Showing 2,041 - 2,060 results of 3,373 for search '"executed"', query time: 0.06s Refine Results
  1. 2041
  2. 2042

    Professional elevators to the Russian political elite by N. A. Yushkina

    Published 2021-01-01
    “…The paper takes as a basis the biographies of 800 representatives of all levels of executive and legislative power holding senior positions. …”
    Get full text
    Article
  3. 2043

    Strategic issues of raising international financing by A. A. Tarasov

    Published 2022-07-01
    “…For the solution of one of the key strategic goals of corporate finance – execution of mergers and acquisitions transactions – we present an algorithm of raising financing by using syndicated loans and eurobonds.…”
    Get full text
    Article
  4. 2044

    Teacher-made tests on Bahasa Indonesia subject for school examinations in public vocational high school of Bengkulu province by Gumono Gumono

    Published 2022-02-01
    “…This turned out that operational verbs of the cognitive realm based on Anderson’s taxonomy are two items of remembering, two items of classifying, an item of summarizing, four items of inferring, an item of predicting, three items of interpreting, an item of executing, six items of analyzing, twenty items of selecting, two items of assessing, an item of checking, and two items of formulating which accounted for 24 verbs in total. …”
    Get full text
    Article
  5. 2045

    Research and implementation of intelligent endogenous technology for SDN cooperative controller by Le ZHANG, Yanqin WU, Ke ZHANG, Dongfeng MAO, Song JIANG, Huawei HU

    Published 2021-12-01
    “…In the face of new demands and challenges such as business diversification, data quantification and cloud network integration, the ideas and methods of cloud network operation are changing.As the core capability of the new generation of cloud network operation system, SDN controller was deeply integrated with artificial intelligence technology.The key technologies and application practices of full-process closed-loop autonomy capability including intention analysis, cloud network intelligence perception, guarantee, optimization and automatic execution were studied to form intelligent endogenous capability of SDN controller.Firstly, the SDN controller intelligent endogenous development background and significance were clarified.And then, the ability of intelligent endogenous architecture and distribution of core competence were illustrated, which gradually form the whole process of the closed loop cloud network autonomy.Finally, focusing on 5G slice, SRv6 scene of new technology new business use cases, the intelligent perception, independent guarantee, automatic optimization of the key aspects of technology, and the effect of implementation and application were resolved.Through capability architecture design, key capability research and development, implementation verification and layout in standardization, the internal intelligence of SDN controller would gradually mature and enable smart operation of cloud network.…”
    Get full text
    Article
  6. 2046

    Beneficial effects of public sector performance measurement by Neda Vitezić

    Published 2007-06-01
    “…However, the fact remains that setting of measurable goals prompts responsibility of executive power and individuals, as well as transparency in reporting. …”
    Get full text
    Article
  7. 2047

    Economic Contributions of Agriculture, Natural Resources, and Food Industries in Florida in 2014 by Alan W. Hodges, Mohammad Rahmani

    Published 2016-09-01
    “…Overall growth in industry contributions during this period reflected an increase in exports of Florida products to domestic and world markets. This 5-page executive summary was written by Alan W. Hodges and Mohammad Rahmani, and published by the Food and Resource Economics Department, August 2016. …”
    Get full text
    Article
  8. 2048

    Accounting for Spacers in the Mechanical Calculation of Flexible Wires for Overhead Lines and Switchgears by Yu. V. Bladyko

    Published 2019-06-01
    “…These formulas, being presented in a form that is convenient for consumers, can be used for computer execution of the mechanical calculation of flexible wires in different climatic regimes, both in the presence and in the absence of phase splitting. …”
    Get full text
    Article
  9. 2049

    Path Planning for a Space-Based Manipulator System Based on Quantum Genetic Algorithm by Zhengcang Chen, Weijia Zhou

    Published 2017-01-01
    “…We then adopt a quantum genetic algorithm (QGA) to solve this objective optimization problem to attain the optimized trajectories of the joints and then execute nonholonomic path planning. To test the proposed method, we carried out a simulation on a six-degree-of-freedom (DOF) space-based manipulator system (SBMS). …”
    Get full text
    Article
  10. 2050

    Mining and utilization of network protocol’s stealth attack behavior by Yan-jing HU, Qing-qi PEI

    Published 2017-10-01
    “…The survivability,concealment and aggression of network protocol’s stealth attack behaviors were very strong,and they were not easy to be detected by the existing security measures.In order to compensate for the shortcomings of existing protocol analysis methods,starting from the instructions to implement the protocol program,the normal behavior instruction sequences of the protocol were captured by dynamic binary analysis.Then,the potential stealth attack behavior instruction sequences were mined by means of instruction clustering and feature distance computation.The mined stealth attack behavior instruction sequences were loaded into the general executing framework for inline assembly.Dynamic analysis was implemented on the self-developed virtual analysis platform HiddenDisc,and the security of stealth attack behaviors were evaluated.Excepting to mining analysis and targeted defensive the stealth attack behaviors,the stealth attack behaviors were also formally transformed by the self-designed stealth transformation method,by using the stealth attack behaviors after transformation,the virtual target machine were successfully attacked and were not detected.Experimental results show that,the mining of protocol stealth attack behaviors is accurate,the transformation and use of them to increase information offensive and defensive ability is also feasible.…”
    Get full text
    Article
  11. 2051

    A Model-Driven Engineering Process for Autonomic Sensor-Actuator Networks by Carlos Vidal, Carlos Fernández-Sánchez, Jessica Díaz, Jennifer Pérez

    Published 2015-03-01
    “…Many of these smart applications are possible due to the incorporation of autonomic control loops that implement advanced processing and analysis of historical and real-time data measured by sensors; plan actions according to a set of goals or policies; and execute plans through actuators. The complexity of this kind of systems requires mechanisms that can assist the system's design and development. …”
    Get full text
    Article
  12. 2052

    Provably secure quantum resistance two-server password-authenticated key exchange protocol by Anqi YIN, Yuanbo GUO, Ding WANG, Tongzhou QU, Lin CHEN

    Published 2022-03-01
    “…Aiming at the problem that the lattice-based single-sever password-authenticated key exchange (PAKE) protocols are not resistant to server compromise attack, while the existing lattice-based multi-server PAKE protocols are inefficient and incompatible with two-server scenarios.The first lattice-based two-party smooth projective hash function (SPHF) was proposed by utilizing the learning with errors (LWE), which was indistinguishability under adaptive chosen-ciphertext attack(IND-CCA2) secure.The parameters of the based public key encryption (PKE) scheme were also identified.On this basis, pertinent two-server PAKE protocols from lattices were designed countering both passive and active attackers.The two quantum resistance protocols were able to achieve password-only settings and the expensive cryptographic primitives were not used, including signature/verification, fully homomorphic encryption and secret sharing.The utilization of zero knowledge proofs were avoided by the protocol under the passive attackers.In the standard model, rigorous security proofs were provided for the two proposed protocols.Experimental results show that the proposed SPHF and PAKE protocols exhibit higher execution efficiency.…”
    Get full text
    Article
  13. 2053

    Self-Management Embedded in Daily Activities: A Photoelicitation Focus Group Study among Persons with Spinal Cord Injury and Their Primary Caregivers in Bangladesh by Salma Begum, Yeasir A. Alve, Peter Bontje

    Published 2022-01-01
    “…This study explored how community-dwelling persons with spinal cord injury (SCI) and their primary caregivers execute self-management strategies in daily activities. …”
    Get full text
    Article
  14. 2054

    Le droit à l’avortement : révélateur et activateur de pratiques parlementaires au Royaume-UniAbortion rights: revealing and activating parliamentary practices in the United Kingdom... by Alexandrine Guyard-Nedelec

    Published 2023-01-01
    “…The article first analyses a number of amendments relating to abortion rights, highlighting the role of the executive, the discursive framework in which debates take place, etc. …”
    Get full text
    Article
  15. 2055

    Intersubjectivity and co-constructed framings: students’ role-play talks in online English-speaking sessions by Leslie Huishan Li

    Published 2025-01-01
    “…In language education settings, activities associated with interactions often reflect multi-layered participant orientations beyond mere linguistic execution. From the perspectives of ethnomethodology and conversation analysis, linguistic actions are effective only when they are intersubjectively understood: the complexity of an activity necessitates corresponding levels of intersubjectivity for smooth progression. …”
    Get full text
    Article
  16. 2056

    Distributed abnormal traffic detection method for SDN based on deep learning by WANG Kun, FU Yu, DUAN Xueyuan, YU Yihan, LIU Taotao

    Published 2024-11-01
    “…Addressing the high computational expenses, congested shared links, and propensity for single-point failures in network devices that can lead to a degradation of software defined network (SDN) service quality or even network paralysis during the execution of large-scale SDN detection tasks by traditional abnormal traffic detection methods, a distributed abnormal traffic detection method for SDN based on deep learning was proposed. …”
    Get full text
    Article
  17. 2057

    Oral supplementation with propionate is reflected in the serum of healthy individuals by Maximilian Schröder, Arijan Pasic, Frank Hirche, Svitlana Rozanova, Melissa Sgodzai, Barbara Gisevius, Lea Horstkemper, Ralf Gold, Katrin Marcus, Kalliopi Pitarokoili, Jeremias Motte, Katalin Barkovits, Gabriele Stangl, Anna Lena Fisse

    Published 2025-01-01
    “…A comprehensive understanding of the PA pharmacokinetics is essential for the optimal design and execution of studies utilizing orally administered PA. …”
    Get full text
    Article
  18. 2058

    Multi-node cooperative distributed offloading strategy in V2X scenario by Dun CAO, Yingbao ZHANG, Dian ZOU, Jin WANG, Qiang TANG, Baofeng JI

    Published 2022-02-01
    “…In order to cope with the dynamic changes of the offloading environment for computing resource-intensive and separable tasks in Internet of vehicle and deal with the problem that different collaborative nodes had different communication and computing resources, a distributed offloading strategy that multiple collaborative nodes had serial offloading mode and parallel computing mode in vehicle to everything (V2X) scenario was proposed.Utilizing the predictable motion trajectories of vehicle, the tasks were split into unequal parts, finally each part was computed on itself, mobile edge server, and vehicles in parallel.Then an optimization problem of the system time delay minimization was established.To solve the optimization problem, an offloading scheme based on the game theory was designed to determine the serial offloading execution order of the cooperative nodes.Considering the dynamic characteristics of Internet of vehicles, a sequential quadratic programming (SQP) algorithm was adopted to optimally split tasks.Finally, the simulation results show that the proposed strategy can effectively reduce system delay, and when multiple cooperative nodes offload in parallel, the proposed strategy can still maintain the stable system performance under the different parameter conditions.…”
    Get full text
    Article
  19. 2059

    MEnDiGa: A Minimal Engine for Digital Games by Filipe M. B. Boaventura, Victor T. Sarinho

    Published 2017-01-01
    “…It also presents modules of code to represent, interpret, and adapt game features to provide the execution of configured games in multiple game platforms. …”
    Get full text
    Article
  20. 2060

    Toward satellite-terrestrial integration: 6G cloud-fog collaborative self-organizing network by PENG Mugen, YUAN Shuo

    Published 2024-03-01
    “…Low earth orbit (LEO) satellite constellations are evolving to support on-board processing, reconfigurable functions, satellite-terrestrial cooperation, and the coordinated execution of multiple tasks, including communication, sensing, navigation, and control. …”
    Get full text
    Article