Showing 6,161 - 6,180 results of 31,041 for search '"strategy"', query time: 0.12s Refine Results
  1. 6161

    Online Structural Health Monitoring of Rotating Machinery via Ultrasonic Guided Waves by Ming Li, Guang Meng, Hongguang Li, Jianxi Qiu, Fucai Li

    Published 2018-01-01
    “…This paper focuses on the establishment of the online structural health monitoring strategy for rotating shafts using ultrasonic guided waves. …”
    Get full text
    Article
  2. 6162

    Analysis of a High-Dimensional Mathematical Model for Plant Virus Transmission with Continuous and Impulsive Roguing Control by Guangming Qiu, Sanyi Tang, Mengqi He

    Published 2021-01-01
    “…Roguing and replanting are the most common strategies to control plant diseases and pests. How to build the mathematical models of plant virus transmission and consider the impact of roguing and replanting strategies on plant virus eradication is of great practical significance. …”
    Get full text
    Article
  3. 6163

    Managers’ attitudes to creativity and innovation practices in the creative industries by Fernando Cardoso de Sousa, Florbela Nunes, Ileana Pardal Monteiro

    Published 2019-01-01
    “…The results, derived from a linear regression model (two factors for the scale of attitudes - Leadership and Autonomy - and for the inventory of business practices - Performance and Strategy), confirmed the proposition by revealing the influence of the creative attitudes of managers regarding the company's innovative practices, fundamentally on Strategy, especially in the creative industries segment. …”
    Get full text
    Article
  4. 6164

    REFORMING OF HIGHER EDUCATION IN THE UK: VALUE AND NORMATIVE DIMENSIONS by Elizaveta V. Zolotareva

    Published 2017-02-01
    “…The conflict of interpretations by main political actors of such principles as social justice, freedom of choice, responsibility and efficiency is projected on their choice of strategy of forming «new» partnerships between educational subjects – universities, students, business and the state. …”
    Get full text
    Article
  5. 6165

    RPRep: A Robust and Privacy-Preserving Reputation Management Scheme for Pseudonym-Enabled VANETs by Jin Wang, Yonghui Zhang, Youyuan Wang, Xiang Gu

    Published 2016-03-01
    “…To defend the reputation link attack during pseudonym changes, we propose hidden-zone strategy and k -anonymity strategy. The simulation results show that our scheme is robust to these tactical attacks and preserves privacy against the reputation link attack during the pseudonym changes.…”
    Get full text
    Article
  6. 6166

    Modeling and Simulation of Complex Network Attributes on Coordinating Large Multiagent System by Yang Xu, Xiang Li, Ming Liu

    Published 2014-01-01
    “…With the expansion of distributed multiagent systems, traditional coordination strategy becomes a severe bottleneck when the system scales up to hundreds of agents. …”
    Get full text
    Article
  7. 6167

    Impediments for the Uptake of the Botswana Government's Male Circumcision Initiative for HIV Prevention by Motshedisi Sabone, Mabel Magowe, Lesego Busang, Jonathan Moalosi, Benjamin Binagwa, Janet Mwambona

    Published 2013-01-01
    “…In 2009, the Ministry of Health launched male circumcision as an additional strategy to the already existing HIV preventive efforts. …”
    Get full text
    Article
  8. 6168

    Application of the Extended Isogeometric Analysis (X-IGA) to Evaluate a Pipeline Structure Containing an External Crack by S. El Fakkoussi, H. Moustabchir, A. Elkhalfi, C. I. Pruncu

    Published 2018-01-01
    “…This work proposes a novel strategy for a two-dimensional problem that includes the approach of extended isogeometric analysis (X-IGA) in order to detect the behavior of a crack in pipeline structures. …”
    Get full text
    Article
  9. 6169

    TECHNOLOGICAL POTENTIAL FOR DEVELOPMENT OF INNOVATION ECONOMY IN RUSSIA: THE LIMITS AND LIMITATIONS OF THE SIXTH TECHNOLOGICAL ORDER by I. S. Prokhorova

    Published 2020-04-01
    “…The research methodology is based on the analysis of the main indicators of technological innovation potential of the country’s economy to overcome the technological gap and implement the strategy of equal entry into the sixth technological order. …”
    Get full text
    Article
  10. 6170

    Religious Solidarity for Coping with Economic Crisis During the Covid-19 Pandemic by Luqman Luqman, Ilhamdi Ilhamdi

    Published 2023-01-01
    “…However, it has also contributed to the functioning of social solidarity in dealing with crisis pressure among local people which became a survival strategy for various businesses. This paper aims to map the patterns of economic pressure resulting from a pandemic and analyze social strength factor that became a survival strategy in the economic field. …”
    Get full text
    Article
  11. 6171

    Anomaly detection and location of malicious node for IoT based on smart contract in blockchain network by Haojie HUANG, Xiaoxiao WU, Gangqiang LI

    Published 2020-06-01
    “…With the explosive growth of the number of distributed devices in the Internet of things (IoT) network,the security of decentralized multi-agent optimization algorithm has become the forefront problem.The distributed algorithms in the IoT network are vulnerable to data injection attacks from internal malicious node because each agent locally estimates its state without any supervision.In general,the detection methods for malicious node run independently in each agent,inducing issues such as closed data,single points of failure,opaque detection processes,and so on.The proposed strategy considered detecting via an aid of blockchain technology and smart contracts in Ethereum to detect malicious node in the network.Based on the decentralized and multiple backup features of blockchain technology,the multi-site backup features of the blockchain technology enabled data sharing and avoided single point failure.In addition,the contract code,execution process and result of the smart contract were open and transparent,and the contract code and result could not be tampered to ensure that the detection process could be traced and verified.Finally,the average consensus algorithm was adopted as an example,and the proposed strategy was verified on a simplified IoT network implemented by Raspberry Pi.…”
    Get full text
    Article
  12. 6172

    Resource-sharing allocation method based on dwarf mongoose optimization algorithm in vehicle computing by LIU Xi, LIU Jun, WU Hong, LI Weidong

    Published 2024-12-01
    “…The experimental results show that the proposed strategy performs well in different allocation environments and is adaptable.…”
    Get full text
    Article
  13. 6173

    The Liver That Cured Christmas: Case Report of Orthotopic Liver Transplant in a Patient with Hemophilia B by Jesse E. Harris, Jonathan L. Balk, Constance M. Mobley, Kirk Heyne

    Published 2020-01-01
    “…Given limitations in the stability of the recombinant factor IX products in the United States, a dosing strategy was comprised of once daily bolus dosing to achieve satisfactory factor IX levels. …”
    Get full text
    Article
  14. 6174

    More Adaptive and Updatable: An Online Sparse Learning Method for Face Recognition by Qiaoling Han, Jianbo Su, Yue Zhao

    Published 2019-01-01
    “…However, most of the face recognition models with learning strategy do not consider this fact and using a fixed training set to learn the face recognition models for once. …”
    Get full text
    Article
  15. 6175

    Politics of the USA in Post-Soviet Central Asia: character and prospects by A. A. Каzаntsev

    Published 2012-08-01
    “…After 9/11 American strategy in the region has become quite aggressive, geopolitical competition with Russia (and, partially, with China) has peaked during the «color» revolutions and then during Russian-Georgian war in 2008. …”
    Get full text
    Article
  16. 6176

    Information Seeking Behavior Among Final Year Students at National Teachers' College Kabale. by Nduhukire, Bonus

    Published 2023
    “…Improvement on the staff-student relationship and information search strategy was highly recommended.…”
    Get full text
    Thesis
  17. 6177

    Appraisal and Disposition of Medical Records: A Case Study of Itojo Hospital Ntungamo District. by Ainobusingye, Dorreck

    Published 2024
    “…Analysis indicated inefficiencies due to issues like a lack of records management strategy, insufficient skilled personnel, and inadequate funding. …”
    Get full text
    Thesis
  18. 6178

    Stretchable Full‐Color Phosphorescent PVA‐Based Ionogels for Multimodal Sensing‐Visual Integration Applications by Xuefeng Wei, Zexi Gou, Jianting Ye, L. H. Shi, Jianwei Zhao, Lei Yang, Linbo Zhang, Kun Zhang, Ruonan Jia

    Published 2025-02-01
    “…By leveraging observable full‐color RTP and real‐time electrical signals in response to diverse stimuli (i.e., stretching and pressing), an intelligent grasping strategy is developed for robust hand pose reconstruction. …”
    Get full text
    Article
  19. 6179

    Batch and semi-continuous fermentation with Parageobacillus thermoglucosidasius DSM 6285 for H2 production by Magda S. Ardila, Habibu Aliyu, Pieter de Maayer, Anke Neumann

    Published 2025-01-01
    “…CODH enzyme activity correlated with H2 production, with a maximum of 1651 U mL−1 on day 14 with the 48 h feeding strategy, while CODH activity remained relatively constant throughout the fermentation process with the 24 h feeding strategy. …”
    Get full text
    Article
  20. 6180

    Combined Microencapsulated Islet Transplantation and Revascularization of Aortorenal Bypass in a Diabetic Nephropathy Rat Model by Yunqiang He, Ziqiang Xu, Hongxing Fu, Bin Chen, Silu Wang, Bicheng Chen, Mengtao Zhou, Yong Cai

    Published 2016-01-01
    “…In this study, we explored a combined strategy to prevent the recurrence of RAS in the DN rat model. …”
    Get full text
    Article