Showing 5,561 - 5,580 results of 31,041 for search '"strategy"', query time: 0.11s Refine Results
  1. 5561

    The different release techniques in high level archery: A comparative case study by Deniz Sımsek, Hayri Ertan

    Published 2015-02-01
    “…The purpose of this study is to make a more detailed analysis of the different hook strategy performed by a particular top-level archer and to consider the advantages this strategy may have on bowstring behavior after release. …”
    Get full text
    Article
  2. 5562

    Fine-grained privacy operation control method for layout documents by Peijie YIN, Fenghua LI, Ben NIU, Haiyang LUO, Bin KUANG, Lingcui ZHANG

    Published 2023-05-01
    “…In view of the problem of privacy information disclosure caused by uncontrolled forwarding in the context of frequent exchange of privacy information, a fine-grained privacy operation control method for layout documents was proposed, which could achieve differentiated fine-grained privacy operation control according to the requirements of the sharer during the sharing process of privacy information.For the received multimodal layout document, the existing privacy operation control strategy was extracted, which combined the current sharer’s use attribute and the receiver’s privacy protection ability and other factors.The privacy operation control strategy was generated iteratively, and an abstract control strategy generation algorithm framework was given.Based on the iterative privacy operation control strategy and combined with specific operation scenarios, the differentiated data-masking control, exchange boundary control and local use control were carried out for different modes of information components, and the abstract privacy operation control algorithm framework was given.A prototype system for privacy operation control of OFD (open fixed-layout document) was developed to verify the above algorithms.The generation and delivery of iterative privacy operation control strategy based on friendship, as well as the differential data-masking control, exchange boundary control and local use control of OFD were implemented in the instant messaging system.…”
    Get full text
    Article
  3. 5563

    Robust Control of Aeronautical Electrical Generators for Energy Management Applications by Giacomo Canciello, Alberto Cavallo, Beniamino Guida

    Published 2017-01-01
    “…A new strategy for the control of aeronautical electrical generators via sliding manifold selection is proposed, with an associated innovative intelligent energy management strategy used for efficient power transfer between two sources providing energy to aeronautical loads, having different functionalities and priorities. …”
    Get full text
    Article
  4. 5564

    Analisis Hubungan Kemampuan Manajemen Konflik Kepala Ruangan dengan Kepuasan Kerja Perawat Pelaksana di Ruang Rawat Inap Rumah Sakit Tk. III Reksodiwiryo Padang by Astri Doris, Fatma Sriwahyuni, Vetty Priscilla

    Published 2019-10-01
    “…There is a significant relationship between conflict management and job satisfaction at Tk III Dr.Reksodiwiryo Hospital (p-value 0,000 <0.05), compromise strategy (p = 0.017), competency strategy (p = 0.025), accommodation strategy (p = 0,000 ), avoidance strategy (0.017), collaboration strategy (p = 0.021). …”
    Get full text
    Article
  5. 5565

    Analysis of Internet Financial Risk Control Model Based on Machine Learning Algorithms by Mingjin Liu, Ruijie Gao, Wei Fu

    Published 2021-01-01
    “…According to the optimized credit risk control strategy, corresponding strategy suggestions are provided for the credit risk control of S company. …”
    Get full text
    Article
  6. 5566

    Effects of a Severe Mountain Pine Beetle Epidemic in Western Alberta, Canada under Two Forest Management Scenarios by Richard R. Schneider, Maria Cecilia Latham, Brad Stelfox, Dan Farr, Stan Boutin

    Published 2010-01-01
    “…Our two management scenarios were conventional harvest and a pine-reduction strategy modeled on a component of Alberta's Mountain Pine Beetle Management Strategy. …”
    Get full text
    Article
  7. 5567

    The effect of using promotion programs on export performance with mediating of management, s understanding of environment and commitmen by R. Sanavi Fard, E. Haji Hosseini

    Published 2024-12-01
    “…Export commitment affects export strategy (0.20) and export performance (0.63). Also, export strategy affects export performance (0.52). …”
    Get full text
    Article
  8. 5568

    Secure control plane for SDN using Bayesian Stackelberg games by Zhen-ping LU, Fu-cai CHEN, Guo-zhen CHENG

    Published 2017-11-01
    “…A dynamic scheduling controller in SDN control layer was proposed by dynamically transform heteroge-neous controlled in order to increase the difficulty of the attacker.Firstly,a dynamic scheduling method based on Bayesian Stackelberg games the attacker and defender were game participation on both sides,obtained the equili-brium,which guided the scheduling strategy.Secondly,introducing a self-cleaning mechanism,it improved the gain of the control layer security combined with game strategy form closed-loop defense mechanism.The experiments described quantitatively based on the game strategy compared with traditional safety control layer to deploy a single controller and adopt the strategy of random scheduling profit gain of the controller,and self-cleaning mechanism could make the control plane to be in a higher level of security.…”
    Get full text
    Article
  9. 5569

    Active deception defense method based on dynamic camouflage network by Shuo WANG, Jianhua WANG, Qingqi PEI, Guangming TANG, Yang WANG, Xiaohu LIU

    Published 2020-02-01
    “…In view of the problem that the existing honeypots often fail to resist the penetration attack due to the lack of confidentiality,an active deception defense method based on dynamic camouflage network (DCN) was presented.The definition of DCN was given firstly,and then the attacker-defender scenario of active deception based on DCN was described.Next,the interaction process of the attacker-defender scenario was modeled by using a signaling game,whose equilibrium can guide the selection of optimal deception strategy.Furthermore,to quantify the payoffs accurately,the two-layer threat penetration graph (TLTPG) was introduced.Finally,the solution for game equilibrium was designed,through which pure strategy and mixed strategy could be calculated simultaneously.The experimental results show that,based on the dynamic camouflage network,the perfect Bayesian equilibrium can provide effective guidance for the defender to implement the optimal defense strategy and maximize the benefits of the defender.In addition,the characteristics and rules of active deception defense DCN-based are summarized.…”
    Get full text
    Article
  10. 5570

    Research on security architecture of strong PUF by adversarial learning by Yan LI, Wei LIU, Yuanlu SUN

    Published 2021-06-01
    “…To overcome the vulnerability of strong physical unclonable function, the adversarial learning model of strong PUF was presented based on the adversarial learning theory, then the training process of gradient descent algorithm was analyzed under the framework of the model, the potential relationship between the delay vector weight and the prediction accuracy was clarified, and an adversarial sample generation strategy was designed based on the delay vector weight.Compared with traditional strategies, the prediction accuracy of logistic regression under new strategy was reduced by 5.4% ~ 9.5%, down to 51.4%.The physical structure with low overhead was designed corresponding to the new strategy, which then strengthened by symmetrical design and complex strategy to form a new PUF architecture called ALPUF.ALPUF not only decrease the prediction accuracy of machine learning to the level of random prediction, but also resist hybrid attack and brute force attack.Compared with other PUF security structures, ALPUF has advantages in overhead and security.…”
    Get full text
    Article
  11. 5571

    Maximizing Lifetime of Three-Dimensional Corona-Based Wireless Sensor Networks by Changqing Xia, Nan Guan, Qingxu Deng, Wang Yi

    Published 2014-05-01
    “…Furthermore, the optimal equal distance strategy (OEDS) which is a simple deployment strategy was proposed to prolong the lifetime of the network by optimizing layer number k .…”
    Get full text
    Article
  12. 5572

    The Effects of Slavery on Enslaved People and Eighteenth-Century Antislavery Arguments by Julia Jorati

    Published 2025-01-01
    “…After examining this argumentative strategy and what makes it appealing, this paper investigates several ways in which it is problematic. …”
    Get full text
    Article
  13. 5573

    An Evolution Model of Fintech Supports Technology-Based SMEs Innovation and Growth by Lei Zhuang, Han Zhou, Tingqiang Chen

    Published 2022-01-01
    “…Introducing the role of fintech, the paper builds an evolutionary model for growth of technology-based SMEs and analyzes fintech incentive mechanisms to guide corporate growth strategies based on some cases by the simulation. The research results show that the evolutionary game strategy that SMEs are willing to adopt is {cooperation, cooperation}. …”
    Get full text
    Article
  14. 5574

    Evolutionary Game of Social Network for Emergency Mobilization (SNEM) of Magnitude Emergencies: Evidence from China by Rui Nan, Jingjie Wang, Wenjun Zhu

    Published 2022-01-01
    “…The analysis of the types, generation mechanism, subject behavior, and strategy selection of the SNEM aid in adopting appropriate mobilization strategy based on magnitude emergencies, achieving the adaptation of the SNEM and emergency scenarios. …”
    Get full text
    Article
  15. 5575

    Cost-effectiveness of AI for pediatric diabetic eye exams from a health system perspective by Mahnoor Ahmed, Tinglong Dai, Roomasa Channa, Michael D. Abramoff, Harold P. Lehmann, Risa M. Wolf

    Published 2025-01-01
    “…We examined the cost-effectiveness of an autonomous AI strategy versus a traditional eye care provider (ECP) strategy during the initial year of implementation from a health system perspective. …”
    Get full text
    Article
  16. 5576

    The Mechanical Impact of Aerodynamic Stall on Tunnel Ventilation Fans by A. G. Sheard, A. Corsini

    Published 2012-01-01
    “…The third strategy selects a fan with a fitted stabilisation ring. …”
    Get full text
    Article
  17. 5577

    La estrategia CRM, una visión 360º del cliente by Ma. Rosa Llamas Alonso, Jean-Pierre Lévy-Mangin, Ma. Aranzazu Sulé Alonso

    Published 2005-01-01
    “…CRM strategy (customer relationship management) is a business philosophy, stemming from relationship marketing that joins strategy and technology, with the objective of creating value for both customers and the company. …”
    Get full text
    Article
  18. 5578

    Admission control algorism study of multi-rate traffics for TD-SCDMA system by Fang-wei LI, Han LI, Xiao LU

    Published 2012-04-01
    “…A call admission control strategy based on traffic priorities was proposed after considering the different rates of traffic requirements and the attributes of different admission requests of services.According to the current system load ,it decides whether or not to accept the call request by taking the strategy of queue / deceleration / demolitions.Simulation results show that the strategy is significantly improved in the systems service level and resource utilization.…”
    Get full text
    Article
  19. 5579
  20. 5580

    Intelligent Boarding Modelling and Evaluation: A Simulation-Based Approach by Lijuan Luo, Shaozhi Hong, Shanshan Shang, Xiaoli Zhou, Junyu Yang, Yu Pan

    Published 2021-01-01
    “…Firstly, we proposed an improved outside-in strategy, which costs shorter boarding time based on the existing outside-in strategy. …”
    Get full text
    Article