Suggested Topics within your search.
Suggested Topics within your search.
- Leadership 4
- Management 4
- Executive ability 3
- Methodology 3
- Common law 2
- History 2
- Interpretation and construction 2
- Law 2
- African Americans 1
- Business and Management 1
- Character 1
- Communication 1
- Corporate culture 1
- Courtship 1
- Decision making 1
- Evaluation 1
- Executive coaching 1
- Farmers 1
- Financial services industry 1
- Führung 1
- Integrity 1
- Internet marketing 1
- Organizational change 1
- Policy sciences 1
- Political planning 1
- Quality control 1
- Quantitative research 1
- Research 1
- Six sigma (Quality control standard) 1
- Social justice 1
-
2781
Information support for administrative and jurisdictional activities of the state border guard service of Ukraine in relation to proceedings on administrative offences
Published 2024-06-01“…The author establishes that such information support is relevant from the moment of detection of the fact of committing an administrative offense and until the execution of a decision in a case on administrative offenses. …”
Get full text
Article -
2782
The impact of Playdough games on the development of oral motor skills in preschool children with childhood apraxia of speech
Published 2024-09-01“…Children in the experimental group, who participated in Playdough therapy, demonstrated significant improvements in both manual and oral motor skills, increased precision and focus in movement execution, and enhanced accuracy and speed of articulatory movements. …”
Get full text
Article -
2783
Measuring the performance of Dehyariha Foundation in terms of economic, social and environmental indicators in rural regions (Case study: Sarbisheh County)
Published 2024-06-01“…The purpose of forming this institution is to have a strong executive force in order to develop rural areas. rural municipality, as the executor of village programs and projects, has an important role in reducing urban and rural inequalities and improving the development of the village. …”
Get full text
Article -
2784
Protest Wave and Countermeasures of Fear: Lebanese Act of a Global Drama
Published 2020-11-01“…The author stresses that from the very beginning socio-economic demands of protestors addressed to the executive power (particularly, to grapple with the rising income inequality) were accompanied by calls for democratization on the secular principles and elimination of political confessionalism. …”
Get full text
Article -
2785
Modelling and Analysis of Autonomous Airport Surface Movement Operations based on Multi-Agent Planning
Published 2025-01-01“…It comprises the Airport Operations Agent to handle the flight schedule and runway configuration, the Routing Agent to compute conflict-free trajectories, and the Guidance Agents to instruct and monitor the Aircraft Agents while these execute the planned routes. The model incorporates the decisive processes and elements of airport surface movement operations such as pushback, engine-start, inbound and outbound holding, compliance to CTOT-slots, and wake turbulence separation for takeoffs. …”
Get full text
Article -
2786
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article -
2787
An Improved iTransformer with RevIN and SSA for Greenhouse Soil Temperature Prediction
Published 2025-01-01“…ReSSA-iTransformer is adept at executing multi-step forecasts for both extended and immediate future intervals, thereby offering comprehensive predictive capabilities. …”
Get full text
Article -
2788
Considerations for establishment of a private virtual hospital identified using an implementation science approach
Published 2025-01-01“…The following key determinants were identified: Enablers – strong executive leadership support; enthusiasm for expanding rural and remote services; need for a clear vision; strong tension for change; commitment to high-quality healthcare. …”
Get full text
Article -
2789
Effectiveness of Badminton Physical Program on Mental Capacities in Healthy Older Adults
Published 2024-12-01“…Older people suffer from reduced mental and cognitive parameters such as executive function, working memory and cognitive flexibility. …”
Get full text
Article -
2790
PUBLIC INFRASRUCTURE PROJECT FAILURES IN NIGERIA: CAUSES AND CONSEQUENTIAL EFFECTS ON ECONOMY AND WELFARE OF CITIZENRY
Published 2024-09-01“… Nigerian state particularly at national and sub-national levels, have experienced public infrastructure project failures during execution of their projects, though, there may be some differences among the level of failures, causes, and effects of such failures at federal, state and local government levels. …”
Get full text
Article -
2791
Sources of Legal Regulation of Mergers, Acquisitions, Consolidations, Joint Stock Companies in Russia and Corporations in the United States
Published 2015-02-01“…Decisions of courts and other bodies based on acts or their separate provisions, recognized by the Constitutional Court of the Russian Federation unconstitutional, are not subject to execution and shall be revised in accordance with the Federal law. …”
Get full text
Article -
2792
Impacts of data consistency levels in cloud-based NoSQL for data-intensive applications
Published 2024-11-01“…Based on the results of the experiments, we provide a comprehensive analysis regarding the system throughput and response time when executing reading and writing operations, pointing out scenarios where each DBMS could be better employed. …”
Get full text
Article -
2793
The essence of the inheritance division agreement and its place in the system of civil law contracts
Published 2022-12-01“…The legal document for inheritance is not the agreement on the division of inheritance, but the certificate of the right to inheritance, issued by a notary for the execution of this agreement. Based on the legislative construction of Art. 1278 of the Civil Code of Ukraine it has been stated that the method of dividing the inheritance is the allocation of a share in kind, as a result of which the ideal share in the inheritance turns into a real one. …”
Get full text
Article -
2794
A Clone Selection Based Real-Valued Negative Selection Algorithm
Published 2018-01-01“…Then, the algorithm considers centers of clusters as antigens, randomly generates initial immune cell population in the qualified range, and executes the clonal selection algorithm. Afterwards, the algorithm changes the limited range to continue the iteration until the non-self space coverage rate meets expectations. …”
Get full text
Article -
2795
Centralisation of financial decision-making on public hospitals in the Eastern Cape province
Published 2025-01-01“…The results further show that the chief executive offices in those hospitals do not have the power to make financial decisions, which affects hospital operations. …”
Get full text
Article -
2796
The Last Word
Published 2022-10-01“…Maluleke, the Deputy Executive Dean of Unisa’s College of Human Sciences, and Prof. …”
Get full text
Article -
2797
CAUSAL RELATIONSHIP AMONGST CORPORATE LONG-TERM FINANCING DECISIONS: EMPIRICAL EVIDENCE OF LISTED NIGERIAN MANUFACTURING FIRMS
Published 2023-11-01“… Considering the effects of the COVID-19 pandemic amongst other present global economic challenges on the growing Nigerian manufacturing firms, this study is conducted to offer useful information to corporate executives and economic policy makers on the importance of the relationship between a firm’s investment, financing and dividend payout choices (the corporate long-term financial decisions). …”
Get full text
Article -
2798
Organizational and legal principles of the State Bureau of Investigation activity in the system of law enforcement agencies of Ukraine
Published 2022-06-01“…The following signs are the state and authority nature of the activity; the right to apply measures of state coercion; execution of special powers to implement the law enforcement function of the state on a professional basis; special material, technical and personnel support of activities; statutory nature of activity; enforceable nature of law enforcement agency decisions, and more. …”
Get full text
Article -
2799
Peculiarities of criminal radicalism determination among prisoners sentenced to imprisonment
Published 2022-12-01“…It has been characterized the influence of reification factors, depersonalization of convicts' personalities, professional deformation of penitentiary staff, low quality of social and psychological work with convicts, shortcomings in the personnel policy of the State Criminal Executive Service of Ukraine, insufficient efficiency of management in the field of accommodation of convicts, formalism and low quality of diagnosis and distribution of convicts upon their admission to correctional colonies, and errors in the formation of groups of convicts.…”
Get full text
Article -
2800
Standartization of Forensic Activities and Certification of Expert Laboratories as a Factor for the Development of Forensic Examination
Published 2021-07-01“…It has been established that the execution of the DSTU ISO / IEC 17025 requirements needs significant resources and financial costs from the laboratory. …”
Get full text
Article