Showing 2,761 - 2,780 results of 3,373 for search '"executed"', query time: 0.12s Refine Results
  1. 2761

    Problematic issues of using modern information and other technologies in the implementation of investigator’s and interrogator’s instructions by operational units by O. O. Zahumennyi

    Published 2022-03-01
    “…The Criminal Procedure Code of Ukraine does not contain a list or definition of certain technical means that are legally required or recommended for use in the execution of orders, and does not detail certain aspects of procedural design based on the results of their implementation. …”
    Get full text
    Article
  2. 2762

    Future Studies of Tourism Development Planning (Case study: Ardabil province) by hossein nazmfar, ameneh alibakhshi

    Published 2021-12-01
    “…The research area of Ardabil province and the statistical population is 45 tourism experts, urban and regional planning and executive agencies of the province. Delphi method, cross-effects matrix (Wizard scenario software) and Wizard scenario software were used to analyze the data. …”
    Get full text
    Article
  3. 2763

    Burden and pattern of diseases among tribes of South-West Rajasthan by Rakhi Dwivedi, Prachi Goel, Riddhi Jain, Aditya Sharma, Pradeep Dwivedi, Pratibha Singh, Kuldeep Singh

    Published 2025-01-01
    “…To tackle these issues, it is imperative to execute a targeted and precise strategy. There is a lack of data within tribal communities, which necessitates additional research to formulate a targeted strategy for tribal health.…”
    Get full text
    Article
  4. 2764

    All happy families area alike: The EDPS' bridges between competition and privacy by Simonetta Vezzoso

    Published 2020-04-01
    “…The importance of this suggestion was recently acknowledged by the EU Commissioner and Executive Vice-President of the European Commission Margrethe Vestager at a lecture delivered in memorial of the former EDPS Giovanni Buttarelli: “[i]n this time of fast and radical change, all of us have a lot to learn from each other. …”
    Get full text
    Article
  5. 2765

    Deep Reinforcement Learning for Intraday Multireservoir Hydropower Management by Rodrigo Castro-Freibott, Álvaro García-Sánchez, Francisco Espiga-Fernández, Guillermo González-Santander de la Cruz

    Published 2025-01-01
    “…In contrast, RL agents, particularly those using discrete action spaces and trained with PPO, maintain consistent performance across both configurations, achieving considerable improvements with less than one second of execution time. These results suggest that RL offers a scalable alternative to traditional optimization methods for hydropower operations, particularly in scenarios requiring real-time decision making or involving larger systems.…”
    Get full text
    Article
  6. 2766

    A novel RFE-GRU model for diabetes classification using PIMA Indian dataset by Mahmoud Y. Shams, Zahraa Tarek, Ahmed M. Elshewey

    Published 2025-01-01
    “…Several predictive evaluation metrics, including precision, recall, F1-score, accuracy, and Area Under the Curve (AUC) achieved 90.50%, 90.70%, 90.50%, 90.70%, 0.9278, respectively, to verify and validate the execution of the RFE-GRU model. The comparative results showed that the RFE-GRU model is better than other classification models.…”
    Get full text
    Article
  7. 2767

    Intrinsic assurance: a systematic approach towards extensible cybersecurity by Xunxun CHEN, Mingzhe LI, Ning LYU, Liang HUANG

    Published 2023-02-01
    “…At present, the mainstream cyber security systems are laid out in an alienated style, where security functions are separated from business processes, and security products are isolated from each other.It is difficult to effectively cope with increasingly complicated cyber threats in this architecture.Therefore, it is imperative to move security inward for more resilient and secure network infrastructures.Business scenarios of the cybersecurity sector can be categorized into four perspectives: organization, vendor, regulatory and threat, each of which has different business objectives.Starting from the commonness and individuality of the four perspectives, the needs of this sector was systematically summarized and then the goal of building an extensible cybersecurity capability ecosystem was recognized.As the key to this goal, the intrinsic assurance methodology was proposed.Intrinsic assurance capabilities referred to the abilities of ICT components to natively support security functions such as monitoring, protection and traceability.But intrinsic assurance is not the ultimate security implementation itself, which is a key difference from the existing “endogenous security” or “designed-in security” methodologies.Intrinsic assurance emphasizes the inherent security enabling endowment of network components, whether by activating an innate gift or by encapsulating a given one, both of which logically exhibit autoimmunity from an external viewpoint.One advantage of such a component is the cohesion of business and security, which leads to transparent security posture awareness, customized security policies, and close-fitting security protection.It also simplifies the overall engineering architecture and reduces management complexity through encapsulation of multiple functions into a singleton.Additionally, the Intrinsic Assurance Support Capability Framework was put forward, which summarized and enumerated the security capabilities that conformed to the intrinsic assurance concept.This framework classified the security capabilities into five categories, namely collection, cognition, execution, syndication and resilience respectively, together with their sub-types and underlying ICT technologies.Based on this framework, the enhanced implementations of typical security business scenarios was further introduced in light of intrinsic assurance.…”
    Get full text
    Article
  8. 2768

    The Late 1980s HIV Outbreak in the Southeast of Soviet Russia: Soviet Government and Its Policy against the Epidemic (The Case of Kalmykia) by Margarita V. Baduginova

    Published 2024-05-01
    “…The study attempts a comprehensive analysis to identify some features of the policy pursued by Soviet executives and healthcare agencies in the face of the emerging HIV threat throughout the mid-to-late 1980s. …”
    Get full text
    Article
  9. 2769

    The Fast and Accurate Method of Tuning of SISO Controllers Using Seven Performance Indexes by Stopakevych A.О., Stopakevych О.A.

    Published 2025-02-01
    “…The goal of the work is the development of an algorithm and corresponding software, which allows the execution of multi-criteria optimization of a control system with PI controller and FOPDT plant. …”
    Get full text
    Article
  10. 2770

    Models of University Interaction with the Economy and Social Sphere of the Region by E. Ya. Kogan, N. Yu. Postalyuk, T. G. Kuteinitsyna

    Published 2019-08-01
    “…In this connection, it is proposed to harmonize the needs of the economy and the activities of universities in the field of meeting personnel demands and developing new production technologies, combining the efforts of the executive authorities and specialized intermediary structures. …”
    Get full text
    Article
  11. 2771

    Exploring a Software Framework for Posture Tracking and Haptic Feedback Control: A Virtual Reality-Based Approach for Upper Limb Rehabilitation on the Oculus Quest 2 by Joaquin Dillen, Antonio H. J. Moreira, João L. Vilaça

    Published 2025-01-01
    “…This approach enhances patient involvement by offering real-time feedback on exercise execution and providing clear instructions for posture correction. …”
    Get full text
    Article
  12. 2772

    The Role of Imperial Authorities in Electing Muslim Clerics across Yenisei Governorate, Mid-Nineteenth to Early Twentieth Centuries by Elena A. Shershneva

    Published 2024-05-01
    “…Our insights into archival materials attest to governorate-level executives had no clear understanding of how to arrange elections of Muslim clerics. …”
    Get full text
    Article
  13. 2773

    Coordinated One Health investigation and management of outbreaks in humans and animals caused by zoonotic avian influenza viruses by Theresa Enkirch, Andrea Gervelmeyer, Luisa Hallmaier‐Wacker, Angeliki Melidou, Katriina Willgert

    Published 2025-01-01
    “…Executive summary When investigating and controlling outbreaks caused by zoonotic avian influenza viruses (AIV), a One Health approach is key. …”
    Get full text
    Article
  14. 2774

    Relevant Problems of Implementing State Policy in the Field of Ensuring Information Security of Ukraine by Ye. V. Kobko, V. A. Kobko

    Published 2021-07-01
    “…Thirdly, the issue of ensuring certain aspects of information security is attributed to the tasks of various state authorities (Parliament, Government, executive authorities, law enforcement agencies, etc.). …”
    Get full text
    Article
  15. 2775

    He effectivness and expedicency of the International Court of Justice interim measures by Bjelica-Vlajić Iris N.

    Published 2024-01-01
    “…The aim of this work is to present the jurisdiction of the Court, the importance and the course of the procedure, in order to explain the way of specifying provisional measures and the possibilities available to the Court in terms of their execution, as well as the obligations of states and United Nations bodies in relation to the provisional measures in order to demonstrate their effectiveness. …”
    Get full text
    Article
  16. 2776

    Rearview Camera-Based Blind-Spot Detection and Lane Change Assistance System for Autonomous Vehicles by Yunhee Lee, Manbok Park

    Published 2025-01-01
    “…The proposed method demonstrated a performance of 11.64 fps with an execution time of 85.87 ms. It provides real-time warnings to both drivers and autonomous vehicles regarding potential collisions with detected objects.…”
    Get full text
    Article
  17. 2777

    Method for Increasing of Lens Gluing Technological Process Efficiency and a Reliable Evaluation of Output Controlled Parameters by R. V. Fiodоrtsev, E. A. Metelskaya, V. A. Marchik, A. V. Kuznetsov, A. E. Makarevich

    Published 2022-04-01
    “…The traditional production process of lenses gluing involves the sequential execution of a set of technological operations and takes a significant period of time. …”
    Get full text
    Article
  18. 2778

    A Decentralized Storage and Security Engine (DeSSE) Using Information Fusion Based on Stochastic Processes and Quantum Mechanics by Gerardo Iovane, Riccardo Amatore

    Published 2025-01-01
    “…The data analytics show a very effective and robust solution, with executions time comparable with cloud technologies, but with a level of security that is a post quantum one. …”
    Get full text
    Article
  19. 2779

    Disruption of Budget Rules in the Legal System of the Country: Preemptive Clarification as a Solution (A Case Study of the Budgets from 2020 to 2023) by Mohammad Barzegar Khosravi, Aminollah Paknejad, Amirhosein Bamati Toosi

    Published 2024-12-01
    “…Budget provisions must be prepared and approved in accordance with preemptive clarification rules; otherwise, the public rights and judicial security of the people are threatened due to the emergence of conflicting interpretations by executive and judicial authorities.…”
    Get full text
    Article
  20. 2780

    Exploiting the Quantum Advantage for Satellite Image Processing: Review and Assessment by Soronzonbold Otgonbaatar, Dieter Kranzlmuller

    Published 2024-01-01
    “…Lastly, we defined the optimal sharing between an HPC+QC system for executing QML models for hyperspectral satellite images. …”
    Get full text
    Article