Showing 7,321 - 7,340 results of 31,041 for search '"strategy"', query time: 0.10s Refine Results
  1. 7321

    BARRIERS TO INNOVATIVE DEVELOPMENT OF RESEARCH ORGANIZATIONS OIL AND GAS INDUSTRY by V. Linnik, Y. Linnik

    Published 2018-12-01
    “…The barriers, internal and external challenges, creating threats to the implemen-tation of the innovative strategy of the oil and gas industry in Russia, have been considered. …”
    Get full text
    Article
  2. 7322

    TURBINE DISK PROFILE OPTIMIZATION APPLYING DESIGN OF EXPERIMENT AND RESPONSE SURFACE METHOD by ZHANG ZhiYi, LIU Yang, PI ZiZi, DENG XiaoTao, DENG YiTai

    Published 2018-01-01
    “…Present research demonstrates that ANSYS Workbench platform integrating geometry modeling,stress analysis and optimization module can minimize the difficulties of optimization work,the accuracy of surrogate model using Design of Experiments( DOE) and Response Surface Method( RSM) can satisfy engineering requirements and the application of combination optimization strategy involving DOE,RSM and Multi-Objective Genetic Algorithm( MOGA) can obviously enhance the optimization efficiency.…”
    Get full text
    Article
  3. 7323

    Attention-based approach of detecting spam in social networks by Qiang QU, Hongtao YU, Ruiyang HUANG

    Published 2020-02-01
    “…In social networks,a large amount of spam has seriously threaten users' information security and the credit system of social websites.Aiming at the noise and sparsity problems,an attention-based CNN method was proposed to detect spam.On the basis of classical CNN,this method added a filter layer in which an attention mechanism based on Naive Bayesian weighting technology was designed to solve the noise issue.What’s more,instead of the original pooling strategy,it adapted an attention-based pooling policy to alleviate the sparsity problem.Compared with other methods,the results show that the accuracy has increased by 1.32%,2.15%,0.07%,1.63% on four different data sets.…”
    Get full text
    Article
  4. 7324

    LEACH protocol based security mechanism for Sybil attack detection by CHEN Shan-shan1, YANG Geng2, CHEN Sheng-shou2

    Published 2011-01-01
    “…Low energy adaptive clustering hierarchy(LEACH) could effectively reduce energy consumption of wireless sensor network(WSN).However,a novel security mechanism was proposed based on LEACH protocol called LEACH-S in order to improve the security performance of WSN.The mechanism adopted a received signal strength indicator(RSSI) based policy for Sybil attack detection in WSN,and a reasonable threshold was chosen to initialize Sybil attack detection strategy in which case attack may occur with high possibility.The simulation results show that the mechanism can detect Sybil attack effectively at the cost of low energy consumption.…”
    Get full text
    Article
  5. 7325

    Chaotic image encryption algorithm based on single image local scrambling and dynamic feedback diffusion by Yeqin CUI, Guochao DING

    Published 2016-11-01
    “…A novel chaotic image encryption algorithm based on single image local scrambling and dynamic feedback diffusion was presented.Firstly,a single image local scrambling algorithm was proposed.Secondly,a novel dynamic feedback diffusion strategy was proposed to change the pixel values of the scrambled image in the phase of diffusion,by which improved the results of image encryption.Finally,the simulation results and performance analysis show that the number pixels change rate(NPCR)values and unified average changing intensity(UACI)values of the proposed algorithm can be close to 99.6% and 33.4%,showing that the proposed algorithm has better resistance to differential attacks and saves time compared with the other three classic algorithms.…”
    Get full text
    Article
  6. 7326

    Timeout threshold estimation algorithm in mimic multiple executors architecture by Delei NIE, Obo ZHA, Chong WANG, Xin WANG, Binghao YAN

    Published 2018-10-01
    “…Aiming at the problem that the current timeout strategy algorithm is difficult to cope with the violent situation of task volume,a timeout threshold prediction algorithm based on equivalent proportional execution time applied to the mimetic defense architecture system is proposed.The algorithm utilizes the principle that the execution time of multiple functional equivalent executable tasks in the mimetic defense architecture is positively related,predicts the task execution time and sets a reasonable timeout threshold.The simulation results show that the proposed algorithm can dynamically predict and set the timeout threshold for different task situations,which effectively improves the timeout judgment efficiency,especially for scenarios with dramatic changes in workload.…”
    Get full text
    Article
  7. 7327

    Improved tree structure anti-collision algorithm of RFID by Xue WANG, Zhi-hong QIAN, Xiao-hui LIU, Chao CHENG

    Published 2015-07-01
    “…The whole big query tree is divided into several branches,and the work of tag recognition is executed in each branch,thus reducing the probability of tag collision.The proposed algorithm can be divided into prefix determination and branch query two phases.In the prefix determination phase,the prefix of every tag is identified,and each prefix denotes a branch.Traverse each branch by turns to recognize tags; in the branch query phase,backward search strategy and dynamic search method are used.Theoretical analysis and simulation experiment show that when the improved algorithm can improved the overall performance of RFID system from the aspects of the number of queries,time delay,and throughput.…”
    Get full text
    Article
  8. 7328

    Optimized PFA algorithm in GPS software receiver by Xiang-zhen YAO, Shao-long CUI, Jin-yun FANG

    Published 2012-04-01
    “…According to the specific storage mode of GPS data,a novel algorithm using 2-bit to quantitate the GPS data and the local carrier signal was proposed,and the baseband-mixing operation was transformed into bit-wise calculation,then the result was set as the input data of PFA algorithm.Part of the twiddle factors were pre-stored as 16-bit complement integer,and the whole factors were generated by mapping strategy when used.So all the floating-point calculations were transformed into integer operations.Experimental results show that this method has improved the efficiency of the PFA algorithm significantly,and the acquisition time were reduced effectively.…”
    Get full text
    Article
  9. 7329

    METTL3/miR-192-5p/SCD1 Axis Regulates Lipid Metabolism to Affect T Cell Differentiation in Asthma by Zhengrong Chen, Dingwei Yan, Suyu Guo, Yiyi Song, Xinxing Zhang, Wenjing Gu, Heting Dong, Li Huang

    Published 2025-01-01
    “…This study may provide novel insights into the pathogenesis of asthma and a new treatment strategy.…”
    Get full text
    Article
  10. 7330

    Doulas como "amortecedores afetivos" Notas etnográficas sobre uma nova acompanhante de parto by Soraya Fleischer

    Published 2005-01-01
    “…My argument is that this profession is configuring an ethos that is consistent with the movement for the humanization of delivery and birth, uses dichotomic categories and at the same time maintains a great fluidity between them. In my view, this strategy can sometimes reify a very conventional image of women.…”
    Get full text
    Article
  11. 7331

    Informational Competence: A Relevant Conception to Take into Consideration in Higher Education by María Elinor Dulzaides Iglesias, Ana María Molina Gómez

    Published 2007-04-01
    “…It implies more integration between strategy, study system, work and organizational culture, along with information management and knowledge. …”
    Get full text
    Article
  12. 7332

    Social financial information security risk analysis and prevention by Jian-ming ZHU, Bo GAO

    Published 2016-03-01
    “…By modeling a social finance security game, that the correct defense strategy and adopt effective defense measures should be developed was analyzed and pointed out to cope with the social finance information security risks, so as to promote the healthy and quick development of social finance in our country.…”
    Get full text
    Article
  13. 7333

    CORPORATE SOCIAL RESPONSIBILITY AS AN INTEGRAL PART OF EFFECTIVE ACTIVITY OF ORGANIZATION by Zi Gunchao

    Published 2020-02-01
    “…When properly understood and executed, it is a win-win strategy, that benefits both the company and society.…”
    Get full text
    Article
  14. 7334

    A renda da terra na Região Metropolitana da Grande Vitória – ES – Brasil by Cláudio Luiz Zanotelli, Francismar Cunha Ferreira, Larissa Marques de Antônio, Rodrigo Bettim Bergamaschi

    Published 2014-08-01
    “…The text concludes by discussing the existence of exponential monopoly rents, absolute and differential, in the region. The strategy to achieve these monopoly rents is closely associated with relationships and crossed cooperation between state agents, real estate agents and landowners.…”
    Get full text
    Article
  15. 7335

    A Novel Virtual Voltage Comparison Compensation for Dynamic Voltage Restorer by Jie Xu, Pengcheng Niu

    Published 2022-01-01
    “…The flexibility of the proposed control strategy, as well as the effectiveness of the optimal design method, is verified by both simulation and experimental results.…”
    Get full text
    Article
  16. 7336

    Methodological recommendations for the evaluation of freight forwarding services by D. R. Abdyusheva

    Published 2021-09-01
    “…In this regard, the assessment of client performance indicators is the basis for the development of an organization’s strategy.…”
    Get full text
    Article
  17. 7337

    Efficient Algorithm for Isotropic and Anisotropic Total Variation Deblurring and Denoising by Yuying Shi, Qianshun Chang

    Published 2013-01-01
    “…The algorithm consists of an efficient solver for the nonlinear system and an acceleration strategy for the outer iteration. For the nonlinear system, the split Bregman method is used to convert it into linear system, and an algebraic multigrid method is applied to solve the linearized system. …”
    Get full text
    Article
  18. 7338

    The Potential for Plants to Remove Phosphorus from the Spodic Horizon by Debolina Chakraborty, Vimala D. Nair, Willie G. Harris, Roy D. Rhue

    Published 2011-10-01
    “…This 5-page fact sheet shows how calculations for the phosphorus saturation ratio and soil phosphorus storage capacity at various soil depths can be used to determine whether to use phytoremediation as a strategy to remove phosphorus from the soil. Written by D. …”
    Get full text
    Article
  19. 7339

    Current Status of New Modes of Mechanical Ventilation by Robert M Kacmarek

    Published 1996-01-01
    “…Current approaches to managing patients requiring ventilatory support have focused on a lung protective strategy. This approach limits peak alveolar pressure and tidal volume, and allows hypercapnia. …”
    Get full text
    Article
  20. 7340

    Post-Election Climate Policy in Germany: Towards a New Green Industrial Policy by Barbara Praetorius, Wolfgang Dierker

    Published 2022-06-01
    “…Abstract In early 2022, the new German government presented an ambitious mitigation strategy to meet its climate protection targets. In it, industry plays a central role in two respects: in achieving emission reductions in its own production, while also generating climate-neutral products and emission-free production processes. …”
    Get full text
    Article