Suggested Topics within your search.
Suggested Topics within your search.
- Entrepreneurship 5
- Management 5
- English language 4
- Business enterprises 3
- Economic development 3
- Industrial management 3
- Information technology 3
- Methodology 3
- Research 3
- Study and teaching 3
- Classroom environment 2
- Communication in education 2
- Effective teaching 2
- Elementary school teaching 2
- Hospitality industry 2
- Inquiry-based learning 2
- Interaction analysis in education 2
- Intercultural communication 2
- Internet in public administration 2
- Internet marketing 2
- Marketing 2
- Moral and ethical aspects 2
- Psychological aspects 2
- Psychology 2
- Public administration 2
- Public relations 2
- Rhetoric 2
- Social networks 2
- Sustainable development 2
- Technical writing 2
-
7301
L’horreur acoustique musiques « anempathiques » dans le théâtre de Martin Crimp
Published 2003-06-01“…Martin Crimp exploits this anempathetic strategy in plays such as Play with Repeats (1990), The Treatment (1993) or more recently the triptych Fewer Emergencies (2005) in which violent events are narrated with a boogie-woogie playing in the background. …”
Get full text
Article -
7302
L’identité nationale canadienne au travers des affiches de propagande des Première et Seconde Guerres mondiales
Published 2008-01-01“…This change in status obliged the country to invent a series of national symbols, and to discard the First World War strategy of appealing to isolated groups of citizens according to their ethnic or cultural origins. …”
Get full text
Article -
7303
Dynamic Behaviors of a Discrete Two Species Predator-Prey System Incorporating Harvesting
Published 2012-01-01“…Lastly, we obtain the optimal capture strategy of the system from the maximum principle by constructing a discrete Hamiltonian function. …”
Get full text
Article -
7304
PROSPECTS OF DEVELOPMENT OF HOUSING CONSTRUCTION
Published 2018-03-01“…Questions of land tenure and allocation of sites under housing construction, strategy of expenses in this segment, state sale and others has been consistently analyzed. …”
Get full text
Article -
7305
A Performance Research on the Threshold-Based Decoding Algorithm in Cooperative Communications
Published 2013-01-01“…Both the error rate performance and the operation complexity were then simulated, and compared with existing algorithms. Furthermore, a strategy of dynamic threshold-settings, which was given on the basis of the analyses and simulations above, was applied to the proposed algorithm. …”
Get full text
Article -
7306
Fully implicit numerical integration of the Yoshida-Uemori two-surface plasticity model with isotropic hardening stagnation
Published 2021-07-01“…This plasticity theory allows to describe the deformation behavior under large strain cyclic plasticity and the material stress-strain responses at small-scale re-yielding after large pre-straining. A novel strategy to model the isotropic hardening stagnation is developed within a fully implicit integration scheme in order to speed up the computation and to improve the material description.…”
Get full text
Article -
7307
Design of a Dynamic Simulator for a Biped Robot
Published 2021-01-01“…This model allowed the design and implementation of a control strategy for balance management, and the monitoring of articular reference paths are tested in the simulator before proceeding to implementation on the actual prototype.…”
Get full text
Article -
7308
HBO’s Black Women Artist Biopics: The Josephine Baker Story and Introducing Dorothy Dandridge
Published 2016-12-01“…This paper analyses cable television HBO’s 1990s biopics based on the life stories of the African American dancer and singer Josephine Baker (The Josephine Baker Story, Brian Gibson, 1991) and the actress Dorothy Dandridge (Introducing Dorothy Dandridge, Martha Coolidge, 1999), demonstrating that the films articulate the network’s commercial strategy, using the life stories of African American icons to tap into a niche market. …”
Get full text
Article -
7309
Research on key management and authentication protocol of PDA in smart grid
Published 2018-03-01“…According to PDA in smart grid,which faced with security issues,key management and authentication protocol for PDA in smart grid based on scrambling PUF were presented.With the construction of mobile trusted platform by trusted hardware module and PDA,a key management mechanism was designed which presented for the indentify of hardware and controlled by user,to guarantee the security of key management and build a safe and effective mechanism of key backup and recovery.Based on trusted hardware module,security access for PDA in smart grid was realized,with the public and private key of key management strategy and improved access authentication protocol based on public key cryptography.…”
Get full text
Article -
7310
TALENT MANAGEMENT IN THE CAREER COACHING STYLE USING A METAPROGRAM APPROACH
Published 2020-07-01“…The current practice has been considered in the article and also an alternative approach that can increase the quality of training of talent pool to a higher level has been presented . A new strategy for integrating career coaching and a metaprogram approach into the system of talent pool management, as well as a different starting point for work with it, have been proposed. …”
Get full text
Article -
7311
Cloud native approach of agile cloud-network converged application delivery
Published 2020-12-01“…ion:Cloud-network convergence is the strategy many telecom operators are implementing for the new information infrastructure,as the technicalbasis cloud native technology prompts the capability integration and business innovation.Leveraging the cloud native DevOps tool-chain and methodology becomes the mainstream in cloud application,for agile delivery of high-quality service and bringing the business value.Principles and solutions of leveraging DevOps in cloud-network converged application were given in three aspects:agile process adoption,key technology and DevOps platform establishment,from the view point of telecom operator.Case study of DevOps platform inproduction environment was presented in the end.…”
Get full text
Article -
7312
COMPARATIVE ANALYSIS OF THE MOTIVATIONAL COMPONENT OF THE INDUSTRY-OUTPUT TARIFF AGREEMENTS IN THE INDUSTRIES OF FUEL & ENERGY COMPLEX
Published 2019-05-01“…Criteria of comparison have been selected and the optimal labor motivation strategy in the oil, gas, coal and electric power industries has been revealed. …”
Get full text
Article -
7313
Approvisionnement en énergie des projets urbains : échelles et acteurs. Analyse des cas Paris Rive Gauche, Clichy-Batignolles et Paris Nord Est
Published 2017-07-01“…This study leads us to question the right scale to the definition and implementation of an energy strategy for the urban fabric as well as the best actor to coordinate this action.…”
Get full text
Article -
7314
In search of the bloc bourgeois
Published 2022-01-01“…This paper proposes an analysis of the social bloc that could support the political strategy of a radical change of the socio-economic model in France. …”
Get full text
Article -
7315
Modifications of the continuation method for the solution of systems of nonlinear equations
Published 1979-01-01“…To do this alterations are made to the strategy used in determining the subproblems to be solved. …”
Get full text
Article -
7316
A PSO-Based Hybrid Metaheuristic for Permutation Flowshop Scheduling Problems
Published 2014-01-01“…To improve the search diversification of the hybrid metaheuristic, a solution replacement strategy based on the pathrelinking is presented to replace the particles that have been trapped in local optimum. …”
Get full text
Article -
7317
Learning Discriminative Salient LBP for Cloud Classification in Wireless Sensor Networks
Published 2015-10-01“…The first layer is designed to learn the most salient and robust patterns from each class, and the second layer is used to obtain features with discriminative power and representation capability. Based on this strategy, discriminative patterns are obtained according to the characteristics of training cloud data from different sensor nodes, which can adapt variant cloud images. …”
Get full text
Article -
7318
4PL and models of strategic alignment
Published 2007-12-01“…Its aim is to know whether the 4PL are able to combine their business strategy, IT deployment and organizational performance efficiently so as to manage interfaces between the supply chain members in the best conditions. …”
Get full text
Article -
7319
Transformações do literário: a politização do corpo e do desejo em Caio Fernando Abreu e Jaime Bayly
Published 2011-01-01“…The articulation of a queer epistemology allows us to think about textuality as a place of dramatization of a politicfiction that questions the heteronormative patterns of sex and gender, and proposes a strategy of resistance based both on bodies and pleasures and on politics of representation and reinvention of masculinities and femininities. …”
Get full text
Article -
7320
Analysis and construction for threshold signature scheme based on game theory
Published 2015-05-01“…The concept of “rational player” is introduced to make threshold signature system more general.In this new primitive,all players are regarded as rational individuals in the sense that they always try to maximize their profits as the goal at any phases.Each player's strategy and utility in key generation and signature synthesis phases are analyzed based on game theory.It is proved that rational players have no motivation to participate in signature in traditional threshold signature scheme,which might cause it impossible to complete threshold signature.Finally,the mechanism of rational key distribution and rational signature synthesis is proposed.Analysis shows the new method is more applicable than the previous schemes in the real-world applications.…”
Get full text
Article