Showing 7,201 - 7,220 results of 31,041 for search '"strategy"', query time: 0.10s Refine Results
  1. 7201

    Quelles interventions humanitaires internationales pour la reconstruction ? by Simon Veitl

    Published 2020-04-01
    “…Post-disaster international aid builds its action on standards (UNDRR frameworks, GAR), applied by stakeholders (UN, state and NGO), who organize themselves through a specific governance model (the cluster tool) and define a strategy to rebuild the land. In this study, we will do a critical analysis of this intervention. …”
    Get full text
    Article
  2. 7202

    El Buen Vivir como alternativa al desarrollo para América Latina by Cubillo-Guevara, A.P., Hidalgo-Capitán, A.L., García-Álvarez, S.

    Published 2016-11-01
    “…So to achieve the objectives of identity, equity and sustainability, we propose a political strategy of the creation of a plurinational, post-capitalist and biocentric society.…”
    Get full text
    Article
  3. 7203

    Nasu-Hakola Syndrome: An Unusual Cause of Pathological Fractures by Jaykar R. Panchmatia, Natasha Jiwa, Neil Soneji, John Paul Murphy

    Published 2012-01-01
    “…We propose a management strategy for pathological fractures in sufferers based on the stage of the disease.…”
    Get full text
    Article
  4. 7204

    Ecology and theology together within African Pentecostals worship liturgy by N. Sande

    Published 2024-06-01
    “…For the ecological strategies to be effective, they should blend into the churchs spiritual life, such as worship. …”
    Get full text
    Article
  5. 7205

    Guidelines for Clostridium difficile infection in adults by Michał Kukla, Krystian Adrych, Agnieszka Dobrowolska, Tomasz Mach, Jarosław Reguła, Grażyna Rydzewska

    Published 2020-03-01
    “…In patients who had recurrent CDI fecal microbiota transplantation seems to be promising and efficient strategy. These guidelines systematize existing data and include recent changes implemented in the management of CDI.…”
    Get full text
    Article
  6. 7206

    A RETROSPECTIVE OF THE FOREIGN GRAIN TRADING DEVELOPMENT by V. Smirnov

    Published 2018-09-01
    “…The rst was characterized by export orientation, the second - as a decit of self - suciency, during the third stage was dominated by grain import strategy, the fourth - dominated export activity. The consequences of the lack of harvesting equipment, losses for this reason, the problems of processing of raw materials, warehouse, transport logistics are considered, which seriously hinders the supply of surplus grain abroad, leads to excessive price pressure on the domestic grain market, the formation of illiquid reserves. …”
    Get full text
    Article
  7. 7207

    INVESTMENT MARKETING: TECHNIQUES AND METHODS OF IMPLEMENTATION IN THE FINANCIAL POLICY OF THE ORGANIZATIONS by E. Gulkova, L. Kazimirova

    Published 2016-02-01
    “…The means of evaluating the effectiveness of investments in marketing in order to monitor ongoing marketing activities for timely adjustments to the selected strategy and financial policy of the company are dedicated and systemated. …”
    Get full text
    Article
  8. 7208

    Research on load-balanced construction algorithm of logical carrying network by Hao-xue WANG, Ming JIANG, Ji FU

    Published 2012-09-01
    “…To improve the extensibility of network service,constructing algorithm of logical carrying network was pro-posed by mapping the demands of network service into substrate network.To solve the problem of construction efficiency,on-demand carrying strategy was introduced to provide different resources to meet different service requirements.Based on available resource and current link load,an improved multi-commodity flow model was proposed to compute the re-source allocation.Simulation results indicate this al ithm can improve network service capability from construction success rate and average construction profit.…”
    Get full text
    Article
  9. 7209

    Practice on edge cloud security of telecom operators by Le ZHANG, Hongyuan MA

    Published 2023-04-01
    “…Abstact: In the peak period of operator edge cloud construction, in order to realize the “three synchronization” construction strategy, the network edge cloud construction and operation and maintenance management mode were expounded, the security risks and security construction requirements of network edge cloud were discussed firstly.Then, the limitations of the security construction mode in the edge cloud scenario for the traditional cloud were analyzed.Finally, an innovative network edge cloud security construction plan was proposed, and the province’s edge cloud security construction was carried out uniformly.The comparison was completed from the perspective of practical application, and the advantages of the innovative edge cloud construction plan was verified.…”
    Get full text
    Article
  10. 7210

    Parallel Monte Carlo computations in SCore environment by Svajonė Vošterienė

    Published 2004-12-01
    “…We use the PC Cluster TAURAS [1] with the SCore cluster system software on top of Linux OS to present the strategy for parallelizing Monte Carlo calculations. …”
    Get full text
    Article
  11. 7211

    Georgian Direction of Russian Foreign Policy: Negative Scenario by A. A. Suchentsov

    Published 2012-12-01
    “…Due to the fact that "political legacy" of Saakashvili's government continues to influence Georgia's policy it is reasonable to refer to the possible strategy of indirect actions of Russia to win sympathies of the Georgian society and inhibit the "Atlantic" tendency “from below”.…”
    Get full text
    Article
  12. 7212

    Research and Achievement of Redundancy Elimination of Backbone Network by Baojian Liu, Jie Huang, Baosheng Wang, Xiaoxiao Zhang

    Published 2013-09-01
    “…In order to solve this problem, a redundant data elimination strategy based on application layer protocol identification(PI-RE)was put forward. …”
    Get full text
    Article
  13. 7213

    Postrzeganie dziecka przez wychowawcę w żłobku by Lucyna Telka

    Published 2023-09-01
    “… The article contains a report of research on the experience of educators of young children in creche. The strategy of the constructivist theory established by K. …”
    Get full text
    Article
  14. 7214

    Suggestions on cyber security talents cultivation by Hong-li ZHANG, Hai-ning YU, Jian-hong ZHAI, Xiang-zhan YU

    Published 2016-03-01
    “…Finally, based on national significant strategy, suggestions on cyber security talents cultivation to explore a sophisticated architecture were proposed, which refer to the national overall planning, academic education, vocational training and certification, genius discovery and cultivation.…”
    Get full text
    Article
  15. 7215

    Design and development of advanced spatio temporal database models by Garima Jolly, Sunita Bhatti

    Published 2024-09-01
    “…The framework is applicable to 2-dimensional and 3-dimensional workspaces. The strategy used decouples the motion planning problem into small tractable problems, which are solved using know path planning algorithm.…”
    Get full text
    Article
  16. 7216

    Enhancing the Classical Closed-Loop Algorithm in terms of Power Consumption by Rahman Mirzaei, Seyed Sina Kourehli

    Published 2015-01-01
    “…Extensive numerical analyses by using various scalar functions show that the proposed strategy effectively can reduce the need of the required control force consumptions.…”
    Get full text
    Article
  17. 7217

    Saturation cryptanalysis of CLEFIA by WANG Wei1, WANG Xiao-yun2

    Published 2008-01-01
    “…The saturation attack on a novel block cipher CLEFIA,which was proposed in FSE 2007,was reevaluated.The flaws in Shirai et al’s 8 round distinguishers were pointed out and corrected.In order to reduce the number of guessed subkeys,the attack utilized the movement of the whitening key to combine it with subkey,and explored a di-vide-and-conquer strategy.The partial sum technique was adopted to reduce the time complexity.As a result,the satura-tion attack can be extended from 10 round variant without key whitenings to 11 round CLEFIA-128/192/256,and is ap-plicable to 12 round CLEFIA-192/256 and 13 round CLEFIA-256.…”
    Get full text
    Article
  18. 7218

    A survey of mitigating satellite interference technology by Caiyong HAO

    Published 2017-01-01
    “…To deal with the new situation of satellite interference and solve the problem of satellite interference effectively,new techniques and methods of mitigating satellite interference were studied.The technology and development trend of satellite interference geolocation were summarized.The method of applying unmanned aerial vehicle assisted to find the ground interfering source was proposed,and it was introduced that using carrier identification (CID) standard to determine the satellite interference source.The implementation method of satellite terminal authentication and data sharing strategy to combat interference was given.It shows that multi-party cooperation and data sharing may be the most effective way to solve the problem of satellite interference.…”
    Get full text
    Article
  19. 7219

    Nouveaux modèles économiques et renouvellement productif à Romans-sur-Isère : à la recherche de la durabilité territoriale by Florian Fompérie, Muriel Maillefert

    Published 2023-06-01
    “…Faced with deindustrialization, the city of Romans-sur-Isère has recently adopted a strategy of redeployment of its activities based on an heritage model. …”
    Get full text
    Article
  20. 7220

    Intermittent Finite-Time Synchronization for Reaction-Diffusion Competitive Neural Networks with Different Time Scales by Renxi Hu, Jie Liu

    Published 2024-01-01
    “…To reduce the waste of network resources, a periodically intermittent control strategy is presented based on two time scales (short and long memory) and time-varying delay. …”
    Get full text
    Article