Showing 7,261 - 7,280 results of 31,041 for search '"strategy"', query time: 0.11s Refine Results
  1. 7261

    A Guide to Tracking Physical Activity by Madison K. Keesling, Anne E. Mathews

    Published 2016-08-01
    “…The Physical Activity Guidelines for Americans recommend that adults be purposefully active for at least 150 minutes per week for overall health and wellness. One proven strategy to make sure you reach your activity goal is to track your energy expenditure. …”
    Get full text
    Article
  2. 7262

    Recursive Neural Networks Based on PSO for Image Parsing by Guo-Rong Cai, Shui-Li Chen

    Published 2013-01-01
    “…State-of-the-art method such as traditional RNN-based parsing strategy uses L-BFGS over the complete data for learning the parameters. …”
    Get full text
    Article
  3. 7263

    Bringing arbitration (taḥkīm) and conciliation (ṣulḥ) under the qāḍī’s purview in Mālikī al-Andalus (10th to 12th centuries C.E.) by Delfina Serrano

    Published 2016-12-01
    “…They acknowledge arbitration as a valid conflict resolution strategy, though inferior and subservient to qāḍīship, while restricting, mostly on ethical grounds, the right to resort to the widespread practice of conciliation.…”
    Get full text
    Article
  4. 7264

    FEATURES OF RAIL TRANSPORT AND THEIR ACCOUNTING IN THE REFORM OF THE INDUSTRY by A. Zhdanov

    Published 2018-01-01
    “…Railway transport has a number of significant features that should be considered with much attention into account both in the overall strategy of economic reforms in the country and in assessing the efficiency of the enterprises of the industry and the company JSC RZhD in general with obtaining objective quantitative characteristics. …”
    Get full text
    Article
  5. 7265

    Research on Ev-Do Multi-Carrier Coverage Consistency Control by Baofa Hu, Minghui Lin, Wen Chen

    Published 2015-08-01
    “…In the crowded area,China Telecom cdma2000 Ev-Do sector is configured with multi-carrier for improving the capacity.Nevertheless,the users’ experience is influenced because of the carrier’s effective coverage difference.Meanwhile,the traditional optimization methods for multi-carrier coverage such as performance index analysis and drive test are time-consuming and costly.According to the multi-carrier wireless environment typical model and combining with the DRC and call data analysis,an effective method to control the coverage of each carrier was proposed.This method can improve the optimization efficiency of China Telecom cdma2000 network by transforming the empirical method into quantitative strategy.…”
    Get full text
    Article
  6. 7266

    Les affiches de la lutte contre le sida by Alexandre Klein, Gabriel Girard

    Published 2021-12-01
    “…Among these productions, the posters occupy a special place as they characterized – one thinks only of the famous Silence = Death of the eponymous collective which alone embodies the epidemic and its political issues – both the prevention strategy against HIV and related socio-political mobilizations. …”
    Get full text
    Article
  7. 7267

    A Virtual Network Mapping Algorithm Based on Approaching Principle by Sheng Huang, Chuanchuan Wu, Xiaofei Yang, Hui Wang, Wei Zhang

    Published 2013-12-01
    “…On the basis of two stages virtual network mapping algorithm, pointing at the defects of the blind node mapping of existing greedy strategy, a virtual network mapping algorithm based on approaching principle was proposed. …”
    Get full text
    Article
  8. 7268

    Research on energy-efficient physical-layer secure transmission mechanism in decode-and-forward cooperative networks by Dong WANG, Yong-cheng LI, Bo BAI, Man-xi WANG

    Published 2017-01-01
    “…The maximization problem of secure energy efficiency (EE) in decode-and-forward relay networks was investigated considering the power and energy constraints in physical-layer secure transmission.An iterative algorithm for power allocation was proposed based on fractional programming and DC (difference of convex functions) programming.This algorithm jointly allocated power for source and relay nodes to achieve energy-efficient secure transmission,subject to the peak power constraint of each node and the minimum secrecy rate requirement of the system.Simulation results demonstrate that the propose algorithm can improve the secure EE significantly compared with the conventional secrecy rate maximization strategy.…”
    Get full text
    Article
  9. 7269

    Methods of Trace Mineral Supplementation by Matthew J. Hersom, Todd A. Thrift

    Published 2018-10-01
    “…The value of the characteristics should be evaluated against management activities of each cattle producer to determine the optimal trace mineral delivery strategy. …”
    Get full text
    Article
  10. 7270

    Task scheduling algorithm for distributed environment based on signal-driven by Yu XIN, Jing YANG, Zhi-qiang XIE

    Published 2015-07-01
    “…In order to optimize the performance of user services in IaaS,the task scheduling algorithm for IaaS based on signal-driven is proposed,by which CS(control subsystem) and NS(inquiry nodes subsystem) based on the structural characteristics of the IaaS is established,and the DAG scheduling model based on the structural characteristics of the inquiry task is created.Then the conversion mechanism for the task partitions is created,constructing the signal communication mechanism for CS and NS,changing the status of the task partitions by signal-driven between the CS and NS,completing the task partitions allocation by POSS (parallel optimization selective strategy) in the scheduling time.This algorithm with low complexity is compatible with the distributed architecture of IaaS,because of utilizing dual system control mode.The effectiveness and practicality of this algorithm is verified by experiment.…”
    Get full text
    Article
  11. 7271

    The Hound of the Baskervilles : Histoire, fantasme et genèse de la narration policière by Christophe Gelly

    Published 2004-12-01
    “…Lastly, we study the character of Sherlock Holmes himself, his behaviour and his strategy when facing this fantasy of an engulfed self, so as to suggest our own vision of the most famous ever fictional detective.…”
    Get full text
    Article
  12. 7272

    Multi-domain optical network virtual technology based on SDN by Shidong LIU, Pan WANG

    Published 2016-04-01
    “…A resource balancing strategy based on SDN for the inter-domain optical network virtualization service was proposed. …”
    Get full text
    Article
  13. 7273

    Crack path in liquid metal embrittlement: experiments with steels and modeling by T. Auger, S. Hémery, M. Bourcier, C. Berdin, M. Martin, I. Robertson

    Published 2015-12-01
    “…Based on these experimental insights, we sketch an on-going modeling strategy for LME crack initiation and propagation at mesoscopic scale.…”
    Get full text
    Article
  14. 7274

    Fixation Probabilities of Evolutionary Graphs Based on the Positions of New Appearing Mutants by Pei-ai Zhang

    Published 2014-01-01
    “…To calculate the fixation probability is usually regarded as a Markov chain process, which is affected by the number of the individuals, the fitness of the mutant, the game strategy, and the structure of the population. However the position of the new mutant is important to its fixation probability. …”
    Get full text
    Article
  15. 7275

    The Potential for Plants to Remove Phosphorus from the Spodic Horizon by Debolina Chakraborty, Vimala D. Nair, Willie G. Harris, Roy D. Rhue

    Published 2011-10-01
    “…This 5-page fact sheet shows how calculations for the phosphorus saturation ratio and soil phosphorus storage capacity at various soil depths can be used to determine whether to use phytoremediation as a strategy to remove phosphorus from the soil. Written by D. …”
    Get full text
    Article
  16. 7276

    Smart grid interoperability maturity model by Jing ZHOU, Guojun LIU, Ziwei HU, Lifeng LU, Wei ZHANG

    Published 2015-12-01
    “…Smart grid interoperability is a kind of ability that a set of electrical equipments and systems exchange and share information safely,seamlessly and transparently with standard interface.The Grid Wise Architecture Council(GWAC)sponsors using concepts from capability maturity models in the software industry to smart grid interoperability and has been drafted an interoperability maturity model which is being in the project verification stage.The interoperability requirements of the smart grid and the work of the GWAC working group to promote interoperability maturity model(IMM)were analyzed.The evaluation and analysis of the maturity of the smart grid interoperability were studied and discussed.It would effectively help the development of smart grid planning from the dimensions of strategy and tactics to consider the interoperability of smart grid.…”
    Get full text
    Article
  17. 7277

    Low complexity uplink multiuser MIMO detecting algorithm by HEI Yong-qiang1, LI Xiao-hui1, YI Ke-chu1, YANG Hong2

    Published 2010-01-01
    “…Aiming at the uplink multiuser MIMO system,a new space-time detecting algorithm was proposed,in which a linear recombination strategy was imposed on the received signal first,and then the matched filter vectors orthogonal to each users’ interference sets were used to eliminate the interference among users.Finally the signal of each user was line-arly space-time decoded by means of the orthogonal equivalent channel.The design of the algorithm under imperfect channel scenario was also provided.Theory analysis and simulation results reveal that the proposed algorithm has the advantages of low complexity and good robustness,and is superior to other detecting algorithms.…”
    Get full text
    Article
  18. 7278

    Bioethical aspects of the management of patients with Acquired immunodeficiency syndrome by Maria de Jesús Sánchez Bouza, Pedro Sánchez Frenes.

    Published 2009-05-01
    “…Bioethical aspects related with the prevention, diagnosis and treatment of patients with AIDS are present in the Cuban strategy to fight the epidemic. Through the revision of the essentials and principles of Bioethics, we analyze the problems that doctors face when treating these patients and aspects related with education for health in the case of this disease. …”
    Get full text
    Article
  19. 7279

    Dark Patterns in Web User Interfaces: Toward an Incentive-Based Policy Approach Supplementing Legal Provisions by Torsten J. Gerpott

    Published 2022-09-01
    “…It concludes that a move beyond a narrow legal dark pattern counter-strategy is required by setting incentives for website providers to implement bright interface design features voluntarily. …”
    Get full text
    Article
  20. 7280

    Basic stage structure measure valued evolutionary game model by John Cleveland

    Published 2014-11-01
    “…The ideas and techniques developed in [12,3] are extended to a basic stage structured model. Each strategy consists of two stages: a Juvenile (L for larvae), and Adult (A). …”
    Get full text
    Article