Showing 7,161 - 7,180 results of 31,041 for search '"strategy"', query time: 0.10s Refine Results
  1. 7161

    Online universal steganalysis system based on multiple pre-trained model by Ya-fei YUAN, Wei LU, Bing-wen FENG, Jian WENG

    Published 2017-05-01
    “…In reality,universal blind steganalysis is still a sensitive issue.A universal online steganalysis system that could be used in practical application was proposed.With reducing the dimensions of SRM,it could improve availability and speed up feature extraction.Some effective pre-trained models and weighted voting strategy were used in this system with a B/S architecture,involving a higher speed.In addition,multithread technology was introduced.Experimental results demonstrate that high detection accuracy can be obtained and about 0.97 seconds for single detection with the system.…”
    Get full text
    Article
  2. 7162

    Rhapsodie et métamorphoses de la voix dans The War Plays d’Edward Bond by Eléonore Obis

    Published 2013-06-01
    “…They are structured and written with what the French critic Jean-Pierre Sarrazac calls a “rhapsodic” dynamic: questioning all the main elements that make a play, the trilogy calls theatre into question. Bond’s strategy is, among others, to try to redefine the concept of character, and hence question the origin and authority of the voice. …”
    Get full text
    Article
  3. 7163

    THE ROLE OF THE RESEARCH AND EDUCATION CENTER IN INNOVATION DEVELOPMENT OF A HIGHER EDUCATIONAL INSTITUTION by Alyona Yu. Levykh, Lyudmila V. Vedernikova

    Published 2022-05-01
    “…The activities of this center is based on the integration and social partnership and is aimed at elaboration of the strategy of social development of the regional educational space and providing high quality of teachers’ training. …”
    Get full text
    Article
  4. 7164

    CONTROLLING AS A CORPORATE GOVERNANCE TOOL by T. Rogulenko

    Published 2018-09-01
    “…According to the results of the research it is concluded that con-trolling is one of the modern algorithmic and automated tools of the corporate governance system of the economic development strategy in a highly competitive environment and un-predictability of the behavior of economic entities in the market of goods, works, services, currency, securities and etc., which integrates with other management systems in the mode of their parallel automation.…”
    Get full text
    Article
  5. 7165

    Observability Estimate for the Fractional Order Parabolic Equations on Measurable Sets by Guojie Zheng, M. Montaz Ali

    Published 2014-01-01
    “…The building of this estimate is based on the Lebeau-Robbiano strategy and a delicate result in measure theory provided in Phung and Wang (2013).…”
    Get full text
    Article
  6. 7166

    Pharmaceutical, Pharmacokinetic and Other Considerations for Intravenous to Oral Stepdown Therapy by Peter J Jewesson

    Published 1995-01-01
    “…Parenteral to oral stepdown therapy represents an effective cost containment strategy which can minimize intravenous therapy associated morbidity and may facilitate earlier hospital discharge. …”
    Get full text
    Article
  7. 7167

    Lin Yifu, l’Afrique et le modèle chinois d’émergence by Thierry Pairault

    Published 2019-07-01
    “…Whether it is the promotion of a Chinese model of development by both the World Bank and China itself, the predilection of African countries for the creation of special economic zones, their desire to be part of the new silk routes strategy, the ambiguities of the notion of emergence and thus the ideological competition that China establishes for political purposes… everything brought me back to a character, Lin Yifu (Justin Lin), who, without being central or even ideologically at the forefront, occupies a visible place - this is the important factor - both in China and abroad, especially in Africa, where the think tank he heads propagates its expertise.…”
    Get full text
    Article
  8. 7168

    A escrita comovida de João Anzanello Carrascoza by Miguel Conde

    Published 2009-01-01
    “…The attention devoted to this mimetic realism, whichrelies on shock as the best strategy for anun mediated apprehension of the real, creates a context in which commotion is perceived as naive or suspicious. …”
    Get full text
    Article
  9. 7169

    Regarding the Practical Guide Updating for the Treatment of Acute Pericarditis in Cienfuegos by René Mick Cabrera Núñez

    Published 2019-10-01
    “…They deal with a specific topic to help doctors select the best possible treatment strategy for a particular patient, who suffers a certain disease, not only taking into account the final result, but also weighing the risks and benefits of a diagnostic procedure or specific therapeutic. …”
    Get full text
    Article
  10. 7170

    Reversible data hiding scheme based on asymmetric histogram modification by Zhiheng LYU, Lei LIU, Si CHEN, Zhaoxia YIN

    Published 2018-05-01
    “…A reversible data hiding scheme was improved,using two different forecast methods to calculate the prediction error of the original image,two asymmetric prediction error distribution histogram generated,when making secret information embedded respectively on two asymmetric prediction error distribution histogram in the opposite direction of translation ways.Compared with the traditional scheme,the improved scheme can play better to the complementary advantages of embedding strategy,make as many pixels pixel values compensation occur,further protecting the secret image quality.…”
    Get full text
    Article
  11. 7171

    The Spatiotemporal Evolution Pattern and Influential Factor of Regional Carbon Emission Convergence in China by Xin Tong

    Published 2020-01-01
    “…Therefore, it is necessary to justify carbon emission reduction in China and put forward an emission reduction strategy.…”
    Get full text
    Article
  12. 7172

    An Improvement of Static Subtree Partitioning in Metadata Server Cluster by Tan Zhipeng, Zhou Wei, Sun Jianliang, Zhan Tian, Cui Jie

    Published 2012-09-01
    “…In view of the strengths and weaknesses of the previous methods, the paper proposes a half-dynamic subtree strategy that supports the replication of metadata, the dynamic addition and failure recovery of MDS. …”
    Get full text
    Article
  13. 7173

    Discussion of the Target Network Structure and Network Models Based on SDN in IP RAN Network by Libo Chen, Ning Qin

    Published 2015-02-01
    “…The target network structure and network models based SDN in IP RAN network were described and the application strategy of SDN in IP RAN network was also discussed.…”
    Get full text
    Article
  14. 7174

    Optimal forwarding policy in opportunistic based on social features of nodes by Zhi-fei WANG, Pei-teng SHI, Su DENG, Hong-bin HUANG, Ya-hui WU

    Published 2016-06-01
    “…A forwarding model of opportunistic network was established based on social features of node and by introducing the Pontryagin’s maximal principle,the optimal policy was got,which obeyed the threshold form.Let h denotes the stop time,when t<h,nodes forward the messages with the maximum probability,when t>h,the node stops sending messages.Experiments show that the optimal strategy is better than optimal static policy.Further analysis show that the bigger the average number of friends of node is,the smaller the stopping time is,the better the performance is.…”
    Get full text
    Article
  15. 7175

    Die verhouding tussen kerk en ??á?? in Pauliniese perspektief by J. A. du Rand

    Published 2002-06-01
    “…os a strenuous labour (1 Thess. 1:3), not to be considered a means or strategy to achieve something but to characterise the typical depicted eschatological character of the Pauline ????????. …”
    Get full text
    Article
  16. 7176

    Endogenous security architecture of Ethernet switch based on mimic defense by Ke SONE, Qinrang LIU, Shuai WEI, Wenjian ZHANG, Libo TAN

    Published 2020-05-01
    “…Aiming at the unknown vulnerabilities and unknown backdoor security threats faced by Ethernet switches,a switch endogenous security architecture based on mimicry defense theory was proposed.The theoretical basis,construction mode and security mechanism of the architecture ware introduced,the algorithm strategy and security improvement effect of TAMA algorithm were proposed and analyzed,a prototype of mimic switch was designed and implemented,and the security tests of white box stuffing and attack chain were carried out.Theoretical analysis and test results show that the architecture has good unknown vulnerabilities and unknown backdoor defense capabilities in various attack scenarios.…”
    Get full text
    Article
  17. 7177

    Проблема героя в рассказе А.П. Чехова „Черный монах” by Anna Chudzińska-Parkosadze

    Published 2018-06-01
    “…This platonic philosophy seems to reflect not only a certain artistic strategy of the writer, but also a personal view on the human existence in the world of Chekhov himself. …”
    Get full text
    Article
  18. 7178

    Optimizing control of adsorption separation processes based on the improved moving asymptotes algorithm by Yonghui Yang, Xuebo Chen, Na Zhang

    Published 2018-12-01
    “…We propose an optimization strategy based on the improved moving asymptotes algorithm to improve system performance indexes. …”
    Get full text
    Article
  19. 7179

    HPPHM:new policy of store for multidimensional dataset of parallel I/O and research of retrieve performance by CHEN Zhi-gang1, ZENG Bi-qing2

    Published 2007-01-01
    “…The policy of store and retrieve for large-scale multidimensional dataset was researched.The multidimensional dataset was allocated in the multi-disks among the distributed processing system by using the parallel I/O technology.A new multidimensional data cyclic declustering policy was proposed aiming to data retrieve based on scope by extending existing cyclic policy to multidimensional dataset from adapting to two-dimension,and by using theory analysis on the present method,a new heuristic multidimensional data retrieve policy named HPPHM was proposed.The experimental result has demonstrated the efficiency of new strategy not only in parallel degree but also in robust.…”
    Get full text
    Article
  20. 7180

    Design and implementation of electric cloud's resource pool by Ning YANG, Huayong LUO, Xing LI, Feng SHANG, Tao CHEN, Guoxia WANG

    Published 2017-03-01
    “…According to the characters of electric enterprise, the designing principle about the capacity and the base schema of resource pool was proposed.And the implementation plans of the resource pool were given.The key factors of resource pool and their assembling methods can be known clearly form the base schema of resource pool,there is great practical importance on the planning and strategy of resource pool.…”
    Get full text
    Article