Showing 7,141 - 7,160 results of 31,041 for search '"strategy"', query time: 0.11s Refine Results
  1. 7141

    Global Tendencies in University Development and Transformation of Russian Education Policy by M. M. Lebedeva, O. N. Barabanov

    Published 2012-12-01
    “…Authors argue that the strategy of catch-up development might be successful in case of Russian higher education system and its potential on the global competitive education market.…”
    Get full text
    Article
  2. 7142

    Entangled state testing in the quantum Byzantine agreement by Xia WU, Heng-yue JIA, Jian-ming ZHU

    Published 2016-11-01
    “…In distributed computing,Byzantine agreement is a practical method to solve its fault-tolerance problem.There is a variation of the Byzantine agreement which is called detectable Byzantine agreement.This kind of protocol is unsolvable by classical means,but can be solved using quantum resources——quantum entangled states.A typical quantum detectable Byzantine agreement is the GBKCW protocol.The part with the generation and distribution of the lists in the GBKCW protocol was dealed with.In order to keep the GBKCW protocol from the intercept-and-resend strategy,the property of the determination of entangled states were employed to test the sharing state between the parties.…”
    Get full text
    Article
  3. 7143

    The Role of Dissolved Oxygen in Hard Clam Aquaculture by Kerry Weber, Elise Hoover, Leslie Sturmer, Shirley Baker

    Published 2009-01-01
    “… FA152, an 11-page illustrated fact sheet by Kerry Weber, Elise Hoover, Leslie Sturmer, and Shirley Baker, discusses dissolved oxygen in clam leases, how to monitor varying concentrations, signs of oxygen stress, how it affects hard clam production, and how to develop a management strategy to adapt to dissolved oxygen levels. Includes contact information for state specialists, glossary and further readings. …”
    Get full text
    Article
  4. 7144

    Construction of an intelligent maintenance system of intensive broadband service by Chao CAI, Lin YUAN, Xina ZHANG

    Published 2017-01-01
    “…With the spreading of broadband acceleration strategy and the quick development of streaming media such as IPTV/OTT,a higher quality of experience on the services of telecom operators need to be satisfied.The current maintenance system and method is operating on different levels and segments,which is lack of interactive functions and cooperation.Therefore,a new method is required to satisfy the network maintenance work in the new developing environment.A new method was proposed to construct the intelligent maintenance system of the intensive broadband service.With this method,it is able to achieve the end-to-end quality monitoring and automatic self-diagnosis functions.The method will benefit the services of telecom operators and will improve the efficiency and intelligence of telecom operators.…”
    Get full text
    Article
  5. 7145

    Application of integration methods between university information systems and access control systems by ZHANG Yundong

    Published 2024-11-01
    “…An implementation strategy for achieving stable and reliable integration between university business systems and access control systems, aimed at enhancing the stability and reliability of business system permissions being issued to access control controllers through synchronization strategies and technological innovations, thereby better ensuring the synchronization of access control permissions. …”
    Get full text
    Article
  6. 7146

    « Das soll Europa sein ? » Jean Cocteau dans l’Europa Almanach de Carl Einstein et Paul Westheim by Klaus H. Kiefer

    Published 2017-12-01
    “…Nevertheless, the editors put the portrait of Cocteau by Modigliani in a critical perspective. This editorial strategy can also be seen in the composition of the other texts and images.…”
    Get full text
    Article
  7. 7147

    Discussion on the evolution of architecture of the core network of cellular Internet of things by Hongyuan MA, Wei ZHOU, Yan FU, Yongping SHAO, Dan LI

    Published 2023-01-01
    “…At present, there are two Internet of things networks facing 2G, 4G, NB-IoT and facing toB core networks.In order to simplify the network, enhance the capability, enhance the benefit, and facilitate the operation and maintenance, it is necessary to define the target architecture of 5G-oriented Internet of things core network.Based on the existing network problems and combined with the driving force of network evolution, the network evolution target structure, evolution strategy and service solution were analyzed and discussed.It provides a reference for operators to plan and construct the Internet of things.…”
    Get full text
    Article
  8. 7148

    Projeção do Brasil no Atlântico Sul: geopolítica e estratégia by Wanderley Messias da Costa

    Published 2014-11-01
    “…This achievement has been processed by the successful implementation of a strategy that combines continuous actions in the diplomatic field, the national research effort in the broad area of marine sciences and investments aimed at strengthening the country's military capability to face challenges in Security & Defense in general and in the South Atlantic in particular.…”
    Get full text
    Article
  9. 7149

    Le gouvernement de l'Indonésie par l'islam et la science. Visions d'intellectuels en quête de pouvoir by François Raillon

    Published 2003-07-01
    “…With general Suharto's takeover in 1966, Muslim intellectuals thought that they had a chance to advance their views of a scientific Islam and to take control of the Indonesian state. Their strategy and efforts to reach this aim, despite Soharto's opposition, are analyzed in this article. …”
    Get full text
    Article
  10. 7150

    Ordre social, ordre spatial : territorialisation des politiques de sécurité publique à Rio de Janeiro by Justine Ninnin

    Published 2014-07-01
    “…The city, which seeks to be a central player on the international scene has redefined its security strategy by reaffirming the public authorities power in the favelas through “militarization” and territorialised policy. …”
    Get full text
    Article
  11. 7151

    Hotel companies and corporate environmentalism by Paul Reynolds

    Published 2013-01-01
    “…The emergence of environmental issues and the implications for strategy are debated and the theoretical and practical implications of integrating environmental issues into corporate strategies are discussed.…”
    Get full text
    Article
  12. 7152

    Locality-guided based optimization method for bounded model checker by Shun WANG, Ye DU, Zhen HAN, Jiqiang LIU

    Published 2018-03-01
    “…For software model checking,approaches that combine with different kind of verification methods are now under research.The key to improve scale and complexity of verifiable software is handling the method for abstraction widening and strengthening wisely and precisely.To archive that,using extra knowledge that extracted from programming pattern or learned through verifying procedure to help eliminate the redundant state has been proved effective.Definition of program locality was given.It took the important role in accelerating software verification,then the strategy was raised and an algorithm was implemented to take advantage of program locality.This method exploits the features of modern BMC (bounded model checker) and scales up the capability of its power in large scale and comprehensive software modules.…”
    Get full text
    Article
  13. 7153

    Co-Design for Rebranding an Italian Foundation by Xue Pei, Francesco Zurlo

    Published 2019-06-01
    “…This paper is based on research conducted by Creative Industries Lab of Politecnico di Milano for creating the new brand image and communication strategy for Fondazione Cariplo. A Co-Design approach has involved both internal and external stakeholders in visually defining a shared future identity for rebranding this significant foundation to the public. …”
    Get full text
    Article
  14. 7154

    A Madame Bovary’s Daughter: David Lean’s Visual Transliteration of Flaubert by Franck Dalmas

    Published 2014-11-01
    “…If we want to consider Madame Bovary as an innovative work of art it is crucial to visualize Flaubert’s narrative strategy. The scholarship of Madame Bovary on film has scrutinized the many adaptations and how to relate them to the writing technique. …”
    Get full text
    Article
  15. 7155

    Emergency and tourism in Abruzzo. A temporary house system by Donatella Radogna

    Published 2018-12-01
    “…These objectives, due to the dual nature of the needs both of post-earthquake reconstruction and of tourism promotion, hope for local development in line with the objectives of the National Strategy for the Development of the Internal Areas of the Country.…”
    Get full text
    Article
  16. 7156

    Game-theoretical frequency reuse algorithm in Femtocell network by Xiong ZHOU, Sui-li FENG, Yue-hua DING, Yong-zhong ZHANG

    Published 2015-02-01
    “…A game-theoretical frequency reuse algorithm has been proposed for Femtocell network.Firstly,each Femtocell tries to get an available sub-band by sensing its radio circumstance.Then,inner-cluster frequency collisions are avoided by implementing a negotiation mechanism.Lastly,each cluster is regarded as a game player to get the largest utility by using its optimal strategy.Despite Femtocell base stations are randomly installed by users,the proposed method performs well in Femtocell network.Simulation results show that frequency collisions are dramatically reduced and the average capacity of Femtocells is considerably enhanced.…”
    Get full text
    Article
  17. 7157

    Game theory based trust management method for mobile ad hoc networks by Jing-jing GUO, Jian-feng MA, Qi LI, Tao WAN, Cong GAO, Liang ZHANG

    Published 2014-11-01
    “…A game model is proposed for the indirect trust information obtaining process.A suitable punishment mechanism and design the utility function for nodes in a MANET is given.Moreover,with evolutionary game theory,the trust evolution of nodes using replicator dynamic equation is analyzed and several theorems toillustrate preconditions under which each evolutionarily stable strategy can be achieved are proposed.Experiments verified the correctness and effectiveness of proposed method and simulated the dynamic evolutionary trend of the nodes under different parameters which experimentally proves the proposed theorems.…”
    Get full text
    Article
  18. 7158

    L’Afrique et sa dette « chinoise » au temps de la covid-19 by Thierry Pairault

    Published 2021-02-01
    “…What influence does this debt have in the development strategy of African countries?…”
    Get full text
    Article
  19. 7159

    Power allocation in wireless network virtualization based on resource sharing by Bin CAO, Wen-qiang LANG, Zhuo CHEN, Yun LI

    Published 2016-02-01
    “…A game theory based two steps power allocation scheme for wireless network virtualization, called G2SPA, was proposed, which designed a stackelberg equilibrium (SE)price strategy based on the interactions between SP and mobile user equipme (MUE), and then MacAfee based auction to reallocate leisure resource was performed. …”
    Get full text
    Article
  20. 7160

    The Role of Dissolved Oxygen in Hard Clam Aquaculture by Kerry Weber, Elise Hoover, Leslie Sturmer, Shirley Baker

    Published 2009-01-01
    “… FA152, an 11-page illustrated fact sheet by Kerry Weber, Elise Hoover, Leslie Sturmer, and Shirley Baker, discusses dissolved oxygen in clam leases, how to monitor varying concentrations, signs of oxygen stress, how it affects hard clam production, and how to develop a management strategy to adapt to dissolved oxygen levels. Includes contact information for state specialists, glossary and further readings. …”
    Get full text
    Article