Showing 47,601 - 47,620 results of 51,844 for search '"Management"', query time: 0.26s Refine Results
  1. 47601

    Privacy matching-based service proxy discovery scheme by Kui GENG, Sheng WAN, Feng-hua LI, Yuan-yuan HE, Han-yi WANG

    Published 2016-08-01
    “…According to user's requirements on the proxy performance,cost and safety in proxy discovery,and the pri-vacy-preserving issue during the process of the demand private matching,a new private matching algorithm was pre-sented based on Paillier homomorphic encryption,comprehensively considered the attributes of user and agents and their priority.It included four steps:building the similarity function based on Euclidean distance,carrying on the private matching by encryption algorithm,calculating the similarity and screening the proxy chain.Proposed scheme introduced semi trusted primary proxy from the global level,which is to manage all the sub proxy's business type and the connection status,and do the main computational overhead.At the same time,Euclidean distance and Paillier homomorphic encryp-tion algorithm were combined to support the multivariate attributes with priority to match,which can effectively protect the privacy of user and sub proxy.Finally,security analysis and evaluation results show the effectiveness and safety of proposed scheme.…”
    Get full text
    Article
  2. 47602

    Research on the subtractive clustering algorithm for mobile ad hoc network based on the Akaike information criterion by Liu Banteng, Haibo Yang, Qiuxia Chen, Zhangquan Wang

    Published 2019-09-01
    “…Clustering in mobile ad hoc networks is an organization method dividing the nodes in groups, which are managed by the nodes called cluster-heads. As far as we know, the difficulty of clustering algorithm lies in determining the number and positions of cluster-heads. …”
    Get full text
    Article
  3. 47603

    Microangiopathic Hemolytic Anemia: A Rare Complication of Acute Pancreatitis by Syedda Ayesha, Masood Muhammad Karim, Maria Ali, Abdul Hadi Shahid, Salman Naseem Adil

    Published 2025-01-01
    “…This paper presents the case of a patient diagnosed with acute pancreatitis-induced hemolytic anemia and thrombocytopenia, who was managed successfully with plasma exchange, steroids, and rituximab. …”
    Get full text
    Article
  4. 47604

    Hearing Loss due to Infiltration of the Tympanic Membrane by Chronic Lymphocytic Leukemia by Jonathon B. Cohen, Robert Cavaliere, John C. Byrd, Leslie A. Andritsos

    Published 2012-01-01
    “…This is the first reported case of tympanic membrane involvement with CLL and describes potentially effective methods for managing this challenging complication.…”
    Get full text
    Article
  5. 47605

    Green Room – An architectural and urban device for energy efficiency and environmental comfort by Luigi Coccia, Sara Cipolletti, Gianmarco Corvaro

    Published 2024-06-01
    “…Starting from morphological, typological, and climatic data and managing computational simulation processes, the experiment aims to update design tools at the architectural and urban scale, establishing a relationship between indoor and outdoor spaces to achieve benefits for the environment and people’s well-being.   …”
    Get full text
    Article
  6. 47606

    AMTD:a way of adaptive moving target defense by Danjun LIU, Guilin CAI, Baosheng WANG

    Published 2018-01-01
    “…Moving target defense is a new way to change the asymmetry state between attack and defense,by dynamically moving target’s attacking surface.Frequency conversion of MTD is of great importance for the weighing between usability,security and defense cost.Nowadays,however,frequency conversion is usually determined by manager’s experience,which cannot create a balance between usability and security cost for the lack of theory basis.An adaptive moving target defense framework(AMTD)was proposed.AMTD can maximize system security at the lowest cost while ensuring that the system is available.The adaptability of AMTD has two modes.Firstly,the defense mode,it contains an adaptive conversion strategy to provide reacting defense triggered by security alerts and active defense triggered by timer expiration events.The other mode is the frequency conversion,which obtain the optimal conversion frequency by establishing mathematical models.Four series of simulation experiments were taken to verify the effectiveness of the solution.…”
    Get full text
    Article
  7. 47607

    Mécanismes neuronaux pour la communication chez les primates by Julia Sliwa, Daniel Y Takahashi, Stephen V Shepherd

    Published 2019-02-01
    “…Cycles of reciprocal signal exchange mediate social interactions, but even “asocial” species coordinate reproduction, manage conflict over territory, and may anticipate and influence potential predators and prey. …”
    Get full text
    Article
  8. 47608

    Great Green Transition and Finance by Claudia Kemfert, Dorothea Schäfer, Willi Semmler

    Published 2020-06-01
    “…Growth rates deep in the red call for a reconstruction programme when the crisis is finally manageable and economic activity can resume. Amidst this, there are again influential groups that claim “this is not the time to insist on strict climate protection goals”. …”
    Get full text
    Article
  9. 47609

    Computational intelligence in the identification of Covid-19 patients  by using KNN-SVM Classifier by shaymaa adnan

    Published 2024-12-01
    “… Initiatives to mitigate the persistent coronavirus disease 2019 (COVID-19) crisis shown that quick, sensitive, and extensive screening is essential for managing the present epidemic and future pandemics. …”
    Get full text
    Article
  10. 47610

    An Unusual Terrible Triad Variant Associated with an Essex-Lopresti Injury by Luis M. Salazar, Abdullah Ghali, Jose M. Gutierrez-Naranjo, Thomas L. Hand, Anil K. Dutta

    Published 2021-01-01
    “…Almost a reverse Essex-Lopresti, this injury was successfully managed with open reduction and repair of the distal radius, radial head, and damaged ligaments in the elbow, along with an internal joint stabilizer (IJS).…”
    Get full text
    Article
  11. 47611

    Building Longitudinal Datasets From Diverse Historical Data in Australia by Janet McCalman

    Published 2021-08-01
    “… Australia is rich in population datasets generated to manage convicts, civilians, stock, land and the colonised and displaced First Nations people. …”
    Get full text
    Article
  12. 47612

    Information Technology in Critical Care: Review of Monitoring and Data Acquisition Systems for Patient Care and Research by Michael A. De Georgia, Farhad Kaffashi, Frank J. Jacono, Kenneth A. Loparo

    Published 2015-01-01
    “…There is a broad consensus that 21st century health care will require intensive use of information technology to acquire and analyze data and then manage and disseminate information extracted from the data. …”
    Get full text
    Article
  13. 47613

    Seller Perception Analysis on Purchase Decision Using Analytical Hierarchy Process Method by Khusna Dwijayanti

    Published 2023-03-01
    “…The questionnaires in this study are given to sellers and marketing managers who are experienced in selling the product. …”
    Get full text
    Article
  14. 47614

    Social Protection in Developing Countries: Legal, Economic, and Social Trends by Nodira Rustamova, Sardorbek Sharifzoda, Xurshida Burxanxodjaeva, Lola Rahimqulova, Mukhammad Turdialiev, Farrukh Nurullaev, Dauletbike Eshchanova

    Published 2025-01-01
    “…Through a comparative analysis of social insurance, social assistance, public works, and community-based employment programs, this study assesses their effectiveness in mitigating poverty, managing risks, and fostering resilience. A unique aspect of this research lies in its integration of economic, historical, and cultural factors, offering a comprehensive evaluation of social protection beyond conventional economic assessments. …”
    Get full text
    Article
  15. 47615

    Neratinib and the Role of Anti‐HER2 Therapy in Salivary Duct Carcinoma by Martina Napolitano, Lucia Trudu, Enrica Martinelli, Chiara Santini, Massimo Dominici, Federica Bertolini

    Published 2025-01-01
    “…Even with central nervous system involvement at diagnosis, a durable clinical response was obtained with a PFS of 11 months and no significant toxicities to manage. Best response observed during tratment was partial response. …”
    Get full text
    Article
  16. 47616

    Les pratiques publiques de capital-investissement en faveur du développement by Océane Ronal

    Published 2021-07-01
    “…In this context, the shareholder state assumes the role of a financial market creator and a risk manager. The demonstration is based on two main arguments. …”
    Get full text
    Article
  17. 47617

    Sistem Pemandian dan Pembersihan Sangkar Burung Murai Batu Otomatis Berbasis Internet Of Things by Valiyana Savitri, Nefy Puteri Novani

    Published 2025-01-01
    “…The implementation results demonstrate that the system is effective, achieving sensor accuracies of 95.4%, 97.7%, and 97.36%, respectively, and providing convenience for bird owners in managing and monitoring the system remotely. …”
    Get full text
    Article
  18. 47618

    Одна країна – декілька національностей: етнічний склад населення Польщі в історичній ретроспективі... by Мареш Тереза

    Published 2020-12-01
    “…In general, it was analyzed to what extent, in our opinion, the Poles managed to establish relations with the "other" neighbor.…”
    Get full text
    Article
  19. 47619

    Analysis of blood flow features in the curved artery in the presence of differently shaped hybrid nanoparticles by K.N. Asha, Neetu Srivastava

    Published 2025-03-01
    “…This work provides a comprehensive overview of the mathematical model, its solutions, and visual data, offering valuable insights for researchers and medical professionals on the potential applications of hybrid nanoparticles in managing stenotic blood flow.…”
    Get full text
    Article
  20. 47620

    Synthesized Cluster Head Selection and Routing for Two Tier Wireless Sensor Network by Keyur Rana, Mukesh Zaveri

    Published 2013-01-01
    “…Large scale sensor networks can be efficiently managed by dividing them into several clusters. With the help of cluster heads, each cluster communicates using some routing schedule. …”
    Get full text
    Article