Showing 7,681 - 7,700 results of 31,041 for search '"strategy"', query time: 0.10s Refine Results
  1. 7681

    Root-Centric Implantology-Navigating Success with Precision Surgery: A Case Report by Kshitibhushan Singh Pandaw, Sachin K. Malagi, Dennis V. Abraham, Saurabh Tembhurne, Sneha Banerjee, Arundhuti Mahato

    Published 2024-12-01
    “…The study’s objective is to present a novel strategy that provides better direction for implant bed preparation for immediate implantation at multirooted extraction sites. …”
    Get full text
    Article
  2. 7682

    Translating the French Revolution into English in A Tale of Two Cities by Nathalie Vanfasse

    Published 2013-09-01
    “…It argues that Dickens’s creation of a new form of English sprinkled with Gallicisms was part and parcel of a strategy to translate the French Revolution into English. …”
    Get full text
    Article
  3. 7683

    Transformations des représentations corporelles durant l’Épiclassique mésoaméricain (600 à 900 apr. j.‑c.) by Juliette Testard

    Published 2014-07-01
    “…It is in contact with Mayan and Gulf societies that the elites from the two sites in question renew the representation of the human figure, in search of another performative strategy that will guarantee their political legitimization in a context of competition between regional centres.…”
    Get full text
    Article
  4. 7684

    Game-based detection method of broken access control vulnerabilities in Web application by HE Haitao, XU Ke, YANG Shuailin, ZHANG Bing, ZHAO Yuxuan, LI Jiazheng

    Published 2024-06-01
    “…To solve the problem that the access control strategy of the program in the industrial Internet was difficult to extract from the source code, and that the user’s access operation was difficult to trigger all access paths, which led to the difficulty of universal detection of logical vulnerabilities, game theory was applied to the access control logic vulnerability detection for the first time. …”
    Get full text
    Article
  5. 7685

    Portfolio Optimization with Asset-Liability Ratio Regulation Constraints by De-Lei Sheng, Peilong Shen

    Published 2020-01-01
    “…Then, the effective investment strategy and the minimum variance are obtained explicitly by using the Lagrange duality method. …”
    Get full text
    Article
  6. 7686

    CONSUMERS ' THOUGHTS ON RETRO MARKETING: A RESEARCH IN ANTALYA by Mükerrem Oral

    Published 2021-07-01
    “…Retro marketing is one of these methods that aim to increase customer satisfaction and can be used as a marketing strategy for businesses. This study focuses on determining the thoughts of consumers on retro marketing and examining the concept of retro marketing in terms of the socio-demographic characteristics of consumers. …”
    Get full text
    Article
  7. 7687

    Research on theoretical ultimate value of 5G flow residence ratio based on big data by Hongjia LIU, Bei LI, Wei ZHAO, Guoping XU, Xinyan WANG

    Published 2023-10-01
    “…The 5G flow residence ratio is an important indicator used by communication operators to evaluate the coverage capacity of 5G networks, and it is also an important starting point for the networks’ planning, optimization, maintenance and operation.To ensure user perception, the actual wireless transmission influencing factors, existing network structure and network coordination strategy, etc., need to be considered.The resident capacity of a 5G network in the 3.5 GHz frequency band was evaluated, analyzed and calculated, and the theoretical ultimate value of the 5G traffic resident ratio based on the analysis of network and users’ big data was put forward, which explained the positive relationship between user perception and residence ratio, and provided a reference for the reasonable theoretical ultimate value of 5G traffic resident ratio.…”
    Get full text
    Article
  8. 7688

    Rational secret sharing scheme based on Markov decision by You-liang TIAN, Xue-mei WANG, Lin-fang LIU

    Published 2015-09-01
    “…The reconstruction methods of a rational secret sharing based on the Markov decision was studied.Firstly,a rational secret sharing system model was proposed using the Markov decision process,which included the players set,the states set,the risk preference function,the state transfer function,the return function,etc.The risk preference function was introduced in order to depict the state set and the state transfer function in this model.Secondly,a rational secret sharing scheme was constructed based on the proposed system model,which was able to solve the secret reconstruction problems according to the Markov strategy.Finally,the functional relations of among the discount factor,the return func-tion and the risk preference function was proposed in this scheme.The analysis results show that the proposed model and scheme are rationality and validity.…”
    Get full text
    Article
  9. 7689

    Intelligent detection method on network malicious traffic based on sample enhancement by Tieming CHEN, Chengqiang JIN, Mingqi LYU, Tiantian ZHU

    Published 2020-06-01
    “…To address the problem that the existing methods of network traffic anomaly detection not only need a large number of training sets,but also have poor generalization ability,an intelligent detection method on network malicious traffic based on sample enhancement was proposed.The key words were extracted from the training set and the sample of the training set was enhanced based on the strategy of key word avoidance,and the ability for the method to extract the text features from the training set was improved.The experimental results show that,the accuracy of network traffic anomaly detection model and cross dataset can be significantly improved by small training set.Compared with other methods,the proposed method can reduce the computational complexity and achieve better detection ability.…”
    Get full text
    Article
  10. 7690

    Fuzzy-Approximation-Based Novel Back-Stepping Control of Flexible Air-Breathing Hypersonic Vehicles with Nonaffine Models by Xingge Li, Gang Li

    Published 2019-01-01
    “…This article investigates a novel fuzzy-approximation-based nonaffine control strategy for a flexible air-breathing hypersonic vehicle (FHV). …”
    Get full text
    Article
  11. 7691

    SOCIO-ECONOMIC DEVELOPMENT IN THE DANUBE DELTA BIOSPHERE RESERVE by NICOLETA DAMIAN

    Published 2016-07-01
    “…Romania plays an important part in the EU Danube Region Strategy as co-ordinator country together with Austria. …”
    Get full text
    Article
  12. 7692

    Adaptive Neural Control Approach for Switched Nonlinear Discrete-Time Systems With Actuator Faults and Input Dead Zone by Ymnah Alruwaily, Mohamed Kharrat

    Published 2025-01-01
    “…In this paper, an adaptive control strategy is developed for discrete-time switched nonlinear systems with actuator faults and dead-zone input under arbitrary switching conditions. …”
    Get full text
    Article
  13. 7693

    Research on trust transitivity and aggregation in evidential trust model by JIANG Li-ming1, ZHANG Kun1, XU Jian1, LIAO Jun1, ZHANG Hong1

    Published 2011-01-01
    “…Current trust models had some certain disadvantages in dealing with trust transitivity and trust aggregation.Firstly,these models ignored the feedback trust measurement on the direct recommender in the process of trust transitivity.Secondly,the models contained the problems of information loss or repetitive calculation for the limits in analysis and dis-posal of the dependent relationships among referral chains.A new evidential trust model was proposed,and the problems existed in current methods for transferring and aggregating trust relationships were addressed by combing D-S evidence with graph theory.It can be seen from the simulation results that compared with existing trust models,the proposed model is more robust on defending malicious attacks for various strategy cheating and collusion,and has more remarkable en-hancements in the accuracy of trust measurement.…”
    Get full text
    Article
  14. 7694

    Adaptive secure network coding scheme against pollution attacks by Ming HE, Gang DENG, Hong WANG, Zheng-hu GONG

    Published 2013-11-01
    “…It is an innovative security scheme which can dynamically adjust the authentication strategy of participating nodes according to the security situation. …”
    Get full text
    Article
  15. 7695

    Syntheses of Marine Natural Products via Matteson Homologations and Related Processes by Uli Kazmaier

    Published 2025-01-01
    “…In contrast, in Aggarwal’s lithiation-borylation strategy, new chiral auxiliary reagents must be used in each reaction step, which on the other hand allows the individual insertion of the desired stereogenic centers. …”
    Get full text
    Article
  16. 7696

    Unusual Operation of the Junction Transistor Based on Dynamical Behavior of Impurities by Roberto Baca Arroyo

    Published 2018-01-01
    “…Hence, the impurities-controlled electrical properties indicate that the observed unusual operation can be a good strategy to optimize signal processing in electronics.…”
    Get full text
    Article
  17. 7697

    A robust congestion control scheme for cluster wireless multimedia sensor networks with propagation delay and external interference by Xi Hu, Wei Guo

    Published 2016-12-01
    “…To solve the problem, based on the additive-increase multiplicative-decrease adjustment strategy, a robust congestion control model is proposed with a scheduling scheme in cluster wireless multimedia sensor networks considering the neighbor feedback. …”
    Get full text
    Article
  18. 7698

    Comparison of Quadratic– and Median-Based Roughness Penalties for Penalized-Likelihood Sinogram Restoration in Computed Tomography

    Published 2006-01-01
    “…<p>We have compared the performance of two different penalty choices for a penalized-likelihood sinogram-restoration strategy we have been developing. One is a quadratic penalty we have employed previously and the other is a new median-based penalty. …”
    Get full text
    Article
  19. 7699

    RISKS TO THE CONTINUITY OF THE INVESTMENT PROJECT IN CONSTRUCTION by T. Yu. Shemyakina, E. S. Kotova

    Published 2019-10-01
    “…Process of assessment of maturity level of the construction organization in the field of business continuity and its increase by definition of strategy, stabilization, renewal and complete recovery of activity, decrease in influence and reduction of consequences has been investigated. …”
    Get full text
    Article
  20. 7700

    Stackelberg games-based distributed algorithm of pricing and resource allocation in heterogeneous wireless networks by Yong JIANG, Shan-zhi CHEN, Bo HU

    Published 2013-01-01
    “…To deal with resource allocation in heterogeneous wireless networks,an algorithm based on multi-leader multi-follower Stackelberg games model was proposed to satisfy optimal utility of both operators and mobile users.The mobile user’s utility function with payoff and cost was designed,and it was demonstrated that the utility function obey concave function condition after defining operator price strategy,which assured the existence of Nash equilibrium point.A distributed iterative algorithm was presented to obtain optimal strategies of mobile user’s bandwidth allocation and operator’s pricing.At last,simulation experiments acquire player’s optimal strategies and Subgame perfect Nash equilibrium.…”
    Get full text
    Article