Suggested Topics within your search.
Suggested Topics within your search.
- Leadership 4
- Management 4
- Executive ability 3
- Methodology 3
- Common law 2
- History 2
- Interpretation and construction 2
- Law 2
- African Americans 1
- Business and Management 1
- Character 1
- Communication 1
- Corporate culture 1
- Courtship 1
- Decision making 1
- Evaluation 1
- Executive coaching 1
- Farmers 1
- Financial services industry 1
- Führung 1
- Integrity 1
- Internet marketing 1
- Organizational change 1
- Policy sciences 1
- Political planning 1
- Quality control 1
- Quantitative research 1
- Research 1
- Six sigma (Quality control standard) 1
- Social justice 1
-
1981
AP-IO: Asynchronous Pipeline I/O for Hiding Periodic Output Cost in CFD Simulation
Published 2014-01-01“…Experimental results on the Tianhe-2 supercomputer demonstrate that AP-IO can achieve a good optimization effect for the periodical snapshot output in CFD application, and the effect is especially better for massively parallel CFD simulations, which can reduce the total execution time up to about 40%.…”
Get full text
Article -
1982
Challenges and solutions for the implementation of computer-based test learning evaluation at SMKN 2 Bandung
Published 2024-06-01“…The research objectives are: (1) describing CBT planning as a learning evaluation, (2) explaining CBT execution to enhance students' honesty in final exams at SMKN 2 Bandung, and (3) analyzing CBT results as a learning evaluation of students' honesty. …”
Get full text
Article -
1983
Inhibitory Deficits, Delay Aversion and Preschool AD/HD: Implications for the Dual Pathway Model
Published 2004-01-01“…The dual pathway model proposes the existence of separate and neurobiologically distinct cognitive (inhibitory and more general executive dysfunction) and motivational (delay aversion) developmental routes to AD/HD. …”
Get full text
Article -
1984
Model-Based ILC with a Modified Q-Filter for Complex Motion Systems: Practical Considerations and Experimental Verification on a Wafer Stage
Published 2018-01-01“…Iterative learning control (ILC) is one of the most popular tracking control methods for systems that repeatedly execute the same task. A system model is usually used in the analysis and design of ILC. …”
Get full text
Article -
1985
Optimal Airport Surface Traffic Planning Using Mixed-Integer Linear Programming
Published 2008-01-01“…The taxi-planning concept presented herein, which is based on mixed-integer linear programming, is designed such that it is able to adapt to perturbations in these input conditions, as well as to account for failure in the actual execution of surface trajectories. The capabilities of the tool are illustrated in a simple hypothetical airport.…”
Get full text
Article -
1986
A Novel Clustering Technique for Efficient Clustering of Big Data in Hadoop Ecosystem
Published 2019-12-01“…We compare the new hybrid algorithm with existing algorithms on the bases of precision, recall, F-measure, execution time, and accuracy of results. From the experimental results, it is clear that the proposed hybrid clustering algorithm is more accurate, and has better precision, recall, and F-measure values.…”
Get full text
Article -
1987
Edge Computing in an IoT Base Station System: Reprogramming and Real-Time Tasks
Published 2019-01-01“…Conventional base station management systems tend to be hosted in the cloud, but cloud-based systems are difficult to reprogram and performing tasks in real-time is sometimes problematic, for example, sounding a combination of alarms or executing linked tasks. To overcome these drawbacks, we propose a hybrid edge-cloud IoT base station system, called BSIS. …”
Get full text
Article -
1988
Developing the Five-Target Test (FTT) for the technical performance analysis in boccia
Published 2024-12-01“…Results indicated consistent performance between repetitions but decreased execution time. Reliability indicators showed acceptable consistency (ICC = 0.44 to 0.71; SEM = 1.23 to 3.19; MDC = 2.44 to 6.33). …”
Get full text
Article -
1989
A Data Mining Classification Approach for Behavioral Malware Detection
Published 2016-01-01“…A suggested program has been presented for converting a malware behavior executive history XML file to a suitable WEKA tool input. …”
Get full text
Article -
1990
Sustainable Development, Digital Democracy, and Open Government: Co-Creation Synergy in Ukraine
Published 2024-12-01“…The study finds that during public consultations in Ukraine, the SDGs served as discussion themes, while the Open Government Partnership provided an executable platform. These e-consultations helped collect policy ideas, e-discussions facilitated policy drafting, and non-binding internet voting assisted in prioritising open government draft policies. …”
Get full text
Article -
1991
Intelligent Models and Architectures for Global Learning-Oriented Cooperation
Published 2025-01-01“…The functional engines control knowledge delivery processes and behaviour executions involving single and composite actions. All these elements are evaluated using a designing case study in current Sustainable Development Goals for education. …”
Get full text
Article -
1992
Key shifts in frontoparietal network activity in Parkinson’s disease
Published 2025-01-01“…To that end, 68 PD patients and 30 controls underwent electroencephalography (EEG) recording while executing visual single- and dual- Go/No-go tasks. …”
Get full text
Article -
1993
Schedulability Analysis for Rate Monotonic Algorithm-Shortest Job First Using UML-RT
Published 2014-01-01“…UML-RT (unified modelling language-real time) is a language used to build an unambiguous executable specification of a real-time system based on UML concepts. …”
Get full text
Article -
1994
Low environmental impact construction: fragilities and potentialities of hyperadobe as a solution for the Brazilian housing deficit
Published 2021-01-01“…Through the bibliographic review, it is concluded that the studied technology presents particularly advantageous characteristics to face the problem such as the low costs, the fast execution, the easy workforce training, and the high environmental performance in thermal and acoustical comfort. …”
Get full text
Article -
1995
Reducing Side Effects of Hiding Sensitive Itemsets in Privacy Preserving Data Mining
Published 2014-01-01“…Experiments are then conducted to show the performance of the proposed algorithm in execution time, number of deleted transactions, and number of side effects.…”
Get full text
Article -
1996
Perbedaan Pengaruh Teknik Relaksasi Nafas Dalam Dan Kompres Hangat Dalam Menurunkan Dismenore Pada Remaja SMA Negeri 3 Padang
Published 2012-12-01“…Sample as many as 32 teens divided in each treatment with the execution time of 20 minutes. Statistical tests used were t-test test and test of paired samples t-test free samples. …”
Get full text
Article -
1997
Manipulation in the world of marketing
Published 2023-07-01“…Research with a method of experiment has assessed aspects of manipulative advertising, their execution, and expected impacts on consumer behaviour in general about any purchase of a product or service worldwide. …”
Get full text
Article -
1998
Contact plan design based on bi-directional particle swarm optimization in satellite network
Published 2019-08-01“…Aiming at the problems of time-varying topology,intermittent connection,and constrained resource in satellite network,a contact plan design (CPD) scheme based on bi-directional particle optimization (BPSO) algorithm was proposed.Firstly,the task-based time-expanded graph (TEG) model was constructed through the analysis of resource-constrained time-varying satellite network.Next,available contact plan (CP) in satellite network were generated through initialization,coding and repairing by considering the discreteness of network topology and the limitation of node resources.Then,an evaluation function was designed according to the characteristics of the execution task to distinguish whether the generated available CP was good or bad.Finally,the bits to be corrected in the worst location were determined according to the sparse characteristics of links in CP,and the CP was continuously modified by the proposed BPSO algorithm to optimize the performance of spatial data transmission.The simulation results show that the proposed BPSO-based CPD scheme can effectively reduce the task delivery time and increase the task arrival rate.…”
Get full text
Article -
1999
Elliptic-Curve Cryptography Implementation on RISC-V Processors for Internet of Things Applications
Published 2024-01-01“…This implementation aims to enhance secure communication and data exchange between IoT devices and also provides a detailed account of our ECDSA implementation on a RISC-V processor and evaluates its performance, achieving a reduction of 11.8% in execution time compared to existing techniques. The implementation takes 483 clock cycles and utilizes approximately 4096 bytes of memory. …”
Get full text
Article -
2000
A Local Stability Supported Parallel Distributed Constraint Optimization Algorithm
Published 2014-01-01“…In addition, the construction of initial solution could be received more quickly without repeated assignment and conflict. In order to execute parallel search, LSPA finds final solution by constantly computing local stability of compatible agents. …”
Get full text
Article