Showing 2,081 - 2,100 results of 3,373 for search '"executed"', query time: 0.05s Refine Results
  1. 2081

    LONG-WAVE DYNAMICS IN THE CONTEXT OF THE DEVELOPMENT OF INSTITUTIONAL ECONOMIC THEORY by B. A. Yerznkyan

    Published 2020-04-01
    “…The results can be used by executive power authorities relating to strategic management of the development and connecting with the design of social and economic institutions that support self-organization and sustainable functioning of ecosystems. …”
    Get full text
    Article
  2. 2082

    Business ecosystem sustainability management by Yu. N. Kafiyatullina, E. E. Panfilova

    Published 2022-06-01
    “…The results of the study are addressed to employees of management companies of special economic zones, heads of executive authorities responsible for the development of industrial policy. …”
    Get full text
    Article
  3. 2083

    INTERVAL ESTIMATION OF WEIBULL DISTRIBUTION BASED ON MODIFIED PIVOTAL VARIABLE METHOD (MT) by XUE GuangMing, NING Peng, FU YaoYu, HE HongRui, ZHOU Jun

    Published 2023-01-01
    “…Therefore, it can be concluded that proposed method executes the more effective estimation than the traditional methods.…”
    Get full text
    Article
  4. 2084

    Study on the Assessment of the Level of Skill and Coordination of Higher Education Students by C.G. Catuna, I.M. Butu

    Published 2024-07-01
    “…So in gymnastics, they performed circle throws and fixed-point ball throws over time, with correct execution being appreciated. The throws with the two objects were made with both hands, starting with the handy hand, with a break between trials. …”
    Get full text
    Article
  5. 2085

    Statistics release and privacy protection method of location big data based on deep learning by Yan YAN, Yiming CONG, Mahmood Adnan, Quanzheng SHENG

    Published 2022-01-01
    “…Aiming at the problems of the unreasonable structure and the low efficiency of the traditional statistical partition and publishing of location big data, a deep learning-based statistical partition structure prediction method and a differential publishing method were proposed to enhance the efficacy of the partition algorithm and improve the availability of the published location big data.Firstly, the two-dimensional space was intelligently partitioned and merged from the bottom to the top to construct a reasonable partition structure.Subsequently, the partition structure matrices were organized as a three-dimensional spatio-temporal sequence, and the spatio-temporal characteristics were extracted via the deep learning model in a bid to realize the prediction of the partition structure.Finally, the differential privacy budget allocation and Laplace noise addition were implemented on the prediction partition structure to realize the privacy protection of the statistical partition and publishing of location big data.Experimental comparison of the real location big data sets proves the advantages of the proposed method in improving the querying accuracy of the published location big data and the execution efficiency of the publishing algorithm.…”
    Get full text
    Article
  6. 2086

    Examining transaction-specific satisfaction and trust in Airbnb and hotels. An application of BERTopic and Zero-shot text classification by Manuel Rey-Moreno, Manuel Jesús Sánchez-Franco, María De la Sierra Rey-Tienda

    Published 2023-04-01
    “…Secondly, our analysis applies a Zero-shot classification approach for classifying guest reviews into labels related to guests' satisfaction and trust. Thirdly, we execute a Principal Component Analysis to investigate the sufficiency relationships between extracted topics, customer satisfaction, and trust-based labels. …”
    Get full text
    Article
  7. 2087

    Encoding Crime and Punishment in TEI: The Digital Processing of Early Modern Broadsheets from Vienna by Claudia Resch, Daniel Schopper, Tanja Wissik, Daniela Fasching

    Published 2019-06-01
    “…The broadsheets, entitled “Death Sentences,” belong to a little-explored genre of print media distributed to advertise public executions and have not been subject to closer scholarly examination before now. …”
    Get full text
    Article
  8. 2088

    A não-reciprocidade dos programas de cooperação para o desenvolvimento: uma análise bibliométrica by Cristiana Dobre

    Published 2019-09-01
    “…This is an issue for the evaluation and execution of development projects. This study fits in the actual IDC panorama where this difficulty remains, even 60 years after the beginning of its history. …”
    Get full text
    Article
  9. 2089

    The impact of audit software on quality of audit in Kuwait: Insights from auditors , by Awwad Alnesafi

    Published 2025-01-01
    “…In this study, multiple sentiments of audit professionals and finance executives on the relation of audit software and quality of audit in Kuwait are examined where, on the basis of agreed perspectives of professionals, it was found that audit software positively influences audit quality. …”
    Get full text
    Article
  10. 2090
  11. 2091

    Anomaly detection and location of malicious node for IoT based on smart contract in blockchain network by Haojie HUANG, Xiaoxiao WU, Gangqiang LI

    Published 2020-06-01
    “…With the explosive growth of the number of distributed devices in the Internet of things (IoT) network,the security of decentralized multi-agent optimization algorithm has become the forefront problem.The distributed algorithms in the IoT network are vulnerable to data injection attacks from internal malicious node because each agent locally estimates its state without any supervision.In general,the detection methods for malicious node run independently in each agent,inducing issues such as closed data,single points of failure,opaque detection processes,and so on.The proposed strategy considered detecting via an aid of blockchain technology and smart contracts in Ethereum to detect malicious node in the network.Based on the decentralized and multiple backup features of blockchain technology,the multi-site backup features of the blockchain technology enabled data sharing and avoided single point failure.In addition,the contract code,execution process and result of the smart contract were open and transparent,and the contract code and result could not be tampered to ensure that the detection process could be traced and verified.Finally,the average consensus algorithm was adopted as an example,and the proposed strategy was verified on a simplified IoT network implemented by Raspberry Pi.…”
    Get full text
    Article
  12. 2092

    Facile Conversion and Optimization of Structured Illumination Image Reconstruction Code into the GPU Environment by Kwangsung Oh, Piero R. Bianco

    Published 2024-01-01
    “…When combined with cost-effective, high-performance GPU-enabled computers, a 4- to 500-fold improvement in algorithm execution speed is observed as shown for the image denoising Hessian-SIM algorithm. …”
    Get full text
    Article
  13. 2093

    Behaviors That Improve Salespeople’s Performance and Handover Difficulties: Analysis from the Perspective of Tacit Knowledge by Takaya TOYOZUMI, Hidenori SATO

    Published 2024-11-01
    “…One of the reasons for this is that tacit knowledge on the part of the person handing over the work makes it difficult for the successor to put the knowledge into writing, even though it is necessary for the successor, and this is thought to hinder the transfer of knowledge in the execution of the work. The inability to pass on tacit knowledge is a challenge for organizations, especially when the performance of those who possess a large amount of tacit knowledge is high. …”
    Get full text
    Article
  14. 2094

    ABAC access control policy generation technique based on deep learning by Aodi LIU, Xuehui DU, Na WANG, Rui QIAO

    Published 2020-12-01
    “…To solve the problem of automatic generation of access control policies, an access control policy generation framework based on deep learning was proposed.Access control policy based on attributes could be generated from natural language texts.This technology could significantly reduce the time cost of access control policy generation and provide effective support for the implementation of access control.The policy generation problem was decomposed into two core tasks, identification of access control policy sentence and access control attribute mining.Neural network models such as BiGRU-CNN-Attention and AM-BiLSTM-CRF were designed respectively to realize identification of access control policy sentence and access control attribute mining, so as to generate readable and executable access control policies.Experimental results show that the proposed method has better performance than the benchmark method.In particular, the average F1-score index can reach 0.941 in the identification task of access control policy sentence, which is 4.1% better than the current state-of-the-art method.…”
    Get full text
    Article
  15. 2095

    Seroepidemiology of Camel Brucellosis in and around Dire Dawa, Eastern Ethiopia by Hika Waktole, Mohammed Aden, Hagos Ashenafi

    Published 2022-01-01
    “…Camel brucellosis is prevalent in eastern Ethiopia and there is a need to execute well-organized disease control and prevention programs and exercise public health education to scale up awareness of the community towards the disease.…”
    Get full text
    Article
  16. 2096

    Spectrum allocation algorithm based on multi-agent reinforcement learning in smart grid by Feng YAN, Xiaowei LIN, Zhenghao LI, Xia XU, Weiwei XIA, Lianfeng SHEN

    Published 2023-09-01
    “…In view of the fact that 5G networks are used to meet the service requirements of various power terminals in smart grid, a spectrum allocation algorithm based on multi-agent reinforcement learning was proposed.Firstly, for the integrated access backhaul system deployed in smart grid, considering the different communication requirements of services in lightweight and non-lightweight terminal, the spectrum allocation problem was formulated as a non-convex mixed-integer programming aiming to maximize the overall energy efficiency.Secondly, the above problem was modeled as a partially observable Markov decision process and transformed into a fully cooperative multi-agent problem, then a spectrum allocation algorithm was proposed which was based on multi-agent proximal policy optimization under the framework of centralized training and distributed execution.Finally, the performance of the proposed algorithm was verified by simulation.The results show that the proposed algorithm has a faster convergence speed and can increase the overall transmission rate by 25.2% through effectively reducing intra-layer and inter-layer interference and balancing the access and backhaul link rates.…”
    Get full text
    Article
  17. 2097

    Prevalence and management of common soccer injuries during university games in Uganda by Olive, Tusiime, Eunice, Kateshumbwa, Frederick, Ssempala

    Published 2020
    “…Dry and hard grounds, joint instability, bad playing field conditions, inadequate treatment/ rehabilitation from previous injury, exercise overload/ over training, poor skill execution, poor training techniques and player neglect caused the injuries. …”
    Get full text
    Article
  18. 2098

    Epidemiology and causes of common soccer injuries during university games in Uganda by Olive, Tusiime, Eunice, Kateshumbwa, Milton, Chebet

    Published 2022
    “…Dry and hard grounds, joint instability, bad playing field conditions, inadequate treatment/ rehabilitation from previous injury, exercise overload/ over training, poor skill execution, poor training techniques and player neglect caused the injuries. …”
    Get full text
    Article
  19. 2099

    Master of Business Administration (MBA) Programme Description by Kabale University

    Published 2022
    “…The MBA programme aims at developing a student's intellectual ability, executive personality and managerial skills through an appropriate blending of business and general education. …”
    Get full text
    Other
  20. 2100

    Strategic Plan 2016/2017 – 2019/2020 by Kabale University

    Published 2023
    “…In responding to the aforementioned basic question, the University evaluated strengths and lessons learned in executing the previous Strategic Plan. Over the next 4 years, the University focus will shift from teacher centered instruction to learner centered training in order to produce graduates with problem solving skills and reflective ability. …”
    Get full text
    Other