Suggested Topics within your search.
Suggested Topics within your search.
- Leadership 4
- Management 4
- Executive ability 3
- Methodology 3
- Common law 2
- History 2
- Interpretation and construction 2
- Law 2
- African Americans 1
- Business and Management 1
- Character 1
- Communication 1
- Corporate culture 1
- Courtship 1
- Decision making 1
- Evaluation 1
- Executive coaching 1
- Farmers 1
- Financial services industry 1
- Führung 1
- Integrity 1
- Internet marketing 1
- Organizational change 1
- Policy sciences 1
- Political planning 1
- Quality control 1
- Quantitative research 1
- Research 1
- Six sigma (Quality control standard) 1
- Social justice 1
-
1561
An Enhanced Differential Evolution Algorithm with Fast Evaluating Strategies for TWT-NFSP with SSTs and RTs
Published 2020-01-01“…In the proposed DE_FES, the DE-based search is adopted to perform global search for obtaining the promising regions or solutions in solution space, and a fast local search combined with three presented strategies is designed to execute exploitation from these obtained regions. …”
Get full text
Article -
1562
Protocol for in vivo chromatin immunoprecipitation on purified chromatin isolated from mouse liver nuclei
Published 2025-03-01“…This protocol yields high-quality samples using commercial antibodies.For complete details on the use and execution of this protocol, please refer to Akl et al.1 : Publisher’s note: Undertaking any experimental protocol requires adherence to local institutional guidelines for laboratory safety and ethics.…”
Get full text
Article -
1563
GreyFan:a network attack framework using Wi-Fi covert channel
Published 2019-09-01“…For traditional physical attacks such as side channel attacks and HID attacks in real networks,physical isolation is considered to be a relatively complete security protection against network attacks.In 2018,a Wi-Fi hidden channel method in the physical isolation environment——Ghost Tunnel was firstly proposed,that is,in the state that Wi-Fi didn’t connected,the wireless AP could successfully transmit data to the computer that initiates the connection request.An attack framework based on the Ghost Tunnel method——GreyFan was proposed.This attack framework enabled attackers to implement non-aware attacks on users who didn’t connected to Wi-Fi,such as file concealed transmission and arbitrary code execution,etc.The corresponding defense technology was also analyzed.…”
Get full text
Article -
1564
Multi-objective task offloading algorithm for mobile cloud computing
Published 2019-09-01“…Mobile devices with limited computing power and resources can offload intensive tasks to the cloud for execution,thus improving the computing capacity of mobile devices and reducing battery energy consumption.However,the existing researches cannot properly balance the application finish time and energy consumption of the mobile terminal when offloading tasks.An MOEA/D based algorithm was proposed to optimize the application finish time and energy consumption,and dynamic voltage frequency scaling technology was introduced into the MOEA/D to adjust the CPU clock frequency of mobile devices to further decrease the energy consumption without increasing the application finish time.The simulation results demonstrate that the proposed algorithm outperforms a number of existing algorithm in terms of the multi-objective performance.…”
Get full text
Article -
1565
Remission of Cognitive Deficits in Parkinson’s Disease: Recovery from a Nonamnestic Mild Cognitive Impairment or Psychiatric Symptoms Remission?
Published 2012-01-01“…The nonamnestic presentations, usually characterized by executive dysfunction, are most prevalent. We present a case report of a Parkinson’s disease patient diagnosed with nonamnestic mild cognitive impairment that showed complete remission of cognitive symptoms after one year. …”
Get full text
Article -
1566
Research on run-time overhead of RM and improvement
Published 2008-01-01“…RM algorithm is a classic fixed priority real-time scheduling algorithm, but in most embedded real-time sys- tems, where the workload is composed of many tasks of high frequency and short execution time, the overheads from context-switches of real-time operating system will lead to a low resource utilization rate if RM algorithm is directly used. …”
Get full text
Article -
1567
Território e federação: a dimensão institucional da política regional da saúde no Rio Grande do Norte
Published 2017-09-01“…Although regionalization has been considered as the structuring axis of SUS since the 1988 Constitution, the vertical normative propositions of the national federated entity and its weak management consolidation in the state federal entity are reflections of the complex organizational structure of the Brazilian federation, which "empties" the locus of regional power while it oscillates between the centralization of the national scale and the decentralization of the municipal scale, generating obstacles for the execution of a territorial pact of health policy.…”
Get full text
Article -
1568
An Efficient Solution to Optimal Motion Planning With Provable Safety and Convergence
Published 2024-01-01“…The scheme is demonstrated to outperform established relevant methods, while at the same time being competitive w.r.t. execution time. Extensive simulations to validate the effectiveness of the method are presented, along with relevant technical proofs for safety and convergence.…”
Get full text
Article -
1569
Performance analysis of web application client layer development tools us-ing Angular, React and Vue as examples
Published 2024-09-01“…It was prepared as a performance tester, implementing tests consisting of operations that manipulate a table of data, in order to measure their execution time. The results of the performed tests became the basis for further analysis. …”
Get full text
Article -
1570
Protocol to image, segment, and quantify cortical contractions in maturing mouse oocytes
Published 2025-03-01“…We then explain how to set up the pipeline to segment the oocyte outline with an ImageJ plugin Oocytor and to measure cortical fluctuations with the help of an ImageJ plugin Radioak.For complete details on the use and execution of this protocol, please refer to Nikalayevich et al.1 : Publisher’s note: Undertaking any experimental protocol requires adherence to local institutional guidelines for laboratory safety and ethics.…”
Get full text
Article -
1571
Protocol for the purification of the plastid-encoded RNA polymerase from transplastomic tobacco plants
Published 2025-03-01“…We then detail the steps for purifying PEP from the transplastomic tobacco leaves.For complete details on the use and execution of this protocol, please refer to Wu et al.1 : Publisher’s note: Undertaking any experimental protocol requires adherence to local institutional guidelines for laboratory safety and ethics.…”
Get full text
Article -
1572
Satellite observation mission planning issues: hotspots and trends analysis
Published 2025-02-01“…In the face of the continuous growth of demand for observation missions, it is increasingly critical to execute reasonable and efficient mission planning for more and more satellite resources. …”
Get full text
Article -
1573
Supporting Preemptive Multitasking in Wireless Sensor Networks
Published 2014-02-01“…Supporting the concurrent execution of multiple tasks on lightweight sensor nodes could enable the deployment of independent applications on a shared wireless sensor network, thus saving cost and time by exploiting infrastructures which are typically underutilized if dedicated to a single task. …”
Get full text
Article -
1574
Relevant Factors in The Post-Merger Systems Integration and Information Technology in Brazilian Banks
Published 2017-01-01“…We interviewed six executives of banks that held relevant experience in M & A processes. …”
Get full text
Article -
1575
Blockchain-based access control mechanism for data traceability
Published 2020-12-01“…To improve the transparency and traceability of access control, a blockchain-based access control mechanism for data traceability and provenance was proposed.The proposed access control policy was transferred to the smart contract and deployed on the blockchain, and the access authorization evaluation was realized by executing the smart contract deployed on the blockchain to ensure the decentralization, transparency and traceability of the access control process.The manner of combining off-chain and on-chain was adopted, the object was stored in off-chain data server, and the object index was generated by the object storage address and hash value, and deployed on the object blockchain.The log of object access authorization and access were recorded in the log blockchain, any misbehavior was immutably recorded.The security analysis show that, the proposed mechanism achieve the properties of decentralization, transparency and traceability while ensuring the privacy of data.…”
Get full text
Article -
1576
Survey on network security based on blockchain
Published 2018-03-01“…With the development of the mobile internet and IoT (internet of things),mass data are stored in the cyberspace.The network security and privacy are of great significance.The blockchain-based network security mechanism has the properties of decentralization,tamper-resistance,traceability,high availability and credibility,and can be applied to improve network security.The application of blockchain in the network security was explored.The main technologies and the future research direction of the blockchain-based network security mechanism were analyzed.Firstly,the blockchain-based data protection scheme was analyzed,which applied the tamper-resistance of the blockchain to improve the authenticity and reliability of data.Secondly,the blockchain-based IoT device management scheme was analyzed,which applied the blockchain to record and execute the device control instruction and improve the authority and communication of the IoT devices.Lastly,the blockchain-based domain name system was analyzed,which applied the decentralization of the blockchain to resist distributed denial of service effectively.…”
Get full text
Article -
1577
Design and implementation of secure Windows platform based on TCM
Published 2015-08-01“…A secure Windows platform solution based on TCM was proposed to solve the integrity measurement and attestation problem of the Windows system.Two security modes were realized by extending the Windows kernel:in the measurement mode,all executable contents that were loaded onto the Windows system were measured,and the TCM provided the protection and outward attestation for these measurements; and in the control mode,the measurements were further compared with a whitelist customized by an administrator,and all the programs that were not included in the whitelist would be prohibited from running.Experiment analysis shows that proposed solution can enhance the security of Windows platform and resist some software attacks; and at the same time,the average performance overhead is about 20~30ms,which will not influence the normal running of Windows.…”
Get full text
Article -
1578
Les grandes pointes foliacées du type « Ponsonby » : un traceur culturel en Patagonie australe
Published 2009-12-01“…Beyond the question of their function, the description of personalized diagnostic criteria (« chaîne opératoire », technical automatism, morphological standard, very careful execution, social value…) makes these objects the undeniable markers of a cultural facies. …”
Get full text
Article -
1579
Des étudiants en lettres face aux humanités numériques : une expérience pédagogique
Published 2022-06-01“…Students evaluated concretely the potential benefits of digital humanities methods for their own studies, either in the form of a critical reflection on a subject related to digital approaches to literary research, or through the conception and execution of a research project using digital tools and corpora of their choosing. …”
Get full text
Article -
1580
Declarative Programming with Temporal Constraints, in the Language CG
Published 2015-01-01“…Finally, we address the issue of consistency and correctness of CG program execution, using the Event-B modeling approach.…”
Get full text
Article