Suggested Topics within your search.
Suggested Topics within your search.
- Entrepreneurship 5
- Management 5
- English language 4
- Business enterprises 3
- Economic development 3
- Industrial management 3
- Information technology 3
- Methodology 3
- Research 3
- Study and teaching 3
- Classroom environment 2
- Communication in education 2
- Effective teaching 2
- Elementary school teaching 2
- Hospitality industry 2
- Inquiry-based learning 2
- Interaction analysis in education 2
- Intercultural communication 2
- Internet in public administration 2
- Internet marketing 2
- Marketing 2
- Moral and ethical aspects 2
- Psychological aspects 2
- Psychology 2
- Public administration 2
- Public relations 2
- Rhetoric 2
- Social networks 2
- Sustainable development 2
- Technical writing 2
-
7281
Research on routing protocol of vehicular delay-tolerant networks
Published 2013-03-01“…At the same time, copy equilibrium strategy was used to dynamically adjust copy number of different types of packets. …”
Get full text
Article -
7282
Nanotechnology, additive manufacturing and genius loci. A case of jewellery design
Published 2020-06-01“…The work shows the possibilities of innovation that arise from the overall strategy of a Territorial Design project by working, on the one hand, on the definition of the peculiarities of the natural and man-made environment, in terms of creativity and aesthetic expression, on the other hand, on the use of nanotechnology to facilitate a conscious use of resources (local waste materials and biopolymers) in combination with the possibilities offered by additive manufacturing.…”
Get full text
Article -
7283
La politique commerciale de George W. Bush : rupture ou continuité ?
Published 2010-03-01“…These elements provide crucial background, first to study the evolution of America’s relations with its top trading partners and second to analyze the strategy of “competitive liberalization” undertaken by the administration at the multilateral, regional and bilateral levels. …”
Get full text
Article -
7284
A Hybrid IP/GA Approach to the Parallel Production Lines Scheduling Problem
Published 2016-01-01“…A few valid inequalities are deduced and a hybrid mixed integer linear programming/constraint programming (MILP/CP) decomposition strategy is introduced. Based on them, a hybrid integer programming/genetic algorithm (IP/GA) approach is proposed to solve the problem. …”
Get full text
Article -
7285
A Guide to Tracking Physical Activity
Published 2016-08-01“…The Physical Activity Guidelines for Americans recommend that adults be purposefully active for at least 150 minutes per week for overall health and wellness. One proven strategy to make sure you reach your activity goal is to track your energy expenditure. …”
Get full text
Article -
7286
A novel perturbation attack on SVM by greedy algorithm
Published 2019-01-01“…This attack occurred in the testing stage by manipulating with the sample tofool the SVM classification model. Greedy strategy was used to search for salient feature subsets in kernel space and then the perturbation in the kernel space was projected back into the input space to obtain attack samples. …”
Get full text
Article -
7287
Probability-based heuristic content placement method for ICN caching
Published 2016-05-01“…,proportional to content popularity and content placement benefit.The experimental re-sults indicate PCP can achieve salient performance gain in terms of cache service ratio,cache hit ratio,access latency ra-tio,compared with current strategies.Meanwhile,PCP's overhead is affordable.…”
Get full text
Article -
7288
Mesenchymal Stem Cells: An Excellent Candidate for the Treatment of Diabetes Mellitus
Published 2021-01-01“…MSC therapy may be the most promising strategy for diabetes mellitus because of these significant merits. …”
Get full text
Article -
7289
Methods of Trace Mineral Supplementation
Published 2018-10-01“…The value of the characteristics should be evaluated against management activities of each cattle producer to determine the optimal trace mineral delivery strategy. …”
Get full text
Article -
7290
Le voyage au centre de l’Europe : l’avant-garde parisienne dans la collection internationale d’art moderne à Łódź
Published 2016-10-01“…The article analyses the strategy of the a.r. Group and examines the vision of the history of modern art that the artists sought to convey through their collection.…”
Get full text
Article -
7291
Research on energy management of multi-user mobile edge computing offloading
Published 2019-03-01“…In mobile edge computing system,the quality of computing experience can be improved greatly by offloading computing tasks from mobile devices to mobile edge computing servers.Consider incorporating renewable energy into a multi-user mobile edge system.Moreover,a battery as an energy harvesting device was added to the model to harvest energy and storage.The task allocation strategy in mobile edge computing system was formulated through the resource management algorithm based on reinforcement learning,which achieved the cost minimization of mobile devices (including delay cost and computing cost).The simulation results show that the proposed algorithm significantly minimizes the cost of mobile devices compared with other algorithms.…”
Get full text
Article -
7292
Gait Analysis and Simulation of a Multi-mode 4-UPU Mechanism
Published 2022-08-01“…The screw theory is used to analyze the degree of freedom of the mechanism and describe the switching strategy of each mode. The gait of each mode of the mechanism is analyzed, and a simulation experiment of the mechanism gait is carried out using Adams software to verify the feasibility of gait. …”
Get full text
Article -
7293
Waveform design and signal processing for terahertz integrated sensing and communication
Published 2022-02-01“…Integrated sensing and communication (ISaC) in the terahertz band can efficiently reduce the consumption of hardware and spectrum resources, while improving the transmission data rate and sensing resolution.Firstly, the development status of ISaC, terahertz communication and sensing were briefly introduced.Then, the strategy of waveform design and optimization for ISaC and the receiving signal processing algorithms were presented.As an example, an OFDM ISaC system operating at 97 GHz was experientially demonstrate, and the performance of ranging, speed and communication were all evaluated in the experiment.Finally, the key issues and research directions of future terahertz ISaC development were discussed.…”
Get full text
Article -
7294
Surgical Intervention for Pectoralis Major Muscle Rupture: Report of Acute and Chronic Cases
Published 2018-01-01“…We reported 2 cases with acute and chronic injury settings along with the strategy to treat each of it.…”
Get full text
Article -
7295
Evolution game model of offense-defense for network security based on system dynamics
Published 2014-01-01“…An offense-defense game model with learning mechanism in the case of asymmetric information was proposed based on non-cooperation evolution game theory.Combined with utility function,the existence and uniqueness of Nash equilibrium in the offense-defense process were proved.Simulation by system dynamics shows that there is Nash equilibrium in evolutionary game model after introducing the dynamic penalty strategy of the third party.Therefore,when improving all kinds of security technology,promoting attacker tracing technology,enhancing the censorship of network attack behaviors and dynamic penalty are fundamental ways to information security.…”
Get full text
Article -
7296
The Economics of Planting New Citrus Groves in Florida in the Era of HLB
Published 2019-03-01“…To this date there is no cure or successful management strategy to deal with HLB. This 8-page fact sheet written by Ariel Singerman, Marina Burani-Arouca, and Stephen H. …”
Get full text
Article -
7297
Network function outsourcing system based on prefix-preserving encryption
Published 2018-04-01“…Due to the problem of high cost and limited scalability of dedicated hardware middleboxes,it is popular for enterprises to outsource middleboxes as software processes to the cloud service provider.In the current network function outsourcing schemes,the cloud service provider requires the enterprise’s communication traffic and network strategy which poses a serious threat to the enterprise’s piracy.Based on prefix-preserving encryption,a privacy preserving network function outsourcing system was proposed.Compared with other similar schemes,the system not only realizes the privacy protection of communication traffic,but also has higher throughput and lower delay.…”
Get full text
Article -
7298
OOxytetracycline Hydrochloride (OTC-HCl) Application for Control of Palm Phytoplasmas
Published 2019-04-01“…Currently, the only two management options available for control of phytoplasmas is an aggressive sampling strategy followed by consistent tree removal and injections of OTC. …”
Get full text
Article -
7299
Reducing the sign problem with line integrals
Published 2025-02-01“…Abstract We present a novel strategy to strongly reduce the severity of the sign problem, using line integrals along paths of changing imaginary action. …”
Get full text
Article -
7300
Houses, Objects and Architects. Architectural Drawing in Children’s Literature
Published 2020-05-01“…The role of drawing in aesthetic education, in education for the understanding of space and in the introduction of young readers to the world of 20th century architecture is of primary importance and the research aims to underline as case studies are only simple examples for readers who are cognitively less trained than adults, but describe a precise educational strategy that cannot be derogated from other means. …”
Get full text
Article