Showing 1,441 - 1,460 results of 3,373 for search '"executed"', query time: 0.07s Refine Results
  1. 1441

    A prototype of a low-cost autonomous mini-vehicle by Gabriel Arthur Vicentini, Luan Gabriel Vidal da Silva, Carlos Dias da Silva Junior, Elias José de Rezende Freitas

    Published 2023-12-01
    “…The main contribution is the feasibility and executability of the project using only simple, readily available, and low-cost components. …”
    Get full text
    Article
  2. 1442

    Cognitive radio auto-adaptive sensing algorithm based on POMDP by Rui-chen XU, Ting JIANG

    Published 2013-06-01
    “…In order to design an appropriate spectrum sensing mechanism in millisecond spectrum hole environment,the optimal data transmission time of secondary users was derived to maximize the data throughput.Furthermore,in order to exploit the millisecond spectrum holes,an auto-adaptive spectrum sensing algorithm based on POMDP (partially observ-able Markov decision process) was proposed.This algorithm executes spectrum sensing or data transmission action in the current decision epoch based on the belief vector and the observation result in the last decision epoch.Simulation results show that the proposed algorithm can constrain the collision probability between primary users and secondary users,and improve systemic spectrum utilization at the same time.…”
    Get full text
    Article
  3. 1443

    Relations between CEO characteristics and mergers and acquisition decisions in Brazilian companies by Kamilla Tairine de Assunção Main, Vinicius Augusto Brunassi Silva

    Published 2021-01-01
    “…We find no statistically significant correlations for other CEO’s characteristics, such as executive tenure, age, education, participation as chair of the board, previous experience as an entrepreneur or being a shareholder of the acquiring company.…”
    Get full text
    Article
  4. 1444

    An Efficient Code-Based One-Time Blind Signature Scheme for Electronic Forensics by Haiyan Xiu, Fang Ren, Xinglong Xue, Dong Zheng

    Published 2024-01-01
    “…The experimental results show that our scheme has a short signature length and high execution efficiency. Our scheme can also be applied to electronic forensics of traffic accidents on the Internet of Vehicles, which can protect users’ privacy.…”
    Get full text
    Article
  5. 1445

    On the invariance of the digital description of a handwritten signature by U. Yu. Akhundjanov, V. V. Starovoitov

    Published 2023-02-01
    “…It is shown that the digital description of the handwritten signature image, previously proposed by the authors, is sufficiently invariant with respect to the listed conditions for its execution to perform the off-line signature verification procedure.…”
    Get full text
    Article
  6. 1446

    A simplified model of the process of medical attention. Assistance, educational and investigative implications by Luis Alberto Corona Martínez, Mercedes Fonseca Hernández

    Published 2011-04-01
    “…In this article a simplified model is proposed or general of the process of medical attention whose employment possesses assistance, educational and investigative implications; elaborated on the base of the address of the mental activity that the doctor develops during the execution of the process. Starting from this idea we identify three moments or phases like components of the pattern: 1) the obtaining of information, 2) the interpretation of the information, and 3) the taking of decisions; each one of which possesses a specific objective in function of the general objective of the process, besides other particularities. …”
    Get full text
    Article
  7. 1447

    Laws that Protect Florida’s Wildlife by Joe Schaefer, John Tucker, Maia McGuire

    Published 2012-06-01
    “…Wildlife protection may also take the form of conventions, treaties, and executive orders. All are subject to periodic change. …”
    Get full text
    Article
  8. 1448

    Research progress on cloud data assured deletion based on cryptography by Jin-bo XIONG, Feng-hua LI, Yan-chao WANG, Jian-feng MA, Zhi-qiang YAO

    Published 2016-08-01
    “…The major challenges faced by the data assured deletion in cloud computing was analyzed,it was observed the main reasons of performing cloud data assured deletion were the characteristics of cloud virtualization and multi-tenancy,as well as the business models of lease and on-demand delivery in cloud computing,and point out three levels of meaning of the cloud data assured deletion.Secondly,the state-of-the-art works on cloud data assured deletion was systematically surveyed from security-oriented view in terms of trusted execution environments,key managements and access control policies.It is also pointed out their highlights,limitations and general problems.Finally,some developing trends of this emerging research field were introduced.…”
    Get full text
    Article
  9. 1449

    Protocol to study toxic, immune, and suicidal phenotypes of killer yeast by Rianne C. Prins, Sonja Billerbeck

    Published 2025-03-01
    “…We detail procedures for yeast culturing, performing the assays, and data analysis.For complete details on the use and execution of this protocol, please refer to Prins et al.1 : Publisher’s note: Undertaking any experimental protocol requires adherence to local institutional guidelines for laboratory safety and ethics.…”
    Get full text
    Article
  10. 1450

    Digital transformation of the textile process chain – state-of-the-art by Robert Nafz, Caroline Schinle, Christian Kaiser, Yordan K. Kyosev

    Published 2022-09-01
    “…Traditional approaches will no longer work in the face of change because digital transformation is inevitable, irreversible, enormously fast, and unfortunately marked by challenges in implementation and uncertainties in execution. However, it also brings many benefits for which it is worth striving for the complete digitization of the value chain. …”
    Get full text
    Article
  11. 1451

    Research on system log anomaly detection based on deep learning by Yidong WANG, Peishun LIU, Gbin WAN

    Published 2019-10-01
    “…The system log reflects the running status of the system and records the activity information of specific events in the system.Therefore,the rapid and accurate detection of the system abnormal log is important to the security and stability of the system.A log anomaly detection algorithm based on GRU neural network is proposed.Log parsing is implemented based on log key technology.Log anomaly detection is realized by using anomaly detection model of execution path and anomaly detection model of parameter value.The system has the advantages of less parameters and faster training.It improves the running speed while achieving higher detection accuracy,and is suitable for log analysis of large information systems.…”
    Get full text
    Article
  12. 1452

    Modeling of the mimic defense based on heterogeneous redundancy by Junning QIN, Jiajia HAN, Sheng ZHOU, Chunming WU, Shuangxi CHEN, Ruoyan ZHAO, Jiangyu ZHANG

    Published 2020-05-01
    “…The unbalanced development status of network security was introduced.The main hazards and the mechanism model of penetration testing were described,and the inherent shortcomings of many existing traditional defense methods were analyzed.However,new method of the mimic defense model makes the attack information obtained invalid by dynamically selecting the executive set and adaptively changing the system composition.The same attack mode is difficult to be maintained or reproduced.Based on the attack chain model,the traditional defensetechnology and mimic defense technology were analyzed and compared,and it was demonstrated that it had a protective role in multiple stages of the attack chain.Finally,the effectiveness and superiority of the mimic defense was verified by experiments,and the model was summarized and prospected.…”
    Get full text
    Article
  13. 1453

    FIRMS’ FINANCIAL AND CORPORATE GOVERNANCE CHARACTERISTICS ASSOCIATION WITH EARNING MANAGEMENT PRACTICES: A META-ANALYSIS APPROACH by Fatima Abdul Hamid, Chaabane Oussama Houssem Eddine, Abdullah Mohamed Ayedh, Abdelghani Echchabi

    Published 2014-11-01
    “… This paper aims to investigate the association between firm’s corporate governance and financial attributes (namely, board of directors’ size, board of directors’ independence, chief executive officer (CEO) duality, ownership structure, audit type, firm’s size, firm’s return and leverage) with earnings management practices. …”
    Get full text
    Article
  14. 1454

    STUDY OF PERSONNEL REACTION ON IMPLEMENTATION OF CORPORATE GOVERNANCE DIGITALIZATION PROGRAMS by A. V. Raychenko

    Published 2020-06-01
    “…The national digitalization program determines the radical transformation of information support and administrative support for the implementation of the functions and procedures of managers, specialists and executives of the management apparatus. The universally declared recognition of the necessity and prospects of the developed and ongoing innovations in information support and management processes does not exclude negative reactions of personnel to their implementation and possible consequences. …”
    Get full text
    Article
  15. 1455

    A protocol for assessing the adhesion potential of lactic acid bacteria on various cell types by Lakshmi Jayaram, Ramith Ramu, Deepthi Puttegowda, Jayanthi M K, Chandana Kumari V B, Khang Wen Goh

    Published 2025-03-01
    “…We then detail procedures for performing an adhesion assay.For complete details on the use and execution of this protocol, please refer to Kumari et al.1 : Publisher’s note: Undertaking any experimental protocol requires adherence to local institutional guidelines for laboratory safety and ethics.…”
    Get full text
    Article
  16. 1456

    Laws that Protect Florida’s Wildlife by Joe Schaefer, John Tucker, Maia McGuire

    Published 2012-06-01
    “…Wildlife protection may also take the form of conventions, treaties, and executive orders. All are subject to periodic change. …”
    Get full text
    Article
  17. 1457

    Reddit comment analysis: sentiment prediction and topic modeling using VADER and BERTopic by Denilson de Oliveira Silva, Richard Matheus Avelino da Silva, Patrícia Virgínia de Santana Lima, Jéssica Cristina Pereira Batista, Sílvio Fernando Alves Xavier Júnior

    Published 2024-12-01
    “… This work aims at exploring data analysis techniques applied to the social media platform Reddit, highlighting the execution of an Exploratory Data Analysis (EDA) to identify trends and patterns of interaction among users. …”
    Get full text
    Article
  18. 1458

    Malware prediction technique based on program gene by Da XIAO, Bohan LIU, Baojiang CUI, Xiaochen WANG, Suoxing ZHANG

    Published 2018-08-01
    “…With the development of Internet technology,malicious programs have risen explosively.In the face of executable files without source,the current mainstream malware detection uses feature detection based on similarity,with lack of analysis of malicious sources.To resolve this status,the definition of program gene was raised,a generic method of extracting program gene was designed,and a malicious program prediction method was proposed based on program gene.Utilizing machine learning and deep-learning algorithms,the forecasting system has good prediction ability,with the accuracy rate of 99.3% in the deep-learning model,which validates the role of program gene theory in the field of malicious program analysis.…”
    Get full text
    Article
  19. 1459

    DISTRIBUTION OF ADDITIONAL COST AND PROFIT AS THE DECISION-MAKING FACTOR FOR THE INVESTMENT PROJECT by A. Kuznetsov

    Published 2017-10-01
    “…The research presents the scheme and algorithm for pricing structure analysis, which can be performed on the stage of investment project development as well as on any of the execution stages.…”
    Get full text
    Article
  20. 1460

    Leadership : practice and perspectives / by Roe, Kevin, 1961-

    Published 2017
    View in OPAC
    Book