Showing 1,381 - 1,400 results of 3,373 for search '"executed"', query time: 0.08s Refine Results
  1. 1381

    Lightweight and secure search scheme for medical data sharing by XIE Qingqing, SONG Liangqing, FENG Xia

    Published 2024-11-01
    “…The proposed search algorithm involved only two pairings and one multiplication operation, allowing for low consumption and security requirements when executing searches using smart contract. Additionally, the scheme employed key policy attribute-based encryption for fine-grained control over search operations, and utilized lightweight encryption algorithm and outsourced decryption mechanism to reduce computational overhead on user terminals. …”
    Get full text
    Article
  2. 1382

    La panique morale au cœur du débat sur la peine de mort en Algérie by Belkacem Benzenine

    Published 2018-06-01
    “…It shows how this has led not only to a review of a 1993 decision suspending the execution of the death penalty, but also to a demand by the ulemas, the associations and the media to apply the death penalty in cases involving the kidnapping of children. …”
    Get full text
    Article
  3. 1383

    Real time database system data security collection scheme by Zhenyang SHANG, Ruixian YANG

    Published 2016-10-01
    “…With application status of the China Petroleum Refining and Chemicals run system MES(manufacturing execution system)in subordinate enterprises as well as the data acquisition interface program in real-time database module, the security risks such as virus, attacks and illegal invasions in production unit automatic control system (DCS, PLC)because of the “two-network integration”were analyzed. …”
    Get full text
    Article
  4. 1384

    Protocol for identifying Mycobacterium tuberculosis infection status through airway microbiome profiling by Geoffrey Olweny, Moses Levi Ntayi, Edward Kyalo, Alex Kayongo

    Published 2025-03-01
    “…Additionally, we provide steps for analyzing taxonomic relative and differential abundances, as well as identifying potential biomarkers associated with infection status.For complete details on the use and execution of this protocol, please refer to Kayongo et al.1 : Publisher’s note: Undertaking any experimental protocol requires adherence to local institutional guidelines for laboratory safety and ethics.…”
    Get full text
    Article
  5. 1385

    Mechanical characterization of metal-ceramic composites by G. Bolzon, M. Bocciarelli, E.J. Chiarullo

    Published 2013-04-01
    “…Difficulties and costs associated with material production and specimen extraction prevent the execution of a statistically meaningful number of standard laboratory tests. …”
    Get full text
    Article
  6. 1386

    ANALISIS PARTISIPASI MASYARAKAT DALAM PELAKSANAAN PROGRAM PEMBANGUNAN PENGAMAN PANTAI DI DESA TEULAGA TUJOH (PUSONG) KECAMATAN LANGSA BARAT - KOTA LANGSA by Thursina Mahyuddin

    Published 2016-03-01
    “…This research aims to analyze the participation of the community in the implementation of development programs in the villages of Teulaga Tujoh Kecamatan Langsa Barat Kota Langsa and to knowing the factors supporting and restricting the execution of development in the villages of Teulaga Tujoh Kecamatan Langsa Barat Kota Langsa. …”
    Get full text
    Article
  7. 1387

    STRATEGIC PARTNERSHIP BETWEEN THE STATE AND LARGE BUSINESS IN ORDER TO IMPLEMENT SIGNIFICANT STATE PROJECTS by G. Gudimenko, V. Zotov, F. Ibyatov

    Published 2018-12-01
    “…It has concluded that it is necessary to use public-private partnership tools for sustainable growth of the Russian economy, which will provide the state with the opportunity to influence key decisions and control the execution of the state order, Federal target programs, export contracts and the social situation in the country.…”
    Get full text
    Article
  8. 1388

    Virtual resource allocation method with the consideration of performance interference among virtual machines by Lei YANG, He-xu XING, Yu DAI, Sai XU, Hao WANG, Bin ZHANG

    Published 2014-09-01
    “…A method for allocating the virtual resource with the consideration of the performance interference among vir-tual machines was proposed.The model for evaluating the performance interference among virtual machines was formed and the method for predicting the performance interference was presented based on the workload pattern of the virtual machine.The predicted result of the performance interference among virtual machines was put into the evaluation of the resource allocation plan to be used as the basis for resource allocation.By doing this,the effectiveness of the resource al-location plan could be insured.The experiments show that the proposed virtual resource allocation method can insure the execution performance of the application deployed on the virtual machines.…”
    Get full text
    Article
  9. 1389

    Modeling the Effect of External Computers and Removable Devices on a Computer Network with Heterogeneous Immunity by Walaa S. Bahashwan, Salma M. Al-Tuwairqi

    Published 2021-01-01
    “…Finally, to rationalize the analytical results, we execute some numerical simulations.…”
    Get full text
    Article
  10. 1390

    Microstrip Antenna Design for Femtocell Coverage Optimization by Afaz Uddin Ahmed, M. T. Islam, Rezaul Azim, Mahamod Ismail, Mohd Fais Mansor

    Published 2014-01-01
    “…It also focuses on the execution of microstrip antenna for multielement configuration. …”
    Get full text
    Article
  11. 1391

    Mover-se na Metrópole de Piratininga: as políticas públicas de mobilidade para a Grande São Paulo by Gullit Torres Dias

    Published 2016-12-01
    “…The present article aims to analyse the aplicability of the public policies of mobility in the São Paulo Metropolitan Region by the state companies who manage the transport (Metrô and CPTM). The formulation, execution and evaluation of the public policies of mobility/accessibility has been scheduled in the last governments either regional or local, with the intention to reduce the traffic of vehicles and improve the users’ flow of public transport in the urban territory. …”
    Get full text
    Article
  12. 1392

    Data integrity verification based on model cloud federation of TPA by Junfeng TIAN, Tianle LI

    Published 2018-08-01
    “…Aiming at the untrustworthiness of third-party auditor (TPA) in the publicity verification model,a data integrity verification model based on the cloud federation of TPA was proposed.Firstly,the cloud federation of TPA’s architecture was designed and the main functional components and function of the system platform was defined.The federation could manage and control the TPA cloud members.Secondly,TPA was designed in detail by using trusted computing technology and blockchain technology to ensure the credibility of the TPA execution environment and workflow.Finally,the data integrity verification model was built by using cloud federation of TPA.The correctness,security and effectiveness of the model were analyzed theoretically and experimentally.…”
    Get full text
    Article
  13. 1393

    Attributes of a Relationship Management Model for the Public Sector (CiRS Exec) by Júlio Medeiros, Gisela Demo

    Published 2021-01-01
    “…Thus, this research aims at identifying evidence for validity and reliability of a citizen relationship scale (CiRS Exec) for the Federal Executive Branch in Brazil, as well as a citizen’s satisfaction index. …”
    Get full text
    Article
  14. 1394

    Microservice system based on container cloud by Di YANG

    Published 2018-09-01
    “…Lack of the procedure of deploying containerized services in microservice systems,the continuous delivery only put executable codes or programs to the production environment.There is no solution for problems of the test version and configuration updates.The microservice system based on container cloud was proposed.Continuous integration for containerized services and the method that supports debugging tests for multi-version of multi-services were designed.Goals of non-stop production and seamless switch between versions were achieved.These services were monitored and managed by an operation and maintenance platform.After production environment verification,the proposed system supports services running without stop and immediate response and satisfies the needs of production.…”
    Get full text
    Article
  15. 1395

    Approach for distributed BPEL engine placement using K-means by Rong-heng LIN, Bu-dan WU, Yao ZHAO, Fang-chun YANG

    Published 2014-05-01
    “…Results show that the proposed method can provide a more opti-mized bandwidth usage of combined BPEL service execution.…”
    Get full text
    Article
  16. 1396

    Use of Left Gastric Vein as an Alternative for Portal Flow Reconstruction in Liver Transplantation by Uirá Fernandes Teixeira, Mayara Christ Machry, Marcos Bertozzi Goldoni, Cristine Kruse, João Alfredo Diedrich, Pablo Duarte Rodrigues, Caroline Becker Giacomazzi, Estéfano Aurélio Negri, Matheus Koop, Carlos Gustavo Spode Gomes, José Artur Sampaio, Paulo Roberto Ott Fontes, Fábio Luiz Waechter

    Published 2016-01-01
    “…Portal vein thrombosis is observed in up to 10% of liver transplant candidates, hindering execution of the procedure. A dilated gastric vein is an alternative to portal vein reconstruction and decompression of splanchnic bed. …”
    Get full text
    Article
  17. 1397

    HUMANITARIAN INTERVENTION FROM COLD WAR ERA TO THE PRESENT: NEO-REALIST PERSPECTIVE by Hasan Fatih Seval

    Published 2017-12-01
    “…In the second part of the article, the concept ofhumanitarian intervention will be defined and a review will be conducted on theimplementations of the theory, and the execution of humanitarian intervention. Mainquestions of the article are as following: how the "humanitarian"aspect of the Cold War's neo-realist nature was perceived and how it changedand developed in the post-Cold War era; what is the main implications ofneo-realist theory for the 'humanitarian' world; and how the neo-realist perceptionaffected the 'humanitarian intervention'.…”
    Get full text
    Article
  18. 1398

    Índice de Anomalias de Chuvas (IAC) para a sub-bacia hidrográfica do rio Sucuru, alto curso do rio Paraíba- PB by José Marcos Duarte Rodrigues, Eduardo Rodrigues Viana de Lima

    Published 2024-11-01
    “…For this purpose, rainfall data from 2000 to 2019, collected from the website of the Paraíba Water Management Executive Agency (AESA), were used to determine the annual IAC. …”
    Get full text
    Article
  19. 1399

    Performance analysis of selected database management systems by Radosław Kowalczyk, Jakub Smołka

    Published 2024-09-01
    “…Performance analysis looked at the execution time of operations, RAM usage and CPU load. …”
    Get full text
    Article
  20. 1400

    A brand new strategy of quantum relay strategy based on entanglement swapping by Min XU, Min NIE, Guang YANG, Changxing PEI

    Published 2016-03-01
    “…Quantum protocols based on entanglement are known as information security,reliability,flexibility and a broad prospect in use.Meanwhile,the fidelity of photons is also required.A new quantum relay strategy was proposed.By setting multi-relays between distant correspondents and under the assistance of classical communications,the strategy can execute entanglement swapping and entanglement purification to provide the correspondents with remote entanglement connection of stable fidelity.Performance analysis shows that by reasonable control of relay series,improvement of entanglement swapping and entanglement purification,the time delay and throughput can be significantly improved,necessary entanglement resources can be provided for the global quantum communication.…”
    Get full text
    Article