Showing 481 - 500 results of 3,373 for search '"executed"', query time: 0.06s Refine Results
  1. 481

    Shared services: case study on the performance of the controllership in 13 Latin American countries by Ana Cristina de Faria, Márcio Antonio Gonçalves

    Published 2010-01-01
    “…SS can function as an independent unit, with their own structure and resources, control of the executed activities, sharing useful and convenient services with other areas in a single company, in any segment and even globally.…”
    Get full text
    Article
  2. 482

    A Multi-Robot Collaborative Exploration Method Based on Deep Reinforcement Learning and Knowledge Distillation by Rui Wang, Ming Lyu, Jie Zhang

    Published 2025-01-01
    “…To this end, we propose to view the robot team as an agent and obtain a policy network that can be centrally executed by training with an improved SAC deep reinforcement learning algorithm. …”
    Get full text
    Article
  3. 483

    Light-weighted vehicle detection network based on improved YOLOv3-tiny by Pingshu Ge, Lie Guo, Danni He, Liang Huang

    Published 2022-03-01
    “…For automotive applicable scenarios, the proposed vehicle detection network was executed in an embedded device. The KITTI data sets were trained and tested. …”
    Get full text
    Article
  4. 484

    Perioperative Management of a Patient Taking Suboxone® at the Time of Ambulatory Surgery by Shawn H. Malan, Christopher H. Bailey, Narjeet Khurmi

    Published 2020-01-01
    “…We present a case in which the Mayo Clinic Arizona protocol for patients undergoing minimally invasive ambulatory surgery while taking Suboxone® is successfully executed, resulting in adequate postoperative pain control and timely discharge from the postanesthesia recovery unit.…”
    Get full text
    Article
  5. 485

    The Humour and Novelty of Congwayndut Puppet Group: An Overview of Performance Studies by Gendot Dekanipa, Aris Setiawan

    Published 2023-11-01
    “…This performance is executed with flexibility which indicating a novelty. …”
    Get full text
    Article
  6. 486

    The Evolution of Sport Policies in Turkey Within the Framework of Development Plans by Aziz DEMİRHAN, Aysel ÖZEL, Mustafa ASLANKILIÇ

    Published 2024-12-01
    “…It is underscored that sports policies must be devised and executed to enhance the quality of life for both athletes and all societal members.…”
    Article
  7. 487

    DroidBet:event-driven automatic detection of network behaviors for Android applications by Song-jie WEI, Gao-xiang WU, Na LUO, Zhao-wei SHI, Zi-yang ZHOU

    Published 2017-05-01
    “…The most Android applications connect to Internet to communicate with the outside world.Applications’ network-related activities were reflected and described with network traffic.By analyzing and modeling network traffic of Android applications,network behaviors of Android applications could be subsequently characterized.Therefore,DroidBet:an event-driven network behavior automatic detection system was presented,to test and evaluate Android applications automatically.Firstly,a scenario simulation event library was built to simulate the events that applications may be executed in the process,so as to trigger the network behavior of the application as much as possible.Then,the test sequence based on the state transition analysis method was automatically generated,and the network behavior was dynamically collected during the application testing process.Finally,the machine learning method was used to learn and train the collected network behavior,and the network behavior model based on BP neural network was generated to detect the behavior of the unknown Android application.The experimental results show that DroidBet can effectively trigger and extract the network behavior of the application,which has the advantages of high accuracy and low resource cost.…”
    Get full text
    Article
  8. 488

    Smart cities survey: Technologies, application domains and challenges for the cities of the future by Ruben Sánchez-Corcuera, Adrián Nuñez-Marcos, Jesus Sesma-Solance, Aritz Bilbao-Jayo, Rubén Mulero, Unai Zulaika, Gorka Azkune, Aitor Almeida

    Published 2019-06-01
    “…Smart Cities still face some challenges in their implementation, but gradually more research projects of Smart Cities are funded and executed. Moreover, cities from all around the globe are implementing Smart City features to improve services or the quality of life of their citizens. …”
    Get full text
    Article
  9. 489

    Using Genetic Algorithms for Navigation Planning in Dynamic Environments by Ferhat Uçan, D. Turgay Altılar

    Published 2012-01-01
    “…Navigation planning can be considered as a combination of searching and executing the most convenient flight path from an initial waypoint to a destination waypoint. …”
    Get full text
    Article
  10. 490

    A Performance and Usability Aware Secure Two-Factor User Authentication Scheme for Wireless Sensor Networks by Sang Guun Yoo, Hyukjun Lee, Juho Kim

    Published 2013-05-01
    “…Additionally, performance and cost analysis are executed to determine its level of feasibility for real implementation.…”
    Get full text
    Article
  11. 491

    Evaluation of Key Parameters Using Deep Convolutional Neural Networks for Airborne Pollution (PM10) Prediction by Marco Antonio Aceves-Fernández, Ricardo Domínguez-Guevara, Jesus Carlos Pedraza-Ortega, José Emilio Vargas-Soto

    Published 2020-01-01
    “…In this contribution, it was found that the CNNs outperforms MLP, especially when they are executed using ensemble models.…”
    Get full text
    Article
  12. 492

    Causes of death among the Ceasars (27 BC-AD 476) by Francois P. Retief, Louise Cilliers

    Published 2005-06-01
    “…Of the second group more were murdered or executed (55,9% versus 33,3%) and more died on the battlefield (5 versus none). …”
    Get full text
    Article
  13. 493

    A Case Report on Juvenile Ossifying Fibroma Unveiling the Pivotal Role of its Prompt Diagnosis by Amakcham Nita, Kavleen K. Sethi, Haider Iqbal, Anuj Mishra, Tanmay Srivastava, Sparsh Srivastava

    Published 2024-12-01
    “…A surgical extirpation was executed and is being monitored to avert recurrence.…”
    Get full text
    Article
  14. 494

    Certificateless ciphertext retrieval scheme with multi-user and multi-keyword based on cloud-edge collaboration by Xiaodong YANG, Tian TIAN, Jiaqi WANG, Meijuan LI, Caifen WANG

    Published 2022-05-01
    “…To solve the problems of single-user search, single-keyword search, high computational cost and low-security level of ciphertext data retrieval in the industrial Internet of things environment, a certificateless ciphertext retrieval scheme with multi-user and multi-keyword based on cloud-edge collaboration was proposed.A user access permissions table was set and once encryption algorithm was executed to realize multi-user search and update users’ access permissions.A cloud-side collaborative computing model was introduced to match keyword ciphertext and keyword trapdoor efficiently by a linear scanning method when the keyword ciphertext does not entirely contain the search keyword.Key escrow and certificate management problems were solved by utilizing certificateless encryption system.Keyword ciphertext authentication was ensured by using digital signature technology.The security analysis results show that the proposed scheme can resist internal keyword guessing attacks under the random oracle model.Simulation results show that the proposed scheme has higher computational efficiency compared with similar schemes.…”
    Get full text
    Article
  15. 495

    STRUCTURAL STRENGTH AND RELIABILITY ANALYSIS OF MW SCALE WIND TURBINE’S MAIN SHAFT by ZHOU XinJian, LI GuangXing, LI ZhiQiang

    Published 2019-01-01
    “…In consideration of the randomness of the load parameters, the size parameters and the mechanical property parameters in practical situations, the static strength reliability analysis of the main shaft was executed by professional probabilistic analysis software NESSUS and ANSYS joint simulation. …”
    Get full text
    Article
  16. 496

    ContractGuard:defend Ethereum smart contract with embedded intrusion detection by Gansen ZHAO, Zhijian XIE, Xinming WANG, Jiahao HE, Chengzhi ZHANG, Chengchuang LIN, ZHOU Ziheng, Bingchuan CHEN, RONG Chunming

    Published 2020-04-01
    “…Ethereum smart contracts are programs that can be collectively executed by a network of mutually untrusted nodes.Smart contracts handle and transfer assets of values,offering strong incentives for malicious attacks.Intrusion attacks are a popular type of malicious attacks.ContractGuard,the first intrusion detection system (IDS) was proposed to defend Ethereum smart contracts against such attacks.Like IDSs for conventional programs,ContractGuard detects intrusion attempts as abnormal control flow.However,existing IDS techniques or tools are inapplicable to Ethereum smart contracts due to Ethereum’s decentralized nature and its highly restrictive execution environment.To address these issues,ContractGuard was designed by embedding it in the contracts.At runtime,ContractGuard protects the smart contract by monitoring the context-tagged acyclic path of the smart contract.As ContractGuard involves deployment overhead and deployment overhead.It was optimized under the Ethereum Gas-oriented performance model to reduce the overheads.The experimental results show that this work can effectively detect 83% of vulnerabilities,ContractGuard only adds to 36.14% of the deployment overhead and 28.27% of the runtime overhead.…”
    Get full text
    Article
  17. 497

    Audio steganography by quantization index modulation in the DCT domain by CHEN Ming1, ZHANG Ru1, LIU Fan-fan1, NIU Xin-xin1, YANG Yi-xian1

    Published 2009-01-01
    “…The merits of the algorithm were as follows: based on the principle of QIM, the message was embedded by quantization method and was extracted by the map-ping between message bit and quantization interval. The extraction was executed blindly; the robustness of the hidden message was ensured well by the improved QIM, which employed the error-tolerance operation during embedding and extracting; the capacity was large as 357.6bit/s. …”
    Get full text
    Article
  18. 498

    Clinical Outcomes of Specific Immunotherapy in Advanced Pancreatic Cancer: A Systematic Review and Meta-Analysis by Jiang Chen, Guo Xiao-Zhong, Xing-Shun Qi

    Published 2017-01-01
    “…The effects of specific immunotherapy were compared with those of nonspecific immunotherapy and the meta-analysis was executed with results regarding the overall survival (OS), immune responses data, and serum cancer markers data. …”
    Get full text
    Article
  19. 499

    Operation, Administration and Maintenance Capabilities of the AT&T 5ESS Switch by Charles D. Gavrilovich, Robert A. Multra, and Wayne L. Wang

    Published 1988-01-01
    “…Diagnostic and testing functions may be run on demand, by schedule, or executed as a result of an error threshold being exceeded. …”
    Get full text
    Article
  20. 500

    Exploring the Performance of Some Efficient Explicit Numerical Methods with Good Stability Properties for Huxley’s Equation by Husniddin Khayrullaev, Issa Omle, Endre Kovács

    Published 2025-01-01
    “…Parameter sweeps are executed for the coefficient of the nonlinear term, the stiffness ratio, and the length of the examined time interval as well. …”
    Get full text
    Article