Suggested Topics within your search.
Suggested Topics within your search.
- Entrepreneurship 5
- Management 5
- English language 4
- Business enterprises 3
- Economic development 3
- Industrial management 3
- Information technology 3
- Methodology 3
- Research 3
- Study and teaching 3
- Classroom environment 2
- Communication in education 2
- Effective teaching 2
- Elementary school teaching 2
- Hospitality industry 2
- Inquiry-based learning 2
- Interaction analysis in education 2
- Intercultural communication 2
- Internet in public administration 2
- Internet marketing 2
- Marketing 2
- Moral and ethical aspects 2
- Psychological aspects 2
- Psychology 2
- Public administration 2
- Public relations 2
- Rhetoric 2
- Social networks 2
- Sustainable development 2
- Technical writing 2
-
7581
A FJSSP Method Based on Dynamic Multi-Objective Squirrel Search Algorithm
Published 2021-01-01“…Take the Squirrel Search Algorithm (SSA) as the core evolution strategy, and combine the multi-objective framework and the dynamic processing technology to solve the established mathematical model. …”
Get full text
Article -
7582
Qui a dit racisme systémique ?
Published 2024-12-01“…Starting with the research mandate negotiation process, the article shows that semantic negotiation is a strategy used by both the researcher-intervenor and her partners to find common ground on which to pursue the research-intervention project. …”
Get full text
Article -
7583
TAJDIID TA’LIM MAHARAH AL QIRA’AH TAHLIL DLARURAT ADAWAT AL ISTIFHAM FI TA’LIM MAHARAH AL QIRA’AH
Published 2018-02-01“…All Arabic teachers, especially those who teach reading skill, should understand and master a questioning strategy to ease comprehending the text. Hopefully, this study can be used as a confirmation of theory in the fact that there is a parallel line between the theory of istifham in the teaching of reading skill, and the process of understanding the passage. …”
Get full text
Article -
7584
Research on Network Selection Algorithm Based on User Preference in Heterogeneous System
Published 2014-06-01“…Most network selection algorithms did not pay more attention to user preference for networks which was based on service requirements.For this circumstance,a new network selection algorithm based on user prefenence was proposed.The algorithm was fully considerd service reqirements,user prefernece and network performance.The AHP algorithm and distance analysis were used to calculate subjective and objective user preference weight respectively for different heterogeneous networks.Then the user preference weight for networks could be obtained dynamically on the basis of user strategy.The performance of each candidate network was counted,based on which the optimum network was selected.Simulation results show that the algorithm performs well in network selection and reduces the number of handoff times as the user moves through the network boundary frequently.…”
Get full text
Article -
7585
Retrieval of Embolized Amplatzer Patent Foramen Ovale Occlusion Device: Issues Related to Late Recognition
Published 2017-01-01“…While early, periprocedural device embolization can normally be managed with snare and percutaneous retrieval, late embolization requires a different management strategy due to inability of the device to deform to allow passage into a large caliber sheath. …”
Get full text
Article -
7586
Increasing Efficiency in Extension Using the Train-the-Trainer Approach
Published 2014-09-01“… Extension has adapted to today’s financial realities through a number of strategies, including increased reliance on partnerships. …”
Get full text
Article -
7587
Energy-saving scheme supporting ONU modularization with independent-discontinuous transceiving
Published 2015-07-01“…To effectively solve the contradiction between energy-saving and packet delay performance in green passive optical network,an energy-saving scheme supporting ONU modularization with independent-discontinuous transceiving is proposed.Utilizing the technology of optical network unit modularization,each module could switch to sleep or awake mode independently and transmit data in specified time slots discontinuously.Simultaneously,to enhance the quality of service of the overall network,the real-time packets are transmitted in the first sub-cycle based on the sub-cycle division strategy.Furthermore,an independent bandwidth allocation algorithm is proposed,which makes the scheme have more advantages in the asymmetric network traffic scenarios.Simulation results verify that the proposed scheme further reduce the network energy consumption on the premise of guarantee the packet delay.…”
Get full text
Article -
7588
Cryoablation for Ventricular Tachycardia Originating from Anterior Papillary Muscle of Left Ventricle Guided by Intracardiac Echocardiography
Published 2017-01-01“…Recently, cryoablation guided by intracardiac echocardiography, 3-dimensional mapping system, and image integration was introduced as alternative strategy for this challenging ablation. We present a case of ventricular tachycardia originating from anterior PM of left ventricle treated by cryoablation guided only by intracardiac echocardiography.…”
Get full text
Article -
7589
Throughput Analysis and Optimization of Relay Selection Techniques for Millimeter Wave Communications
Published 2019-01-01“…We suggest a new optimal power allocation (OPA) strategy that offers significant performance enhancement with respect to uniform power allocation (UPA). …”
Get full text
Article -
7590
ENGINE FAULT DIAGNOSIS BASED ON DEEP BELIEF NETWORK IMPROVED BY ADAPTIVE CROW SEARCH ALGORITHM (MT)
Published 2023-01-01“…Based on the crow search algorithm(CSA), by the adaptive crow search algorithm(ACSA) the adaptive value strategy of sensing probability and flight distance, which effectively enhanced the performance of the algorithm is designed. …”
Get full text
Article -
7591
Double Discretization Difference Schemes for Partial Integrodifferential Option Pricing Jump Diffusion Models
Published 2012-01-01“…A new discretization strategy is introduced for the numerical solution of partial integrodifferential equations appearing in option pricing jump diffusion models. …”
Get full text
Article -
7592
Convolutive blind source separation method based on tensor decomposition
Published 2021-08-01“…A convolutive blind source separation algorithm was proposed based on tensor decomposition framework, to address the estimation of mixed filter matrix and the permutation alignment of frequency bin simultaneously.Firstly, the tensor models at all frequency bins were constructed according to the estimated autocorrelation matrix of the observed signals.Secondly, the factor matrix corresponding to each frequency bin was calculated by tensor decomposition technique as the estimated mixed filter matrix for that bin.Finally, a global optimal permutation strategy with power ratio as the permutation alignment measure was adopted to eliminate the permutation ambiguity in all the frequency bins.Experimental results demonstrate that the proposed method achieves better separation performance than other existing algorithms when dealing with convolutive mixed speech under different simulation conditions.…”
Get full text
Article -
7593
Evaluation of Library Services Circular Principles in the Scope of Public Library Services in Ankara
Published 2016-12-01“…As a result of the research, it was found that public libraries sustain their traditional library services and mandatory administrative transactions generally related to public institutions in accordance with the Circular of Library Service Principles but the library services requiring more strategy, innovation and quality do not comply with the Circular due to several reasons. …”
Get full text
Article -
7594
Review of threat discovery and forensic analysis based on system provenance graph
Published 2022-07-01“…By investigating works of literature related to provenance graph research, a research framework for network threat discovery and forensic analysis based on system-level provenance graph was proposed.A detailed overview of data collection, data management, data query, and visualization methods based on provenance graphs was provided.The rule-based, anomaly-based, and learning-based threat detection classification methods were proposed.Threats based on threat intelligence or based on strategy, technology, and process-driven threats hunting methods were summarized.Forensic analysis methods based on causality, sequence learning, language query and semantic reconstruction in special fields were summarized.Finally, the future research trends were pointed out.…”
Get full text
Article -
7595
An Implicit Collocation Method for Direct Solution of Fourth Order Ordinary Differential Equations
Published 2020-01-01“…This implementation strategy is more accurate and efficient than Adams–Bashforth Method solution. …”
Get full text
Article -
7596
Cross-border cooperation as a component of sustainable regional development of Mongolia
Published 2019-04-01“…Based on the analysis of the main indicators of the economy of Mongolia and its aimaks, it has been concluded, that cross-border cooperation plays a significant role in the sustainable development of the economy of Mongolia; due to heterogeneity and signifi diff entiation in terms of development, when developing a strategy for cross-border cooperation, there is a need to take into account the specifics of each individual region and aimak; the solution of the problem of sustainable socio-economic regional development of Mongolia should be implemented on the basis of an integrated approach.…”
Get full text
Article -
7597
Research and Practice Analysis of Higher Vocational Colleges Facing the Experience and Dissemination of Regional Characteristic Tea Culture
Published 2022-01-01“…From this perspective, this paper analyzes the development of computer technology in the background of big data, summarizes the necessity of using computer technology in the dissemination of tea culture information and, on this basis, considers the application strategy of computer technology in the dissemination of tea culture information from the perspective of big data, hoping to enter a more ideal pattern of tea culture information dissemination.…”
Get full text
Article -
7598
Contributos (antropo)metodológicos para um projecto social de cidade
Published 2006-01-01“…As an attempt to contribute to the overcoming of such difficulties, two notions are emphasized: project, understood as a strategy of invention or creation of a new sociospatial order as a cultural, phenomenological and pragmatic expression; diagnosis, conceived in an interactive, dynamic and flexible way. …”
Get full text
Article -
7599
Diabetes Meal Planning: Managing Your Carbohydrate Intake
Published 2020-02-01“…Gal and Wendy J. Dahl, provides a strategy for planning your daily menu to manage your carbohydrate intake. …”
Get full text
Article -
7600
Optimal path identification to defend against DDoS attacks
Published 2008-01-01“…A novel packet marking scheme,optimal path identification(OPi),was proposed to defend against DDoS at-tacks.Instead of using fixed 1 or 2 bit in previous schemes,in OPi a router deduces the traveling distance of an arrived packet by its TTL value and inserts a variable-length marking of 1~16 bit into the packet.The marking field is filled completely even the path is very short and the distinguishability is improved.OPi outperforms previous schemes,espe-cially when attacker paths adjoin user paths seriously.To obtain better performance,an OPi+TTL filtering strategy was proposed to frustrate attackers’ tries with spoofed initial TTL values.Theoretical analyses and simulations with actual Internet topologies show OPi performs excellently.…”
Get full text
Article