Suggested Topics within your search.
Suggested Topics within your search.
- Leadership 4
- Management 4
- Executive ability 3
- Methodology 3
- Common law 2
- History 2
- Interpretation and construction 2
- Law 2
- African Americans 1
- Business and Management 1
- Character 1
- Communication 1
- Corporate culture 1
- Courtship 1
- Decision making 1
- Evaluation 1
- Executive coaching 1
- Farmers 1
- Financial services industry 1
- Führung 1
- Integrity 1
- Internet marketing 1
- Organizational change 1
- Policy sciences 1
- Political planning 1
- Quality control 1
- Quantitative research 1
- Research 1
- Six sigma (Quality control standard) 1
- Social justice 1
-
481
Shared services: case study on the performance of the controllership in 13 Latin American countries
Published 2010-01-01“…SS can function as an independent unit, with their own structure and resources, control of the executed activities, sharing useful and convenient services with other areas in a single company, in any segment and even globally.…”
Get full text
Article -
482
A Multi-Robot Collaborative Exploration Method Based on Deep Reinforcement Learning and Knowledge Distillation
Published 2025-01-01“…To this end, we propose to view the robot team as an agent and obtain a policy network that can be centrally executed by training with an improved SAC deep reinforcement learning algorithm. …”
Get full text
Article -
483
Light-weighted vehicle detection network based on improved YOLOv3-tiny
Published 2022-03-01“…For automotive applicable scenarios, the proposed vehicle detection network was executed in an embedded device. The KITTI data sets were trained and tested. …”
Get full text
Article -
484
Perioperative Management of a Patient Taking Suboxone® at the Time of Ambulatory Surgery
Published 2020-01-01“…We present a case in which the Mayo Clinic Arizona protocol for patients undergoing minimally invasive ambulatory surgery while taking Suboxone® is successfully executed, resulting in adequate postoperative pain control and timely discharge from the postanesthesia recovery unit.…”
Get full text
Article -
485
The Humour and Novelty of Congwayndut Puppet Group: An Overview of Performance Studies
Published 2023-11-01“…This performance is executed with flexibility which indicating a novelty. …”
Get full text
Article -
486
The Evolution of Sport Policies in Turkey Within the Framework of Development Plans
Published 2024-12-01“…It is underscored that sports policies must be devised and executed to enhance the quality of life for both athletes and all societal members.…”
Article -
487
DroidBet:event-driven automatic detection of network behaviors for Android applications
Published 2017-05-01“…The most Android applications connect to Internet to communicate with the outside world.Applications’ network-related activities were reflected and described with network traffic.By analyzing and modeling network traffic of Android applications,network behaviors of Android applications could be subsequently characterized.Therefore,DroidBet:an event-driven network behavior automatic detection system was presented,to test and evaluate Android applications automatically.Firstly,a scenario simulation event library was built to simulate the events that applications may be executed in the process,so as to trigger the network behavior of the application as much as possible.Then,the test sequence based on the state transition analysis method was automatically generated,and the network behavior was dynamically collected during the application testing process.Finally,the machine learning method was used to learn and train the collected network behavior,and the network behavior model based on BP neural network was generated to detect the behavior of the unknown Android application.The experimental results show that DroidBet can effectively trigger and extract the network behavior of the application,which has the advantages of high accuracy and low resource cost.…”
Get full text
Article -
488
Smart cities survey: Technologies, application domains and challenges for the cities of the future
Published 2019-06-01“…Smart Cities still face some challenges in their implementation, but gradually more research projects of Smart Cities are funded and executed. Moreover, cities from all around the globe are implementing Smart City features to improve services or the quality of life of their citizens. …”
Get full text
Article -
489
Using Genetic Algorithms for Navigation Planning in Dynamic Environments
Published 2012-01-01“…Navigation planning can be considered as a combination of searching and executing the most convenient flight path from an initial waypoint to a destination waypoint. …”
Get full text
Article -
490
A Performance and Usability Aware Secure Two-Factor User Authentication Scheme for Wireless Sensor Networks
Published 2013-05-01“…Additionally, performance and cost analysis are executed to determine its level of feasibility for real implementation.…”
Get full text
Article -
491
Evaluation of Key Parameters Using Deep Convolutional Neural Networks for Airborne Pollution (PM10) Prediction
Published 2020-01-01“…In this contribution, it was found that the CNNs outperforms MLP, especially when they are executed using ensemble models.…”
Get full text
Article -
492
Causes of death among the Ceasars (27 BC-AD 476)
Published 2005-06-01“…Of the second group more were murdered or executed (55,9% versus 33,3%) and more died on the battlefield (5 versus none). …”
Get full text
Article -
493
A Case Report on Juvenile Ossifying Fibroma Unveiling the Pivotal Role of its Prompt Diagnosis
Published 2024-12-01“…A surgical extirpation was executed and is being monitored to avert recurrence.…”
Get full text
Article -
494
Certificateless ciphertext retrieval scheme with multi-user and multi-keyword based on cloud-edge collaboration
Published 2022-05-01“…To solve the problems of single-user search, single-keyword search, high computational cost and low-security level of ciphertext data retrieval in the industrial Internet of things environment, a certificateless ciphertext retrieval scheme with multi-user and multi-keyword based on cloud-edge collaboration was proposed.A user access permissions table was set and once encryption algorithm was executed to realize multi-user search and update users’ access permissions.A cloud-side collaborative computing model was introduced to match keyword ciphertext and keyword trapdoor efficiently by a linear scanning method when the keyword ciphertext does not entirely contain the search keyword.Key escrow and certificate management problems were solved by utilizing certificateless encryption system.Keyword ciphertext authentication was ensured by using digital signature technology.The security analysis results show that the proposed scheme can resist internal keyword guessing attacks under the random oracle model.Simulation results show that the proposed scheme has higher computational efficiency compared with similar schemes.…”
Get full text
Article -
495
STRUCTURAL STRENGTH AND RELIABILITY ANALYSIS OF MW SCALE WIND TURBINE’S MAIN SHAFT
Published 2019-01-01“…In consideration of the randomness of the load parameters, the size parameters and the mechanical property parameters in practical situations, the static strength reliability analysis of the main shaft was executed by professional probabilistic analysis software NESSUS and ANSYS joint simulation. …”
Get full text
Article -
496
ContractGuard:defend Ethereum smart contract with embedded intrusion detection
Published 2020-04-01“…Ethereum smart contracts are programs that can be collectively executed by a network of mutually untrusted nodes.Smart contracts handle and transfer assets of values,offering strong incentives for malicious attacks.Intrusion attacks are a popular type of malicious attacks.ContractGuard,the first intrusion detection system (IDS) was proposed to defend Ethereum smart contracts against such attacks.Like IDSs for conventional programs,ContractGuard detects intrusion attempts as abnormal control flow.However,existing IDS techniques or tools are inapplicable to Ethereum smart contracts due to Ethereum’s decentralized nature and its highly restrictive execution environment.To address these issues,ContractGuard was designed by embedding it in the contracts.At runtime,ContractGuard protects the smart contract by monitoring the context-tagged acyclic path of the smart contract.As ContractGuard involves deployment overhead and deployment overhead.It was optimized under the Ethereum Gas-oriented performance model to reduce the overheads.The experimental results show that this work can effectively detect 83% of vulnerabilities,ContractGuard only adds to 36.14% of the deployment overhead and 28.27% of the runtime overhead.…”
Get full text
Article -
497
Audio steganography by quantization index modulation in the DCT domain
Published 2009-01-01“…The merits of the algorithm were as follows: based on the principle of QIM, the message was embedded by quantization method and was extracted by the map-ping between message bit and quantization interval. The extraction was executed blindly; the robustness of the hidden message was ensured well by the improved QIM, which employed the error-tolerance operation during embedding and extracting; the capacity was large as 357.6bit/s. …”
Get full text
Article -
498
Clinical Outcomes of Specific Immunotherapy in Advanced Pancreatic Cancer: A Systematic Review and Meta-Analysis
Published 2017-01-01“…The effects of specific immunotherapy were compared with those of nonspecific immunotherapy and the meta-analysis was executed with results regarding the overall survival (OS), immune responses data, and serum cancer markers data. …”
Get full text
Article -
499
Operation, Administration and Maintenance Capabilities of the AT&T 5ESS Switch
Published 1988-01-01“…Diagnostic and testing functions may be run on demand, by schedule, or executed as a result of an error threshold being exceeded. …”
Get full text
Article -
500
Exploring the Performance of Some Efficient Explicit Numerical Methods with Good Stability Properties for Huxley’s Equation
Published 2025-01-01“…Parameter sweeps are executed for the coefficient of the nonlinear term, the stiffness ratio, and the length of the examined time interval as well. …”
Get full text
Article