Suggested Topics within your search.
Suggested Topics within your search.
- Leadership 4
- Management 4
- Executive ability 3
- Methodology 3
- Common law 2
- History 2
- Interpretation and construction 2
- Law 2
- African Americans 1
- Business and Management 1
- Character 1
- Communication 1
- Corporate culture 1
- Courtship 1
- Decision making 1
- Evaluation 1
- Executive coaching 1
- Farmers 1
- Financial services industry 1
- Führung 1
- Integrity 1
- Internet marketing 1
- Organizational change 1
- Policy sciences 1
- Political planning 1
- Quality control 1
- Quantitative research 1
- Research 1
- Six sigma (Quality control standard) 1
- Social justice 1
-
1481
Accelerating cryptographic computation with parallel computing mechanisms in Android platform
Published 2019-02-01“…Aiming to accelerate cryptographic computation in Android platform,parallel computing method is adopted.Utilizing RenderScript framework in Android platform,big integer multiplication operation is implemented in parallel,which provides efficient and fast basic operations for cryptographic schemes such as elliptic curve.Storage structure and computing logic are designed and implemented for parallel computation of big integer multiplication.Integers are decomposed and handled as matrix elements,so that all additive and multiplicative operations can be performed simultaneously,which provides accelerated intermediate result for multiplication operations.Experiment results show that,compared to the original Java library for big integers in the Android platform,the proposed method has distinctive advantage in execution time.…”
Get full text
Article -
1482
Research of the Electric Drive with Intermittent Motion Law
Published 2020-04-01“…An electric drive with an intermittent law of the shaft motion of the executive motor, which is widely used in various fields of industry, is considered. …”
Get full text
Article -
1483
«Today we need to talk about the Civil War with restraint, without the desire to take anyone’s side...»
Published 2024-02-01“…Ruslan Grigorievich Gagkuev — Doctor of Historical Sciences, Chairman of the Board of the Russian Historical Society, Executive Director of the History of the Fatherland Foundation, leading researcher at the Center for Military History of Russia at the Institute of Russian History of the Russian Academy of Sciences. …”
Get full text
Article -
1484
Automation Processes for Efficient Verification of Complex Systems: An Empirical Case Study
Published 2024-12-01“…The automation efforts focused on four areas: (1) test setup, (2) test execution, (3) test result analysis, and (4) documentation. …”
Get full text
Article -
1485
Exploiting Neural-Network Statistics for Low-Power DNN Inference
Published 2024-01-01“…Specialized compute blocks have been developed for efficient nn execution. However, due to the vast amount of data and parameter movements, the interconnects and on-chip memories form another bottleneck, impairing power and performance. …”
Get full text
Article -
1486
A RESEARCH ON THE ESTABLISHMENT OF TOTAL QUALITY MANAGEMENT IN MUNICIPALITIES
Published 2023-03-01“…As a result, the ranking was made by the experts who participated in the research as follows; training of municipal top executives, public demand, establishment of Total Quality Management Directorate in municipalities, development of municipal legislation, supervision of municipalities by the General Directorate of local administrations.…”
Get full text
Article -
1487
Protocol for assessing the clogging of the mitochondrial translocase of the outer membrane by precursor proteins in human cells
Published 2025-03-01“…We then show how co-immunoprecipitation can be used to test the stalling of precursors inside TOM.For complete details on the use and execution of this protocol, please refer to Kim et al.1 : Publisher’s note: Undertaking any experimental protocol requires adherence to local institutional guidelines for laboratory safety and ethics.…”
Get full text
Article -
1488
Defense of hidden backdoor technology for Web
Published 2020-05-01“…Rootkit is a set of persistent and undetectable attack technologies,which can hide their attack behavior and backdoor trace by modifying software or kernel in operating system and changing execution path of instruction.Firstly,the basic definition and evolution of Rootkit were introduced,then the operating principle,current mainstream technology and detection methods of Rootkit were discussed.Then,through comparative experiments on performance and security,the application of mimic defense system was described for Web based on dynamic,heterogeneous,redundant structure under Trojan Horse attack.Experiments show that mimic defense system can effectively defend against Trojan Horse in tests in the premise of low overhead.At last,the opportunities and challenges of the DHR system were summarized.…”
Get full text
Article -
1489
Entre ethos professionnel et logiques d’entreprises : La recherche et l’innovation dans les agences d’architecture
Published 2020-12-01“…Encouraged by an incentive and reforming public policy, agency executives are showing a real interest in integrating research or innovation practices into their structures. …”
Get full text
Article -
1490
Direct Applicability of Generally Accepted Principles of International Law in Legal Order of the Republic of Slovenia
Published 2013-11-01“…Self-executing, incorporated and generally accepted principles of international law have been used directly in legal order of the Republic of Slovenia. …”
Get full text
Article -
1491
Design and fabrication study of a small remote-controlled bionic butterfly flapping-wing flying machine
Published 2024-12-01“…This study not only demonstrates the feasibility of the design and implementation of small bionic butterfly aircraft, but also emphasizes its potential application value in the execution of small space missions, providing a new perspective for the design and optimization of bionic aircraft in the future. …”
Get full text
Article -
1492
An automatic verification method for software quality with real business data
Published 2024-03-01“…This scheme automatically perceives responses, adjusts access rates accordingly, and schedules additional server executions using real business data, significantly enhancing operational efficiency and result intuitiveness.…”
Get full text
Article -
1493
BARRIERS OF EXTERNAL ECONOMIC ACTIVITIES TO RUSSIAN NON-COMMODITY EXPORTS
Published 2019-06-01“…Also the classification of such “barriers of ignorance” has been developed and the measures, allowing to reduce the impact of these barriers have been proposed: creation of an electronic commercial site; creation of multifunctional centers, in which certification and licensing procedures would be carried out, customs and tax сonsultancy to potential exporters, advice and assistance in obtaining the necessary permission documentation in foreign countries; сounselling on the correct execution of foreign economic contracts to avoid double taxation and transfer pricing and other measures.…”
Get full text
Article -
1494
Protocol for the isolation of silk glands from silkworms for snRNA-seq and spatial transcriptomics
Published 2025-03-01“…This protocol enables the exploration of the spatial distribution of SG cells at single-cell resolution.For complete details on the use and execution of this protocol, please refer to Ma et al.1 : Publisher’s note: Undertaking any experimental protocol requires adherence to local institutional guidelines for laboratory safety and ethics.…”
Get full text
Article -
1495
Survey on static software vulnerability detection for source code
Published 2019-02-01“…Static software vulnerability detection is mainly divided into two types according to different analysis objects:vulnerability detection for binary code and vulnerability detection for source code.Because the source codecontains more semantic information,it is more favored by code auditors.The existing vulnerability detection research works for source code are summarized from four aspects:code similarity-based vulnerability detection,symbolic execution-based vulnerability detection,rule-based vulnerability detection,and machine learning-based vulnerability detection.The vulnerability detection system based on source code similarity and the intelligent software vulnerability detection system for source code are taken as two examples to introduce the process of vulnerability detection in detail.…”
Get full text
Article -
1496
Hand Gesture Recognition Algorithm Using SVM and HOG Model for Control of Robotic System
Published 2021-01-01“…Results show that the algorithm is up to 99% accuracy with a 70-millisecond execution time per frame that is suitable for industrial applications.…”
Get full text
Article -
1497
La Organización de la Justicia en España durante la primera mitad del siglo XIX
Published 2020-12-01“…The city mayor was a complex figure with respect to sharing judicial and executive powers. Over time, legislation would try to address this clear misrepresentation, by first reducing the participation of these local authorities in the administration of Justice and then later eliminating it.…”
Get full text
Article -
1498
Rafael del Riego, mártir en vida
Published 2024-02-01“…The fact that Rafael del Riego became a «martyr to freedom» following his trial and his particularly ferocious and vengeful execution is undeniable. His sacrificial death enabled him to be immortalised as the most emblematic victim of tyranny, and this status was widely used by the defenders of liberalism and later on by republicans. …”
Get full text
Article -
1499
Protocol for generating human assembloids to investigate thalamocortical and corticothalamic synaptic transmission and plasticity
Published 2025-03-01“…We detail the steps for using whole-cell patch-clamp electrophysiology to investigate the properties of synaptic transmission and synaptic plasticity in this model system.For complete details on the use and execution of this protocol, please refer to Patton et al.1 : Publisher’s note: Undertaking any experimental protocol requires adherence to local institutional guidelines for laboratory safety and ethics.…”
Get full text
Article -
1500
Determining substitutability of cloud services supported by semantically extended type theory
Published 2016-02-01“…The method was proved feasibly by a case determining, and the experimental results show that it brings higher success rate of execution.…”
Get full text
Article