Suggested Topics within your search.
Suggested Topics within your search.
- Leadership 4
- Management 4
- Executive ability 3
- Methodology 3
- Common law 2
- History 2
- Interpretation and construction 2
- Law 2
- African Americans 1
- Business and Management 1
- Character 1
- Communication 1
- Corporate culture 1
- Courtship 1
- Decision making 1
- Evaluation 1
- Executive coaching 1
- Farmers 1
- Financial services industry 1
- Führung 1
- Integrity 1
- Internet marketing 1
- Organizational change 1
- Policy sciences 1
- Political planning 1
- Quality control 1
- Quantitative research 1
- Research 1
- Six sigma (Quality control standard) 1
- Social justice 1
-
2541
Exploiting Partial Reconfiguration through PCIe for a Microphone Array Network Emulator
Published 2018-01-01“…On the other hand, a set of strategies and heuristics to properly use partial reconfiguration allows the acceleration of the emulation by exploiting the execution parallelism. Several experiments are presented to demonstrate some of the capabilities of our platform and the benefits of using partial reconfiguration.…”
Get full text
Article -
2542
Modeling and Optimization of Multiaction Dynamic Dispatching Problem for Shared Autonomous Electric Vehicles
Published 2021-01-01“…The fusion of electricity, automation, and sharing is forming a new Autonomous Mobility-on-Demand (AMoD) system in current urban transportation, in which the Shared Autonomous Electric Vehicles (SAEVs) are a fleet to execute delivery, parking, recharging, and repositioning tasks automatically. …”
Get full text
Article -
2543
Study of a Pathological E-Learning via Content Analysis on the Campus of the University of Tehran
Published 2024-12-01“…The advantage of this type of training for the educational organization in 4 categories (executive benefits, human resources, economic and educational-developmental) And the problems of this education were summarized by students in 3 general categories (learning problems, security and technology). …”
Get full text
Article -
2544
-
2545
Resource Scheduling Method for Integration of TT&C and Observation Based on Multi-Agent Deep Reinforcement Learning
Published 2023-03-01“…With the development of satellite communication technology and the continuous expansion of the constellation scale, the integration of TT&C and observation technology has become the mainstream trend.The large constellation scale, many scheduling objects and complex operation joint control bring great challenges to the integrated resource scheduling of satellite network TT&C and observation.Subject to the low solution effi ciency and complex constraints of scheduling algorithms, the traditional TT&C resource scheduling technology adopts the advance injection TT&C instructions to perform tasks according to the fi xed deployment, which is diffi cult to meet the scheduling needs of emergencies and emergency tasks.Therefore, a kind of resource scheduling method based on multi-agent actor-Agent Actor-Critic Deterministic Policy Gradient Algorithms (MADDPG) was presented.With centralized training and distributed execution, the multi-agent model of integrated task of TT&C and observation was established.By analyzed the scheduling strategy of neighbor agent, the response speed of local information was improved.According to the model and constraints in the integrated resource scheduling problem of TT&C and observation, selected signifi cant and interpretable constraints, then established the multi-agent resource scheduling reinforcement learning model, and carried on the simulation test.The simulation results showed that the task benefi t of this method was 22% higher than the traditional method.…”
Get full text
Article -
2546
DARE: A decentralized association rules extraction scheme for embedded data sets in distributed IoT devices
Published 2020-10-01“…Finding these patterns and using them for decision-making can provide ease, comfort, practicality, and autonomy when executing daily activities. Performing knowledge extraction in a decentralized approach is a computational challenge considering the tight storage and processing constraints of IoT devices, unlike deep learning, which demands a massive amount of data, memory, and processing capability. …”
Get full text
Article -
2547
State-of-the-art survey of smart contract verification based on formal methods
Published 2022-08-01“…Smart contract represents an essential application scenario of blockchain technology.Smart contract technology improves programmability and scalability of blockchain, and has broad development prospects.However, a series of security incidents caused a great number of economic losses and weakened users’ confidence in the Ethereum platform.The security of smart contract has become a critical problem that restricts the further development of smart contract.Defects in smart contract code may cause serious consequences and cannot be modified once deployed, it is especially important to verify the correctness of smart contract in advance.In recent years, researchers have obtained many achievements in verification of smart contract, but there is a lack of systematic summary of these research results.Therefore, some basic principles of Ethereum were introduced, including the transaction, gas mechanism, storage and programming language.Eight common types of vulnerabilities in smart contract were summarized and their causes were explained.Some real security events were reviewed and some examples of vulnerability codes were presented.Then, the research work on automatic verification of smart contract based on symbolic execution, model checking and theorem proving was classified and summarized.Three open-source automated tools were selected, including Mythril, Slither and Oyente.And experiments were implemented to evaluate and compare the three tools from the aspects of efficiency, accuracy and the types of vulnerability can be detected.Furthermore, related review articles were surveyed, and the advantages of this paper compared with these works were summarized.The critical problems in the vulnerability detection technology of smart contract were also summarized and the direction of future research was proposed at last.…”
Get full text
Article -
2548
Shape Restoration by Active Self-Assembly
Published 2005-01-01“…The assembly agents initially execute a random walk. When two robots meet, they may exchange a small number of messages. …”
Get full text
Article -
2549
The governing system of the Vatican City State under the Fundamental Law of the Vatican City State of 2023
Published 2024-12-01“…This issue required an in-depth analysis due to the fact that the Vatican City State, despite being an absolute monarchy in which the Sovereign enjoys full power, has specialised bodies equipped with legislative, executive and judicial functions, which they always exercise on behalf of the Pope. …”
Get full text
Article -
2550
Opportunities of Artificial Intelligence and Machine Learning in the Food Industry
Published 2021-01-01“…The human workforce plays an essential role in the smooth execution of the production and packaging of food products. …”
Get full text
Article -
2551
A guidance to intelligent metamaterials and metamaterials intelligence
Published 2025-01-01“…., wave-based neural network, mathematical operation, and logic operation, all of which directly execute computation, detection, and inference task in physical space. …”
Get full text
Article -
2552
Analisis Penyelesaian Dana Macet di Koperasi Konsumen Guru dan Pegawai Negeri di Medan Area
Published 2024-06-01“…The research subjects are (1) Chairman of the Board (2) IT Expert (3) Administrative Executive of the “Consumer Teachers and Civil Servants” cooperative located on Jl.A.R. …”
Get full text
Article -
2553
Corporate Governance and Cash Holdings among Non-Financial Companies Listed in the Nigerian Exchange Group
Published 2024-02-01“…With exception of board gender diversity and institutional ownership, variables such as board independence, size, and chief executive officer equity ownership exhibit a significant inverse impact on cash holdings at a 5% level. …”
Get full text
Article -
2554
Sustainable Selection of Machine Learning Algorithm for Gender-Bias Attenuated Prediction
Published 2025-01-01Get full text
Article -
2555
Fishing Industry in Eighteenth-Century Astrakhan Governorate: Eyewitness Accounts of Travelers and St. Petersburg Academy of Sciences Expeditionists
Published 2024-09-01“…Our insights into a variety of published sources and unpublished documents discovered in Collection 394 of the Archive attest to comprehensive descriptions of Astrakhan fisheries were first made by members of academic expeditions in accordance with duly assigned tasks and through the support of regional executives. Notes by chiefs of ‘physical expeditions’ make it possible to localize and characterize key areas of fish production in the region, identify some prominent fishery owners, determine the actual fish species’ range, production volumes and incomes, tools and methods of fishing. …”
Get full text
Article -
2556
Regulation of local self-government bodies powers in health care
Published 2023-12-01“…It is proposed to enhance the legal regulation of the powers of local self-government bodies by including the full list of powers of local councils and their executive committees in the healthcare field in a separate section of Article 32 of the Law on Local Self-Government.…”
Get full text
Article -
2557
Protective Effect of Thyme Extract on Albino Rats Exposed to Paraquat
Published 2022-01-01“…The treatment duration was continued for eight executive days. Paraquat administration showed significant decrease in BW, food intake, liver, kidney weight also PQ increased malondialdehyde (MDA), low density lipoprotein (LDL), alkaline phosphatase (ALP) and, uric acid (UA) significantly. …”
Get full text
Article -
2558
A Low-Power Streaming Speech Enhancement Accelerator for Edge Devices
Published 2024-01-01“…The proposed high performance model is optimized for hardware execution with the co-design of model compression and target application, which reduces 93.9% of model size by the proposed domain-aware and streaming-aware pruning techniques. …”
Get full text
Article -
2559
Constructing method of opaque predicate based on type conversion and operation of floating point numbers
Published 2023-10-01“…With the increasing complexity of software functions and the evolving technologies of network attacks, malicious behaviors such as software piracy, software cracking, data leakage, and malicious software modification are on the rise.As a result, software security has become a focal point in industry research.Code obfuscation is a common software protection technique used to hinder reverse engineering.It aims to make program analyzing and understanding more difficult for attackers while preserving the original program functionality.However, many existing code obfuscation techniques suffer from performance loss and poor concealment in pursuit of obfuscation effectiveness.Control flow obfuscation, particularly opaque predicate obfuscation, is widely used to increase the difficulty of code reverse engineering by disrupting the program’s control flow.A method was proposed to address the limitations of existing code obfuscation techniques.It utilized the phenomenon of precision loss that occurred during type conversion and floating-point number operations in computers.Under certain conditions, this method produced operation results that contradict common sense.By performing forced type conversion, addition, and multiplication with selected decimal numbers, a series of opaque predicates can be constructed based on the statistical analysis of their operation results.This approach achieved code obfuscation with high concealment, good generality, reversibility, and low overhead compared to traditional opaque predicates.Experimental verification demonstrates that this method significantly slows down attackers’ reverse engineering efforts and exhibits good resistance to dynamic analysis techniques such as symbolic execution.…”
Get full text
Article -
2560
A Novel Integrated Fuzzy-Rough MCDM Model for Evaluation of Companies for Transport of Dangerous Goods
Published 2021-01-01“…The organization and execution of the transport of dangerous goods is conditioned by a series of legal, technical, technological, safety, and engineering requirements, which must be met. …”
Get full text
Article