Suggested Topics within your search.
Suggested Topics within your search.
- Leadership 4
- Management 4
- Executive ability 3
- Methodology 3
- Common law 2
- History 2
- Interpretation and construction 2
- Law 2
- African Americans 1
- Business and Management 1
- Character 1
- Communication 1
- Corporate culture 1
- Courtship 1
- Decision making 1
- Evaluation 1
- Executive coaching 1
- Farmers 1
- Financial services industry 1
- Führung 1
- Integrity 1
- Internet marketing 1
- Organizational change 1
- Policy sciences 1
- Political planning 1
- Quality control 1
- Quantitative research 1
- Research 1
- Six sigma (Quality control standard) 1
- Social justice 1
-
401
Corrosion inhibition effects of eco-friendly clarithromycin molecules on aluminium in hydrochloric acid solution via experimental, theoretical and optimization approach
Published 2025-01-01“…Characterization of the inhibitor was executed with gas chromatography mass spectrometry (GC–MS) and Fourier transform infrared (FTIR) spectroscopy, while optimization of the process was executed with response surface methodology (RSM). …”
Get full text
Article -
402
Influence of Team Ability on Physical and Tactical Performance According to Playing Position in Spanish Soccer LaLiga.
Published 2024-12-01“…The following variables were considered: total distance covered (TD) covered by players, distance covered at high intensity (HIR; >24.0 km · h−1), number of efforts made at high-intensity running (N of HIR), Average Speed (AvSpeed, km · h−1), Offensive Volume (Off Vol): sum of passes, shots, and dribbles executed by the player; Defensive Volume (Def Vol): sum of recoveries, clearances, opponent attack interruptions, and blocked shots executed by the player; and (iii) Game Volume (Game Vol): sum of offensive actions and defensive actions. …”
Get full text
Article -
403
Association between elevated cystatin C levels and obstructive sleep apnea hypopnea syndrome: a systematic review and updated meta-analysis
Published 2025-02-01“…Statistical analysis was executed utilizing STATA 11.0, GraphPad Prism 8, and R 4.1.3. …”
Get full text
Article -
404
Deletable blockchain based on threshold ring signature
Published 2019-04-01“…With the development of blockchain,huge storage space is needed to store all of blockchain data.In addition,data can’t be changed once it is packaged into the chain,and it may be possible for overdue data to take up large storage space.Firstly,a threshold ring signature scheme was improved,and then a deletable blockchain scheme based on the mechanism of proof of space (PoSpace) consensus was constructed.Most of nodes could sign and delete a block together when block data was overdue,and the overall structure of the blockchain was unchanged.Several experiments in a simulated environment were executed,and the results show that the proposed blockchain scheme has high efficiency in generating and delegating a block.Meanwhile,the deletion of a block doesn’t influence the storage and use of other blocks.…”
Get full text
Article -
405
Research on data encryption system and technology for cloud storage
Published 2020-08-01“…To order to address the problem of cloud storage data security,the generic proxy-based data protection system was proposed,which could automatically and transparently secure sensitive data in browser-based cloud storage applications.A novel dynamic program analysis technique was adopted based on JavaScript API function hooking for automatically extending to various cloud applications.And a novel proxy executed searchable encryption solution was presented so that it could achieve data encryption while maintaining the original functions of cloud applications.Experimental results show that the system can support a variety of typical cloud services,effectively protect sensitive data,and bring a relatively low overhead.…”
Get full text
Article -
406
Prediction of fatigue crack initiation under biaxial loading
Published 2017-07-01“…In this context, an extension of this study was executed considering the strain based critical plane approaches proposed by Fatemi-Socie (FS) and SmithWatson-Topper (SWT). …”
Get full text
Article -
407
Solution of Motion Position and Machining Simulation for Spiral Bevel Gear based on Four Axis Generative Movement
Published 2020-05-01“…Finally, the machining process of four axis milling machine is simulated based on VERICUT, and the cutting experiment is executed. The results verify that the machine model and motion position solution is correct and effective.…”
Get full text
Article -
408
The art of asking in psychotherapy
Published 2020-01-01“…Results and conclusions: the paper explores the art’s theory of asking and the technique of speaking the patient's language as a maneuver that supports the way in which the question is executed. It also tries a typology of questions that were collected in the clinical practice of different therapists. …”
Get full text
Article -
409
The Dynamical Analysis of Computer Viruses Model with Age Structure and Delay
Published 2021-01-01“…The numerical examples are executed to validate the theoretical results.…”
Get full text
Article -
410
Forming digital kinships with earthen materials. The T-Stool
Published 2021-12-01“…The methodology chronicles the fabrication of the T-Stool, as part of interdisciplinary collaboration, to develop a novel press-molding technique for stoneware that uses a two-part, silicone rubber and epoxy mold. The T-Stool was executed in stoneware through the use of a digital twin as a data source for material speculation, to track transformations in the clay, and to implement the use of custom tools.…”
Get full text
Article -
411
Lightweight trust model for the detection of concealed malicious nodes in sparse wireless ad hoc networks
Published 2016-07-01“…These data are periodically sent to a base station, where all trust functions are executed. A simulation model is built to evaluate system performance, and the results show that the proposed model is efficient in detecting all types of considered malicious nodes.…”
Get full text
Article -
412
Analysis of data processing efficiency with use of Apache Hive and Apache Pig in Hadoop environment
Published 2024-03-01“…Research was provided with use of scripts and queries destined for Apache Hive and Apache Pig, and then executed 10 times on environment brought by created virtual machine. …”
Get full text
Article -
413
Damages to stent stabilized left ventricular pacemaker electrodes during simulated lead extraction
Published 2013-04-01“…After the pacemaker leads were extracted, various microscopic examinations were executed. The findings may to make such intervention methods more successful, helping to better stabilize the electrode and to keep injuries during interventions to a minimum.…”
Get full text
Article -
414
EKSISTENSI DINAS SOSIAL DAN TENAGA KERJA KOTA BINJAI DALAM PENANGGULANGAN PENYANDANG MASALAH KESEJAHTERAAN SOSIAL (PMKS) DI KOTA BINJAI
Published 2016-03-01“…Discussion, the results obtained in this study that the program is executed quite well, and the lack of significant issues or problems, although with limited budget priorities being able to anticipate through the program, so the limitations but showed positive performance. …”
Get full text
Article -
415
Optimizing demand charge of data center base on PE method
Published 2016-03-01“…Demand charge and energy charge are the two main components of data center electricity cost,previous re-searches have not take demand charge into consideration.PEDC algorithm was proposed by modeling time slot,work-load,service quality constraint and response time constraint.With PEDC algorithm peak power was decreased by partial execution on the condition of service quality constrai and response time constraint.PE method was executed in the heavy loaded time slots to reduce peak power so as to ize demand charge.Energy charge and total charge were also optimized.By comparing with four algorithms and with accurately predicted,PEDC algorithm can reduce elec-tricity cost by 5.9%~12.7% and improve cluster utilization 1.32 times.…”
Get full text
Article -
416
Research on cloud-based traffic adaptive command and control method for mobile botnet
Published 2014-11-01“…Botnet is a serious attack evolved from traditional malwares.With the rapid development of computing capability and mobile Internet access technology,building a realistic mobile botnet has become a potential threat.An adaptive traffic control mechanism for cloud-based mobile botnet was proposed.It adopts different traffic consumption strategies according to different 3G or Wi-Fi network environments.Then scheduling algorithms to execute botnet commands was applied.The experimental results show the traffic adaptive algorithm can improve the stealthy and efficiency of mobile botnet while ensure that the botnet commands can be executed effectively.…”
Get full text
Article -
417
Creation of one-parametrical model russia for testa "linear algebra, analytical geometry"
Published 2016-12-01“…At calculation of probability of the correct answer on a task logistic distribution is used. As a result of the executed actions characteristic curves of level of knowledge of examinees, level of difficulty of tasks, the combined histograms of these levels, and also graphics of comparison of experimental data with model Russia are constructed. …”
Get full text
Article -
418
More Than Hospitality: A Reflection on The Parish Ministry of Welcoming and Hospitality
Published 2023-06-01“…Despite its importance, hospitality is often poorly executed, particularly towards newcomers to the church. …”
Get full text
Article -
419
L’Affaire Redureau, le crime de Bas-Briacé (1913) : Un meurtrier de 15 ans au cœur des complaintes
Published 2021-03-01“…The Redureau Affair depicts a 15-year-old criminal who executed his winegrowing boss in Brittany and 6 other members of the family on the night of 30 September 1913. …”
Get full text
Article -
420
Microwave Magnetoelectric Devices
Published 2012-01-01“…Tunability of the ME devices characteristics can be executed by application of an electric field. This electric tuning is relatively fast and is not power-consuming. …”
Get full text
Article