Suggested Topics within your search.
Suggested Topics within your search.
- Entrepreneurship 5
- Management 5
- English language 4
- Business enterprises 3
- Economic development 3
- Industrial management 3
- Information technology 3
- Methodology 3
- Research 3
- Study and teaching 3
- Classroom environment 2
- Communication in education 2
- Effective teaching 2
- Elementary school teaching 2
- Hospitality industry 2
- Inquiry-based learning 2
- Interaction analysis in education 2
- Intercultural communication 2
- Internet in public administration 2
- Internet marketing 2
- Marketing 2
- Moral and ethical aspects 2
- Psychological aspects 2
- Psychology 2
- Public administration 2
- Public relations 2
- Rhetoric 2
- Social networks 2
- Sustainable development 2
- Technical writing 2
-
7161
Online universal steganalysis system based on multiple pre-trained model
Published 2017-05-01“…In reality,universal blind steganalysis is still a sensitive issue.A universal online steganalysis system that could be used in practical application was proposed.With reducing the dimensions of SRM,it could improve availability and speed up feature extraction.Some effective pre-trained models and weighted voting strategy were used in this system with a B/S architecture,involving a higher speed.In addition,multithread technology was introduced.Experimental results demonstrate that high detection accuracy can be obtained and about 0.97 seconds for single detection with the system.…”
Get full text
Article -
7162
Rhapsodie et métamorphoses de la voix dans The War Plays d’Edward Bond
Published 2013-06-01“…They are structured and written with what the French critic Jean-Pierre Sarrazac calls a “rhapsodic” dynamic: questioning all the main elements that make a play, the trilogy calls theatre into question. Bond’s strategy is, among others, to try to redefine the concept of character, and hence question the origin and authority of the voice. …”
Get full text
Article -
7163
THE ROLE OF THE RESEARCH AND EDUCATION CENTER IN INNOVATION DEVELOPMENT OF A HIGHER EDUCATIONAL INSTITUTION
Published 2022-05-01“…The activities of this center is based on the integration and social partnership and is aimed at elaboration of the strategy of social development of the regional educational space and providing high quality of teachers’ training. …”
Get full text
Article -
7164
CONTROLLING AS A CORPORATE GOVERNANCE TOOL
Published 2018-09-01“…According to the results of the research it is concluded that con-trolling is one of the modern algorithmic and automated tools of the corporate governance system of the economic development strategy in a highly competitive environment and un-predictability of the behavior of economic entities in the market of goods, works, services, currency, securities and etc., which integrates with other management systems in the mode of their parallel automation.…”
Get full text
Article -
7165
Observability Estimate for the Fractional Order Parabolic Equations on Measurable Sets
Published 2014-01-01“…The building of this estimate is based on the Lebeau-Robbiano strategy and a delicate result in measure theory provided in Phung and Wang (2013).…”
Get full text
Article -
7166
Pharmaceutical, Pharmacokinetic and Other Considerations for Intravenous to Oral Stepdown Therapy
Published 1995-01-01“…Parenteral to oral stepdown therapy represents an effective cost containment strategy which can minimize intravenous therapy associated morbidity and may facilitate earlier hospital discharge. …”
Get full text
Article -
7167
Lin Yifu, l’Afrique et le modèle chinois d’émergence
Published 2019-07-01“…Whether it is the promotion of a Chinese model of development by both the World Bank and China itself, the predilection of African countries for the creation of special economic zones, their desire to be part of the new silk routes strategy, the ambiguities of the notion of emergence and thus the ideological competition that China establishes for political purposes… everything brought me back to a character, Lin Yifu (Justin Lin), who, without being central or even ideologically at the forefront, occupies a visible place - this is the important factor - both in China and abroad, especially in Africa, where the think tank he heads propagates its expertise.…”
Get full text
Article -
7168
A escrita comovida de João Anzanello Carrascoza
Published 2009-01-01“…The attention devoted to this mimetic realism, whichrelies on shock as the best strategy for anun mediated apprehension of the real, creates a context in which commotion is perceived as naive or suspicious. …”
Get full text
Article -
7169
Regarding the Practical Guide Updating for the Treatment of Acute Pericarditis in Cienfuegos
Published 2019-10-01“…They deal with a specific topic to help doctors select the best possible treatment strategy for a particular patient, who suffers a certain disease, not only taking into account the final result, but also weighing the risks and benefits of a diagnostic procedure or specific therapeutic. …”
Get full text
Article -
7170
Reversible data hiding scheme based on asymmetric histogram modification
Published 2018-05-01“…A reversible data hiding scheme was improved,using two different forecast methods to calculate the prediction error of the original image,two asymmetric prediction error distribution histogram generated,when making secret information embedded respectively on two asymmetric prediction error distribution histogram in the opposite direction of translation ways.Compared with the traditional scheme,the improved scheme can play better to the complementary advantages of embedding strategy,make as many pixels pixel values compensation occur,further protecting the secret image quality.…”
Get full text
Article -
7171
The Spatiotemporal Evolution Pattern and Influential Factor of Regional Carbon Emission Convergence in China
Published 2020-01-01“…Therefore, it is necessary to justify carbon emission reduction in China and put forward an emission reduction strategy.…”
Get full text
Article -
7172
An Improvement of Static Subtree Partitioning in Metadata Server Cluster
Published 2012-09-01“…In view of the strengths and weaknesses of the previous methods, the paper proposes a half-dynamic subtree strategy that supports the replication of metadata, the dynamic addition and failure recovery of MDS. …”
Get full text
Article -
7173
Discussion of the Target Network Structure and Network Models Based on SDN in IP RAN Network
Published 2015-02-01“…The target network structure and network models based SDN in IP RAN network were described and the application strategy of SDN in IP RAN network was also discussed.…”
Get full text
Article -
7174
Optimal forwarding policy in opportunistic based on social features of nodes
Published 2016-06-01“…A forwarding model of opportunistic network was established based on social features of node and by introducing the Pontryagin’s maximal principle,the optimal policy was got,which obeyed the threshold form.Let h denotes the stop time,when t<h,nodes forward the messages with the maximum probability,when t>h,the node stops sending messages.Experiments show that the optimal strategy is better than optimal static policy.Further analysis show that the bigger the average number of friends of node is,the smaller the stopping time is,the better the performance is.…”
Get full text
Article -
7175
Die verhouding tussen kerk en ??á?? in Pauliniese perspektief
Published 2002-06-01“…os a strenuous labour (1 Thess. 1:3), not to be considered a means or strategy to achieve something but to characterise the typical depicted eschatological character of the Pauline ????????. …”
Get full text
Article -
7176
Endogenous security architecture of Ethernet switch based on mimic defense
Published 2020-05-01“…Aiming at the unknown vulnerabilities and unknown backdoor security threats faced by Ethernet switches,a switch endogenous security architecture based on mimicry defense theory was proposed.The theoretical basis,construction mode and security mechanism of the architecture ware introduced,the algorithm strategy and security improvement effect of TAMA algorithm were proposed and analyzed,a prototype of mimic switch was designed and implemented,and the security tests of white box stuffing and attack chain were carried out.Theoretical analysis and test results show that the architecture has good unknown vulnerabilities and unknown backdoor defense capabilities in various attack scenarios.…”
Get full text
Article -
7177
Проблема героя в рассказе А.П. Чехова „Черный монах”
Published 2018-06-01“…This platonic philosophy seems to reflect not only a certain artistic strategy of the writer, but also a personal view on the human existence in the world of Chekhov himself. …”
Get full text
Article -
7178
Optimizing control of adsorption separation processes based on the improved moving asymptotes algorithm
Published 2018-12-01“…We propose an optimization strategy based on the improved moving asymptotes algorithm to improve system performance indexes. …”
Get full text
Article -
7179
HPPHM:new policy of store for multidimensional dataset of parallel I/O and research of retrieve performance
Published 2007-01-01“…The policy of store and retrieve for large-scale multidimensional dataset was researched.The multidimensional dataset was allocated in the multi-disks among the distributed processing system by using the parallel I/O technology.A new multidimensional data cyclic declustering policy was proposed aiming to data retrieve based on scope by extending existing cyclic policy to multidimensional dataset from adapting to two-dimension,and by using theory analysis on the present method,a new heuristic multidimensional data retrieve policy named HPPHM was proposed.The experimental result has demonstrated the efficiency of new strategy not only in parallel degree but also in robust.…”
Get full text
Article -
7180
Design and implementation of electric cloud's resource pool
Published 2017-03-01“…According to the characters of electric enterprise, the designing principle about the capacity and the base schema of resource pool was proposed.And the implementation plans of the resource pool were given.The key factors of resource pool and their assembling methods can be known clearly form the base schema of resource pool,there is great practical importance on the planning and strategy of resource pool.…”
Get full text
Article