-
801
État actionnaire et capitalisme de connivence au Maroc : le cas de la Caisse de dépôt et de gestion (CDG)
Published 2021-07-01“…Despite the resurgence of developmental aspirations with the Moroccanization policy in the 1970s, the CDG was quickly captured by Moroccan crony capitalism embedded in a hierarchical global economic system. It suffered from the privatizations of the 1990s for the benefit of companies related to the holders of political power.In the 2000s, the organization and strategy of the CDG changed to comply with the constraints/injunctions of a shareholder logic. …”
Get full text
Article -
802
Artificial intelligence in the service of entrepreneurial finance: knowledge structure and the foundational algorithmic paradigm
Published 2025-02-01“…In contrast, applications of topic modeling, fuzzy neural networks, and growing hierarchical self-organizing maps are rare. Additionally, we take a broader view by addressing the problem of applying artificial intelligence in economic science. …”
Get full text
Article -
803
Communication service priority in smart substation and its queue scheduling method
Published 2021-07-01“…The future development of power grid puts forward the requirement of unified network for all the communication services in smart substation.In order to meet the different quality of service (QoS) requirements of various communication services, as well as ensure the real-time and reliability of key services when the network congestion occurs, a priority scheme and its queue scheduling method for the smart substation was proposed.The priorities of the communication services in the smart substation were assigned considering the delay requirements, the importance to power grid operation control, and the traffic of the communication services.The queue scheduling algorithm of hierarchical deficit weighted round robin (HDWRR), combining the advantages of strict priority queue (SPQ) algorithm and deficit weight round robin (DWRR) algorithm, was designed for the proposed priority scheme.The simulation results show that the proposed method has isolation ability for malicious traffic, and can ensure the real-time and reliable transmission of key services in smart substation once the network is congested.…”
Get full text
Article -
804
Causes et conséquences de l’hyperconnectivité professionnelle : au-delà de la responsabilité individuelle des travailleurs et travailleuses
Published 2024-09-01“…This occurs in workers of all backgrounds and hierarchical positions. It is likewise associated with many deleterious effects for the health of these workers, their professional trajectories, their work-life balance, and even the organization of work itself. …”
Get full text
Article -
805
Multi-view graph neural network for fraud detection algorithm
Published 2022-11-01“…Aiming at the problem that in the field of fraud detection, imbalance labels and lack of necessary connections between fraud nodes, resulting in fraud detection tasks not conforming to the hypothesis of homogeneity of graph neural networks, multi-view graph neural network for fraud detection (MGFD) algorithm was proposed.First, A structure-independent encoder was used to encode the attributes of nodes in the network to learn the difference between the fraud node and the normal node.The hierarchical attention mechanism was designed to integrate the multi-view information in the network, and made full use of the interaction information between different perspectives in the network to model the nodes on the basis of learning differences.Then, based on the data imbalance ratio sampled subgraph, the sample was constructed according to the connection characteristics of fraud nodes for classification, which solved the problem of imbalance sample labels.Finally, the prediction label was used to identify whether a node is fraudulent.Experiments on real-world datasets have shown that the MGFD algorithm outperforms the comparison method in the field of graph-based fraud detection.…”
Get full text
Article -
806
Pacient a lékař – už ve starém Egyptě
Published 2013-01-01“…Some of the doctors have reached soon domain specialization, while others gained hierarchical titles counting as well the highest of them. …”
Get full text
Article -
807
Packet-loss robust scalable authentication algorithm for compressed image streaming
Published 2014-04-01“…Firstly, the compressed streams of the original image are analyzed to obtain hierarchical structures and coding dependencies. Secondly, in accordance with the differentiation-importance of codestreams to the reconstructed image, sub-important packet is linked to more important packets via hash chains. …”
Get full text
Article -
808
Improving energy efficiency and network performance in IaaS cloud with virtual machine placement
Published 2014-01-01“…The existing virtual machine(VM) placement schemes mostly reduce energy consumption by optimizing utilization of physical server or network element.However,the aggressive consolidation of these resources may lead to network performance degradation.In view of this,a VM placement scheme was proposed to achieve two objectives.One is to minimize the number of activating physical machines and network elements to reduce the energy consumption,and the other is to minimize the maximum link utilization to improve the network performance.This scheme is able to reduce the energy consumption caused by physical servers and network equipment while optimizing the network performance,making a trade off between energy efficiency and network performance.A novel two-stage heuristic algorithm for a solution was designed.Firstly,the hierarchical clustering algorithm based on minimum cut and best fit algorithm was used to optimize energy efficiency,and then,local search algorithm was used to minimize the maximum link utilization.The simulations show that this solution achieves good results.…”
Get full text
Article -
809
ETHNOCENTRISM AND ANIMOSITY IN CONSUMER BEHAVIOR IN BOSNIA AND HERZEGOVINA AND IMPLICATIONS FOR COMPANIES
Published 2011-05-01“…Data was processed using ACNOVA, Cronbach alpha and hierarchical regression analysis. …”
Get full text
Article -
810
Des normes professionnelles auto-prescrites. Le cas de la mise en œuvre de la démarche d’enseignement scientifique en Suisse romande
Published 2019-01-01“…Data processing was carried out using factor analysis and hierarchical bottom-up classification. This quantitative analysis revealed the following: (1) the existence of self-prescribed standards for the establishment of the inquiry based science education(2) the existence of 4 categories of teachers according to their adherence to the pedagogical and epistemological standards of the IBSE; (3) hypotheses concerning the existence of a generational cleavage (experienced/non-experienced) and/or a cleavage linked to the level of education(students from 4 to 7 years old/students from 8 to 11 years old) that explains the variability in the rate of adherence to the epistemological and didactic norms of the IBSE.…”
Get full text
Article -
811
Biomechanical Dynamics of Cranial Sutures during Simulated Impulsive Loading
Published 2015-01-01“…It was concluded that the higher order hierarchical suture morphology, lower suture elastic modulus, and the better collagen fiber orientation must benefit the stress attenuation and energy absorption.…”
Get full text
Article -
812
Modeling and Stochastic Model Updating of Bolt-Jointed Structure
Published 2018-01-01“…Modal tests and experimental modal analysis of substructures and built-up structure are performed. A hierarchical model updating strategy based on Bayesian inference is applied to identify the unknown parameters in the substructures model and those in the overall model. …”
Get full text
Article -
813
Two-layer grouped Byzantine fault tolerance algorithm for UAV swarm
Published 2022-01-01“…To reduce the communication complexity and improve the robustness of blockchain network, a two-layer grouped Byzantine fault tolerance algorithm for unmanned ariel vehicle (UAV) swarm was proposed.First, nodes were divided into several groups according to the formation results of UAV swarm.A portion of high-reputation nodes were selected from each group to form a committee, and other nodes were used as shared nodes.Threshold signature techniques were employed to reduce communication complexity.In that way, nodes from other groups only needed to communicate with the committee nodes of the current group, thus greatly reducing the average communication delay.In addition, the hierarchical structure, which made the identity of the primary node hidden in the committee, reduced the risk of being adaptively attacked by the Byzantine nodes and improves the robustness of the system.Experimental results demonstrates that the proposed algorithm significantly reduces the delay of the consensus process and can effectively ensure the aliveness of the system compared with the comparison algorithm.…”
Get full text
Article -
814
Research on low-energy-consumption deployment of emergency UAV network for integrated communication-navigating-sensing
Published 2022-07-01“…In public emergencies such as accident relief, rescue workers are faced with challenges, such as poor communication, unstable navigating, and inaccurate disaster sensing.It is necessary to deploy an emergency unmanned aerial vehicle (UAV) network to guarantee the services of communication-navigating-sensing.Aiming at alleviating the problem of limited energy of UAV, a low-energy-consumption deployment of an emergency UAV network was first proposed for integrated communication-navigating-sensing (ICNS).The proposed scheme was able to realize network topology reconstruction and role cognition on demand.Then, a particle swarm algorithm based hierarchical matching decision-making algorithm was presented to jointly optimize three sub-problems, including the associations between UAVs and users, the resource allocation for multi-role UAV communications, and the UAV position.Simulation results show that the proposed ICNS scheme can achieve flexible adaptation of the multi-objective requirements and limited network resources, and dramatically reduce the demand for the number of UAVs and the deployment energy consumption.…”
Get full text
Article -
815
A feminist analysis of child neglect cases from the Brazilian Superior Court of Justice
Get full text
Article -
816
Possibilities of Habit-Change in The Essex Serpent: A Semiotic Analysis of Cora Seaborne
Published 2022-04-01“…The full development of Perry’s protagonist in these terms brings about an awareness about this in-betweenness, which produces a non-binary and non-hierarchical ethical turn beyond rigid categories that define the subject’s relationship with the world. …”
Get full text
Article -
817
Evaluation of the Normative Framework of Strategic Planning for the Realization of Good Urban Governance in Tehran\'s 22 District
Published 2022-03-01“…The tool for evaluating AHP's hierarchical analysis technique is implemented according to the views of the experts and stakeholders. …”
Get full text
Article -
818
Data transmission algorithm for mobile wireless sensor network based on power loss equalization control mechanism
Published 2018-11-01“…In order to solve the problem of synchronization addressing and the inadequacy of power interaction among nodes in the current mobile wireless sensor network,a new data transmission algorithm for mobile wireless sensor network was proposed.Firstly,the broadcast mechanism was adopted to realize synchronous control packet transmission and reduce the pressure caused by the synchronization flow to the addressing process.Then regional node flow valve control mechanism was used,and data traffic between sink nodes and regional node links were recorded and got by interception,flow link equalization was further adopted to promote traffic equalization.in the further step.Finally,the limited bandwidth based on wheel number-sink link jitter screening mode could be identified,and the transmission failure due to limited bandwidth was reduced.Simulation results show that compared with the bandwidth of the root zone node and widely used in limiting transmission algorithm,node link stability encoding algorithm and hierarchical encoding algorithm,the data transmission bandwidth can be improved,the packet loss rate can be reduced,and the practical needs can be better met.…”
Get full text
Article -
819
Evolution of Mesopores in Monolithic Macroporous Ethylene-Bridged Polysilsesquioxane Gels Incorporated with Nonionic Surfactant
Published 2012-01-01“…By combining the micellar templating in nanometer scale with the polymerization-induced phase separation in micrometer scale, ethylene-bridged polysilsesquioxane gels with hierarchical macropores and mesopores are prepared. The difference of mesopore structures depending on the method of the solvent removal has been observed by the X-ray diffraction and the nitrogen adsorption-desorption measurements. …”
Get full text
Article -
820
Risk Evaluation of Urban Integrated Pipe Corridor Operation and Maintenance Based on Improved AHP-CIM Model
Published 2022-01-01“…Using a combination of qualitative and quantitative methods, the risk factors in the operation and maintenance process of the integrated urban pipe corridor were first identified and their weights determined, and then the CIM model was used to calculate the probability distribution of the levels of risk factors at each level of the hierarchical model, and finally the risk assessment set of the risk probability distribution of this integrated pipe corridor was obtained. …”
Get full text
Article