Showing 7,581 - 7,600 results of 31,041 for search '"strategy"', query time: 0.10s Refine Results
  1. 7581

    A FJSSP Method Based on Dynamic Multi-Objective Squirrel Search Algorithm by Yanjiao Wang, Jieru Han

    Published 2021-01-01
    “…Take the Squirrel Search Algorithm (SSA) as the core evolution strategy, and combine the multi-objective framework and the dynamic processing technology to solve the established mathematical model. …”
    Get full text
    Article
  2. 7582

    Qui a dit racisme systémique ? by Stacey Caceus, Consuelo Vásquez

    Published 2024-12-01
    “…Starting with the research mandate negotiation process, the article shows that semantic negotiation is a strategy used by both the researcher-intervenor and her partners to find common ground on which to pursue the research-intervention project. …”
    Get full text
    Article
  3. 7583

    TAJDIID TA’LIM MAHARAH AL QIRA’AH TAHLIL DLARURAT ADAWAT AL ISTIFHAM FI TA’LIM MAHARAH AL QIRA’AH by Rusdi Rusdi

    Published 2018-02-01
    “…All Arabic teachers, especially those who teach reading skill,  should understand and master a questioning strategy to ease comprehending the text. Hopefully, this study can be used as a confirmation of theory in the fact that there is a parallel line between the theory of istifham in the teaching of reading skill, and the process of understanding the passage. …”
    Get full text
    Article
  4. 7584

    Research on Network Selection Algorithm Based on User Preference in Heterogeneous System by Cun Yang, Jihong Zhao, Shuyuan Zhao

    Published 2014-06-01
    “…Most network selection algorithms did not pay more attention to user preference for networks which was based on service requirements.For this circumstance,a new network selection algorithm based on user prefenence was proposed.The algorithm was fully considerd service reqirements,user prefernece and network performance.The AHP algorithm and distance analysis were used to calculate subjective and objective user preference weight respectively for different heterogeneous networks.Then the user preference weight for networks could be obtained dynamically on the basis of user strategy.The performance of each candidate network was counted,based on which the optimum network was selected.Simulation results show that the algorithm performs well in network selection and reduces the number of handoff times as the user moves through the network boundary frequently.…”
    Get full text
    Article
  5. 7585

    Retrieval of Embolized Amplatzer Patent Foramen Ovale Occlusion Device: Issues Related to Late Recognition by Allan J. Davies, Nicholas Collins, Nicole Organ

    Published 2017-01-01
    “…While early, periprocedural device embolization can normally be managed with snare and percutaneous retrieval, late embolization requires a different management strategy due to inability of the device to deform to allow passage into a large caliber sheath. …”
    Get full text
    Article
  6. 7586

    Increasing Efficiency in Extension Using the Train-the-Trainer Approach by Laura A. Warner, Amy Harder, Tom Wichman, Frank Dowdle

    Published 2014-09-01
    “… Extension has adapted to today’s financial realities through a number of strategies, including increased reliance on partnerships. …”
    Get full text
    Article
  7. 7587

    Energy-saving scheme supporting ONU modularization with independent-discontinuous transceiving by Yu XIONG, Jian-jun GUAN, Ru-yan WANG

    Published 2015-07-01
    “…To effectively solve the contradiction between energy-saving and packet delay performance in green passive optical network,an energy-saving scheme supporting ONU modularization with independent-discontinuous transceiving is proposed.Utilizing the technology of optical network unit modularization,each module could switch to sleep or awake mode independently and transmit data in specified time slots discontinuously.Simultaneously,to enhance the quality of service of the overall network,the real-time packets are transmitted in the first sub-cycle based on the sub-cycle division strategy.Furthermore,an independent bandwidth allocation algorithm is proposed,which makes the scheme have more advantages in the asymmetric network traffic scenarios.Simulation results verify that the proposed scheme further reduce the network energy consumption on the premise of guarantee the packet delay.…”
    Get full text
    Article
  8. 7588

    Cryoablation for Ventricular Tachycardia Originating from Anterior Papillary Muscle of Left Ventricle Guided by Intracardiac Echocardiography by Ibrahim Marai, Nizar Andria, Osnat Gurevitz

    Published 2017-01-01
    “…Recently, cryoablation guided by intracardiac echocardiography, 3-dimensional mapping system, and image integration was introduced as alternative strategy for this challenging ablation. We present a case of ventricular tachycardia originating from anterior PM of left ventricle treated by cryoablation guided only by intracardiac echocardiography.…”
    Get full text
    Article
  9. 7589

    Throughput Analysis and Optimization of Relay Selection Techniques for Millimeter Wave Communications by Raed Alhamad, Hatem Boujemaa

    Published 2019-01-01
    “…We suggest a new optimal power allocation (OPA) strategy that offers significant performance enhancement with respect to uniform power allocation (UPA). …”
    Get full text
    Article
  10. 7590

    ENGINE FAULT DIAGNOSIS BASED ON DEEP BELIEF NETWORK IMPROVED BY ADAPTIVE CROW SEARCH ALGORITHM (MT) by WANG Liang, TANG MingWei

    Published 2023-01-01
    “…Based on the crow search algorithm(CSA), by the adaptive crow search algorithm(ACSA) the adaptive value strategy of sensing probability and flight distance, which effectively enhanced the performance of the algorithm is designed. …”
    Get full text
    Article
  11. 7591

    Double Discretization Difference Schemes for Partial Integrodifferential Option Pricing Jump Diffusion Models by M.-C. Casabán, R. Company, L. Jódar, J.-V. Romero

    Published 2012-01-01
    “…A new discretization strategy is introduced for the numerical solution of partial integrodifferential equations appearing in option pricing jump diffusion models. …”
    Get full text
    Article
  12. 7592

    Convolutive blind source separation method based on tensor decomposition by Baoze MA, Tianqi ZHANG, Zeliang AN, Pan DENG

    Published 2021-08-01
    “…A convolutive blind source separation algorithm was proposed based on tensor decomposition framework, to address the estimation of mixed filter matrix and the permutation alignment of frequency bin simultaneously.Firstly, the tensor models at all frequency bins were constructed according to the estimated autocorrelation matrix of the observed signals.Secondly, the factor matrix corresponding to each frequency bin was calculated by tensor decomposition technique as the estimated mixed filter matrix for that bin.Finally, a global optimal permutation strategy with power ratio as the permutation alignment measure was adopted to eliminate the permutation ambiguity in all the frequency bins.Experimental results demonstrate that the proposed method achieves better separation performance than other existing algorithms when dealing with convolutive mixed speech under different simulation conditions.…”
    Get full text
    Article
  13. 7593

    Evaluation of Library Services Circular Principles in the Scope of Public Library Services in Ankara by Şenol Karadeniz

    Published 2016-12-01
    “…As a result of the research, it was found that public libraries sustain their traditional library services and mandatory administrative transactions generally related to public institutions in accordance with the Circular of Library Service Principles but the library services requiring more strategy, innovation and quality do not comply with the Circular due to several reasons. …”
    Get full text
    Article
  14. 7594

    Review of threat discovery and forensic analysis based on system provenance graph by Tao LENG, Lijun CAI, Aimin YU, Ziyuan ZHU, Jian’gang MA, Chaofei LI, Ruicheng NIU, Dan MENG

    Published 2022-07-01
    “…By investigating works of literature related to provenance graph research, a research framework for network threat discovery and forensic analysis based on system-level provenance graph was proposed.A detailed overview of data collection, data management, data query, and visualization methods based on provenance graphs was provided.The rule-based, anomaly-based, and learning-based threat detection classification methods were proposed.Threats based on threat intelligence or based on strategy, technology, and process-driven threats hunting methods were summarized.Forensic analysis methods based on causality, sequence learning, language query and semantic reconstruction in special fields were summarized.Finally, the future research trends were pointed out.…”
    Get full text
    Article
  15. 7595

    An Implicit Collocation Method for Direct Solution of Fourth Order Ordinary Differential Equations by B. Alechenu, D.O. Oyewola

    Published 2020-01-01
    “…This implementation strategy is more accurate and efficient than Adams–Bashforth Method solution. …”
    Get full text
    Article
  16. 7596

    Cross-border cooperation as a component of sustainable regional development of Mongolia by N. Otgonbayar, T. Svirin, Yu. N. Shedko

    Published 2019-04-01
    “…Based on the analysis of the main indicators of the economy of Mongolia and its aimaks, it has been concluded, that cross-border cooperation plays a significant role in the sustainable development of the economy of Mongolia; due to heterogeneity and signifi diff entiation in terms of development, when developing a strategy for cross-border cooperation, there is a need to take into account the specifics of each individual region and aimak; the solution of the problem of sustainable socio-economic regional development of Mongolia should be implemented on the basis of an integrated approach.…”
    Get full text
    Article
  17. 7597

    Research and Practice Analysis of Higher Vocational Colleges Facing the Experience and Dissemination of Regional Characteristic Tea Culture by Xiangrong Yan

    Published 2022-01-01
    “…From this perspective, this paper analyzes the development of computer technology in the background of big data, summarizes the necessity of using computer technology in the dissemination of tea culture information and, on this basis, considers the application strategy of computer technology in the dissemination of tea culture information from the perspective of big data, hoping to enter a more ideal pattern of tea culture information dissemination.…”
    Get full text
    Article
  18. 7598

    Contributos (antropo)metodológicos para um projecto social de cidade by Marluci Menezes

    Published 2006-01-01
    “…As an attempt to contribute to the overcoming of such difficulties, two notions are emphasized: project, understood as a strategy of invention or creation of a new sociospatial order as a cultural, phenomenological and pragmatic expression; diagnosis, conceived in an interactive, dynamic and flexible way. …”
    Get full text
    Article
  19. 7599

    Diabetes Meal Planning: Managing Your Carbohydrate Intake by Nancy Gal, Wendy J. Dahl

    Published 2020-02-01
    “…Gal and Wendy J. Dahl, provides a strategy for planning your daily menu to manage your carbohydrate intake. …”
    Get full text
    Article
  20. 7600

    Optimal path identification to defend against DDoS attacks by JIN Guang1, YANG Jian-gang1, LI Yuan2, ZHANG Hui-zhan2

    Published 2008-01-01
    “…A novel packet marking scheme,optimal path identification(OPi),was proposed to defend against DDoS at-tacks.Instead of using fixed 1 or 2 bit in previous schemes,in OPi a router deduces the traveling distance of an arrived packet by its TTL value and inserts a variable-length marking of 1~16 bit into the packet.The marking field is filled completely even the path is very short and the distinguishability is improved.OPi outperforms previous schemes,espe-cially when attacker paths adjoin user paths seriously.To obtain better performance,an OPi+TTL filtering strategy was proposed to frustrate attackers’ tries with spoofed initial TTL values.Theoretical analyses and simulations with actual Internet topologies show OPi performs excellently.…”
    Get full text
    Article