Showing 1,941 - 1,960 results of 3,373 for search '"executed"', query time: 0.06s Refine Results
  1. 1941

    Electoral Management in the Western Balkans – Overview of Institutional Setting by Marko Milenković

    Published 2020-02-01
    “…Based on this influence, all the countries of the WB have established electoral commissions that are to great extent formally independent from the executive, with the intention of being less prone to electoral meddling. …”
    Get full text
    Article
  2. 1942

    Turbine Airfoil Optimization Using Quasi-3D Analysis Codes by Sanjay Goel

    Published 2009-01-01
    “…An inviscid flow solver is used to reduce the execution time of the analysis. Multiple evaluation criteria based on the Mach number profile obtained from the analysis of each airfoil cross-section are used for computing a quality metric. …”
    Get full text
    Article
  3. 1943

    Cognitive flexibility and sociality in Guinea baboons (Papio papio). by Julie Gullstrand, Nicolas Claidière, Joël Fagot

    Published 2024-01-01
    “…Cognitive flexibility is an executive function playing an important role in problem solving and the adaptation to contextual changes. …”
    Get full text
    Article
  4. 1944

    Transforming The Institutional and Governance Frameworks of Indonesia’s Downstreaming Policy by Bahlil Lahadalia, Chandra Wijaya, Athor Subroto

    Published 2025-01-01
    “…Purpose: This paper seeks to address the existing governance and institutional challenges that obstruct effective policy execution through an integrative literature review and comparative analysis. …”
    Get full text
    Article
  5. 1945

    Une figurine en terre cuite dorée d’époque romaine à Reims/Durocortorum by Loïc Androuin

    Published 2022-11-01
    “…The gilding applied to a portion of its surface makes this figurine unique within Roman Gaul, specifically in terms of coroplastic studies and craft industries more generally. While its execution remains classical and similar to other known Greek gilded figurines, its uniqueness invites the opinion that this object was commissioned by a rather wealthy client. …”
    Get full text
    Article
  6. 1946

    Failure recovery algorithm for LRT and transaction property analysis by Xiao-yong MEI, Chang-qin HUANG, Xiao-lin ZHENG, De-ren CHEN, Shi-xian LI

    Published 2012-04-01
    “…Researchers have worked on recovery strategies of composition transactions,most efforts focus on transaction consistency by backward recovery,compensation is commonly used for backward recovery,which have limitations since the cost of compensation tasks are rather expensive,and the compensation mechanism can not satisfy various requirements of applications.A transaction recovery algorithm was proposed including forward recovery,backward recovery and alternative recovery,which was a formal modeling method based on extended Petri nets,state token,data token and QoS token were introduced to implement relaxed ACID properties of LRT.When failure occurs,terminate dependency point (TDP) and compensation set were calculated dynamically,recovery strategies were added or deleted automatically according to the data flow dependency,control flow dependency and state dependency among tasks.Failure types are generated by log file mining,therefore,failure coordination and recovery are implemented and an executable model which support add/delete failure recovery behavior is constructed seamlessly.…”
    Get full text
    Article
  7. 1947

    Physical Simulation of Burning Process of Alternative Engine Fuels by M. S. Assad

    Published 2008-04-01
    “…This method as an efficient means for investigation of fast processes permits to obtain a visual, convenient visual perception insight about the development of the burning process and understand peculiarities of the development of flame in the closed vessels.The paper contains a description of an experimental stand and methodology for execution of an experiment on visualization of the flame development and measurement of main parameters of the burning process in a closed vessel that is in the simulating combustion chamber.According to the obtained photos an analysis of form, structure and dynamics of flame front development has been carried out; some peculiarities and differences of flames of various fuel-air mixtures have been established and the paper proves an occurrence of the secondary glow during burning in the closed vessel.Body of data obtained with the help of the visualization of burning process makes it possible to determine main parameters of the burning process. …”
    Get full text
    Article
  8. 1948

    QoE Guarantee Scheme Based on Cooperative Cognitive Cloud and Opportunistic Weight Particle Swarm by Weihang Shi

    Published 2015-01-01
    “…The experimental results show that the proposed mechanism compared is superior to the QoE guarantee scheme based on cooperative cloud and QoE guarantee scheme based on particle swarm optimization, compared with optimization fitness and high cloud computing service execution efficiency and high throughput performance advantages.…”
    Get full text
    Article
  9. 1949

    Spatiotemporal chaotic one-way Hash function construction based on coupled tent maps by LIU Jian-dong, FU Xiu-li

    Published 2007-01-01
    “…A novel coupled tent maps-based spatiotemporal chaotic cryptographic Hash function was proposed.Compared with the discrete tent map,the coupled discrete tent spatiotemporal chaotic maps have longer computer-realization-period,nearly uniform distribution and desired diffusion and confusion properties.Based on the coupled discrete tent spatiotemporal chaotic maps,a cryptographic Hashing function is constructed to generate 128-bit Hash value from a message with arbitrary length.The approach uses the initial value of coupled discrete tent chaotic dynamical system iteration as the secret key.The key space is very large.There is a high sensitivity and complex and strongly nonlinear coupling relation between the Hash value and the corresponding message and secret key.Theoretic analysis and simulation results are shown that the approach possess not only extremely high security in comparison with earlier chaotic Hash functions,but also the high execution speed.Therefore,the approach can satisfy all the performance requirements of Hash function,such as one-way,key sensitivity and collision resistance.…”
    Get full text
    Article
  10. 1950

    Dynamic scheduling method of service function chain executors based on the mimic defense architecture by Chuanhuang LI, Jingjing TANG, Yangting CHEN, Rui LEI, Chao CHEN, Weiming WANG

    Published 2022-04-01
    “…Faced with the problem that static and lagging traditional defense technologies cannot effectively deal with new network attacks, according to the theory of mimetic security defense, a defense architecture of mimic service function chain (MSFC) based on the data forwarding level was proposed, and an execution dynamic scheduling method based on the decision feedback was further proposed.The method took the abnormal executor information fed back by the decision maker, the heterogeneity of executors and the actual load of the system as the scheduling influencing factors, so that the scheduling method can be adjusted adaptively according to the actual changes of the network.In addition, the scheduling method used decision feedback to adjust the scheduling time, so as to achieve the best balance between system cost and security, and reduce the resource overhead of the system.Simulation results showed that the scheduling method can select a set of highly heterogeneous actuators that better meet the current network requirements on the basis of balancing the system cost and security, so as to improve the security and reliability of the system.…”
    Get full text
    Article
  11. 1951

    Energy-efficient strategy for work node by DRAM voltage regulation in storm by Yonglin PU, Jiong YU, Liang LU, Chen BIAN, Bin LIAO, Ziyang LI

    Published 2018-10-01
    “…Focused on the problem that traditional energy-efficient strategies never consider about the real time of data processing and transmission,models of directed acyclic graph,parallelism of instance,resource allocation for task and critical path were set up based on the features of data stream processing and the structure of storm cluster.Meanwhile,the WNDVR-storm (energy-efficient strategy for work node by dram voltage regulation in storm) was proposed according to the analysis of critical path and system performance,which included two energy-efficient algorithms aiming at whether there were any work nodes executing on the non-critical path of a topology.Finally,the appropriate threshold values fit for the CPU utilization of work node and the volume of transmitted data were determined based on the data processing and transmission constraints to dynamically regulate the DRAM voltage of the system.The experimental result shows that the strategy can reduce energy consumption effectively.Moreover,the fewer constraints are,the higher energy efficiency is.…”
    Get full text
    Article
  12. 1952

    PENGARUH KOMUNIKASI PEMASARAN TERHADAP PENINGKATAN JUMLAH NASABAH ASURANSI BUMI ASIH JAYA MEDAN by Ardial Ira Yustina

    Published 2016-01-01
    “…This research is conducted to know how execution of marketing communications by employees of Glorious Earth Asih Insurance. …”
    Get full text
    Article
  13. 1953

    Indentured impressions: The embodied materiality of artistic practices in Mauritius by Baishali Ghosh

    Published 2024-11-01
    “…The first part of the text discusses how the artists appropriate colonial records, familial objects and sensorial evidences in executing their works and articulating their methods; it argues that the artistic praxes deliberately process embodied indentured labour histories. …”
    Get full text
    Article
  14. 1954

    “[T]hat pincushion made of crimson satin:” Embroidery, Discourse and Memory in Victorian Literature and Culture by Róisín QUINN-LAUTREFIN

    Published 2018-12-01
    “…Although it was viewed as an ancient and prestigious craft, its practitioners were happy to rely on speedy execution, easy shortcuts, mass-produced materials and widely-circulated patterns.A reflection on time seems to transpire through these text-iles. …”
    Get full text
    Article
  15. 1955

    STRUCTURE FINITE ELEMENT ANALYSIS AND LIGHTWEIGHT DESIGN OF MULTILAYER DRUM by WEN MingLiang, WU Xiao, LI Xin, XIONG Gang

    Published 2015-01-01
    “…In order to reduce the execution cycle of the ANSYS optimization method and improve the efficiency,it uses LM-BP neural network which has great nonlinear problem fitting ability and GA which has excellent global search ability in Matlab to realize this rapid optimization design of multilayer drum. …”
    Get full text
    Article
  16. 1956

    Epidemiology and Causes of common Soccer injuries During University Games in Uganda by Tusiime, Olive, Kateshumbwa, Eunice, Chebet, Milton

    Published 2023
    “…Dry and hard grounds, joint instability, bad playing field conditions, inadequate treatment/ rehabilitation from previous injury, exercise overload/ over training, poor skill execution, poor training techniques and player neglect caused the injuries. …”
    Get full text
    Article
  17. 1957

    Professionalisation and governance in sports organisations: towards an integrated understanding by Raphael Stieger, Siegfried Nagel, Grazia Lang

    Published 2025-01-01
    “…Therefore, more and more sports organisations are professionalising their structures and processes, such as establishing an executive office with paid staff, which may influence governance structures and processes. …”
    Get full text
    Article
  18. 1958

    Value-creating factors in the professional relationship between the auditor and the employer in the auditing profession by Alireza Vaziri, keihan Azadi, Mojtaba Maleki choubari

    Published 2024-08-01
    “…The current research is applicative in terms of purpose, and quantitative in terms of execution method. The statistical population of the research includes 303 people, including financial experts, executive directors, auditors or legal inspectors, CEOs or members of the board of directors, university faculty members, and etc.; selected through a targeted sampling method. …”
    Get full text
    Article
  19. 1959

    Reduced interhemispheric connectivity in traumatic brachial plexopathies after bionic reconstruction by Galia V Anguelova, Agnes Sturma, Oskar Aszmann, Mehmet S Yildirim, Anna Boesendorfer, Victor Schmidbauer, Karl-Heinz Nenning, Gregor Kasprian

    Published 2025-01-01
    “…This cross-sectional study aimed to assess (sub)cortical motor activity and functional connectivity changes after TBPL and bionic reconstruction.Cortical activity was measured with functional MRI (fMRI) during execution, and imagery of hand closing movements with the affected and healthy arm and single subject analysis was performed on the fMRI data. …”
    Get full text
    Article
  20. 1960

    Tools for the Analysis of Quantum Protocols Requiring State Generation Within a Time Window by Bethany Davies, Thomas Beauchamp, Gayane Vardoyan, Stephanie Wehner

    Published 2024-01-01
    “…The methods presented in this work can be used to analyze and optimize the execution of quantum protocols. Specifically, with an example of a blind quantum computing protocol, we illustrate how they may be used to infer <inline-formula><tex-math notation="LaTeX">$w$</tex-math></inline-formula> and <inline-formula><tex-math notation="LaTeX">$p$</tex-math></inline-formula> to optimize the rate of successful protocol execution.…”
    Get full text
    Article