo or rl ld d United Nations, 2005 ii Notes The designations employed and the presentation of the material in this publication do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United N...

2001
LISA C. JEFFREY

Let Σ be a compact Riemann surface of genus g, and G ̄SU(n). The central element c ̄ diag(e#id/n,... , e#id/n) for d coprime to n is introduced. The Verlinde formula is proved for the Riemann–Roch number of a line bundle over the moduli space g," (c,Λ) of representations of the fundamental group of a Riemann surface of genus g with one boundary component, for which the loop around the boundary is...

Journal: :IJEGR 2005
James Melitski Marc Holzer Seang-Tae Kim Chan-Gun Kim Seung-Yong Rho

abstract This article evaluates the current practice of digital government in large municipalities worldwide. The study assesses 84 cities from around the world that use a five-stage e-government framework. Our research and methodology goes beyond previous research by utilizing 92 measures that were translated into the native language of each city. In addition, the assessment of each municipal ...

2015
K. Alese Boniface K. Adu Michael K. Owa Victor

Security can be defined as the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable assets, such as persons, dwellings, communities, nations or organizations. Cybercrime is any crime committed or facilitated via the Internet. It is any criminal activity involving computers and networks. It can range from fraud to unsolicited emails (spam). It includes the ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید