Suggested Topics within your search.
Suggested Topics within your search.
- Leadership 4
- Management 4
- Executive ability 3
- Methodology 3
- Common law 2
- History 2
- Interpretation and construction 2
- Law 2
- African Americans 1
- Business and Management 1
- Character 1
- Communication 1
- Corporate culture 1
- Courtship 1
- Decision making 1
- Evaluation 1
- Executive coaching 1
- Farmers 1
- Financial services industry 1
- Führung 1
- Integrity 1
- Internet marketing 1
- Organizational change 1
- Policy sciences 1
- Political planning 1
- Quality control 1
- Quantitative research 1
- Research 1
- Six sigma (Quality control standard) 1
- Social justice 1
-
2181
The representation of Irish affairs in La Gazette and in Nouvelles Ordinaires de Londres, 1649-1652
Published 2014-07-01“…The context in 1649-1652 was particularly newsworthy – as Charles I’s execution and the establishment of a new regime in England coincided with the beginning of the Fronde in France. …”
Get full text
Article -
2182
L’abandon et l’appel, ou l’optimisme paradoxal de Graham Greene dans The Power and the Glory
Published 2009-03-01“…This call to his repressed conscience is repeated in the final scene when he witnesses the priest’s execution. Newman’s understanding of man’s condition probably underlies such contrasts “between the beautiful and the treacherous”. …”
Get full text
Article -
2183
-
2184
Crowd-based collaboration caching mechanism in smart identifier network
Published 2018-12-01“…Smart identifier network (SINET) is an innovative network architecture.Through dynamic collaboration of service resource,function groups and physical components,the network scalability,resource utilization and service quality were effectively improved by SINET,and an effective solution for the development of industrial Internet of things(IoT) could be provided.To promote content delivery in resource-constrained IoT,caching function was introduced in network components by SINET,and the bandwidth waste caused by traffic redundancy in resource-constrained node could be reduced.Therefore,how to efficiently cache content became an important research topic.Based on SINET architecture,a crowd-based collaboration cache (C2Cache) mechanism was proposed in this scheme.According to the actual network topology,the caching function group was dynamically created and optimized by C2Cache,and a function group as crowd minimum unit to execute the maximum benefit cache (MBC) algorithm was defined to maximize the caching space efficiency.With the self-developed emulation system,named EmuStack,the performance of C2Cache was evaluated.The experimental results show that,comparing with LCE,Random,Prob Cache,LCD and Greedy caching mechanisms,the cache hit rate can be improved effectively,then the average access time can be reduced significantly by C2Cache.In the simulated network scenario,the performance increases 15% to 30%.…”
Get full text
Article -
2185
A scoping review on self-regulation and reward processing measured with gambling tasks: Evidence from the general youth population.
Published 2024-01-01“…Nonetheless, there was some evidence of associations with attention, cognitive control, and overall executive functioning. More longitudinal research is needed to draw accurate conclusions on the direction of the association between self-regulation and reward processing.…”
Get full text
Article -
2186
GOVERNMENT EXPENDITURE: A CATALYST FOR ECONOMIC GROWTH IN NIGERIA
Published 2024-10-01“…The study suggested that the allocation and execution of budget to the identified critical sectors should be more done carefully for accelerated economic growth. …”
Get full text
Article -
2187
Perception and Experiences of Undergraduate Nursing Students on Clinical Learning Environment in a Public University
Published 2022-11-01“…Clinical training offers chances to use the theoretical knowledge in practice, raise problem-solving and executive skills, learn time management, collaborate with others, and develop professionalism. …”
Get full text
Article -
2188
Birleşmiş Milletler Güvenlik Konseyi’nin Reformu Sorunsalı: İtalya’nın Beklentileri ve Stratejileri
Published 2020-06-01“…The Security Council (UNSC), which acts as executive mechanism of the UN, is the part that is expected to receive highest share from these changes. …”
Get full text
Article -
2189
An Improved Multiobjective Algorithm: DNSGA2-PSA
Published 2018-01-01“…To improve the diversity and decrease execution time of the nondominated sorting genetic algorithm II (NSGA-II), an improved algorithm is presented in this paper, which adopts a new vector ranking scheme to decrease the whole runtime and utilize Part and Select Algorithm (PSA) to maintain the diversity. …”
Get full text
Article -
2190
Handover algorithm for space-air-ground integrated network based on location prediction model
Published 2024-12-01“…A distributional deep Q-network (D-DQN) was employed to select the network nodes that could maximize long-term goals for execution handover. Compared with network handover algorithms based on Q-Learning, double deep Q-network (DDQN), and dueling double deep Q-network (D3QN), the proposed algorithm performs better in terms of reducing handover delay and frequency, as well as enhancing network throughput, thereby validating the effectiveness of the proposed algorithm.…”
Get full text
Article -
2191
Generation Z in Search of Leadership - Model of Intergenerational Leadership for Creating Commitment (MILCC)
Published 2024-12-01“…This article presents a model for creating commitment for Generation Z employees based on research on executive leadership's impact on Generation Z employee commitment. …”
Get full text
Article -
2192
Identifying the Prophetic Legal Ethos in the Death Penalty Provisions of the Indonesian Criminal Code
Published 2024-11-01“…Should the convict exhibit remorse prior to execution, it reflects the understanding that Allah is the Most Forgiving. …”
Get full text
Article -
2193
A Critique on the Book Theory of Strategic Management
Published 2021-05-01“…In the process of its plan and strategy, this book has referred to the formulation, execution, and implementation. However, it does not explicitly mention the important and main process of monitoring and evaluating the strategy and only discusses the control of strategies sporadically in some chapters. …”
Get full text
Article -
2194
Rôle des acteurs dans le processus d’élaboration de projets routiers
Published 2014-05-01“…From preliminary studies to the execution of road works, a road project is submitted to a succession of decisions, following a regulated procedure. …”
Get full text
Article -
2195
Graph Theoretical Analysis of Semantic Fluency in Patients with Parkinson’s Disease
Published 2022-01-01“…Semantic fluency is the ability to name items from a given category within a limited time, which relies on semantic memory, working memory, and executive function. Semantic disfluency is a common problem in Parkinson’s disease (PD) and Alzheimer’s disease (AD). …”
Get full text
Article -
2196
Skinner Sweet, American Vampire
Published 2015-08-01“…As such, Skinner is both the savage “native” American whose execution is sought by the “civilized” whites, as well as the brash American seeking his Emersonian independence from European tradition. …”
Get full text
Article -
2197
Applied Analysis at MGIMO-University
Published 2014-10-01“…This kind of research always attracted considerable interest of the Ministry of Foreign Affairs of the USSR, and other executive institutions of the government and received their support. …”
Get full text
Article -
2198
-
2199
CP-ABE based users collaborative privacy protection scheme for continuous query
Published 2017-09-01“…In location-based services (LBS),as the untrusted LBS server can be seen as an adversary,and it can utilize the attribute as background knowledge to correlate the real location of the user in the set of uncertain locations.Then the adversary can gain the location privacy when the user enjoys the snapshot and continuous query through the correlation inference attack.In order to cope with this attack,the main scheme in privacy protection is to generalize the attribute and achieve attribute anonymity.However,algorithms of this type usually assumes a trusted third party (TTP) which provides the service of similarity attribute finding and comparing,and it is unpractical in the real environment,as the TTP may become the point of attack or the bottleneck of service and it cannot be considered as the trusted one all the time.Thus,to cope with the correlation inference attack as well as the semi-trusted third party,ciphertext policy attribute based encryption (CP-ABE) and users collaboration based attribute anonymous scheme was proposed.In this scheme,the user coupled achieve location and attribute anonymity.Furthermore,this scheme could also provide security for attacks from the semi-trusted third party as well as semi-trusted collaborative users.At last,security analysis and the experiment results further verify the effectiveness of privacy protection and the efficiency of algorithm execution.…”
Get full text
Article -
2200
Cooperative Search Optimization of an Unknown Dynamic Target Based on the Modified TPM
Published 2022-01-01“…Then, the distributed ant colony (ACO) algorithm and the artificial potential field (APF) algorithm are combined to generate and optimize the UAV swarm search result and return path with the goal of maximizing task execution efficiency. Finally, the Monte Carlo simulation method is used to analyze the effectiveness of the proposed algorithm, and the results are evaluated from five aspects, including the number of targets captured. …”
Get full text
Article