Suggested Topics within your search.
Suggested Topics within your search.
- Management 58
- Public administration 10
- Marketing 9
- methods 9
- Hospitality industry 8
- Personnel management 8
- Tourism 8
- Entrepreneurship 7
- Information technology 7
- Project management 7
- Educational leadership 6
- Industrial management 6
- Leadership 6
- Organizational behavior 6
- Politics and government 6
- Purchasing 6
- Risk management 6
- School management and organization 6
- Economic conditions 5
- Finance 5
- History 5
- Industrial procurement 5
- Natural resources 5
- Study and teaching 5
- Communication in management 4
- Database management 4
- Decision making 4
- Moral and ethical aspects 4
- Nursing 4
- Planning 4
-
47601
Privacy matching-based service proxy discovery scheme
Published 2016-08-01“…According to user's requirements on the proxy performance,cost and safety in proxy discovery,and the pri-vacy-preserving issue during the process of the demand private matching,a new private matching algorithm was pre-sented based on Paillier homomorphic encryption,comprehensively considered the attributes of user and agents and their priority.It included four steps:building the similarity function based on Euclidean distance,carrying on the private matching by encryption algorithm,calculating the similarity and screening the proxy chain.Proposed scheme introduced semi trusted primary proxy from the global level,which is to manage all the sub proxy's business type and the connection status,and do the main computational overhead.At the same time,Euclidean distance and Paillier homomorphic encryp-tion algorithm were combined to support the multivariate attributes with priority to match,which can effectively protect the privacy of user and sub proxy.Finally,security analysis and evaluation results show the effectiveness and safety of proposed scheme.…”
Get full text
Article -
47602
Research on the subtractive clustering algorithm for mobile ad hoc network based on the Akaike information criterion
Published 2019-09-01“…Clustering in mobile ad hoc networks is an organization method dividing the nodes in groups, which are managed by the nodes called cluster-heads. As far as we know, the difficulty of clustering algorithm lies in determining the number and positions of cluster-heads. …”
Get full text
Article -
47603
Microangiopathic Hemolytic Anemia: A Rare Complication of Acute Pancreatitis
Published 2025-01-01“…This paper presents the case of a patient diagnosed with acute pancreatitis-induced hemolytic anemia and thrombocytopenia, who was managed successfully with plasma exchange, steroids, and rituximab. …”
Get full text
Article -
47604
Hearing Loss due to Infiltration of the Tympanic Membrane by Chronic Lymphocytic Leukemia
Published 2012-01-01“…This is the first reported case of tympanic membrane involvement with CLL and describes potentially effective methods for managing this challenging complication.…”
Get full text
Article -
47605
Green Room – An architectural and urban device for energy efficiency and environmental comfort
Published 2024-06-01“…Starting from morphological, typological, and climatic data and managing computational simulation processes, the experiment aims to update design tools at the architectural and urban scale, establishing a relationship between indoor and outdoor spaces to achieve benefits for the environment and people’s well-being. …”
Get full text
Article -
47606
AMTD:a way of adaptive moving target defense
Published 2018-01-01“…Moving target defense is a new way to change the asymmetry state between attack and defense,by dynamically moving target’s attacking surface.Frequency conversion of MTD is of great importance for the weighing between usability,security and defense cost.Nowadays,however,frequency conversion is usually determined by manager’s experience,which cannot create a balance between usability and security cost for the lack of theory basis.An adaptive moving target defense framework(AMTD)was proposed.AMTD can maximize system security at the lowest cost while ensuring that the system is available.The adaptability of AMTD has two modes.Firstly,the defense mode,it contains an adaptive conversion strategy to provide reacting defense triggered by security alerts and active defense triggered by timer expiration events.The other mode is the frequency conversion,which obtain the optimal conversion frequency by establishing mathematical models.Four series of simulation experiments were taken to verify the effectiveness of the solution.…”
Get full text
Article -
47607
Mécanismes neuronaux pour la communication chez les primates
Published 2019-02-01“…Cycles of reciprocal signal exchange mediate social interactions, but even “asocial” species coordinate reproduction, manage conflict over territory, and may anticipate and influence potential predators and prey. …”
Get full text
Article -
47608
Great Green Transition and Finance
Published 2020-06-01“…Growth rates deep in the red call for a reconstruction programme when the crisis is finally manageable and economic activity can resume. Amidst this, there are again influential groups that claim “this is not the time to insist on strict climate protection goals”. …”
Get full text
Article -
47609
Computational intelligence in the identification of Covid-19 patients by using KNN-SVM Classifier
Published 2024-12-01“… Initiatives to mitigate the persistent coronavirus disease 2019 (COVID-19) crisis shown that quick, sensitive, and extensive screening is essential for managing the present epidemic and future pandemics. …”
Get full text
Article -
47610
An Unusual Terrible Triad Variant Associated with an Essex-Lopresti Injury
Published 2021-01-01“…Almost a reverse Essex-Lopresti, this injury was successfully managed with open reduction and repair of the distal radius, radial head, and damaged ligaments in the elbow, along with an internal joint stabilizer (IJS).…”
Get full text
Article -
47611
Building Longitudinal Datasets From Diverse Historical Data in Australia
Published 2021-08-01“… Australia is rich in population datasets generated to manage convicts, civilians, stock, land and the colonised and displaced First Nations people. …”
Get full text
Article -
47612
Information Technology in Critical Care: Review of Monitoring and Data Acquisition Systems for Patient Care and Research
Published 2015-01-01“…There is a broad consensus that 21st century health care will require intensive use of information technology to acquire and analyze data and then manage and disseminate information extracted from the data. …”
Get full text
Article -
47613
Seller Perception Analysis on Purchase Decision Using Analytical Hierarchy Process Method
Published 2023-03-01“…The questionnaires in this study are given to sellers and marketing managers who are experienced in selling the product. …”
Get full text
Article -
47614
Social Protection in Developing Countries: Legal, Economic, and Social Trends
Published 2025-01-01“…Through a comparative analysis of social insurance, social assistance, public works, and community-based employment programs, this study assesses their effectiveness in mitigating poverty, managing risks, and fostering resilience. A unique aspect of this research lies in its integration of economic, historical, and cultural factors, offering a comprehensive evaluation of social protection beyond conventional economic assessments. …”
Get full text
Article -
47615
Neratinib and the Role of Anti‐HER2 Therapy in Salivary Duct Carcinoma
Published 2025-01-01“…Even with central nervous system involvement at diagnosis, a durable clinical response was obtained with a PFS of 11 months and no significant toxicities to manage. Best response observed during tratment was partial response. …”
Get full text
Article -
47616
Les pratiques publiques de capital-investissement en faveur du développement
Published 2021-07-01“…In this context, the shareholder state assumes the role of a financial market creator and a risk manager. The demonstration is based on two main arguments. …”
Get full text
Article -
47617
Sistem Pemandian dan Pembersihan Sangkar Burung Murai Batu Otomatis Berbasis Internet Of Things
Published 2025-01-01“…The implementation results demonstrate that the system is effective, achieving sensor accuracies of 95.4%, 97.7%, and 97.36%, respectively, and providing convenience for bird owners in managing and monitoring the system remotely. …”
Get full text
Article -
47618
Одна країна – декілька національностей: етнічний склад населення Польщі в історичній ретроспективі...
Published 2020-12-01“…In general, it was analyzed to what extent, in our opinion, the Poles managed to establish relations with the "other" neighbor.…”
Get full text
Article -
47619
Analysis of blood flow features in the curved artery in the presence of differently shaped hybrid nanoparticles
Published 2025-03-01“…This work provides a comprehensive overview of the mathematical model, its solutions, and visual data, offering valuable insights for researchers and medical professionals on the potential applications of hybrid nanoparticles in managing stenotic blood flow.…”
Get full text
Article -
47620
Synthesized Cluster Head Selection and Routing for Two Tier Wireless Sensor Network
Published 2013-01-01“…Large scale sensor networks can be efficiently managed by dividing them into several clusters. With the help of cluster heads, each cluster communicates using some routing schedule. …”
Get full text
Article