Suggested Topics within your search.
Suggested Topics within your search.
- Leadership 4
- Management 4
- Executive ability 3
- Methodology 3
- Common law 2
- History 2
- Interpretation and construction 2
- Law 2
- African Americans 1
- Business and Management 1
- Character 1
- Communication 1
- Corporate culture 1
- Courtship 1
- Decision making 1
- Evaluation 1
- Executive coaching 1
- Farmers 1
- Financial services industry 1
- Führung 1
- Integrity 1
- Internet marketing 1
- Organizational change 1
- Policy sciences 1
- Political planning 1
- Quality control 1
- Quantitative research 1
- Research 1
- Six sigma (Quality control standard) 1
- Social justice 1
-
381
IMPROVEMENT OF ALGORITHM FOR FORMATION OF ORTHOGONAL COMPONENTS OF INPUT VALUES IN MICROPROCESSOR RELAY PROTECTION OF POWER LINES IN DISTRIBUTION NETWORKS
Published 2014-02-01“…The paper considers a new algorithm for formation of orthogonal components of input values in microprocessor relay protection of power lines in distribution networks. Results of the executed investigations have been given in the paper and they reveal high efficiency of the proposed algorithm and a principle possibility of its use in microprocessor relay protection of distribution networks.…”
Get full text
Article -
382
Automatic Analysis of Operational Failures of Electric Power Station Equipment – Efficient Method for Reduction in Expenditure for Power Generation
Published 2008-08-01“…The investigations, executed in the 70-ies-80-ies of the last century, have demonstrated that an operator is badly managing his/her duties and makes mistakes while controlling the operation of power-generating equipment. …”
Get full text
Article -
383
Application to Biomedical Data: Using the Topp Leone Inverse Lindley Model
Published 2022-01-01“…The simulation study is executed to investigate the effectiveness of the estimates. …”
Get full text
Article -
384
Turbo equalization and its improvement in BICM-ID based on hard-decision
Published 2009-01-01“…Conventional receivers executed equalization and channel decoding independently. …”
Get full text
Article -
385
Multipurpose zero watermarking algorithm for medical image based on SVD and SAE
Published 2017-11-01“…A multipurpose zero watermarking algorithm was proposed according to the copyright protection and tamper location of medical image.The two information matrices were executed the XOR operation with the original robust watermarking image and the original semi-fragile watermarking image separately to generate zero robust watermarking image and zero semi-fragile watermarking image.The experimental results show that effects of extracted zero watermarking image are terrific,and the algorithm can resist the common attacks,particularly its resistance is effect ive for strong attacks.…”
Get full text
Article -
386
The roles portrayed by children in South African magazine advertising
Published 2022-10-01“… This paper summarizes the findings of four studies executed from 1983 to 2003 to determine how marketers in South Africa portray children in magazine advertisements. …”
Get full text
Article -
387
La Frichelette de Thônes. Guerre, mémoire et identité territoriale dans les Aravis de 1793 à l’âge d’internet
Published 2016-05-01“…It soon became the ‘Savoy Vendée’, staying that way for many years, its memory perpetuated alongside that of its heroine, La Frichelette, executed by firing squad. Her fate, since her death, reveals a commemorative dynamic, with popular and scholarly roots, which has sustained deep-rooted mistrust of novelty and outside changes.fr…”
Get full text
Article -
388
Colonial interference in the translations of the Bible in Southern Sotho
Published 2009-12-01“… Bible translation in South Africa was initially conceptualised and executed by either missionary societies or Bible societies. …”
Get full text
Article -
389
La Frichelette of Thônes. War, Memory and Territorial Identity in Aravis from 1793 to the Age of Internet
Published 2016-05-01“…It soon became the ‘Savoy Vendée’, staying that way for many years, its memory perpetuated alongside that of its heroine, La Frichelette, executed by firing squad. Her fate, since her death, reveals a commemorative dynamic, with popular and scholarly roots, which has sustained deep-rooted mistrust of novelty and outside changes.…”
Get full text
Article -
390
Design and development of advanced spatio temporal database models
Published 2024-09-01“…The spatial queries executed using the proposed approach can reduce the computational time needed to find an optimal collision free path for network analysis. …”
Get full text
Article -
391
A machine learning based variable selection algorithm for binary classification of perinatal mortality.
Published 2025-01-01“…The CARS-Logistic model is executed to determine the significant factors of perinatal mortality in Pakistan. …”
Get full text
Article -
392
Correlation Analysis Approach About Numerous Security Information and Event in Telecommunication Network
Published 2013-10-01“…Correlation analysis engine which correlate isolated security event as a chain to find out the real threat from a large number of false alarms or low level ones,is a key module of security operations centre(SOC).The traditional correlation analysis mechanism is divided into two types:state machine and inference-engine.For poor precision and low efficiency,they don't adapt telecom network application.A new correlation analysis mechanism based on consecutive state by inference-engine was presented,which executed efficiently and accurately,to solve the problems of correlation analysis engine applied in telecom network.…”
Get full text
Article -
393
Research on technology of data encryption and search based on access broker
Published 2018-07-01“…Broker executed searchable encryption (BESE) scheme was proposed for the confidentiality issues of cloud application data.The scheme did not need to modify the cloud application or user habits,thus had strong applicability.Firstly,systematic and quantitative analysis on BESE scheme was conducted in terms of query expressiveness,performance and security.Then,the main challenges of BESE scheme including securely sharing index and encrypted data between brokers were pointed out,and corresponding schemes were proposed to address the above challenges.The experimental results show that the BESE scheme can effectively protect the user data in the cloud,achieve a variety of search functions,and has high efficiency and security.…”
Get full text
Article -
394
Prediction of fatigue crack initiation under biaxial loading
Published 2017-06-01“…In this context, an extension of this study was executed considering the strain based critical plane approaches proposed by Fatemi-Socie (FS) and Smith- Watson-Topper (SWT). …”
Get full text
Article -
395
Flat stone ceilings in the medieval Armenian architecture
Published 2024-12-01“…Nevertheless, such ceilings had an exceptional development in Armenian architecture from the 11th to the 13th centuries. They were executed in different masonry techniques and with a decor resembling starry heavens. …”
Get full text
Article -
396
Improved tree structure anti-collision algorithm of RFID
Published 2015-07-01“…The whole big query tree is divided into several branches,and the work of tag recognition is executed in each branch,thus reducing the probability of tag collision.The proposed algorithm can be divided into prefix determination and branch query two phases.In the prefix determination phase,the prefix of every tag is identified,and each prefix denotes a branch.Traverse each branch by turns to recognize tags; in the branch query phase,backward search strategy and dynamic search method are used.Theoretical analysis and simulation experiment show that when the improved algorithm can improved the overall performance of RFID system from the aspects of the number of queries,time delay,and throughput.…”
Get full text
Article -
397
Investigation of Apparatus Reliability Applied for Protection of Power Networks in Emergency Operational Cases at Dwelling Sector of the Republic of Belarus
Published 2007-10-01“…The paper contains results of experimental comparative investigations concerning operation of fuses for 25 A current and automatic thread fuses for nominal 25 A current.The investigations have shown that fuses do not ensure protection of power networks in a dwelling in 40 % of executed tests. Replacement of these fuses for automatic thread ones permits to reduce a number of fires in a dwelling sector and, first of all, in the rural area.…”
Get full text
Article -
398
CORPORATE SOCIAL RESPONSIBILITY AS AN INTEGRAL PART OF EFFECTIVE ACTIVITY OF ORGANIZATION
Published 2020-02-01“…When properly understood and executed, it is a win-win strategy, that benefits both the company and society.…”
Get full text
Article -
399
Guillotiner les simples d’esprit et les « demi-fous » ? Atténuation de la responsabilité pénale et application de la peine de mort (France, IVe République)
Published 2014-09-01“…It was then assumed that the mentally unbalanced and retarded criminals shouldn't be executed. However, a study of the pardon requests indicates that a « diminished responsibility » could not always prevent an execution. …”
Get full text
Article -
400
PROBABILISTIC ANALYSIS FOR SCHMIDT FACTOR OF POLYCRYSTALS
Published 2016-01-01“…On the meso-scale,for textured and untextured polycrystalline,relationships between Schmidt factor and stochastic Euler angles of grains orientation are discussed respectively,the fact that face-centered and body-centered crystals with the same orientation presenting the same Schmidt factor is proved,the meso-scale probabilistic model of Schmidt factor is built,and the statistical simulation based on meso-scale is executed. The probabilistic distribution of the Schmidt factor of grains group in fatigue crack initiation zone is obtained,which can provide theoretical basis and effective engineering method for fatigue reliability analysis of the mechanical structure,especially micromechanical and micro electromechanical structures.…”
Get full text
Article