Suggested Topics within your search.
Suggested Topics within your search.
- Leadership 4
- Management 4
- Executive ability 3
- Methodology 3
- Common law 2
- History 2
- Interpretation and construction 2
- Law 2
- African Americans 1
- Business and Management 1
- Character 1
- Communication 1
- Corporate culture 1
- Courtship 1
- Decision making 1
- Evaluation 1
- Executive coaching 1
- Farmers 1
- Financial services industry 1
- Führung 1
- Integrity 1
- Internet marketing 1
- Organizational change 1
- Policy sciences 1
- Political planning 1
- Quality control 1
- Quantitative research 1
- Research 1
- Six sigma (Quality control standard) 1
- Social justice 1
-
461
Study of the Effect of Grafted Antioxidant on the Acrylonitrile-Butadiene Copolymer Properties
Published 2010-01-01“…The grafting of ADPEA onto natural rubber was executed with UV radiation. Benzoyl peroxide was used to initiate the free-radical grafting copolymerization. …”
Get full text
Article -
462
Prediction of earthquake by machine learning models and neural network
Published 2025-01-01“…Earthquake prediction, in this article, is executed with a neural network and machine learning models. …”
Get full text
Article -
463
Investigation of the Optimum Clocking Position in a Two-Stage Axial Turbine
Published 2005-01-01“…A frozen rotor approach in a steady calculation and a sliding mesh approach in an unsteady simulation are performed in a stator clocking investigation. The clocking is executed on the second stator in a two-stage axial turbine over several circumferential positions. …”
Get full text
Article -
464
Preventing fraud in crypto payments
Published 2025-03-01“…When the transaction is instead executed in bitcoin, an unbacked crypto-asset, the transaction is not covered by any EU regulation despite it being used as a method of payment for goods and other services. …”
Get full text
Article -
465
Transmission Error Analysis for Cycloidal-pin Gear of RV Reducer Considering Tooth Profile Error
Published 2020-05-01“…The digital tooth contact analysis of cycloidal gear is executed based on the gear meshing principle, and the transmission error curve of cycloidal-pin gear considering the tooth profile errors is obtained. …”
Get full text
Article -
466
Belize’s 2016–17 Sovereign Debt Restructuring – Third Time Lucky?
Published 2020-12-01“…As was the case in the earlier two restructurings, in 2006–07 and in 2012–13, the 2016–17 debt restructuring was executed through collaborative engagement with creditors outside an IMF-supported program. …”
Get full text
Article -
467
Design of task dividing and offloading algorithm in mobile edge computing
Published 2021-06-01“…Mobile edge computing (MEC) emerges as a new paradigm that pushes the computing infrastructure from the remote cloud data center to the edge equipments.It provides a new solution to meet the delay sensitive and computing intensive requirements of Internet of things (IoT).In this work, the problem of tasks offloading and scheduling in the multi-user and multi-server MEC system was considered.Specifically, each user had a task-dependent application and the tasks could be either executed locally or remotely according to the dependence.Thus, the network performance was improved by unloading and scheduling the sub tasks.Quality of experience (QoE) and fairness between users were used to characterize the network performance, and the optimization problem was modeled as a joint dependent task offloading and scheduling (J-DTOS) problem.The J-DTOS problem was a non-linear mixed integer programming, which was NP-hard in general.The original problem was reformulated by introducing intermediate variables and proposing a near-optimal solution.Simulation results show that the proposed offloading and scheduling design can significantly improve the performance of the system.…”
Get full text
Article -
468
PID Control Perspective: Techniques and Uses
Published 2025-01-01“…A study of the evolution of conventional PID and its integration with intelligent control has been executed, taking into account a number of ap-plication fields. …”
Get full text
Article -
469
Principle Analysis and Dynamic Simulation of Self-stabilizing Speed Transmission for Wind Turbine
Published 2017-01-01“…The kinematics analysis for the self-stabilizing speed wind turbine is carried out,and the mass-spring-damper model of the transmission is established for three shafts system with double inputs and single output. The simulation is executed in SIMULINK software with turbulent wind input.The influences on output shaft speed and torque under different inertia,stiffness,damping are discussed. …”
Get full text
Article -
470
Design and Implementation of Plastic Deformation Behavior by Cartesian Impedance Control Based on Maxwell Model
Published 2018-01-01“…Implementation in a robot manipulator is executed to validate and analyze the proposed control law. …”
Get full text
Article -
471
Peníze, nebo prestiž? Soudní spor o autorství Vančurových Obrazů z dějin národa českého
Published 2010-07-01“…Vladislav Vančura was writing this book at the end of the 1930’s, while some papers (historical facts) were submitted by young historians Václav Husa, Jaroslav Charvát and Jan Pachta. Vančura was executed during World War II but his collaborators became important representatives of the official Marxist-Leninist historiography after 1948. …”
Get full text
Article -
472
Patient and Family Experience: Targets for Improvements in Care and Communication in the ICU
Published 2025-01-01“…This process improvement project sought to further explore the experience of patients and family members within an intensive care unit (ICU) hospital setting to develop specific interventions that can be executed to provide better patient-centered outcome. …”
Get full text
Article -
473
A Step-By-Step Guide of Bibliometric Study for Healthcare and Allied Research
Published 2024-12-01“…It provides scholars with the ability to obtain a comprehensive overview, pinpoint areas lacking in knowledge, generate novel research philosophies, and apply planned outcomes within the field. Well-executed bibliometric studies can provide scholars with valuable insights, including a broad outline of the research field of interest, identification of research gaps, generation of new research philosophies, and positioning of their contributions. …”
Get full text
Article -
474
RANSAC based robust localization algorithm for visual sensor network
Published 2013-08-01“…Due to node failures or environmental changes,observed data on the target will be error in visual sensor network,so the least squares based multi-vision localization algorithm won’t be accurate.A centralized RANSAC based robust localization method was proposed,which can remove the error data and improve the positioning accuracy.Furthermore,to address this issue,energy imbalance of network nodes in centralized RANSAC where all computing load is executed in one single node,a robust localization algorithm based on distributed RANSAC was also proposed,which can distribute a large number of iterative calculations into each node averagely to ensure the network balance on calculation and energy without affecting the robustness.Finally,through comparing experiments on no-RANSAC,cen-RANSAC and dis-RANSAC,it’s verified that this algorithm can obtain robust and good positioning results in a predetermined probability,and the time complexity was analyzed via experiment.…”
Get full text
Article -
475
Research on switch migration method based on minimum cost path
Published 2020-02-01“…In order to protect the controller,especially the controller in backbone network,from security threats and attacks,improve the security of the software-defined network (SDN) control plane,a switch migration algorithm based on minimum cost path was proposed.A load prediction module was added to the migration model,which executed a controller load prediction algorithm to obtain a load prediction matrix,and then a migration-target controller set was determined according to the load prediction matrix.The improved Dijkstra algorithm was used to determine the minimum cost path.According to the load state of the controller and the traffic priority of the switch to be migrated,the optimal migration switch set was determined.The problem of isolated nodes was solved that may occur during the migration process.The experimental results show that the migration timing of the algorithm is more reasonable,the selection of the migration controller and the target controller is more reasonable,the load balancing of the control plane is realized,the number of migrations and cost are reduced,and the performance of the controller is improved.…”
Get full text
Article -
476
A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing
Published 2012-01-01“…In most cases, they are treated as cryptographic primitives and are usually executed without consideration of possible attacks that might frequently occur in an open network, such as an impersonation, replaying, or man-in-the-middle attack. …”
Get full text
Article -
477
Floating Knee Injury Associated with Patellar Tendon Rupture: A Case Report and Review of Literature
Published 2012-01-01“…DCS fixation by bridge plating technique for the distal femur and lateral buttress plating by MIPO technique for proximal tibia were planned and executed under spinal anesthesia with image intensifier. …”
Get full text
Article -
478
Reliability Assessment Methodology for Massive Manufacturing Using Multi-Function Equipment
Published 2018-01-01“…The methodology is applied in a workshop of a textile industry, where there is prior evidence that the failure behavior varies according to the type of function executed by multifunction machines.…”
Get full text
Article -
479
The Fuel System Modification To Strengthen Achievement And The Prospect Of Utilizing Gasoline Ethanol Blended With Water Injection
Published 2024-06-01“…The experiment was conducted using fuel with a ration octane number (RON) of 92, gasoline-ethanol was executed up to E25 then applied water injection (Wi). …”
Get full text
Article -
480
Research on RTF array overflow vulnerability detection
Published 2017-05-01“…When the virtual function was executed,it could cause array overflow vulnerability due to error operation of the virtual function table of C++ object.By attacking the virtual function,it could cause the system crash,or even the attacker to control the execution of program directly was allowed,which threatened user’s security seriously.In order to find and fix this potential security vulnerability as soon as possible,the technology for detecting such security vulnerability was studied.Based on the analysis of the virtual function call during the MS Word parsing RTF files,the array overflow vulnerability generated by MS Word parsing abnormal RTF files,and a new RTF array overflow vulnerability detection method based on the file structure analytical Fuzzing was proposed.Besides,an RTF array overflow vulnerability detection tool (RAVD,RTF array vulnerability detector) was designed.The test results show RAVD can detect RTF array overflow vulnerabilities correctly.Moreover,the Fuzzing results show RAVD has higher efficiency in comparison with traditional file Fuzzing tools.…”
Get full text
Article