• главная
  • рубрики
  • по алфавиту
  • реклама на сайте
  • обратная связь
коллекция "otherreferats"
Главная Коллекция "Otherreferats" S
  • 0..9
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • J
  • K
  • L
  • M
  • N
  • O
  • P
  • Q
  • R
  • S
  • T
  • U
  • V
  • W
  • X
  • Y
  • Z

  • А
  • Б
  • В
  • Г
  • Д
  • Ґ
  • Е
  • Є
  • Ё
  • Ж
  • З
  • И
  • І
  • Ї
  • Й
  • К
  • Л
  • М
  • Н
  • О
  • П
  • Р
  • С
  • Т
  • Ќ
  • У
  • Ў
  • Ф
  • Х
  • Ц
  • Ч
  • Ш
  • Щ
  • Э
  • Ю
  • Я
  • 91. Seamless and secure integration of socialmedia, e-portfolio and alumn services into university information architecture

    Concept and prototype for an "assembling" IT intergration portal to be used in higher education. Solution, to use Elgg as an information portal and social media platform. The gap between the closed nature of university IT infrastructure and user-friendly.

    статья (1007,8 K)
  • 92. Seaports in the bri: challenges, solutions and emerging regulations

    The third analysis is the growth of the BRI northern segment, the beginning of the formation of the Ice Silk Road, and the investment projects of the PRC in the seaports of the traditional near-arctic states. Seaports and the BRI Normative Dimention.

    статья (29,9 K)
  • 93. Search for double beta decays of 96-Ru and 104-Ru with high purity Ge gamma spectrometry

    Experiment to search for double beta decay is in progress in the INFN laboratory with the help of ultra-low background high purity Ge gamma spectrometry. Studies of double beta decay give information about properties of neutrino and weak interactions.

    статья (295,3 K)
  • 94. Search for the waterfalls in Ethiopia using remote sensing data

    The position of the studied Jinbar Waterfall and Blue Nile Falls on a map of Ethiopia. Short analysis of the relief, the map of slopes. Medium spatial resolution. Possible further seasonal monitoring of the state of previously identified waterfalls.

    статья (6,1 M)
  • 95. Search tactics: specific issues of technical means application

    Formulating requirements to technical means used during the search. Identification of persons held responsible for videorecording carried out during the search. Analysis of specific tactical approaches of search-operative group applied during search.

    автореферат (21,5 K)
  • 96. Search-informational competence of future biomedical engineers and economists as an important component of adjustment of safety professional activity standards

    Detailed consideration of the problem of formation of search and information competence in the system of professional training of future biomedical engineers and economists in foreign language classes. Development of electronic language didactics.

    статья (504,8 K)
  • 97. Searching for the origin of agriculture in East Asia

    Neolithization of East Asia, which took place against the backdrop of catastrophic landscape and climatic changes. The origins of agriculture and the reasons for the wide distribution of both early farmers and a wide range of hunter-gatherers in Asia.

    статья (1,2 M)
  • 98. Seasonal anomaly in variations of global distributions of F2-layer electron density according to CCIR model

    The distribution of the electron density and the height of the ionospherе. Analysis of the laws of longitude-latitude variations in the northern and southern hemispheres. Geographical indices of appearance of anomalies in calculations of the CCIR model.

    статья (1,2 M)
  • 99. Seasonal changes of metabolic parameters in young men in the conditions of the European North

    The causes of fluctuations in the concentration of metabolites in the blood. Analysis of the values of biochemical indicators of blood during the year in the conditions of European North. The process of adaptation of the organism to weather conditions.

    статья (19,5 K)
  • 100. Seasonality in Hotel Business

    The seasonality of demand in the hotel industry and its dependence on the location of the hotel. The popularity of resorts focused on health care. Measures to attract customers to the hotel: discounts, services, etc. Seasonality in Saint-Petersburg.

    презентация (10,6 M)
  • 101. Second stage of "State defiance": Counter visions on the Euromaidan's precepts

    The features of the phenomenon of "state against" and its consequential factor - Euromaidan, as their mutual influence on the course of historical events in Ukraine after the removal of the Yanukovych administration from the presidency are considered.

    статья (26,3 K)
  • 102. Second-order Logic still wild

    A popular opinion among mathematical logicians by referring to second-order logic as "set theory in sheep`s clothing". Boolos`s translation of the second-order axiom of foundation. Using ordinary language to settle logical matters. Boolos`s circle.

    статья (679,1 K)
  • 103. Secondary education

    Primary school, incomplete secondary education, upper secondary school and complete secondary education. Basics of the Belarusian and Russian languages, mathematics, nature study, initial knowledge about society, and national history and culture.

    реферат (14,1 K)
  • 104. Secret societies of Europe

    A secret society as a club or an organization whose activities, events, and inner functioning are concealed from non-members. The Freemasons, the Order of the Golden Dawn, British universities and colleges secret societies, the Illuminati, the Carbonari.

    курсовая работа (26,2 K)
  • 105. Sector of mountain settlements use of innovative foreign experience in the tourism

    Research of recreational activities, experience and possibilities of its application in territorial communities of mountain settlements of the Transcarpathian region. Rural tourism destinations are available in the United States and European countries.

    статья (15,0 K)
  • 106. Sectoral priorities for construction activities in Ukraine

    Methodical and applied basis of construction activity. Analysis of factors shaping demand and stimulating housing construction, construction of engineering structures. The level of incomes of the population and the conditions of mortgage lending.

    статья (306,3 K)
  • 107. Secure key establishment

    Computer security approach. Message authentication codes. Bilinear maps from elliptic curve pairings. Cryptographic hash functions. Method of session key generation. Secure authenticated encryption schemes. An efficient protocol in extended model.

    книга (1,4 M)
  • 108. Secure multi-party non-repudiation protocols and applications

    Make translation of paper-based procedures to networked digital ones hard. Specific non-repudiation services. General contribution to multi-party problem. Summary of MPNR protocol properties. Supporting legal framework. Main model simulation event.

    книга (2,8 M)
  • 109. Securing the loan agreement of an entity conducting private medical activity in poland by means of an assignment of receivables from a contract with the Narodowy Fundusz Zdrowia (National Health Fund)

    Analysis of the medical activity of non-governmental organizations in Poland. Review of the possibility of securing a credit agreement of a subject of non-state medical activity by assigning receivables under a contract with the National Health Care Fund.

    статья (10,4 K)
  • 110. Securing the loan agreement of an entity conducting private medical activity in Poland by means of an assignment of receivables from a contract with the narodowy fundusz zdrowia (national health fund)

    The subject of this article is an analysis of the possibility of securing a loan agreement of an entity conducting non-public medical activity in Poland by means of the assignment of receivables under the contract with the National Health Fund.

    статья (15,3 K)
  • 111. Securities and shares

    Classification and concept of securities. Kinds of the share markets. The basic representations and functions of the markets of the action. Bonds - the securities which have been let out by the company, the governments and financial institutions.

    реферат (20,8 K)
  • 112. Securitization of loans as a tool to attract "long money" in the banking sector of the Russian economy

    Comparative analysis of models of traditional and synthetic models of securitization. Advantages of the model of securitization of mortgage loans, used in most European countries. The current structure of the securitization market in Europe and America.

    статья (20,2 K)
  • 113. Security and cryptography for networks

    Implementing two-party computation efficiently with security against malicious adversaries. Two generic constructions of probabilistic cryptosystems and their applications. Cramer-shoup satisfies a stronger plaintext awareness under a weaker assumption.

    книга (4,9 M)
  • 114. Security aspects of modern international migration processes

    The article highlights and characterizes the main aspects of influence of migration processes on the separate constituent components of international and national security. It has been discovered that international migration processes influence security.

    статья (603,3 K)
  • 115. Security in Turkey

    Determination of the main causes underlying the Kurdish issue. Consideration of both internal and regional transformations, such as the Arab uprisings, changed the foreign policy perspective of Ankara. Evaluation of the security policy of Turkey.

    дипломная работа (75,7 K)
  • 116. Security management

    The policy and organization of information security. The lack of detection systems on enterprise. Classification and management of technology resources. Understanding the need of controlling process. Problems in security management and their solutions.

    статья (426,0 K)
  • 117. Security of natural gas supply to consumers in ukraine and poland in the face of open russian military aggression in 2022 (comparative study)

    Security of natural gas supply to consumers in Ukraine and Poland in the face of open Russian military aggression in 2022 (comparative study). Military operations, including Russian attacks on natural gas production sites controlled by Ukraine.

    статья (1,5 M)
  • 118. Security policy of the Slovak Republic in the context of intensifying the hybrid actions of the Russian Federation

    The annexation of Crimea - a factor that has changed the strategic situation in the European defense complex. Membership in international and regional organizations is a method used by the Slovak Republic for the protection of the security Council.

    статья (13,2 K)
  • 119. Security proofs of cryptographic protocols

    Database and logic abduction method. Classical Logic Programming approach. Soundness and completeness DLA method. Various aspects of analysis of security protocols. Needham-Schroeder protocol. Optimized Otway-Rees protocol. Internet Key Exchange Protocol.

    научная работа (163,9 K)
  • 120. Security system for stateless persons

    Clarifying the urgency and importance of stateless persons through the status quo and providing proposals for the security system of stateless persons. Analysis of solutions to the problems of lack of rights and the difficult life of stateless persons.

    статья (19,4 K)

Страница:

  •  1 
  •  2 
  •  3 
  •  4 
  •  5 
  •  6 
  •  7 
  •  8 
  •  9 
  •  » 
  • главная
  • рубрики
  • по алфавиту
  • Рубрики
  • По алфавиту
  • Закачать файл

© 2000 — 2025, ООО «Олбест» Все наилучшее для вас