Suggested Topics within your search.
Suggested Topics within your search.
- Leadership 4
- Management 4
- Executive ability 3
- Methodology 3
- Common law 2
- History 2
- Interpretation and construction 2
- Law 2
- African Americans 1
- Business and Management 1
- Character 1
- Communication 1
- Corporate culture 1
- Courtship 1
- Decision making 1
- Evaluation 1
- Executive coaching 1
- Farmers 1
- Financial services industry 1
- Führung 1
- Integrity 1
- Internet marketing 1
- Organizational change 1
- Policy sciences 1
- Political planning 1
- Quality control 1
- Quantitative research 1
- Research 1
- Six sigma (Quality control standard) 1
- Social justice 1
-
1381
Lightweight and secure search scheme for medical data sharing
Published 2024-11-01“…The proposed search algorithm involved only two pairings and one multiplication operation, allowing for low consumption and security requirements when executing searches using smart contract. Additionally, the scheme employed key policy attribute-based encryption for fine-grained control over search operations, and utilized lightweight encryption algorithm and outsourced decryption mechanism to reduce computational overhead on user terminals. …”
Get full text
Article -
1382
La panique morale au cœur du débat sur la peine de mort en Algérie
Published 2018-06-01“…It shows how this has led not only to a review of a 1993 decision suspending the execution of the death penalty, but also to a demand by the ulemas, the associations and the media to apply the death penalty in cases involving the kidnapping of children. …”
Get full text
Article -
1383
Real time database system data security collection scheme
Published 2016-10-01“…With application status of the China Petroleum Refining and Chemicals run system MES(manufacturing execution system)in subordinate enterprises as well as the data acquisition interface program in real-time database module, the security risks such as virus, attacks and illegal invasions in production unit automatic control system (DCS, PLC)because of the “two-network integration”were analyzed. …”
Get full text
Article -
1384
Protocol for identifying Mycobacterium tuberculosis infection status through airway microbiome profiling
Published 2025-03-01“…Additionally, we provide steps for analyzing taxonomic relative and differential abundances, as well as identifying potential biomarkers associated with infection status.For complete details on the use and execution of this protocol, please refer to Kayongo et al.1 : Publisher’s note: Undertaking any experimental protocol requires adherence to local institutional guidelines for laboratory safety and ethics.…”
Get full text
Article -
1385
Mechanical characterization of metal-ceramic composites
Published 2013-04-01“…Difficulties and costs associated with material production and specimen extraction prevent the execution of a statistically meaningful number of standard laboratory tests. …”
Get full text
Article -
1386
ANALISIS PARTISIPASI MASYARAKAT DALAM PELAKSANAAN PROGRAM PEMBANGUNAN PENGAMAN PANTAI DI DESA TEULAGA TUJOH (PUSONG) KECAMATAN LANGSA BARAT - KOTA LANGSA
Published 2016-03-01“…This research aims to analyze the participation of the community in the implementation of development programs in the villages of Teulaga Tujoh Kecamatan Langsa Barat Kota Langsa and to knowing the factors supporting and restricting the execution of development in the villages of Teulaga Tujoh Kecamatan Langsa Barat Kota Langsa. …”
Get full text
Article -
1387
STRATEGIC PARTNERSHIP BETWEEN THE STATE AND LARGE BUSINESS IN ORDER TO IMPLEMENT SIGNIFICANT STATE PROJECTS
Published 2018-12-01“…It has concluded that it is necessary to use public-private partnership tools for sustainable growth of the Russian economy, which will provide the state with the opportunity to influence key decisions and control the execution of the state order, Federal target programs, export contracts and the social situation in the country.…”
Get full text
Article -
1388
Virtual resource allocation method with the consideration of performance interference among virtual machines
Published 2014-09-01“…A method for allocating the virtual resource with the consideration of the performance interference among vir-tual machines was proposed.The model for evaluating the performance interference among virtual machines was formed and the method for predicting the performance interference was presented based on the workload pattern of the virtual machine.The predicted result of the performance interference among virtual machines was put into the evaluation of the resource allocation plan to be used as the basis for resource allocation.By doing this,the effectiveness of the resource al-location plan could be insured.The experiments show that the proposed virtual resource allocation method can insure the execution performance of the application deployed on the virtual machines.…”
Get full text
Article -
1389
Modeling the Effect of External Computers and Removable Devices on a Computer Network with Heterogeneous Immunity
Published 2021-01-01“…Finally, to rationalize the analytical results, we execute some numerical simulations.…”
Get full text
Article -
1390
Microstrip Antenna Design for Femtocell Coverage Optimization
Published 2014-01-01“…It also focuses on the execution of microstrip antenna for multielement configuration. …”
Get full text
Article -
1391
Mover-se na Metrópole de Piratininga: as políticas públicas de mobilidade para a Grande São Paulo
Published 2016-12-01“…The present article aims to analyse the aplicability of the public policies of mobility in the São Paulo Metropolitan Region by the state companies who manage the transport (Metrô and CPTM). The formulation, execution and evaluation of the public policies of mobility/accessibility has been scheduled in the last governments either regional or local, with the intention to reduce the traffic of vehicles and improve the users’ flow of public transport in the urban territory. …”
Get full text
Article -
1392
Data integrity verification based on model cloud federation of TPA
Published 2018-08-01“…Aiming at the untrustworthiness of third-party auditor (TPA) in the publicity verification model,a data integrity verification model based on the cloud federation of TPA was proposed.Firstly,the cloud federation of TPA’s architecture was designed and the main functional components and function of the system platform was defined.The federation could manage and control the TPA cloud members.Secondly,TPA was designed in detail by using trusted computing technology and blockchain technology to ensure the credibility of the TPA execution environment and workflow.Finally,the data integrity verification model was built by using cloud federation of TPA.The correctness,security and effectiveness of the model were analyzed theoretically and experimentally.…”
Get full text
Article -
1393
Attributes of a Relationship Management Model for the Public Sector (CiRS Exec)
Published 2021-01-01“…Thus, this research aims at identifying evidence for validity and reliability of a citizen relationship scale (CiRS Exec) for the Federal Executive Branch in Brazil, as well as a citizen’s satisfaction index. …”
Get full text
Article -
1394
Microservice system based on container cloud
Published 2018-09-01“…Lack of the procedure of deploying containerized services in microservice systems,the continuous delivery only put executable codes or programs to the production environment.There is no solution for problems of the test version and configuration updates.The microservice system based on container cloud was proposed.Continuous integration for containerized services and the method that supports debugging tests for multi-version of multi-services were designed.Goals of non-stop production and seamless switch between versions were achieved.These services were monitored and managed by an operation and maintenance platform.After production environment verification,the proposed system supports services running without stop and immediate response and satisfies the needs of production.…”
Get full text
Article -
1395
Approach for distributed BPEL engine placement using K-means
Published 2014-05-01“…Results show that the proposed method can provide a more opti-mized bandwidth usage of combined BPEL service execution.…”
Get full text
Article -
1396
Use of Left Gastric Vein as an Alternative for Portal Flow Reconstruction in Liver Transplantation
Published 2016-01-01“…Portal vein thrombosis is observed in up to 10% of liver transplant candidates, hindering execution of the procedure. A dilated gastric vein is an alternative to portal vein reconstruction and decompression of splanchnic bed. …”
Get full text
Article -
1397
HUMANITARIAN INTERVENTION FROM COLD WAR ERA TO THE PRESENT: NEO-REALIST PERSPECTIVE
Published 2017-12-01“…In the second part of the article, the concept ofhumanitarian intervention will be defined and a review will be conducted on theimplementations of the theory, and the execution of humanitarian intervention. Mainquestions of the article are as following: how the "humanitarian"aspect of the Cold War's neo-realist nature was perceived and how it changedand developed in the post-Cold War era; what is the main implications ofneo-realist theory for the 'humanitarian' world; and how the neo-realist perceptionaffected the 'humanitarian intervention'.…”
Get full text
Article -
1398
Índice de Anomalias de Chuvas (IAC) para a sub-bacia hidrográfica do rio Sucuru, alto curso do rio Paraíba- PB
Published 2024-11-01“…For this purpose, rainfall data from 2000 to 2019, collected from the website of the Paraíba Water Management Executive Agency (AESA), were used to determine the annual IAC. …”
Get full text
Article -
1399
Performance analysis of selected database management systems
Published 2024-09-01“…Performance analysis looked at the execution time of operations, RAM usage and CPU load. …”
Get full text
Article -
1400
A brand new strategy of quantum relay strategy based on entanglement swapping
Published 2016-03-01“…Quantum protocols based on entanglement are known as information security,reliability,flexibility and a broad prospect in use.Meanwhile,the fidelity of photons is also required.A new quantum relay strategy was proposed.By setting multi-relays between distant correspondents and under the assistance of classical communications,the strategy can execute entanglement swapping and entanglement purification to provide the correspondents with remote entanglement connection of stable fidelity.Performance analysis shows that by reasonable control of relay series,improvement of entanglement swapping and entanglement purification,the time delay and throughput can be significantly improved,necessary entanglement resources can be provided for the global quantum communication.…”
Get full text
Article