Suggested Topics within your search.
Suggested Topics within your search.
- Leadership 4
- Management 4
- Executive ability 3
- Methodology 3
- Common law 2
- History 2
- Interpretation and construction 2
- Law 2
- African Americans 1
- Business and Management 1
- Character 1
- Communication 1
- Corporate culture 1
- Courtship 1
- Decision making 1
- Evaluation 1
- Executive coaching 1
- Farmers 1
- Financial services industry 1
- Führung 1
- Integrity 1
- Internet marketing 1
- Organizational change 1
- Policy sciences 1
- Political planning 1
- Quality control 1
- Quantitative research 1
- Research 1
- Six sigma (Quality control standard) 1
- Social justice 1
-
2041
Battling the smoking epidemic: How Indonesia can boost its economy and health with proven global strategies
Published 2025-01-01Get full text
Article -
2042
Professional elevators to the Russian political elite
Published 2021-01-01“…The paper takes as a basis the biographies of 800 representatives of all levels of executive and legislative power holding senior positions. …”
Get full text
Article -
2043
Strategic issues of raising international financing
Published 2022-07-01“…For the solution of one of the key strategic goals of corporate finance – execution of mergers and acquisitions transactions – we present an algorithm of raising financing by using syndicated loans and eurobonds.…”
Get full text
Article -
2044
Teacher-made tests on Bahasa Indonesia subject for school examinations in public vocational high school of Bengkulu province
Published 2022-02-01“…This turned out that operational verbs of the cognitive realm based on Anderson’s taxonomy are two items of remembering, two items of classifying, an item of summarizing, four items of inferring, an item of predicting, three items of interpreting, an item of executing, six items of analyzing, twenty items of selecting, two items of assessing, an item of checking, and two items of formulating which accounted for 24 verbs in total. …”
Get full text
Article -
2045
Research and implementation of intelligent endogenous technology for SDN cooperative controller
Published 2021-12-01“…In the face of new demands and challenges such as business diversification, data quantification and cloud network integration, the ideas and methods of cloud network operation are changing.As the core capability of the new generation of cloud network operation system, SDN controller was deeply integrated with artificial intelligence technology.The key technologies and application practices of full-process closed-loop autonomy capability including intention analysis, cloud network intelligence perception, guarantee, optimization and automatic execution were studied to form intelligent endogenous capability of SDN controller.Firstly, the SDN controller intelligent endogenous development background and significance were clarified.And then, the ability of intelligent endogenous architecture and distribution of core competence were illustrated, which gradually form the whole process of the closed loop cloud network autonomy.Finally, focusing on 5G slice, SRv6 scene of new technology new business use cases, the intelligent perception, independent guarantee, automatic optimization of the key aspects of technology, and the effect of implementation and application were resolved.Through capability architecture design, key capability research and development, implementation verification and layout in standardization, the internal intelligence of SDN controller would gradually mature and enable smart operation of cloud network.…”
Get full text
Article -
2046
Beneficial effects of public sector performance measurement
Published 2007-06-01“…However, the fact remains that setting of measurable goals prompts responsibility of executive power and individuals, as well as transparency in reporting. …”
Get full text
Article -
2047
Economic Contributions of Agriculture, Natural Resources, and Food Industries in Florida in 2014
Published 2016-09-01“…Overall growth in industry contributions during this period reflected an increase in exports of Florida products to domestic and world markets. This 5-page executive summary was written by Alan W. Hodges and Mohammad Rahmani, and published by the Food and Resource Economics Department, August 2016. …”
Get full text
Article -
2048
Accounting for Spacers in the Mechanical Calculation of Flexible Wires for Overhead Lines and Switchgears
Published 2019-06-01“…These formulas, being presented in a form that is convenient for consumers, can be used for computer execution of the mechanical calculation of flexible wires in different climatic regimes, both in the presence and in the absence of phase splitting. …”
Get full text
Article -
2049
Path Planning for a Space-Based Manipulator System Based on Quantum Genetic Algorithm
Published 2017-01-01“…We then adopt a quantum genetic algorithm (QGA) to solve this objective optimization problem to attain the optimized trajectories of the joints and then execute nonholonomic path planning. To test the proposed method, we carried out a simulation on a six-degree-of-freedom (DOF) space-based manipulator system (SBMS). …”
Get full text
Article -
2050
Mining and utilization of network protocol’s stealth attack behavior
Published 2017-10-01“…The survivability,concealment and aggression of network protocol’s stealth attack behaviors were very strong,and they were not easy to be detected by the existing security measures.In order to compensate for the shortcomings of existing protocol analysis methods,starting from the instructions to implement the protocol program,the normal behavior instruction sequences of the protocol were captured by dynamic binary analysis.Then,the potential stealth attack behavior instruction sequences were mined by means of instruction clustering and feature distance computation.The mined stealth attack behavior instruction sequences were loaded into the general executing framework for inline assembly.Dynamic analysis was implemented on the self-developed virtual analysis platform HiddenDisc,and the security of stealth attack behaviors were evaluated.Excepting to mining analysis and targeted defensive the stealth attack behaviors,the stealth attack behaviors were also formally transformed by the self-designed stealth transformation method,by using the stealth attack behaviors after transformation,the virtual target machine were successfully attacked and were not detected.Experimental results show that,the mining of protocol stealth attack behaviors is accurate,the transformation and use of them to increase information offensive and defensive ability is also feasible.…”
Get full text
Article -
2051
A Model-Driven Engineering Process for Autonomic Sensor-Actuator Networks
Published 2015-03-01“…Many of these smart applications are possible due to the incorporation of autonomic control loops that implement advanced processing and analysis of historical and real-time data measured by sensors; plan actions according to a set of goals or policies; and execute plans through actuators. The complexity of this kind of systems requires mechanisms that can assist the system's design and development. …”
Get full text
Article -
2052
Provably secure quantum resistance two-server password-authenticated key exchange protocol
Published 2022-03-01“…Aiming at the problem that the lattice-based single-sever password-authenticated key exchange (PAKE) protocols are not resistant to server compromise attack, while the existing lattice-based multi-server PAKE protocols are inefficient and incompatible with two-server scenarios.The first lattice-based two-party smooth projective hash function (SPHF) was proposed by utilizing the learning with errors (LWE), which was indistinguishability under adaptive chosen-ciphertext attack(IND-CCA2) secure.The parameters of the based public key encryption (PKE) scheme were also identified.On this basis, pertinent two-server PAKE protocols from lattices were designed countering both passive and active attackers.The two quantum resistance protocols were able to achieve password-only settings and the expensive cryptographic primitives were not used, including signature/verification, fully homomorphic encryption and secret sharing.The utilization of zero knowledge proofs were avoided by the protocol under the passive attackers.In the standard model, rigorous security proofs were provided for the two proposed protocols.Experimental results show that the proposed SPHF and PAKE protocols exhibit higher execution efficiency.…”
Get full text
Article -
2053
Self-Management Embedded in Daily Activities: A Photoelicitation Focus Group Study among Persons with Spinal Cord Injury and Their Primary Caregivers in Bangladesh
Published 2022-01-01“…This study explored how community-dwelling persons with spinal cord injury (SCI) and their primary caregivers execute self-management strategies in daily activities. …”
Get full text
Article -
2054
Le droit à l’avortement : révélateur et activateur de pratiques parlementaires au Royaume-UniAbortion rights: revealing and activating parliamentary practices in the United Kingdom...
Published 2023-01-01“…The article first analyses a number of amendments relating to abortion rights, highlighting the role of the executive, the discursive framework in which debates take place, etc. …”
Get full text
Article -
2055
Intersubjectivity and co-constructed framings: students’ role-play talks in online English-speaking sessions
Published 2025-01-01“…In language education settings, activities associated with interactions often reflect multi-layered participant orientations beyond mere linguistic execution. From the perspectives of ethnomethodology and conversation analysis, linguistic actions are effective only when they are intersubjectively understood: the complexity of an activity necessitates corresponding levels of intersubjectivity for smooth progression. …”
Get full text
Article -
2056
Distributed abnormal traffic detection method for SDN based on deep learning
Published 2024-11-01“…Addressing the high computational expenses, congested shared links, and propensity for single-point failures in network devices that can lead to a degradation of software defined network (SDN) service quality or even network paralysis during the execution of large-scale SDN detection tasks by traditional abnormal traffic detection methods, a distributed abnormal traffic detection method for SDN based on deep learning was proposed. …”
Get full text
Article -
2057
Oral supplementation with propionate is reflected in the serum of healthy individuals
Published 2025-01-01“…A comprehensive understanding of the PA pharmacokinetics is essential for the optimal design and execution of studies utilizing orally administered PA. …”
Get full text
Article -
2058
Multi-node cooperative distributed offloading strategy in V2X scenario
Published 2022-02-01“…In order to cope with the dynamic changes of the offloading environment for computing resource-intensive and separable tasks in Internet of vehicle and deal with the problem that different collaborative nodes had different communication and computing resources, a distributed offloading strategy that multiple collaborative nodes had serial offloading mode and parallel computing mode in vehicle to everything (V2X) scenario was proposed.Utilizing the predictable motion trajectories of vehicle, the tasks were split into unequal parts, finally each part was computed on itself, mobile edge server, and vehicles in parallel.Then an optimization problem of the system time delay minimization was established.To solve the optimization problem, an offloading scheme based on the game theory was designed to determine the serial offloading execution order of the cooperative nodes.Considering the dynamic characteristics of Internet of vehicles, a sequential quadratic programming (SQP) algorithm was adopted to optimally split tasks.Finally, the simulation results show that the proposed strategy can effectively reduce system delay, and when multiple cooperative nodes offload in parallel, the proposed strategy can still maintain the stable system performance under the different parameter conditions.…”
Get full text
Article -
2059
MEnDiGa: A Minimal Engine for Digital Games
Published 2017-01-01“…It also presents modules of code to represent, interpret, and adapt game features to provide the execution of configured games in multiple game platforms. …”
Get full text
Article -
2060
Toward satellite-terrestrial integration: 6G cloud-fog collaborative self-organizing network
Published 2024-03-01“…Low earth orbit (LEO) satellite constellations are evolving to support on-board processing, reconfigurable functions, satellite-terrestrial cooperation, and the coordinated execution of multiple tasks, including communication, sensing, navigation, and control. …”
Get full text
Article