Suggested Topics within your search.
Suggested Topics within your search.
- Leadership 4
- Management 4
- Executive ability 3
- Methodology 3
- Common law 2
- History 2
- Interpretation and construction 2
- Law 2
- African Americans 1
- Business and Management 1
- Character 1
- Communication 1
- Corporate culture 1
- Courtship 1
- Decision making 1
- Evaluation 1
- Executive coaching 1
- Farmers 1
- Financial services industry 1
- Führung 1
- Integrity 1
- Internet marketing 1
- Organizational change 1
- Policy sciences 1
- Political planning 1
- Quality control 1
- Quantitative research 1
- Research 1
- Six sigma (Quality control standard) 1
- Social justice 1
-
1441
A prototype of a low-cost autonomous mini-vehicle
Published 2023-12-01“…The main contribution is the feasibility and executability of the project using only simple, readily available, and low-cost components. …”
Get full text
Article -
1442
Cognitive radio auto-adaptive sensing algorithm based on POMDP
Published 2013-06-01“…In order to design an appropriate spectrum sensing mechanism in millisecond spectrum hole environment,the optimal data transmission time of secondary users was derived to maximize the data throughput.Furthermore,in order to exploit the millisecond spectrum holes,an auto-adaptive spectrum sensing algorithm based on POMDP (partially observ-able Markov decision process) was proposed.This algorithm executes spectrum sensing or data transmission action in the current decision epoch based on the belief vector and the observation result in the last decision epoch.Simulation results show that the proposed algorithm can constrain the collision probability between primary users and secondary users,and improve systemic spectrum utilization at the same time.…”
Get full text
Article -
1443
Relations between CEO characteristics and mergers and acquisition decisions in Brazilian companies
Published 2021-01-01“…We find no statistically significant correlations for other CEO’s characteristics, such as executive tenure, age, education, participation as chair of the board, previous experience as an entrepreneur or being a shareholder of the acquiring company.…”
Get full text
Article -
1444
An Efficient Code-Based One-Time Blind Signature Scheme for Electronic Forensics
Published 2024-01-01“…The experimental results show that our scheme has a short signature length and high execution efficiency. Our scheme can also be applied to electronic forensics of traffic accidents on the Internet of Vehicles, which can protect users’ privacy.…”
Get full text
Article -
1445
On the invariance of the digital description of a handwritten signature
Published 2023-02-01“…It is shown that the digital description of the handwritten signature image, previously proposed by the authors, is sufficiently invariant with respect to the listed conditions for its execution to perform the off-line signature verification procedure.…”
Get full text
Article -
1446
A simplified model of the process of medical attention. Assistance, educational and investigative implications
Published 2011-04-01“…In this article a simplified model is proposed or general of the process of medical attention whose employment possesses assistance, educational and investigative implications; elaborated on the base of the address of the mental activity that the doctor develops during the execution of the process. Starting from this idea we identify three moments or phases like components of the pattern: 1) the obtaining of information, 2) the interpretation of the information, and 3) the taking of decisions; each one of which possesses a specific objective in function of the general objective of the process, besides other particularities. …”
Get full text
Article -
1447
Laws that Protect Florida’s Wildlife
Published 2012-06-01“…Wildlife protection may also take the form of conventions, treaties, and executive orders. All are subject to periodic change. …”
Get full text
Article -
1448
Research progress on cloud data assured deletion based on cryptography
Published 2016-08-01“…The major challenges faced by the data assured deletion in cloud computing was analyzed,it was observed the main reasons of performing cloud data assured deletion were the characteristics of cloud virtualization and multi-tenancy,as well as the business models of lease and on-demand delivery in cloud computing,and point out three levels of meaning of the cloud data assured deletion.Secondly,the state-of-the-art works on cloud data assured deletion was systematically surveyed from security-oriented view in terms of trusted execution environments,key managements and access control policies.It is also pointed out their highlights,limitations and general problems.Finally,some developing trends of this emerging research field were introduced.…”
Get full text
Article -
1449
Protocol to study toxic, immune, and suicidal phenotypes of killer yeast
Published 2025-03-01“…We detail procedures for yeast culturing, performing the assays, and data analysis.For complete details on the use and execution of this protocol, please refer to Prins et al.1 : Publisher’s note: Undertaking any experimental protocol requires adherence to local institutional guidelines for laboratory safety and ethics.…”
Get full text
Article -
1450
Digital transformation of the textile process chain – state-of-the-art
Published 2022-09-01“…Traditional approaches will no longer work in the face of change because digital transformation is inevitable, irreversible, enormously fast, and unfortunately marked by challenges in implementation and uncertainties in execution. However, it also brings many benefits for which it is worth striving for the complete digitization of the value chain. …”
Get full text
Article -
1451
Research on system log anomaly detection based on deep learning
Published 2019-10-01“…The system log reflects the running status of the system and records the activity information of specific events in the system.Therefore,the rapid and accurate detection of the system abnormal log is important to the security and stability of the system.A log anomaly detection algorithm based on GRU neural network is proposed.Log parsing is implemented based on log key technology.Log anomaly detection is realized by using anomaly detection model of execution path and anomaly detection model of parameter value.The system has the advantages of less parameters and faster training.It improves the running speed while achieving higher detection accuracy,and is suitable for log analysis of large information systems.…”
Get full text
Article -
1452
Modeling of the mimic defense based on heterogeneous redundancy
Published 2020-05-01“…The unbalanced development status of network security was introduced.The main hazards and the mechanism model of penetration testing were described,and the inherent shortcomings of many existing traditional defense methods were analyzed.However,new method of the mimic defense model makes the attack information obtained invalid by dynamically selecting the executive set and adaptively changing the system composition.The same attack mode is difficult to be maintained or reproduced.Based on the attack chain model,the traditional defensetechnology and mimic defense technology were analyzed and compared,and it was demonstrated that it had a protective role in multiple stages of the attack chain.Finally,the effectiveness and superiority of the mimic defense was verified by experiments,and the model was summarized and prospected.…”
Get full text
Article -
1453
FIRMS’ FINANCIAL AND CORPORATE GOVERNANCE CHARACTERISTICS ASSOCIATION WITH EARNING MANAGEMENT PRACTICES: A META-ANALYSIS APPROACH
Published 2014-11-01“… This paper aims to investigate the association between firm’s corporate governance and financial attributes (namely, board of directors’ size, board of directors’ independence, chief executive officer (CEO) duality, ownership structure, audit type, firm’s size, firm’s return and leverage) with earnings management practices. …”
Get full text
Article -
1454
STUDY OF PERSONNEL REACTION ON IMPLEMENTATION OF CORPORATE GOVERNANCE DIGITALIZATION PROGRAMS
Published 2020-06-01“…The national digitalization program determines the radical transformation of information support and administrative support for the implementation of the functions and procedures of managers, specialists and executives of the management apparatus. The universally declared recognition of the necessity and prospects of the developed and ongoing innovations in information support and management processes does not exclude negative reactions of personnel to their implementation and possible consequences. …”
Get full text
Article -
1455
A protocol for assessing the adhesion potential of lactic acid bacteria on various cell types
Published 2025-03-01“…We then detail procedures for performing an adhesion assay.For complete details on the use and execution of this protocol, please refer to Kumari et al.1 : Publisher’s note: Undertaking any experimental protocol requires adherence to local institutional guidelines for laboratory safety and ethics.…”
Get full text
Article -
1456
Laws that Protect Florida’s Wildlife
Published 2012-06-01“…Wildlife protection may also take the form of conventions, treaties, and executive orders. All are subject to periodic change. …”
Get full text
Article -
1457
Reddit comment analysis: sentiment prediction and topic modeling using VADER and BERTopic
Published 2024-12-01“… This work aims at exploring data analysis techniques applied to the social media platform Reddit, highlighting the execution of an Exploratory Data Analysis (EDA) to identify trends and patterns of interaction among users. …”
Get full text
Article -
1458
Malware prediction technique based on program gene
Published 2018-08-01“…With the development of Internet technology,malicious programs have risen explosively.In the face of executable files without source,the current mainstream malware detection uses feature detection based on similarity,with lack of analysis of malicious sources.To resolve this status,the definition of program gene was raised,a generic method of extracting program gene was designed,and a malicious program prediction method was proposed based on program gene.Utilizing machine learning and deep-learning algorithms,the forecasting system has good prediction ability,with the accuracy rate of 99.3% in the deep-learning model,which validates the role of program gene theory in the field of malicious program analysis.…”
Get full text
Article -
1459
DISTRIBUTION OF ADDITIONAL COST AND PROFIT AS THE DECISION-MAKING FACTOR FOR THE INVESTMENT PROJECT
Published 2017-10-01“…The research presents the scheme and algorithm for pricing structure analysis, which can be performed on the stage of investment project development as well as on any of the execution stages.…”
Get full text
Article -
1460