Suggested Topics within your search.
Suggested Topics within your search.
- Leadership 4
- Management 4
- Executive ability 3
- Methodology 3
- Common law 2
- History 2
- Interpretation and construction 2
- Law 2
- African Americans 1
- Business and Management 1
- Character 1
- Communication 1
- Corporate culture 1
- Courtship 1
- Decision making 1
- Evaluation 1
- Executive coaching 1
- Farmers 1
- Financial services industry 1
- Führung 1
- Integrity 1
- Internet marketing 1
- Organizational change 1
- Policy sciences 1
- Political planning 1
- Quality control 1
- Quantitative research 1
- Research 1
- Six sigma (Quality control standard) 1
- Social justice 1
-
2761
Problematic issues of using modern information and other technologies in the implementation of investigator’s and interrogator’s instructions by operational units
Published 2022-03-01“…The Criminal Procedure Code of Ukraine does not contain a list or definition of certain technical means that are legally required or recommended for use in the execution of orders, and does not detail certain aspects of procedural design based on the results of their implementation. …”
Get full text
Article -
2762
Future Studies of Tourism Development Planning (Case study: Ardabil province)
Published 2021-12-01“…The research area of Ardabil province and the statistical population is 45 tourism experts, urban and regional planning and executive agencies of the province. Delphi method, cross-effects matrix (Wizard scenario software) and Wizard scenario software were used to analyze the data. …”
Get full text
Article -
2763
Burden and pattern of diseases among tribes of South-West Rajasthan
Published 2025-01-01“…To tackle these issues, it is imperative to execute a targeted and precise strategy. There is a lack of data within tribal communities, which necessitates additional research to formulate a targeted strategy for tribal health.…”
Get full text
Article -
2764
All happy families area alike: The EDPS' bridges between competition and privacy
Published 2020-04-01“…The importance of this suggestion was recently acknowledged by the EU Commissioner and Executive Vice-President of the European Commission Margrethe Vestager at a lecture delivered in memorial of the former EDPS Giovanni Buttarelli: “[i]n this time of fast and radical change, all of us have a lot to learn from each other. …”
Get full text
Article -
2765
Deep Reinforcement Learning for Intraday Multireservoir Hydropower Management
Published 2025-01-01“…In contrast, RL agents, particularly those using discrete action spaces and trained with PPO, maintain consistent performance across both configurations, achieving considerable improvements with less than one second of execution time. These results suggest that RL offers a scalable alternative to traditional optimization methods for hydropower operations, particularly in scenarios requiring real-time decision making or involving larger systems.…”
Get full text
Article -
2766
A novel RFE-GRU model for diabetes classification using PIMA Indian dataset
Published 2025-01-01“…Several predictive evaluation metrics, including precision, recall, F1-score, accuracy, and Area Under the Curve (AUC) achieved 90.50%, 90.70%, 90.50%, 90.70%, 0.9278, respectively, to verify and validate the execution of the RFE-GRU model. The comparative results showed that the RFE-GRU model is better than other classification models.…”
Get full text
Article -
2767
Intrinsic assurance: a systematic approach towards extensible cybersecurity
Published 2023-02-01“…At present, the mainstream cyber security systems are laid out in an alienated style, where security functions are separated from business processes, and security products are isolated from each other.It is difficult to effectively cope with increasingly complicated cyber threats in this architecture.Therefore, it is imperative to move security inward for more resilient and secure network infrastructures.Business scenarios of the cybersecurity sector can be categorized into four perspectives: organization, vendor, regulatory and threat, each of which has different business objectives.Starting from the commonness and individuality of the four perspectives, the needs of this sector was systematically summarized and then the goal of building an extensible cybersecurity capability ecosystem was recognized.As the key to this goal, the intrinsic assurance methodology was proposed.Intrinsic assurance capabilities referred to the abilities of ICT components to natively support security functions such as monitoring, protection and traceability.But intrinsic assurance is not the ultimate security implementation itself, which is a key difference from the existing “endogenous security” or “designed-in security” methodologies.Intrinsic assurance emphasizes the inherent security enabling endowment of network components, whether by activating an innate gift or by encapsulating a given one, both of which logically exhibit autoimmunity from an external viewpoint.One advantage of such a component is the cohesion of business and security, which leads to transparent security posture awareness, customized security policies, and close-fitting security protection.It also simplifies the overall engineering architecture and reduces management complexity through encapsulation of multiple functions into a singleton.Additionally, the Intrinsic Assurance Support Capability Framework was put forward, which summarized and enumerated the security capabilities that conformed to the intrinsic assurance concept.This framework classified the security capabilities into five categories, namely collection, cognition, execution, syndication and resilience respectively, together with their sub-types and underlying ICT technologies.Based on this framework, the enhanced implementations of typical security business scenarios was further introduced in light of intrinsic assurance.…”
Get full text
Article -
2768
The Late 1980s HIV Outbreak in the Southeast of Soviet Russia: Soviet Government and Its Policy against the Epidemic (The Case of Kalmykia)
Published 2024-05-01“…The study attempts a comprehensive analysis to identify some features of the policy pursued by Soviet executives and healthcare agencies in the face of the emerging HIV threat throughout the mid-to-late 1980s. …”
Get full text
Article -
2769
The Fast and Accurate Method of Tuning of SISO Controllers Using Seven Performance Indexes
Published 2025-02-01“…The goal of the work is the development of an algorithm and corresponding software, which allows the execution of multi-criteria optimization of a control system with PI controller and FOPDT plant. …”
Get full text
Article -
2770
Models of University Interaction with the Economy and Social Sphere of the Region
Published 2019-08-01“…In this connection, it is proposed to harmonize the needs of the economy and the activities of universities in the field of meeting personnel demands and developing new production technologies, combining the efforts of the executive authorities and specialized intermediary structures. …”
Get full text
Article -
2771
Exploring a Software Framework for Posture Tracking and Haptic Feedback Control: A Virtual Reality-Based Approach for Upper Limb Rehabilitation on the Oculus Quest 2
Published 2025-01-01“…This approach enhances patient involvement by offering real-time feedback on exercise execution and providing clear instructions for posture correction. …”
Get full text
Article -
2772
The Role of Imperial Authorities in Electing Muslim Clerics across Yenisei Governorate, Mid-Nineteenth to Early Twentieth Centuries
Published 2024-05-01“…Our insights into archival materials attest to governorate-level executives had no clear understanding of how to arrange elections of Muslim clerics. …”
Get full text
Article -
2773
Coordinated One Health investigation and management of outbreaks in humans and animals caused by zoonotic avian influenza viruses
Published 2025-01-01“…Executive summary When investigating and controlling outbreaks caused by zoonotic avian influenza viruses (AIV), a One Health approach is key. …”
Get full text
Article -
2774
Relevant Problems of Implementing State Policy in the Field of Ensuring Information Security of Ukraine
Published 2021-07-01“…Thirdly, the issue of ensuring certain aspects of information security is attributed to the tasks of various state authorities (Parliament, Government, executive authorities, law enforcement agencies, etc.). …”
Get full text
Article -
2775
He effectivness and expedicency of the International Court of Justice interim measures
Published 2024-01-01“…The aim of this work is to present the jurisdiction of the Court, the importance and the course of the procedure, in order to explain the way of specifying provisional measures and the possibilities available to the Court in terms of their execution, as well as the obligations of states and United Nations bodies in relation to the provisional measures in order to demonstrate their effectiveness. …”
Get full text
Article -
2776
Rearview Camera-Based Blind-Spot Detection and Lane Change Assistance System for Autonomous Vehicles
Published 2025-01-01“…The proposed method demonstrated a performance of 11.64 fps with an execution time of 85.87 ms. It provides real-time warnings to both drivers and autonomous vehicles regarding potential collisions with detected objects.…”
Get full text
Article -
2777
Method for Increasing of Lens Gluing Technological Process Efficiency and a Reliable Evaluation of Output Controlled Parameters
Published 2022-04-01“…The traditional production process of lenses gluing involves the sequential execution of a set of technological operations and takes a significant period of time. …”
Get full text
Article -
2778
A Decentralized Storage and Security Engine (DeSSE) Using Information Fusion Based on Stochastic Processes and Quantum Mechanics
Published 2025-01-01“…The data analytics show a very effective and robust solution, with executions time comparable with cloud technologies, but with a level of security that is a post quantum one. …”
Get full text
Article -
2779
Disruption of Budget Rules in the Legal System of the Country: Preemptive Clarification as a Solution (A Case Study of the Budgets from 2020 to 2023)
Published 2024-12-01“…Budget provisions must be prepared and approved in accordance with preemptive clarification rules; otherwise, the public rights and judicial security of the people are threatened due to the emergence of conflicting interpretations by executive and judicial authorities.…”
Get full text
Article -
2780
Exploiting the Quantum Advantage for Satellite Image Processing: Review and Assessment
Published 2024-01-01“…Lastly, we defined the optimal sharing between an HPC+QC system for executing QML models for hyperspectral satellite images. …”
Get full text
Article