Suggested Topics within your search.
Suggested Topics within your search.
- Leadership 4
- Management 4
- Executive ability 3
- Methodology 3
- Common law 2
- History 2
- Interpretation and construction 2
- Law 2
- African Americans 1
- Business and Management 1
- Character 1
- Communication 1
- Corporate culture 1
- Courtship 1
- Decision making 1
- Evaluation 1
- Executive coaching 1
- Farmers 1
- Financial services industry 1
- Führung 1
- Integrity 1
- Internet marketing 1
- Organizational change 1
- Policy sciences 1
- Political planning 1
- Quality control 1
- Quantitative research 1
- Research 1
- Six sigma (Quality control standard) 1
- Social justice 1
-
541
Generalised versus Regional Odontodysplasia: Diagnosis, Transitional Management, and Long-Term Followup—A Report of 2 Cases
Published 2013-01-01“…A 2-step, conservative treatment plan was executed with a 10-year followup. Step 1 was root canal treatment of nonvital teeth. …”
Get full text
Article -
542
DC algorithm for estimation of sparse Gaussian graphical models.
Published 2024-01-01“…To solve this problem efficiently, we design a DC algorithm in which the graphical lasso algorithm is repeatedly executed to solve convex optimization subproblems. …”
Get full text
Article -
543
Ambiguous Territory
Published 2018-11-01“…What can one do when the things and processes used to sustain oneself – physically, economically, emotionally – are executed at a scale and intensity whereby they become poisonous? …”
Get full text
Article -
544
Afghan EFL lecturers’ beliefs about autonomous language learning
Published 2025-12-01“…Thematic analysis of the data was executed utilizing techniques of data reduction, data display, and the drawing and verification of conclusions. …”
Get full text
Article -
545
Evolutionary Prediction of Soil Loss from Observed Rainstorm Parameters in an Erosion Watershed Using Genetic Programming
Published 2021-01-01“…Three evolutionary trials were executed, and three models were presented considering different permutations of the predictors. …”
Get full text
Article -
546
An Entropy-Based Multiobjective Evolutionary Algorithm with an Enhanced Elite Mechanism
Published 2012-01-01“…The proposed algorithm is executed on widely used test problems, and the simulated results show that the algorithm has better or comparative performances in convergence and diversity of solutions compared with two state-of-the-art evolutionary algorithms: NSGA-II, SPEA2 and the MOSADE.…”
Get full text
Article -
547
Cyber Attacks on Commercial Drones: A Review
Published 2025-01-01“…The main purpose is to provide an overview of the possible ways in which cyber attacks can be executed. This analysis concludes that drones, designed for diverse purposes, are vulnerable to a range of cyber attacks. …”
Get full text
Article -
548
Current Controlled AC/DC Converter and Its Performance—A Mathematical Model
Published 2025-01-01“…Several examples of current, voltage, and vectors taken during the simulation and experimental works are executed.…”
Get full text
Article -
549
Bridging Photonics and Optoelectronics Curriculum for the Solar Photovoltaic and LED Industries
Published 2014-01-01“…Finally in order to bridge the gap between learning and practical application, the study provides an idea on curriculum design and suggests that curriculum review should be executed by industrial experts to confirm the courses related to the employability.…”
Get full text
Article -
550
For Loan Processing a Fuzzy Process Mining
Published 2023-09-01“…Then, the new workflow is designed and the pattern is executed. In the first stage of the total loan period, 7.84 hours of earnings are obtained. …”
Get full text
Article -
551
Implementation Model Prototyping In Application Design of Halal Food Product Detection For Overseas Muslim Students
Published 2023-11-01“…The use of Kotlin, which is statically expressed and executed, makes the process of developing these applications efficient and straightforward. …”
Get full text
Article -
552
Research on efficient and secure cross-domain data sharing of IoV under blockchain architecture
Published 2023-03-01“…To solve the problems of data disclosure, uncontrolled data access, and inefficiency of cross-domain data sharing in the Internet of vehicles (IoV), an efficient and secure cross-domain data sharing scheme of IoV under blockchain architecture was proposed.A blockchain was maintained by trusted authorities of different trust domains.A modified ciphertext-policy attribute-based encryption scheme was adopted to encrypt data, and encrypted data was stored in interplanetary file system (IPFS) with relevant information recorded on the blockchain, constructing a fine-grained and secure cross-domain data sharing scheme based on blockchain.A verification algorithm for cross-domain access based on the garbled Bloom filter was designed, and a smart contract executed fast decryption tests based on access policies on the blockchain, improving the access efficiency of a mass of ciphertext.A cross-domain data access method based on outsourcing decryption was designed, and the trusted authorities transformed ciphertexts while performing outsourcing decryption with complex bilinear pairing calculations, reducing the time overhead of vehicle decryption.Experiment results show that the proposed scheme is superior to other schemes in the process of cross-domain ciphertext transformation and vehicle decryption, and the cross-domain data access efficiency is increased by 60% on average.…”
Get full text
Article -
553
Optimizing Circuit Reusing and its Application in Randomized Benchmarking
Published 2025-01-01“…An efficient approach known as ``circuit reusing,'' where each circuit is executed multiple times, reduces the cost compared to implementing new circuits. …”
Get full text
Article -
554
Methods and Models for Metabolic Assessment in Mice
Published 2013-01-01“…This report summarizes how these tests can be executed and how arising data are analyzed to confidently determine changes in insulin resistance and insulin secretion with high reproducibility. …”
Get full text
Article -
555
The COVID-19 pandemic art of Anna Szpakowska-Kujawska: from pastels to spatial compositions
Published 2025-02-01“…These works include a series of pastels Kwadraty zaokienne (Squares outside the Window, or “pandemic squares”) from 2020 and spatial objects made of polystyrene foam and cardboard executed in the years 2021–2022. Tomczak gives an analytical interpretation of the modernist element in Szpakowska-Kujawska’s artistic record of her experience of the plague as it developed from painting at the point of realistic departure to unconventional sculpture. …”
Get full text
Article -
556
Volumetric Denoising of XCT Data Using Quantum Computing
Published 2025-02-01“…The final implementation is executed on a real X-ray computed tomography dataset, showing that proper denoising can be performed on quantum devices, yet current technological limitations inhibit the application to large datasets. …”
Get full text
Article -
557
Yoyo trick on type‐II generalised Feistel networks
Published 2021-11-01“…For 7‐round type‐II GFNs, this work presents the first decomposition thus far, which can be executed within a time complexity of O(n24n + 3) and a data complexity of O(23n + 2). …”
Get full text
Article -
558
Delayed occluder displacement following patent ductus arteriosus closure successfully managed with thoracic endovascular aortic repair: a case report and literature review
Published 2025-01-01“…Despite numerous unsuccessful catheter-based interventions, thoracic endovascular aortic repair (TEVAR) was successfully executed. This procedure effectively resolved the PDA without any postprocedural complications. …”
Get full text
Article -
559
National Defense as fiscal policy during the Mauricio Macri administration (2015-2019)
Published 2020-09-01“…This article argues that the Defense policies implemented by the Mauricio Macri administration (2015-2019) were subordinated to the priorities defined by the neo-liberal fiscal adjustment programs executed during its tenure. In order to show this, the discourse of major policy makers is surveyed, the main policy documents published during the period are examined, and finally, the resources actually allocated to carry out Defense policies are tallied. …”
Get full text
Article -
560
Image vaccine against steganography in encrypted domain
Published 2025-02-01“…When steganography is executed on vaccinated image, the utilization of steganography can be discovered in encrypted domain. …”
Get full text
Article