Suggested Topics within your search.
Suggested Topics within your search.
- Leadership 4
- Management 4
- Executive ability 3
- Methodology 3
- Common law 2
- History 2
- Interpretation and construction 2
- Law 2
- African Americans 1
- Business and Management 1
- Character 1
- Communication 1
- Corporate culture 1
- Courtship 1
- Decision making 1
- Evaluation 1
- Executive coaching 1
- Farmers 1
- Financial services industry 1
- Führung 1
- Integrity 1
- Internet marketing 1
- Organizational change 1
- Policy sciences 1
- Political planning 1
- Quality control 1
- Quantitative research 1
- Research 1
- Six sigma (Quality control standard) 1
- Social justice 1
-
441
Precision Imaging of Frequency Stepped SAR with Frequency Domain Extracted HRRP and Fast Factorized Back Projection Algorithm
Published 2017-01-01“…Imaging validations are executed and all results proved that the FDEM has a great capability of antijamming. …”
Get full text
Article -
442
Les vitraux de l’École de Pharmacie de Paris
Published 2011-12-01“…Designed in 1889 by Albert Besnard, the painter who decorated the walls of this room, they were in fact not executed. But two of them were realized later by Henri Carot for private commissioners.…”
Get full text
Article -
443
A New Conjugate Gradient Projection Method for Convex Constrained Nonlinear Equations
Published 2020-01-01“…A large number of numerical experiments for the presented method and its comparisons are executed, which indicates that the presented method is very promising. …”
Get full text
Article -
444
Electrical Characterization of Engineering Materials
Published 1996-01-01“…The “state of normalization” using physical geometrical factors can only be executed for a specific phenomenon when isolated from the total electrical behavior.…”
Get full text
Article -
445
Port address overloading based packet forwarding verification in SDN
Published 2021-07-01“…Aiming at the problem that the existing forwarding verification mechanisms in software-defined networking (SDN) incur significant communication overhead caused by embedding additional packet fields, a packet forwarding verification mechanism based on port address overloading was proposed, which key idea was the ingress switch implemented port address overloading by reconstructing port and address of packet, downstream switches executed packet probabilistic verification based on overloading port address, and the controller acquired valid and invalid packet statistics of node verification in the path and localized anomaly.Anomaly detection threshold of malicious injecting and dropping packets was presented by theoretical analysis.Finally, the proposed scheme was implemented and evaluated.Experiments demonstrate the proposed scheme achieves efficient forwarding and effective anomaly localization with less than 10% of additional forwarding delays and less than 8% of throughput degradation.…”
Get full text
Article -
446
Association between controlling nutritional status score and the prognosis of patients with acute myocardial infarction: a systematic review and meta-analysis
Published 2025-01-01“…Subgroup analyses were executed to account for various confounding factors. …”
Get full text
Article -
447
Community, vulnerability and reproduction in disaster conditions. Approaches from Latin America and the CaribbeanIntroduction to dossier
Published 2020-01-01“…Finally, themes for debate and reflection are proposed, attempting to contribute to a discussion that is currently in tension in the academia and in the implementation of public policies or actions executed by international cooperation organisms.…”
Get full text
Article -
448
Investigating The Influence of Conformity and Fanaticism on Bullying Dynamics
Published 2023-12-01“…A quantitative causality approach was used, with data analysis executed through multiple regression to obtain 349 respondents. …”
Get full text
Article -
449
The Radicalization of Neoliberalism in Brazil and the Role of the Ministry of Tourism in Coalition Presidentialism
Published 2024-12-01“…The research was based on the theoretical framework of political science regarding coalition presidentialism and carried out documentary research, with the cross-referencing of data regarding composition of coalition parties, parliamentary amendment by political party, political party in charge of the body, and budget executed. The results indicate that the Brazilian Ministry of Tourism remained in the government structure during the ultra-liberal governments, which defended the streamlining of the state machine, as it fulfilled the role of accommodating allied political parties, configuring itself as an instrument to meet parliamentary demands and assist the coalition of governments in Congress. …”
Get full text
Article -
450
Evaluate the Depth of Scouring of the Bridge Base Using Soft Calculation Techniques
Published 2022-07-01“…So the correlation coefficient in the program’s execution is with subsequent data compared to the non-secondary data in the program. …”
Get full text
Article -
451
Blood glucose response to kratom tea (Mitragyna speciosa Korth.)
Published 2025-01-01“…Methods: This evaluation was executed using an experimental design with ten subjects, which included pure standard glucose in week 1 and standard glucose mixed with 1% kratom tea in week 2, with a 1-week wash-out period. …”
Get full text
Article -
452
Detection of sybil attacks based on periodic ultra wide band distance information in WSN
Published 2016-08-01“…Concerning the problem that wireless sensor network is vulnerable to many kinds of network attacks and compromise of nodes,a complete detecting system of sybil attack based on periodic ultra-bandwidth distance information was proposed.Firstly,the distance between the adjacent nodes was ranging and the hello data packet was exchanged.Then,the distance estimation form was constructed by local estimation,and the form was contained in each node.Meanwhile,multiple distance matching check was periodically executed for each node in the network.Finally,when there was the distance matching between the legitimate node at least two different nodes,it would give an alarm and discard the sybil nodes.If there was no distance matching,the node continued normal operations.IEEE 802.15.4 peer to peer sensor networks were adopted in the simulation experiments.Experimental results show that the proposed system not only can tolerate changes in the number of complicated sybil attacks,but also can successfully deal with the occurrence of complicated,malleable sybil attack.In addition,the probability of false alarm is very small,the entire network performance and its consistency are not affected.…”
Get full text
Article -
453
TECHNIQUES FOR FORMATION OF FERROELECTRIC PHOTONIC AND PHONONIC CRYSTALS
Published 2017-04-01“…Results of the works executed in Moscow Technological University are briefly described. …”
Get full text
Article -
454
4D Applications of GIS in Construction Management
Published 2017-01-01“…Construction industries broadly involve different set of construction activities which are to be executed as per schedule and the major software used for scheduling is PRIMAVERA and Microsoft Project (MSP). …”
Get full text
Article -
455
Adaptive Streaming of Scalable Videos over P2PTV
Published 2015-01-01“…In this paper, we propose a new Scalable Video Coding (SVC) quality-adaptive peer-to-peer television (P2PTV) system executed at the peers and at the network. The quality adaptation mechanisms are developed as follows: on one hand, the Layer Level Initialization (LLI) is used for adapting the video quality with the static resources at the peers in order to avoid long startup times. …”
Get full text
Article -
456
A Color-Image Encryption Scheme Using a 2D Chaotic System and DNA Coding
Published 2019-01-01“…Thereafter, a DNA exclusive OR (XOR) operation is executed between the DNA sequences of the permuted image and the DNA sequences generated by the TD-ERCS system to produce three encrypted scrambled matrices. …”
Get full text
Article -
457
Performance analysis of REST API technologies using Spring and Express.js examples
Published 2023-12-01“…The experiment was based on 5 scenarios repeated for a different number of users in the range of 10 to 100, with a constant number of executed requests to the server. The analysis conducted showed that the application implemented in Express.js handles HTTP requests up to 249% more efficiently than its counterpart in Spring. …”
Get full text
Article -
458
An Effective Hybrid Algorithm Based on Particle Swarm Optimization with Migration Method for Solving the Multiskill Resource-Constrained Project Scheduling Problem
Published 2022-01-01“…The new algorithm proposed in this paper will resolve that by detecting local extremes and escaping that by moving the population to new space. That is executed using the Migration technique combined with the Particle Swarm Optimization (PSO) method. …”
Get full text
Article -
459
Port Contention Aware Task Scheduling for SIMD Applications
Published 2025-01-01“…When SIMD operations are executed in a simultaneous multi-threading (SMT) environment, a performance degradation event, called port contention, is expected to occur due to the limited number of ports caused by the large size of the SIMD circuit. …”
Get full text
Article -
460
Efficient and provably secure attribute-based online/offline encryption schemes
Published 2014-07-01“…The ABOOE non-trivially splited the encryption process into two phases: the offline phase first executed most of heavy computations prior to knowing the message and the attributes' set; and then the online phase only performed light computations to produce the ciphertext once the attrib-utes' set and the message get available. …”
Get full text
Article