Showing 6,561 - 6,580 results of 8,559 for search '"cooperative"', query time: 0.07s Refine Results
  1. 6561

    AN ASSESSMENT OF CIVIL-MILITARY RELATIONS AND ITS IMPLICATIONS ON NIGERIA'S NATIONAL SECURITY by Uti Harrison Onyeka, Ubong Ituen Ituen

    Published 2022-05-01
    “…It is imperative to note, as it reflects till date, the lack of cooperation with the military from the general public in carrying out its combat and noncombat military operations in Nigeria has continued to undermine the success of such operations. …”
    Get full text
    Article
  2. 6562

    Swedish School of Library and Information Science 50 years! A multi-colour bibliometric portrait by Gustaf Nelhans, Björn Hammarfelt

    Published 2023-06-01
    “…The results present the production and cooperation patterns of SSLIS researchers, the subjects covered by them, the relations between researchers, journals and research contents. …”
    Get full text
    Article
  3. 6563
  4. 6564

    A Mealybug Phenacoccus multicerarii Granara de Willink (Hemiptera: Pseudococcidae) by Ian Stocks

    Published 2013-05-01
    “…No further infestations were reported until October 2012, when a heavy infestation was discovered on a residential planting of coleus in Cooper City (Broward County). This mealybug was described in 2007 from a sample collected in Caracas, Venezuela, in 1949 from an unknown host (Granara de Willink and Szumik 2007). …”
    Get full text
    Article
  5. 6565
  6. 6566

    Organizational and Economic Aspects of the Intellectual Transport Systems Effectiveness by A. O. Merenkov

    Published 2017-09-01
    “…The study not only tells about scientific institutions in Russia, but points out the need to cooperate internationally in this filed…”
    Get full text
    Article
  7. 6567

    Survey on the Development of Space-Integrated-Ground Information Network by Wei WU

    Published 2020-09-01
    “…With the rapid development of ICT(information communication technology) and aerospace technology,the space network related technology is becoming mature,the global promotion of information technology fi eld has been fully expanded to all the space of human production,life and scientifi c research,including land,ocean,sky and space.For the China's information network,it is the focus to speed up the construction of the space-integrated-ground information network and realize the goal of seamless global coverage through the cooperation of the heaven and earth network.Firstly,the composition,network form and main characteristics of the space-ground integrated information network were described.Then,the development status and trend of the space-integrated-ground information networks at home and abroad were summarized.Finally,the key technologies needed to break through in the construction of the space- integrated-ground information network were analyzed,Hoping to provide reference for the development and construction of the space-integrated-ground information network.…”
    Get full text
    Article
  8. 6568

    Le détroit de Gibraltar by Guillaume Le Boedec

    Published 2008-02-01
    “…A real testing laboratory for the outsourcing of European migratory policy and of Maghreb cooperation, the Strait of Gibraltar has emerged as a model «frontier-setting» in the Schengen zone, but also as the symbol of its lack of efficiency. …”
    Get full text
    Article
  9. 6569
  10. 6570
  11. 6571

    JAPANESE WOMEN'S ACTIVISM SUSTAINS A LIFE-GIVING COMMUNITY IN THE PANDEMIC by J. Peracullo

    Published 2023-04-01
    “…Using ecofeminist theologian Sallie McFague’s ecological model, I demonstrate that AWEP reveals Japanese women’s acute understanding of a need for an ecological ethics of solidarity that includes ecological interests, a consciousness of solidarity, and cooperation through global sisterhood, which posits that women the world over share everyday experiences regardless of race, nationality, ethnicity, class, or economic status and, therefore, should help one another. …”
    Get full text
    Article
  12. 6572

    A trusted IoT architecture model by Ansheng YIN, Shijun ZHANG

    Published 2017-10-01
    “…The internet of things (IoT) has been widely concerned and developed in the world,and its security has been paid more and more attention.However,due to the characteristics of the IoT itself,a lot of security measures in the internet field can’t be applied directly.The current security strategy mainly provide solutions according to the threat of the IoT one by one.In face of increasingly intelligent,systematic,integrated security threats,a trusted IoT architecture of two layers and tri-elements,which brought about a whole trusted security mechanism according to the function of IoT.Starting with the integrity and safety inspection of hardware and software of sensor devices,the trusted chain was transmitted until the application layer,and data was processed according to behavior trusted value in application layer.At the same time,the control function and the data function were separated,and the security strategies cooperated and verified with each other,therefore improving the ability of the IoT to deal with security threats effectively.…”
    Get full text
    Article
  13. 6573
  14. 6574

    Repolitizando el « desarrollo ». Las ONGD y la acción colectiva en España by Beltrán Roca

    Published 2016-09-01
    “…Based on a general analysis of the Spanish DNGOs’ sector and on two case studies of NGO campaigns in Spain, the Council Cooperation conflict in 2001 and the « Glivec Battle » since 2006, this article investigates the complex and contradictory relations between DNGOs and political and corporate powers. …”
    Get full text
    Article
  15. 6575

    Særlige pligtforhold i den internationale strafferet by Lene Ravn

    Published 1998-11-01
    “…Thus, from a legislative point of view, there may be grounds for reviewing the extent of the protective principle in Danish criminal law in the light of contemporary demands to international cooperation.…”
    Get full text
    Article
  16. 6576

    Conjunct model of cloud & client computing based on multi-agent by XU Xiao-long, CHENG Chun-ling, XIONG Jing-yi

    Published 2010-01-01
    “…In order to utilize the resources of all nodes in networks fully,a novel conjunct model of cloud & client computing based on multi-agent was proposed,dividing the computing environment into three layers in accordance with the type of node and adopting agent to represent the behavior and resource of node to realize more efficient resource sharing and collaboration.The model takes full account of available resources owned by terminal nodes and deploys tasks in an orderly manner to the core nodes,servers and terminal nodes in order to maximize the efficiency of the resource utilization.To assure that tasks could be completed efficiently and reliably,a multi-agent-based collaborative multi-ring management mechanism was also presented,which is particularly suitable for the cloud & client conjunct computing environment and propitious to enhance the stability of resources sharing and nodes cooperation and relieve the load of core nodes.Finally,the construction method of experimental system and application demonstration based on the model was provided for reference.…”
    Get full text
    Article
  17. 6577

    DETERMINANTS OF ENTERPRISE COLLABORATION ON INNOVATION by Tomasz KIJEK, Anna MATRAS-BOLIBOK, Beata PODSTAWKA

    Published 2024-12-01
    “…As determinants of cooperation, we included the absorptive capacity, the firm size, and the scale of activity. …”
    Get full text
    Article
  18. 6578
  19. 6579

    Prymas Józef Glemp wobec opozycji politycznejw latach 1983–1984 by Rafał Łatka

    Published 2019-01-01
    “…It should be emphasised that the detachment from the activity of the opposition also resulted in the primate's critical approach to cooperation of the clergy with the political underground. …”
    Get full text
    Article
  20. 6580

    Interference-aware node access scheme in UAV-aided VANET by Xiying FAN, Chuanhe HUANG, Junyu ZHU, Shaojie WEN

    Published 2019-06-01
    “…In vehicular Ad Hoc network (VANET),frequent link handovers and channel interference can lead to increased transmission delay and decreased network throughput.To address the issues,unmanned aerial vehicle (UAV) were introduced to cooperate with vehicles and construct UAV-assisted air-ground integrated VANET.An interference-aware node access scheme was proposed.The node access problem was formulated as a multi-objective optimization problem considering link transmission rate,link handovers and transmit power.Then the optimization problem was decomposed into two convex optimization sub-problems by dual decomposition method,the sub-problem jointly optimizes handovers and link transmission rate while the sub-problem optimizes the transmit power based on link reliability.Finally,simulation results show that the proposed mechanism can effectively improve data delivery ratio,average end-to-end delay and network throughput.…”
    Get full text
    Article