Suggested Topics within your search.
Suggested Topics within your search.
- Leadership 4
- Management 4
- Executive ability 3
- Methodology 3
- Common law 2
- History 2
- Interpretation and construction 2
- Law 2
- African Americans 1
- Business and Management 1
- Character 1
- Communication 1
- Corporate culture 1
- Courtship 1
- Decision making 1
- Evaluation 1
- Executive coaching 1
- Farmers 1
- Financial services industry 1
- Führung 1
- Integrity 1
- Internet marketing 1
- Organizational change 1
- Policy sciences 1
- Political planning 1
- Quality control 1
- Quantitative research 1
- Research 1
- Six sigma (Quality control standard) 1
- Social justice 1
-
2021
Using Fuzzy Multiple Criteria Decision-Making Approach for Assessing the Risk of Railway Reconstruction Project in Taiwan
Published 2014-01-01“…Based on the identified risk factors, an assessing framework based on the fuzzy multicriteria decision-making (fuzzy MCDM) approach to help construction agencies build awareness of the critical risk factors on the execution of railway reconstruction project, measure the impact and occurrence likelihood for these risk factors. …”
Get full text
Article -
2022
Effects of Rural Tourism on Rural Development: Hajij Village in Kermanshah
Published 2015-06-01“…Research tools include a researcher made questionnaire which its validity was confirmed based on the collective opinion of the universities professor's and experts of executive organizations. The reliability of the questionnaire was calculated at 0.867 using Cranach’s alpha test based on 20 pretesting. …”
Get full text
Article -
2023
Au prisme de Louise Weiss ? Les femmes dans les mouvements d’assistance aux réfugiés en France durant la Première Guerre mondiale
Published 2022-09-01“…But they were excluded from the positions of executive responsibilities. As the wives of prefects, mayors or other notables, they often represented their husbands but also acted to give themselves a profile. …”
Get full text
Article -
2024
HUMAN SECURITY AND LAND BORDERS CLOSURE: A HISTORICAL PERSPECTIVE
Published 2024-10-01“…The paper also revealed that what influenced government closure of the borders was due to proliferation of light and heavy weapons across the Nigeria borders hence the executive order for border closure in 2019.The paper concludes that despite federal government acclaimed success of border closure of the nation land borders the closure did not yield the desire results. …”
Get full text
Article -
2025
Interactive Visualization of the Printed Circuits Tracing Algorithms for Educational Purposes
Published 2023-02-01“…The main difference between the developed module and the software of similar purpose is the possibility of step-by-step annotated execution of various algorithms for tracing printed conductors with the possibility of changing the order of routing user-specified conductors. …”
Get full text
Article -
2026
Bidirectional authentication key agreement protocol supporting identity’s privacy preservation based on RLWE
Published 2019-11-01“…In order to solve the problem of identity privacy preservation between two participants involved when implementing authenticated key agreement protocol,a bidirectional authenticated key agreement protocol against quantum attack based on C commitment scheme was proposed.Through the design of C commitment function,the real identity information of two participants involved was hidden.Based on RLWE difficult problem,under the premise to ensure identity anonymity,this protocol not only completed two-way identity authentication,but also ensured the integrity of the transmitted message,furthermore,the shared session key was negotiated.After been analyzed,in terms of protocol’s execution efficiency,only two rounds of message transmission were needed to complete anonymous two-way authentication and key agreement in the proposed scheme.Compared with Ding’s protocol,the length of public key was reduced by nearly 50%.With regard to security,the protocol could resist forgery,replay,key-copy,and man-in-the-middle attacks.It is proved that the proposed protocol satisfies the provable security under the eCK model.At the same time,the protocol is based on the RLWE problem of lattices,and can resist quantum computing attacks.…”
Get full text
Article -
2027
Testing the significance of pricing factors of oil and gas companies.
Published 2024-01-01“…With a purely statistical approach, we show the factors that explain the cross-sectional expected return of the O&G companies, providing information of special relevance for the decision making of investors, executives and politicians.…”
Get full text
Article -
2028
Implementation of TQM and the Integration of BIM in the Construction Management Sector in Saudi Arabia
Published 2021-01-01“…When applied, TQM improves execution of time management of project, satisfies clients’ needs, minimizes the expenses and increases the profit of contractor, and fulfils safety regulations on the construction site. …”
Get full text
Article -
2029
“Nossa energia tem um Norte”: propostas e (des) encontros no planejamento energético na Amazônia Oriental
Published 2021-03-01“…Taking as a motto the documentary production of companies involved in this process, such as Eletronorte, Celpa and Eletrobrás, as well as by observing the debates that permeated government media and speeches, the article seeks to bring subsidies to understand how the paths followed by these projects, from the present to the past , are apprehended as dynamic elements of a region, but that historically have not consolidated a real execution focused on the interests and needs of this space.…”
Get full text
Article -
2030
Adversarial method for malicious ELF file detection based on deep reinforcement learning
Published 2024-10-01“…In recent years, research on detecting malicious executable and linkable format (ELF) files based on deep learning had made significant progress. …”
Get full text
Article -
2031
Scatter and Blurring Compensation in Inhomogeneous Media Using a Postprocessing Method
Published 2008-01-01“…This method also offers an alternative to compensate for scatter and blurring in a more time efficient manner compared to the popular iterative methods. The execution time for this efficient postprocessing method is only a few minutes, which is within the clinically acceptable range.…”
Get full text
Article -
2032
COVID-19: Are Malaysians embracing or suffering the new normality?
Published 2020-08-01“…The movement control order (MCO) was one of the drastic measures taken in Malaysia adhering to the guideline released by World Health Organization (WHO) and has been made effective since 18th of March 2020. The execution of MCO in a developing setting like Malaysia certainly impacts its people on several fronts, especially those from low-socioeconomic background. …”
Get full text
Article -
2033
An Enhanced -Means Clustering Algorithm for Pattern Discovery in Healthcare Data
Published 2015-06-01“…The experiments also yield better results for G -means in terms of the coefficient of variance and the execution time.…”
Get full text
Article -
2034
An Automatic Multidocument Text Summarization Approach Based on Naïve Bayesian Classifier Using Timestamp Strategy
Published 2016-01-01“…The results show that the proposed method results in lesser time than the existing MEAD algorithm to execute the summarization process. Moreover, the proposed method results in better precision, recall, and F-score than the existing clustering with lexical chaining approach.…”
Get full text
Article -
2035
A Domain-Specific Architecture for Elementary Function Evaluation
Published 2015-01-01“…We propose a Domain-Specific Architecture for elementary function computation to improve throughput while reducing power consumption as a model for more general applications: support fine-grained parallelism by eliminating branches, and eliminate the duplication required by coprocessors by decomposing computation into instructions which fit existing pipelined execution models and standard register files. Our example instruction architecture (ISA) extension supports scalar and vector/SIMD implementations of table-based methods of calculating all common special functions, with the aim of improving throughput by (1) eliminating the need for tables in memory, (2) eliminating all branches for special cases, and (3) reducing the total number of instructions. …”
Get full text
Article -
2036
Algorithms for partitioning logical circuits into subcircuits
Published 2020-09-01“…The data structures to execute the algorithms are defined. Various types of equations connections, obtaining better solutions for partitioning are described. …”
Get full text
Article -
2037
The impact of self-isolation on the socio-psychological state of a person: research results
Published 2022-09-01Get full text
Article -
2038
-
2039
Time Code for multifunctional 3D printhead controls
Published 2025-01-01“…G-Code’s line-by-line execution requires auxiliary control commands to interrupt the print path motion, causing defects in the printed structure. …”
Get full text
Article -
2040
Adaptive distributed cloud edge collaborative load control strategy for load management
Published 2024-08-01“…The experimental results show that the algorithm proposed has significant advantages in task completion time and execution cost, and these advantages become more pronounced as the number of tasks increases and computing resources decrease. …”
Get full text
Article