Showing 6,121 - 6,140 results of 31,041 for search '"strategy"', query time: 0.09s Refine Results
  1. 6121

    Dynamic pricing optimization for high-speed railway based on passenger flow assignment. by Jiren Cao, Lei Nie, Lu Tong, Zhenhuan He, Zhangjiaxuan Liu

    Published 2024-01-01
    “…In order to improve the operation efficiency and market competitiveness, how to optimize the ticket pricing strategy of high-speed railway to match the dynamic supply-demand relationship was an urgent problem to be studied. …”
    Get full text
    Article
  2. 6122

    Modeling the Internal Control Constraint of University Research Funding System by Jiacan Wang, Liangzhang Hu

    Published 2021-01-01
    “…With the in-depth development of the trend of scientific and technological innovation and the implementation of the “Double First-Class” strategy, universities shouldering the scientific research task are constantly promoting the development of scientific research projects with the support of national policies and the scientific research funds are also significantly increased. …”
    Get full text
    Article
  3. 6123

    A Stabilization Method Based on an Adaptive Feedforward Controller for the Underactuated Bipedal Walking with Variable Step-Length on Compliant Discontinuous Ground by Yang Wang, Daojin Yao, Jie He, Xiaohui Xiao

    Published 2020-01-01
    “…Unlike a totally new control method, the method is actually a high-level control strategy developed based on an existing low-level controller meant for the continuous compliant ground. …”
    Get full text
    Article
  4. 6124

    BeiDou satellites cross-regional communication path assignment model and resource management by Sheng Liu, Di Wu, Lanyong Zhang

    Published 2021-07-01
    “…Finally, the performance of the model and the strategy in average link handover times, link reliability, resource allocation fairness, and network quality of service is determined by simulation.…”
    Get full text
    Article
  5. 6125

    Resistance of Nineteen Major Caladium Commercial Cultivars to Pythium Root Rot by Zhanao Deng, Brent K. Harbaugh, Richard O. Kelly, Teresa Seijo, Robert J. McGovern

    Published 2005-04-01
    “…This strategy will be particularly useful for caladiums in the landscape and home gardens, because in such cases choices of root rot control measures are limited. …”
    Get full text
    Article
  6. 6126

    Service Arms with Unconventional Robotic Parameters for Intricate Workstations: Optimal Number and Dimensional Synthesis by Satwinder Singh, Ekta Singla

    Published 2016-01-01
    “…A task-oriented design strategy is presented in this paper for service manipulators. …”
    Get full text
    Article
  7. 6127

    Cloud federation three-layer architecture: game-theoretic QoS modeling by MA Kun, HU Chuangyue, ZHANG Yuzhi, MA Fangchao, WANG Xiaodong, DANG Zhonghua, XIAO Wenhong, CHEN Shuangxi

    Published 2024-09-01
    “…At the application to virtual layer, an innovative task allocation strategy based on the differential evolution (DE) algorithm was proposed, specifically designed to handle multi-QoS task distribution challenges. …”
    Get full text
    Article
  8. 6128

    RELIGIOUS EXPANSION OF TURKEY IN TATARSTAN IN THE POST-SOVIET PERIOD by R. R. Suleymanov

    Published 2016-04-01
    “…The ideological rapprochement with Turkey was a part of the foreign policy strategy of Tatarstan elite that after gaining independence in the early 1990s saw in Ankara a natural ally. …”
    Get full text
    Article
  9. 6129

    Selective Decontamination of the Digestive Tract Reduces Pneumonia and Mortality by Lenneke E. M. Haas, Marcus J. Schultz

    Published 2010-01-01
    “…Nevertheless, SDD has remained a controversial strategy. One reason for why clinicians remained reluctant to implement SDD into daily practice could be that mortality was reduced in only 2 trials. …”
    Get full text
    Article
  10. 6130

    Practical exploration on the construction of data asset management system by Guohe LI, Zheng FENG, Zhuoyu WANG, Yong SUN, Yang GUO, Qiguo SAN

    Published 2019-02-01
    “…With the change of policy environment and the upgrading of information technology,the big data strategy has officially risen to the national strategy.Digital China construction is accelerating in all directions,and data asset management has received unprecedented attention.The construction of data asset management system has become an inevitable choice and inevitable trend for enterprises to cope with the requirements of the era of big data.Data value mining needs to provide protection through data asset management system.Focusing on the problems existing in the big data management and control of State Grid Xinyuan Co.…”
    Get full text
    Article
  11. 6131

    Japan’s Foreign Policy Shifting in 2022 by Khaira Anisa, Juan Miguel Carboni Martínez

    Published 2024-07-01
    “…This article examines Japan's significant foreign policy changes in 2022, focusing on three crucial documents: the National Security Strategy (NSS), the National Defence Strategy (NDS), and the Medium-Term Defence Force Buildup Program (MTDP), issued on December 6, 2022. …”
    Get full text
    Article
  12. 6132

    Biomimetic nanocarriers: integrating natural functions for advanced therapeutic applications by Hugo Felix Perini, Beatriz Sodré Matos, Carlo José Freire de Oliveira, Marcos Vinicius da Silva

    Published 2024-12-01
    “…Here, we address the therapeutic applications of biomimetic nanocarriers and their promising strategy for personalized medicine.…”
    Get full text
    Article
  13. 6133

    Research of power preprocessing optimization-based template attack on LED by Xiao-juan WANG, Shi-ze GUO, Xin-jie ZHAO, Mei SONG, Fan ZHANG

    Published 2014-03-01
    “…The security of LED,a lightweight block cipher proposed in CHES 2011,was evaluated by the template attack (TA).Several improvements of TA from the perspective of the preprocessing optimization was proposed.Firstly,the noise offset was calculated by using the phase-only correlation factor in the frequency view of the power trace to eliminate the data interference in the template building phase.Secondly,a novel character extracting method was proposed based on calculating the cross-cluster offset of different clusters classified by the plaintexts to cut the different leakage points from the power traces automatically.Thirdly,a dynamic effective power points choosing strategy was proposed by utilizing the mean value and the noises of the of power traces to evaluate the differences between different templates and improve the utilization of side channel information.Experiment results demonstrate that the proposed techniques of data alignment and automatically data cutting enlarge the differences of templates and reduce the number of the required power trace in both the template building and attacking phase.The proposed effective power points choosing strategy reduces the data complexity of the attack and only two power traces are required to launch the attack with the success rate of 100%.…”
    Get full text
    Article
  14. 6134

    Experimental Research for CHF Sensitivity of Heat Flux Distribution under IVR Conditions by Shilei Han, Pengfei Liu, Bo Kuang, Yanhua Yang

    Published 2022-01-01
    “…The varying heat flux distribution during severe accident process will not threaten significantly the success of IVR strategy.…”
    Get full text
    Article
  15. 6135

    Influence Factors and Policy Analysis of Small and Microenterprises’ Sustainable Development: Empirical from Zhejiang by Pengyue Wu, Huijie Zhou

    Published 2022-01-01
    “…As far as the government's strategy of supporting and promoting tax policy is concerned, tax policy has a good independent impact, but when combined with other indicators, the impact effect is not significant. …”
    Get full text
    Article
  16. 6136

    A Game-Based Secure Localization Algorithm for Mobile Wireless Sensor Networks by Tianyue Bao, Jiangwen Wan, Kefu Yi, Qiang Zhang

    Published 2015-09-01
    “…To address these challenges, the paper presents a novel game-based secure localization algorithm. The nodes' strategy level can be indicated through the results of trust evaluation and then by means of constructing reasonable strategy space and payoff function using game theory; all kinds of nodes within the network can achieve the optimal payoffs. …”
    Get full text
    Article
  17. 6137

    Model Predictive Voltage Control with Optimal Duty Cycle for Three-Phase Grid-Connected Inverter by Shahrouz Ebrahimpanah, Qihong Chen, Liyan Zhang, Misbawu Adam

    Published 2019-01-01
    “…This paper proposes a model predictive voltage control (MPVC) strategy with duty cycle control for grid-connected three-phase inverters with output LCL filter. …”
    Get full text
    Article
  18. 6138

    Free Vibration Response of a Frame Structural Model Controlled by a Nonlinear Active Mass Driver System by Ilaria Venanzi, Filippo Ubertini

    Published 2014-01-01
    “…In this paper, a nonlinear control strategy based on a modified direct velocity feedback algorithm is proposed for handling stroke limits of an active mass driver (AMD) system. …”
    Get full text
    Article
  19. 6139

    Murray Rothbard's Populist Blueprint: Paleo-Libertarianism and the Ascent of the Political Right by David Bebnowski

    Published 2024-10-01
    “…In his 1992 pamphlet "Right-Wing Populism: A Strategy for the Paleo Movement," libertarian economist and intellectual Murray Rothbard drafted a strategy that foreshadowed the rise of populist politics that was to come some years later. …”
    Get full text
    Article
  20. 6140

    Fixed-Time Sliding Mode Control for Robotic Manipulators Based on Disturbance Observer by Tianli Li, Gang Zhang, Tan Zhang, Jing Pan

    Published 2024-01-01
    “…Simulation research is carried out to illustrate that the proposed control strategy has strong robustness and fast-tracking speed.…”
    Get full text
    Article