Suggested Topics within your search.
Suggested Topics within your search.
- Entrepreneurship 5
- Management 5
- English language 4
- Business enterprises 3
- Economic development 3
- Industrial management 3
- Information technology 3
- Methodology 3
- Research 3
- Study and teaching 3
- Classroom environment 2
- Communication in education 2
- Effective teaching 2
- Elementary school teaching 2
- Hospitality industry 2
- Inquiry-based learning 2
- Interaction analysis in education 2
- Intercultural communication 2
- Internet in public administration 2
- Internet marketing 2
- Marketing 2
- Moral and ethical aspects 2
- Psychological aspects 2
- Psychology 2
- Public administration 2
- Public relations 2
- Rhetoric 2
- Social networks 2
- Sustainable development 2
- Technical writing 2
-
7681
Root-Centric Implantology-Navigating Success with Precision Surgery: A Case Report
Published 2024-12-01“…The study’s objective is to present a novel strategy that provides better direction for implant bed preparation for immediate implantation at multirooted extraction sites. …”
Get full text
Article -
7682
Translating the French Revolution into English in A Tale of Two Cities
Published 2013-09-01“…It argues that Dickens’s creation of a new form of English sprinkled with Gallicisms was part and parcel of a strategy to translate the French Revolution into English. …”
Get full text
Article -
7683
Transformations des représentations corporelles durant l’Épiclassique mésoaméricain (600 à 900 apr. j.‑c.)
Published 2014-07-01“…It is in contact with Mayan and Gulf societies that the elites from the two sites in question renew the representation of the human figure, in search of another performative strategy that will guarantee their political legitimization in a context of competition between regional centres.…”
Get full text
Article -
7684
Game-based detection method of broken access control vulnerabilities in Web application
Published 2024-06-01“…To solve the problem that the access control strategy of the program in the industrial Internet was difficult to extract from the source code, and that the user’s access operation was difficult to trigger all access paths, which led to the difficulty of universal detection of logical vulnerabilities, game theory was applied to the access control logic vulnerability detection for the first time. …”
Get full text
Article -
7685
Portfolio Optimization with Asset-Liability Ratio Regulation Constraints
Published 2020-01-01“…Then, the effective investment strategy and the minimum variance are obtained explicitly by using the Lagrange duality method. …”
Get full text
Article -
7686
CONSUMERS ' THOUGHTS ON RETRO MARKETING: A RESEARCH IN ANTALYA
Published 2021-07-01“…Retro marketing is one of these methods that aim to increase customer satisfaction and can be used as a marketing strategy for businesses. This study focuses on determining the thoughts of consumers on retro marketing and examining the concept of retro marketing in terms of the socio-demographic characteristics of consumers. …”
Get full text
Article -
7687
Research on theoretical ultimate value of 5G flow residence ratio based on big data
Published 2023-10-01“…The 5G flow residence ratio is an important indicator used by communication operators to evaluate the coverage capacity of 5G networks, and it is also an important starting point for the networks’ planning, optimization, maintenance and operation.To ensure user perception, the actual wireless transmission influencing factors, existing network structure and network coordination strategy, etc., need to be considered.The resident capacity of a 5G network in the 3.5 GHz frequency band was evaluated, analyzed and calculated, and the theoretical ultimate value of the 5G traffic resident ratio based on the analysis of network and users’ big data was put forward, which explained the positive relationship between user perception and residence ratio, and provided a reference for the reasonable theoretical ultimate value of 5G traffic resident ratio.…”
Get full text
Article -
7688
Rational secret sharing scheme based on Markov decision
Published 2015-09-01“…The reconstruction methods of a rational secret sharing based on the Markov decision was studied.Firstly,a rational secret sharing system model was proposed using the Markov decision process,which included the players set,the states set,the risk preference function,the state transfer function,the return function,etc.The risk preference function was introduced in order to depict the state set and the state transfer function in this model.Secondly,a rational secret sharing scheme was constructed based on the proposed system model,which was able to solve the secret reconstruction problems according to the Markov strategy.Finally,the functional relations of among the discount factor,the return func-tion and the risk preference function was proposed in this scheme.The analysis results show that the proposed model and scheme are rationality and validity.…”
Get full text
Article -
7689
Intelligent detection method on network malicious traffic based on sample enhancement
Published 2020-06-01“…To address the problem that the existing methods of network traffic anomaly detection not only need a large number of training sets,but also have poor generalization ability,an intelligent detection method on network malicious traffic based on sample enhancement was proposed.The key words were extracted from the training set and the sample of the training set was enhanced based on the strategy of key word avoidance,and the ability for the method to extract the text features from the training set was improved.The experimental results show that,the accuracy of network traffic anomaly detection model and cross dataset can be significantly improved by small training set.Compared with other methods,the proposed method can reduce the computational complexity and achieve better detection ability.…”
Get full text
Article -
7690
Fuzzy-Approximation-Based Novel Back-Stepping Control of Flexible Air-Breathing Hypersonic Vehicles with Nonaffine Models
Published 2019-01-01“…This article investigates a novel fuzzy-approximation-based nonaffine control strategy for a flexible air-breathing hypersonic vehicle (FHV). …”
Get full text
Article -
7691
SOCIO-ECONOMIC DEVELOPMENT IN THE DANUBE DELTA BIOSPHERE RESERVE
Published 2016-07-01“…Romania plays an important part in the EU Danube Region Strategy as co-ordinator country together with Austria. …”
Get full text
Article -
7692
Adaptive Neural Control Approach for Switched Nonlinear Discrete-Time Systems With Actuator Faults and Input Dead Zone
Published 2025-01-01“…In this paper, an adaptive control strategy is developed for discrete-time switched nonlinear systems with actuator faults and dead-zone input under arbitrary switching conditions. …”
Get full text
Article -
7693
Research on trust transitivity and aggregation in evidential trust model
Published 2011-01-01“…Current trust models had some certain disadvantages in dealing with trust transitivity and trust aggregation.Firstly,these models ignored the feedback trust measurement on the direct recommender in the process of trust transitivity.Secondly,the models contained the problems of information loss or repetitive calculation for the limits in analysis and dis-posal of the dependent relationships among referral chains.A new evidential trust model was proposed,and the problems existed in current methods for transferring and aggregating trust relationships were addressed by combing D-S evidence with graph theory.It can be seen from the simulation results that compared with existing trust models,the proposed model is more robust on defending malicious attacks for various strategy cheating and collusion,and has more remarkable en-hancements in the accuracy of trust measurement.…”
Get full text
Article -
7694
Adaptive secure network coding scheme against pollution attacks
Published 2013-11-01“…It is an innovative security scheme which can dynamically adjust the authentication strategy of participating nodes according to the security situation. …”
Get full text
Article -
7695
Syntheses of Marine Natural Products via Matteson Homologations and Related Processes
Published 2025-01-01“…In contrast, in Aggarwal’s lithiation-borylation strategy, new chiral auxiliary reagents must be used in each reaction step, which on the other hand allows the individual insertion of the desired stereogenic centers. …”
Get full text
Article -
7696
Unusual Operation of the Junction Transistor Based on Dynamical Behavior of Impurities
Published 2018-01-01“…Hence, the impurities-controlled electrical properties indicate that the observed unusual operation can be a good strategy to optimize signal processing in electronics.…”
Get full text
Article -
7697
A robust congestion control scheme for cluster wireless multimedia sensor networks with propagation delay and external interference
Published 2016-12-01“…To solve the problem, based on the additive-increase multiplicative-decrease adjustment strategy, a robust congestion control model is proposed with a scheduling scheme in cluster wireless multimedia sensor networks considering the neighbor feedback. …”
Get full text
Article -
7698
Comparison of Quadratic– and Median-Based Roughness Penalties for Penalized-Likelihood Sinogram Restoration in Computed Tomography
Published 2006-01-01“…<p>We have compared the performance of two different penalty choices for a penalized-likelihood sinogram-restoration strategy we have been developing. One is a quadratic penalty we have employed previously and the other is a new median-based penalty. …”
Get full text
Article -
7699
RISKS TO THE CONTINUITY OF THE INVESTMENT PROJECT IN CONSTRUCTION
Published 2019-10-01“…Process of assessment of maturity level of the construction organization in the field of business continuity and its increase by definition of strategy, stabilization, renewal and complete recovery of activity, decrease in influence and reduction of consequences has been investigated. …”
Get full text
Article -
7700
Stackelberg games-based distributed algorithm of pricing and resource allocation in heterogeneous wireless networks
Published 2013-01-01“…To deal with resource allocation in heterogeneous wireless networks,an algorithm based on multi-leader multi-follower Stackelberg games model was proposed to satisfy optimal utility of both operators and mobile users.The mobile user’s utility function with payoff and cost was designed,and it was demonstrated that the utility function obey concave function condition after defining operator price strategy,which assured the existence of Nash equilibrium point.A distributed iterative algorithm was presented to obtain optimal strategies of mobile user’s bandwidth allocation and operator’s pricing.At last,simulation experiments acquire player’s optimal strategies and Subgame perfect Nash equilibrium.…”
Get full text
Article