Showing 1,921 - 1,940 results of 3,373 for search '"executed"', query time: 0.06s Refine Results
  1. 1921

    The impact of providing a continuum of care in the throughcare and aftercare process by Caroline Chittleburgh

    Published 2010-03-01
    “…In response to such findings, regulations and guidance were published, outlining responsibilities for supporting young people leaving care (Scottish Executive, 2004). The Regulations and Guidance includes duties to assess and review a young person's aftercare needs and to establish clear plans called pathways. …”
    Article
  2. 1922

    Shared Leadership in Schools: Strategies for Improving Teacher Performance by Kelly Rozalinda, Ali Marzuki Zebua

    Published 2024-09-01
    “…In 2022, the teacher performance percentage reached 68%-80%, indicating adaptation and improvement in task execution. The peak of performance improvement was achieved in 2023, with over 90% for most indicators. …”
    Get full text
    Article
  3. 1923

    MOTIVATING DELEGATION MODEL AND ITS RATIONALE by A. A. Dolgaya

    Published 2020-07-01
    “…Motivating delegation allows you guaranteed to activate both the emotional part of the performer’s brain, which provides energy for the execution of the task, and the prefrontal complex, which is responsible for the thoughtfulness, creativity and consistency of the result and the process of the performance of the task.…”
    Get full text
    Article
  4. 1924

    Computation energy efficiency maximization based resource allocation scheme in wireless powered mobile edge computing network by Liqin SHI, Yinghui YE, Guangyue LU

    Published 2020-10-01
    “…For wireless powered mobile edge computing (MEC) network,a system computation energy efficiency (CEE) maximization scheme by considering the limited computation capacity at the MEC server side was proposed.Specifically,a CEE maximization optimization problem was formulated by jointly optimizing the computing frequencies and execution time of the MEC server and the edge user(EU),the transmit power and offloading time of each EU,the energy harvesting time and the transmit power of the power beacon.Since the formulated optimization problem was a non-convex fractional optimization problem and hard to solve,the formulated problem was firstly transformed into a non-convex subtraction problem by means of the generalized fractional programming theory and then transform the subtraction problem into an equivalent convex problem by introducing a series of auxiliary variables.On this basis,an iterative algorithm to obtain the optimal solutions was proposed.Simulation results verify the fast convergence of the proposed algorithm and show that the proposed resource allocation scheme can achieve a higher CEE by comparing with other schemes.…”
    Get full text
    Article
  5. 1925

    Cryptographic service optimization scheduling algorithm for collaborative jobs in cloud environment by CAO Xiaogang, LI Fenghua, GENG Kui, LI Zifu, KOU Wenlong

    Published 2024-07-01
    “…In the selection stage, the improved NSGA-III algorithm was employed to select computing units for cryptographic computing jobs, and in the sorting stage, the execution order was determined based on the urgency of jobs. …”
    Get full text
    Article
  6. 1926

    The Impact of Venture Capital Background on CEO Replacement in Portfolio Companies: Empirical Evidence from China by Haixia Hao, Lihong Guo

    Published 2021-01-01
    “…Taking Chinese startups backed by venture capital (VC) in 1997–2017 as the sample, this study investigates the impact of VC background on chief executive officer (CEO) replacement in portfolio companies. …”
    Get full text
    Article
  7. 1927

    H.264 SVC Complexity Reduction Based on Likelihood Mode Decision by L. Balaji, K. K. Thyagharajan

    Published 2015-01-01
    “…H.264 Advanced Video Coding (AVC) was prolonged to Scalable Video Coding (SVC). SVC executes in different electronics gadgets such as personal computer, HDTV, SDTV, IPTV, and full-HDTV in which user demands various scaling of the same content. …”
    Get full text
    Article
  8. 1928

    Le « Héros homicide et nocturne » en pleines « Lumières » : de Cartouche ou les voleurs (1721) aux « Vies privées » (1721-1803) by Anne-Marie Mercier-Faivre

    Published 2013-01-01
    “…The movement, revealed in the plays La Devineresse (1679) by Thomas Corneille and Cartouche et les voleurs (1721) by Legrand, shows a curiosity that goes beyond the spectacle of criminal executions. If Corneille’s play is used by the authorities to attack superstition in the “poisons affair”, the decision to forbid Legrand’s play (presenting the criminal Cartouche in a very attractive light at the moment of his trial) shows that the government is taking note of the new fascination with criminals. …”
    Get full text
    Article
  9. 1929

    Taking Note: Challenges of Dealing with Graphical Content in TEI by Martina Scholger

    Published 2020-01-01
    “…This model takes into account the (1) graphical components characterizing the composition, (2) textual functions describing and directing the execution of artworks, and (3) interpretation of the graphics and their contextualization with connected material and information. …”
    Get full text
    Article
  10. 1930

    Implementation Of The Use Of The C Programming Language in The Ubuntu Linux Operating System by Samsuriah Agus

    Published 2024-06-01
    “…The compilation and execution processes differ significantly on Ubuntu Linux, necessitating a distinct approach. …”
    Get full text
    Article
  11. 1931
  12. 1932

    Barriers and facilitators in delivering a new model of sexual health service for young people who are looked after by Hannah Dale, Lorna Watson

    Published 2010-03-01
    “…Due to their poorer outcomes, the need to intervene with and prioritise them has often been highlighted (Scottish Executive, 2005; Scott & Hill, 2006; NHS Fife, 2007; Scottish Government, 2007; Health Scotland, 2008).…”
    Article
  13. 1933

    CEO political orientation and loan contract by Chune Young Chung, Changhwan Choi, Do Thi Thanh Nhan

    Published 2025-01-01
    “…Given the common belief that certain personality traits—such as trustworthiness, reliability, loyalty, thriftiness, and stinginess—are more often linked to conservatives (Republicans) than to liberals (Democrats), we investigate whether companies with conservative chief executive officers (CEOs) secure more advantageous loan terms compared to others. …”
    Get full text
    Article
  14. 1934

    La Coroplastica Greca. Metodologie per lo studio di produzioni, contesti e immagini by Jaimee Uhlenbrock

    Published 2013-06-01
    “…From May 27 to June 1, 2013, the First International Summer School on Greek Coroplastic Studies was held in Catania, Sicily. Organized by ACoST Executive Committee member Antonella Pautasso, project director at IBAM-CNR, Catania, and Ambra Pace of the University of Messina, with the support of Mario Cottonaro of the University of Catania and Vanessa Chillemi of the University of Messina, this 6-day event was called La Coroplastica Greca. …”
    Get full text
    Article
  15. 1935
  16. 1936

    Strategic Policy Overreaction as a Risky Policy Investment by Moshe Maor

    Published 2019-06-01
    “…This may be motivated by, among other factors, political executives’ desire to pander to public opinion, appear informed to voters, and signal extremity. …”
    Get full text
    Article
  17. 1937

    Alexithymia and Apathy in Parkinson’s Disease: Neurocognitive Correlates by Yelena Bogdanova, Alice Cronin-Golomb

    Published 2013-01-01
    “…Alexithymia was associated with performance on non-verbally mediated measures of executive and visuospatial function, but not on verbally mediated tasks. …”
    Get full text
    Article
  18. 1938

    Wireless quantum power distribution system based on wireless by Jiawei WU, Yuxiang BIAN, Qing ZHANG, Bao FENG

    Published 2020-02-01
    “…The traditional optical fiberchannel-based key distribution method is limited by the optical fiber resources and construction cost,and it is difficult to meet the security enhancement requirements of the access side massive power service terminals,especially the mobile terminals.In this respect,a wireless channel-based quantum key distribution system was proposed,which was suitable for mass service terminals of power systems.Based on the wireless access requirements of mass service terminals in power system,the overall design of power quantum key distribution system based on wireless channel was given.The functional modules and execution flow of the power quantum key distribution system based on wireless channel were analyzed in detail from three aspects:quantum security service control platform,quantum key storage management platform and massive power service terminal platform.On this basis,combined with the typical power service such as electricity information collection and mobile office,the advantages and prospects of the quantum channel distribution system based on wireless channel applied to the terminal scenario of massive power service were comprehensively analyzed.…”
    Get full text
    Article
  19. 1939

    Psychological and neuropsychological clinical impact in brain cancer patients and evidence-based psychological intervention: a systematic review of the literature by Pasquale Caponnetto, Giulia Schilirò, Marilena Maglia, Graziella Chiara Prezzavento, Chris Baeken, Maria Catena Quattropani

    Published 2024-01-01
    “… # Conclusions Overall, neurocognitive rehabilitation had an improvement on cancer patients and a recovery of executive and cognitive functions, a better quality of life, and psychological well-being.…”
    Get full text
    Article
  20. 1940

    Perceived value of organizational foresight processes: effects of the illusion of control and individual foresight by Natália Borges, Raquel Janissek-Muniz

    Published 2021-01-01
    “…The sample was composed of 185 executives from the financial and technological sectors, and a reduction to the perceived value of foresight processes was identified, as a result of the illusion of control and individual practices of these activities. …”
    Get full text
    Article