Suggested Topics within your search.
Suggested Topics within your search.
- Entrepreneurship 5
- Management 5
- English language 4
- Business enterprises 3
- Economic development 3
- Industrial management 3
- Information technology 3
- Methodology 3
- Research 3
- Study and teaching 3
- Classroom environment 2
- Communication in education 2
- Effective teaching 2
- Elementary school teaching 2
- Hospitality industry 2
- Inquiry-based learning 2
- Interaction analysis in education 2
- Intercultural communication 2
- Internet in public administration 2
- Internet marketing 2
- Marketing 2
- Moral and ethical aspects 2
- Psychological aspects 2
- Psychology 2
- Public administration 2
- Public relations 2
- Rhetoric 2
- Social networks 2
- Sustainable development 2
- Technical writing 2
-
5561
The different release techniques in high level archery: A comparative case study
Published 2015-02-01“…The purpose of this study is to make a more detailed analysis of the different hook strategy performed by a particular top-level archer and to consider the advantages this strategy may have on bowstring behavior after release. …”
Get full text
Article -
5562
Fine-grained privacy operation control method for layout documents
Published 2023-05-01“…In view of the problem of privacy information disclosure caused by uncontrolled forwarding in the context of frequent exchange of privacy information, a fine-grained privacy operation control method for layout documents was proposed, which could achieve differentiated fine-grained privacy operation control according to the requirements of the sharer during the sharing process of privacy information.For the received multimodal layout document, the existing privacy operation control strategy was extracted, which combined the current sharer’s use attribute and the receiver’s privacy protection ability and other factors.The privacy operation control strategy was generated iteratively, and an abstract control strategy generation algorithm framework was given.Based on the iterative privacy operation control strategy and combined with specific operation scenarios, the differentiated data-masking control, exchange boundary control and local use control were carried out for different modes of information components, and the abstract privacy operation control algorithm framework was given.A prototype system for privacy operation control of OFD (open fixed-layout document) was developed to verify the above algorithms.The generation and delivery of iterative privacy operation control strategy based on friendship, as well as the differential data-masking control, exchange boundary control and local use control of OFD were implemented in the instant messaging system.…”
Get full text
Article -
5563
Robust Control of Aeronautical Electrical Generators for Energy Management Applications
Published 2017-01-01“…A new strategy for the control of aeronautical electrical generators via sliding manifold selection is proposed, with an associated innovative intelligent energy management strategy used for efficient power transfer between two sources providing energy to aeronautical loads, having different functionalities and priorities. …”
Get full text
Article -
5564
Analisis Hubungan Kemampuan Manajemen Konflik Kepala Ruangan dengan Kepuasan Kerja Perawat Pelaksana di Ruang Rawat Inap Rumah Sakit Tk. III Reksodiwiryo Padang
Published 2019-10-01“…There is a significant relationship between conflict management and job satisfaction at Tk III Dr.Reksodiwiryo Hospital (p-value 0,000 <0.05), compromise strategy (p = 0.017), competency strategy (p = 0.025), accommodation strategy (p = 0,000 ), avoidance strategy (0.017), collaboration strategy (p = 0.021). …”
Get full text
Article -
5565
Analysis of Internet Financial Risk Control Model Based on Machine Learning Algorithms
Published 2021-01-01“…According to the optimized credit risk control strategy, corresponding strategy suggestions are provided for the credit risk control of S company. …”
Get full text
Article -
5566
Effects of a Severe Mountain Pine Beetle Epidemic in Western Alberta, Canada under Two Forest Management Scenarios
Published 2010-01-01“…Our two management scenarios were conventional harvest and a pine-reduction strategy modeled on a component of Alberta's Mountain Pine Beetle Management Strategy. …”
Get full text
Article -
5567
The effect of using promotion programs on export performance with mediating of management, s understanding of environment and commitmen
Published 2024-12-01“…Export commitment affects export strategy (0.20) and export performance (0.63). Also, export strategy affects export performance (0.52). …”
Get full text
Article -
5568
Secure control plane for SDN using Bayesian Stackelberg games
Published 2017-11-01“…A dynamic scheduling controller in SDN control layer was proposed by dynamically transform heteroge-neous controlled in order to increase the difficulty of the attacker.Firstly,a dynamic scheduling method based on Bayesian Stackelberg games the attacker and defender were game participation on both sides,obtained the equili-brium,which guided the scheduling strategy.Secondly,introducing a self-cleaning mechanism,it improved the gain of the control layer security combined with game strategy form closed-loop defense mechanism.The experiments described quantitatively based on the game strategy compared with traditional safety control layer to deploy a single controller and adopt the strategy of random scheduling profit gain of the controller,and self-cleaning mechanism could make the control plane to be in a higher level of security.…”
Get full text
Article -
5569
Active deception defense method based on dynamic camouflage network
Published 2020-02-01“…In view of the problem that the existing honeypots often fail to resist the penetration attack due to the lack of confidentiality,an active deception defense method based on dynamic camouflage network (DCN) was presented.The definition of DCN was given firstly,and then the attacker-defender scenario of active deception based on DCN was described.Next,the interaction process of the attacker-defender scenario was modeled by using a signaling game,whose equilibrium can guide the selection of optimal deception strategy.Furthermore,to quantify the payoffs accurately,the two-layer threat penetration graph (TLTPG) was introduced.Finally,the solution for game equilibrium was designed,through which pure strategy and mixed strategy could be calculated simultaneously.The experimental results show that,based on the dynamic camouflage network,the perfect Bayesian equilibrium can provide effective guidance for the defender to implement the optimal defense strategy and maximize the benefits of the defender.In addition,the characteristics and rules of active deception defense DCN-based are summarized.…”
Get full text
Article -
5570
Research on security architecture of strong PUF by adversarial learning
Published 2021-06-01“…To overcome the vulnerability of strong physical unclonable function, the adversarial learning model of strong PUF was presented based on the adversarial learning theory, then the training process of gradient descent algorithm was analyzed under the framework of the model, the potential relationship between the delay vector weight and the prediction accuracy was clarified, and an adversarial sample generation strategy was designed based on the delay vector weight.Compared with traditional strategies, the prediction accuracy of logistic regression under new strategy was reduced by 5.4% ~ 9.5%, down to 51.4%.The physical structure with low overhead was designed corresponding to the new strategy, which then strengthened by symmetrical design and complex strategy to form a new PUF architecture called ALPUF.ALPUF not only decrease the prediction accuracy of machine learning to the level of random prediction, but also resist hybrid attack and brute force attack.Compared with other PUF security structures, ALPUF has advantages in overhead and security.…”
Get full text
Article -
5571
Maximizing Lifetime of Three-Dimensional Corona-Based Wireless Sensor Networks
Published 2014-05-01“…Furthermore, the optimal equal distance strategy (OEDS) which is a simple deployment strategy was proposed to prolong the lifetime of the network by optimizing layer number k .…”
Get full text
Article -
5572
The Effects of Slavery on Enslaved People and Eighteenth-Century Antislavery Arguments
Published 2025-01-01“…After examining this argumentative strategy and what makes it appealing, this paper investigates several ways in which it is problematic. …”
Get full text
Article -
5573
An Evolution Model of Fintech Supports Technology-Based SMEs Innovation and Growth
Published 2022-01-01“…Introducing the role of fintech, the paper builds an evolutionary model for growth of technology-based SMEs and analyzes fintech incentive mechanisms to guide corporate growth strategies based on some cases by the simulation. The research results show that the evolutionary game strategy that SMEs are willing to adopt is {cooperation, cooperation}. …”
Get full text
Article -
5574
Evolutionary Game of Social Network for Emergency Mobilization (SNEM) of Magnitude Emergencies: Evidence from China
Published 2022-01-01“…The analysis of the types, generation mechanism, subject behavior, and strategy selection of the SNEM aid in adopting appropriate mobilization strategy based on magnitude emergencies, achieving the adaptation of the SNEM and emergency scenarios. …”
Get full text
Article -
5575
Cost-effectiveness of AI for pediatric diabetic eye exams from a health system perspective
Published 2025-01-01“…We examined the cost-effectiveness of an autonomous AI strategy versus a traditional eye care provider (ECP) strategy during the initial year of implementation from a health system perspective. …”
Get full text
Article -
5576
The Mechanical Impact of Aerodynamic Stall on Tunnel Ventilation Fans
Published 2012-01-01“…The third strategy selects a fan with a fitted stabilisation ring. …”
Get full text
Article -
5577
La estrategia CRM, una visión 360º del cliente
Published 2005-01-01“…CRM strategy (customer relationship management) is a business philosophy, stemming from relationship marketing that joins strategy and technology, with the objective of creating value for both customers and the company. …”
Get full text
Article -
5578
Admission control algorism study of multi-rate traffics for TD-SCDMA system
Published 2012-04-01“…A call admission control strategy based on traffic priorities was proposed after considering the different rates of traffic requirements and the attributes of different admission requests of services.According to the current system load ,it decides whether or not to accept the call request by taking the strategy of queue / deceleration / demolitions.Simulation results show that the strategy is significantly improved in the systems service level and resource utilization.…”
Get full text
Article -
5579
-
5580
Intelligent Boarding Modelling and Evaluation: A Simulation-Based Approach
Published 2021-01-01“…Firstly, we proposed an improved outside-in strategy, which costs shorter boarding time based on the existing outside-in strategy. …”
Get full text
Article