Showing 7,301 - 7,320 results of 31,041 for search '"strategy"', query time: 0.12s Refine Results
  1. 7301

    L’horreur acoustique musiques « anempathiques » dans le théâtre de Martin Crimp by Aloysia Rousseau

    Published 2003-06-01
    “…Martin Crimp exploits this anempathetic strategy in plays such as Play with Repeats (1990), The Treatment (1993) or more recently the triptych Fewer Emergencies (2005) in which violent events are narrated with a boogie-woogie playing in the background. …”
    Get full text
    Article
  2. 7302

    L’identité nationale canadienne  au travers des affiches de propagande des Première et Seconde Guerres mondiales by Jean Quellien, Andrew Ives

    Published 2008-01-01
    “…This change in status obliged the country to invent a series of national symbols, and to discard the First World War strategy of appealing to isolated groups of citizens according to their ethnic or cultural origins. …”
    Get full text
    Article
  3. 7303

    Dynamic Behaviors of a Discrete Two Species Predator-Prey System Incorporating Harvesting by Ting Wu

    Published 2012-01-01
    “…Lastly, we obtain the optimal capture strategy of the system from the maximum principle by constructing a discrete Hamiltonian function. …”
    Get full text
    Article
  4. 7304

    PROSPECTS OF DEVELOPMENT OF HOUSING CONSTRUCTION by E. Bogomolova, A. Kozlovskiy, N. Moiseenko

    Published 2018-03-01
    “…Questions of land tenure and allocation of sites under housing construction, strategy of expenses in this segment, state sale and others has been consistently analyzed. …”
    Get full text
    Article
  5. 7305

    A Performance Research on the Threshold-Based Decoding Algorithm in Cooperative Communications by Chenjie Huo, Shuxin Chen, Hengyang Zhang

    Published 2013-01-01
    “…Both the error rate performance and the operation complexity were then simulated, and compared with existing algorithms. Furthermore, a strategy of dynamic threshold-settings, which was given on the basis of the analyses and simulations above, was applied to the proposed algorithm. …”
    Get full text
    Article
  6. 7306

    Fully implicit numerical integration of the Yoshida-Uemori two-surface plasticity model with isotropic hardening stagnation by Riccardo Fincato, Seiichiro Tsutsumi, Alex Zilio, Gianluca Mazzucco, Valentina Salomoni

    Published 2021-07-01
    “…This plasticity theory allows to describe the deformation behavior under large strain cyclic plasticity and the material stress-strain responses at small-scale re-yielding after large pre-straining. A novel strategy to model the isotropic hardening stagnation is developed within a fully implicit integration scheme in order to speed up the computation and to improve the material description.…”
    Get full text
    Article
  7. 7307

    Design of a Dynamic Simulator for a Biped Robot by Diego A. Bravo M, Carlos F. Rengifo Rodas

    Published 2021-01-01
    “…This model allowed the design and implementation of a control strategy for balance management, and the monitoring of articular reference paths are tested in the simulator before proceeding to implementation on the actual prototype.…”
    Get full text
    Article
  8. 7308

    HBO’s Black Women Artist Biopics: The Josephine Baker Story and Introducing Dorothy Dandridge by Hélène Charlery

    Published 2016-12-01
    “…This paper analyses cable television HBO’s 1990s biopics based on the life stories of the African American dancer and singer Josephine Baker (The Josephine Baker Story, Brian Gibson, 1991) and the actress Dorothy Dandridge (Introducing Dorothy Dandridge, Martha Coolidge, 1999), demonstrating that the films articulate the network’s commercial strategy, using the life stories of African American icons to tap into a niche market. …”
    Get full text
    Article
  9. 7309

    Research on key management and authentication protocol of PDA in smart grid by Xiao YU, Li TIAN, Zhe LIU, Jie WANG

    Published 2018-03-01
    “…According to PDA in smart grid,which faced with security issues,key management and authentication protocol for PDA in smart grid based on scrambling PUF were presented.With the construction of mobile trusted platform by trusted hardware module and PDA,a key management mechanism was designed which presented for the indentify of hardware and controlled by user,to guarantee the security of key management and build a safe and effective mechanism of key backup and recovery.Based on trusted hardware module,security access for PDA in smart grid was realized,with the public and private key of key management strategy and improved access authentication protocol based on public key cryptography.…”
    Get full text
    Article
  10. 7310

    TALENT MANAGEMENT IN THE CAREER COACHING STYLE USING A METAPROGRAM APPROACH by N. M. Tverdola

    Published 2020-07-01
    “…The current practice has been considered in the article and also an alternative approach that can increase the quality of training of talent pool to a higher level has been presented . A new strategy for integrating career coaching and a metaprogram approach into the system of talent pool management, as well as a different starting point for work with it, have been proposed. …”
    Get full text
    Article
  11. 7311

    Cloud native approach of agile cloud-network converged application delivery by Yong CHEN, Wensheng YAO, Jingxiang CHEN, Huan LIANG, Jing LI

    Published 2020-12-01
    “…ion:Cloud-network convergence is the strategy many telecom operators are implementing for the new information infrastructure,as the technicalbasis cloud native technology prompts the capability integration and business innovation.Leveraging the cloud native DevOps tool-chain and methodology becomes the mainstream in cloud application,for agile delivery of high-quality service and bringing the business value.Principles and solutions of leveraging DevOps in cloud-network converged application were given in three aspects:agile process adoption,key technology and DevOps platform establishment,from the view point of telecom operator.Case study of DevOps platform inproduction environment was presented in the end.…”
    Get full text
    Article
  12. 7312

    COMPARATIVE ANALYSIS OF THE MOTIVATIONAL COMPONENT OF THE INDUSTRY-OUTPUT TARIFF AGREEMENTS IN THE INDUSTRIES OF FUEL & ENERGY COMPLEX by A. V. Akopyan, N. G. Lubimova

    Published 2019-05-01
    “…Criteria of comparison have been selected and the optimal labor motivation strategy in the oil, gas, coal and electric power industries has been revealed. …”
    Get full text
    Article
  13. 7313

    Approvisionnement en énergie des projets urbains : échelles et acteurs. Analyse des cas Paris Rive Gauche, Clichy-Batignolles et Paris Nord Est by Charlotte Tardieu

    Published 2017-07-01
    “…This study leads us to question the right scale to the definition and implementation of an energy strategy for the urban fabric as well as the best actor to coordinate this action.…”
    Get full text
    Article
  14. 7314

    In search of the bloc bourgeois by Bruno Amable

    Published 2022-01-01
    “…This paper proposes an analysis of the social bloc that could support the political strategy of a radical change of the socio-economic model in France. …”
    Get full text
    Article
  15. 7315

    Modifications of the continuation method for the solution of systems of nonlinear equations by G. R. Lindfield, D. C. Simpson

    Published 1979-01-01
    “…To do this alterations are made to the strategy used in determining the subproblems to be solved. …”
    Get full text
    Article
  16. 7316

    A PSO-Based Hybrid Metaheuristic for Permutation Flowshop Scheduling Problems by Le Zhang, Jinnan Wu

    Published 2014-01-01
    “…To improve the search diversification of the hybrid metaheuristic, a solution replacement strategy based on the pathrelinking is presented to replace the particles that have been trapped in local optimum. …”
    Get full text
    Article
  17. 7317

    Learning Discriminative Salient LBP for Cloud Classification in Wireless Sensor Networks by Shuang Liu, Zhong Zhang

    Published 2015-10-01
    “…The first layer is designed to learn the most salient and robust patterns from each class, and the second layer is used to obtain features with discriminative power and representation capability. Based on this strategy, discriminative patterns are obtained according to the characteristics of training cloud data from different sensor nodes, which can adapt variant cloud images. …”
    Get full text
    Article
  18. 7318

    4PL and models of strategic alignment by Laurence Saglietto, François Fulconis, Gilles Paché

    Published 2007-12-01
    “…Its aim is to know whether the 4PL are able to combine their business strategy, IT deployment and organizational performance efficiently so as to manage interfaces between the supply chain members in the best conditions. …”
    Get full text
    Article
  19. 7319

    Transformações do literário: a politização do corpo e do desejo em Caio Fernando Abreu e Jaime Bayly by Anselmo Peres Alós

    Published 2011-01-01
    “…The articulation of a queer epistemology allows us to think about textuality as a place of dramatization of a politicfiction that questions the heteronormative patterns of sex and gender, and proposes a strategy of resistance based both on bodies and pleasures and on politics of representation and reinvention of masculinities and femininities. …”
    Get full text
    Article
  20. 7320

    Analysis and construction for threshold signature scheme based on game theory by ANGJie W, AIYong-quan C, IANYou-liang T

    Published 2015-05-01
    “…The concept of “rational player” is introduced to make threshold signature system more general.In this new primitive,all players are regarded as rational individuals in the sense that they always try to maximize their profits as the goal at any phases.Each player's strategy and utility in key generation and signature synthesis phases are analyzed based on game theory.It is proved that rational players have no motivation to participate in signature in traditional threshold signature scheme,which might cause it impossible to complete threshold signature.Finally,the mechanism of rational key distribution and rational signature synthesis is proposed.Analysis shows the new method is more applicable than the previous schemes in the real-world applications.…”
    Get full text
    Article