Showing 1,561 - 1,580 results of 3,373 for search '"executed"', query time: 0.05s Refine Results
  1. 1561

    An Enhanced Differential Evolution Algorithm with Fast Evaluating Strategies for TWT-NFSP with SSTs and RTs by Rong Hu, Xing Wu, Bin Qian, Jian L. Mao, Huai P. Jin

    Published 2020-01-01
    “…In the proposed DE_FES, the DE-based search is adopted to perform global search for obtaining the promising regions or solutions in solution space, and a fast local search combined with three presented strategies is designed to execute exploitation from these obtained regions. …”
    Get full text
    Article
  2. 1562

    Protocol for in vivo chromatin immunoprecipitation on purified chromatin isolated from mouse liver nuclei by Lei Li, May G. Akl, Scott B. Widenmaier

    Published 2025-03-01
    “…This protocol yields high-quality samples using commercial antibodies.For complete details on the use and execution of this protocol, please refer to Akl et al.1 : Publisher’s note: Undertaking any experimental protocol requires adherence to local institutional guidelines for laboratory safety and ethics.…”
    Get full text
    Article
  3. 1563

    GreyFan:a network attack framework using Wi-Fi covert channel by Dongjie MA, Chengqiang JIN, ·uan CHEN, Tieming CHEN

    Published 2019-09-01
    “…For traditional physical attacks such as side channel attacks and HID attacks in real networks,physical isolation is considered to be a relatively complete security protection against network attacks.In 2018,a Wi-Fi hidden channel method in the physical isolation environment——Ghost Tunnel was firstly proposed,that is,in the state that Wi-Fi didn’t connected,the wireless AP could successfully transmit data to the computer that initiates the connection request.An attack framework based on the Ghost Tunnel method——GreyFan was proposed.This attack framework enabled attackers to implement non-aware attacks on users who didn’t connected to Wi-Fi,such as file concealed transmission and arbitrary code execution,etc.The corresponding defense technology was also analyzed.…”
    Get full text
    Article
  4. 1564

    Multi-objective task offloading algorithm for mobile cloud computing by Fuhong SONG, Huanlai XING, Wei PAN

    Published 2019-09-01
    “…Mobile devices with limited computing power and resources can offload intensive tasks to the cloud for execution,thus improving the computing capacity of mobile devices and reducing battery energy consumption.However,the existing researches cannot properly balance the application finish time and energy consumption of the mobile terminal when offloading tasks.An MOEA/D based algorithm was proposed to optimize the application finish time and energy consumption,and dynamic voltage frequency scaling technology was introduced into the MOEA/D to adjust the CPU clock frequency of mobile devices to further decrease the energy consumption without increasing the application finish time.The simulation results demonstrate that the proposed algorithm outperforms a number of existing algorithm in terms of the multi-objective performance.…”
    Get full text
    Article
  5. 1565

    Remission of Cognitive Deficits in Parkinson’s Disease: Recovery from a Nonamnestic Mild Cognitive Impairment or Psychiatric Symptoms Remission? by Jonas Jardim de Paula, Marco Túlio Gualberto Cintra, Débora Marques Miranda, Maria Aparecida Camargos Bicalho, Edgar Nunes Moares, Leandro Fernandes Malloy-Diniz

    Published 2012-01-01
    “…The nonamnestic presentations, usually characterized by executive dysfunction, are most prevalent. We present a case report of a Parkinson’s disease patient diagnosed with nonamnestic mild cognitive impairment that showed complete remission of cognitive symptoms after one year. …”
    Get full text
    Article
  6. 1566

    Research on run-time overhead of RM and improvement by LUO Ding-ding, ZHAO Hai, SUN Pei-gang, ZHANG Xi-yuan, YIN Zhen-yu

    Published 2008-01-01
    “…RM algorithm is a classic fixed priority real-time scheduling algorithm, but in most embedded real-time sys- tems, where the workload is composed of many tasks of high frequency and short execution time, the overheads from context-switches of real-time operating system will lead to a low resource utilization rate if RM algorithm is directly used. …”
    Get full text
    Article
  7. 1567

    Território e federação: a dimensão institucional da política regional da saúde no Rio Grande do Norte by Luciana da Costa Feitosa, Aldo Dantas

    Published 2017-09-01
    “…Although regionalization has been considered as the structuring axis of SUS since the 1988 Constitution, the vertical normative propositions of the national federated entity and its weak management consolidation in the state federal entity are reflections of the complex organizational structure of the Brazilian federation, which "empties" the locus of regional power while it oscillates between the centralization of the national scale and the decentralization of the municipal scale, generating obstacles for the execution of a territorial pact of health policy.…”
    Get full text
    Article
  8. 1568

    An Efficient Solution to Optimal Motion Planning With Provable Safety and Convergence by PANAGIOTIS ROUSSEAS, Charalampos Bechlioulis, Kostas Kyriakopoulos

    Published 2024-01-01
    “…The scheme is demonstrated to outperform established relevant methods, while at the same time being competitive w.r.t. execution time. Extensive simulations to validate the effectiveness of the method are presented, along with relevant technical proofs for safety and convergence.…”
    Get full text
    Article
  9. 1569

    Performance analysis of web application client layer development tools us-ing Angular, React and Vue as examples by Damian Bogusz, Paweł Ciszewski, Beata Pańczyk

    Published 2024-09-01
    “…It was prepared as a performance tester, implementing tests consisting of operations that manipulate a table of data, in order to measure their execution time. The results of the performed tests became the basis for further analysis. …”
    Get full text
    Article
  10. 1570

    Protocol to image, segment, and quantify cortical contractions in maturing mouse oocytes by Gaëlle Letort, Elvira Nikalayevich

    Published 2025-03-01
    “…We then explain how to set up the pipeline to segment the oocyte outline with an ImageJ plugin Oocytor and to measure cortical fluctuations with the help of an ImageJ plugin Radioak.For complete details on the use and execution of this protocol, please refer to Nikalayevich et al.1 : Publisher’s note: Undertaking any experimental protocol requires adherence to local institutional guidelines for laboratory safety and ethics.…”
    Get full text
    Article
  11. 1571

    Protocol for the purification of the plastid-encoded RNA polymerase from transplastomic tobacco plants by Xiao-Xian Wu, Fan Li, Chuxia Zhu, Shu-Yi Sun, Wen-Hui Mu, Stephanie Ruf, Ralph Bock, Yu Zhang, Fei Zhou

    Published 2025-03-01
    “…We then detail the steps for purifying PEP from the transplastomic tobacco leaves.For complete details on the use and execution of this protocol, please refer to Wu et al.1 : Publisher’s note: Undertaking any experimental protocol requires adherence to local institutional guidelines for laboratory safety and ethics.…”
    Get full text
    Article
  12. 1572

    Satellite observation mission planning issues: hotspots and trends analysis by WANG Yi, LIU Desheng, LIU Jiatong, YANG Yang, HU Qinying

    Published 2025-02-01
    “…In the face of the continuous growth of demand for observation missions, it is increasingly critical to execute reasonable and efficient mission planning for more and more satellite resources. …”
    Get full text
    Article
  13. 1573

    Supporting Preemptive Multitasking in Wireless Sensor Networks by Emanuele Lattanzi, Valerio Freschi, Alessandro Bogliolo

    Published 2014-02-01
    “…Supporting the concurrent execution of multiple tasks on lightweight sensor nodes could enable the deployment of independent applications on a shared wireless sensor network, thus saving cost and time by exploiting infrastructures which are typically underutilized if dedicated to a single task. …”
    Get full text
    Article
  14. 1574

    Relevant Factors in The Post-Merger Systems Integration and Information Technology in Brazilian Banks by Marcel Ginotti Pires, Reynaldo Cavalheiro Marcondes

    Published 2017-01-01
    “…We interviewed six executives of banks that held relevant experience in M & A processes. …”
    Get full text
    Article
  15. 1575

    Blockchain-based access control mechanism for data traceability by Rongna XIE, Hui LI, Guozhen SHI, Yunchuan GUO, Ming ZHANG, Xiuze DONG

    Published 2020-12-01
    “…To improve the transparency and traceability of access control, a blockchain-based access control mechanism for data traceability and provenance was proposed.The proposed access control policy was transferred to the smart contract and deployed on the blockchain, and the access authorization evaluation was realized by executing the smart contract deployed on the blockchain to ensure the decentralization, transparency and traceability of the access control process.The manner of combining off-chain and on-chain was adopted, the object was stored in off-chain data server, and the object index was generated by the object storage address and hash value, and deployed on the object blockchain.The log of object access authorization and access were recorded in the log blockchain, any misbehavior was immutably recorded.The security analysis show that, the proposed mechanism achieve the properties of decentralization, transparency and traceability while ensuring the privacy of data.…”
    Get full text
    Article
  16. 1576

    Survey on network security based on blockchain by Ye CHEN, Dongjin XU, Liang XIAO

    Published 2018-03-01
    “…With the development of the mobile internet and IoT (internet of things),mass data are stored in the cyberspace.The network security and privacy are of great significance.The blockchain-based network security mechanism has the properties of decentralization,tamper-resistance,traceability,high availability and credibility,and can be applied to improve network security.The application of blockchain in the network security was explored.The main technologies and the future research direction of the blockchain-based network security mechanism were analyzed.Firstly,the blockchain-based data protection scheme was analyzed,which applied the tamper-resistance of the blockchain to improve the authenticity and reliability of data.Secondly,the blockchain-based IoT device management scheme was analyzed,which applied the blockchain to record and execute the device control instruction and improve the authority and communication of the IoT devices.Lastly,the blockchain-based domain name system was analyzed,which applied the decentralization of the blockchain to resist distributed denial of service effectively.…”
    Get full text
    Article
  17. 1577

    Design and implementation of secure Windows platform based on TCM by Wei FENG, Yu QIN, Deng-guo FENG, Bo YANG, Ying-jun ZHANG

    Published 2015-08-01
    “…A secure Windows platform solution based on TCM was proposed to solve the integrity measurement and attestation problem of the Windows system.Two security modes were realized by extending the Windows kernel:in the measurement mode,all executable contents that were loaded onto the Windows system were measured,and the TCM provided the protection and outward attestation for these measurements; and in the control mode,the measurements were further compared with a whitelist customized by an administrator,and all the programs that were not included in the whitelist would be prohibited from running.Experiment analysis shows that proposed solution can enhance the security of Windows platform and resist some software attacks; and at the same time,the average performance overhead is about 20~30ms,which will not influence the normal running of Windows.…”
    Get full text
    Article
  18. 1578

    Les grandes pointes foliacées du type « Ponsonby » : un traceur culturel en Patagonie australe by Dominique Legoupil, Nicole Pigeot

    Published 2009-12-01
    “…Beyond the question of their function, the description of personalized diagnostic criteria (« chaîne opératoire », technical automatism, morphological standard, very careful execution, social value…) makes these objects the undeniable markers of a cultural facies. …”
    Get full text
    Article
  19. 1579

    Des étudiants en lettres face aux humanités numériques : une expérience pédagogique by Motasem Alrahabi, Glenn Roe, Marguerite Bordry, Camille Koskas, James Gawley

    Published 2022-06-01
    “…Students evaluated concretely the potential benefits of digital humanities methods for their own studies, either in the form of a critical reflection on a subject related to digital approaches to literary research, or through the conception and execution of a research project using digital tools and corpora of their choosing. …”
    Get full text
    Article
  20. 1580

    Declarative Programming with Temporal Constraints, in the Language CG by Lorina Negreanu

    Published 2015-01-01
    “…Finally, we address the issue of consistency and correctness of CG program execution, using the Event-B modeling approach.…”
    Get full text
    Article