Suggested Topics within your search.
Suggested Topics within your search.
- Entrepreneurship 5
- Management 5
- English language 4
- Business enterprises 3
- Economic development 3
- Industrial management 3
- Information technology 3
- Methodology 3
- Research 3
- Study and teaching 3
- Classroom environment 2
- Communication in education 2
- Effective teaching 2
- Elementary school teaching 2
- Hospitality industry 2
- Inquiry-based learning 2
- Interaction analysis in education 2
- Intercultural communication 2
- Internet in public administration 2
- Internet marketing 2
- Marketing 2
- Moral and ethical aspects 2
- Psychological aspects 2
- Psychology 2
- Public administration 2
- Public relations 2
- Rhetoric 2
- Social networks 2
- Sustainable development 2
- Technical writing 2
-
7721
Location privacy protection for mobile social network
Published 2015-12-01“…Given its high utility value,mobile social network services(MSNS),however,has raised serious concerns about users’ location privacy.The location privacy requirements of users in MSNS are personal and dynamic,thus a metric called confidence was proposed to quantify the privacy risks.To avoid the adversary inferring users’ privacy,a method of legation privacy protection was designed to calculate the correlation between the locations through lo-cation information,social relation and personal information.Then the correlation and the space-time background were used to evaluate whether the users’ published geo-content meet the user’s privacy requirement.Eventually,our experimental results demonstrate the validity and practicality of the proposed strategy.…”
Get full text
Article -
7722
Performance optimization for mMTC in 5G network with multiple random access schemes
Published 2022-06-01“…To optimize the support for massive machine type communication (mMTC) services with different traffic characteristics, packet-based random access (PBRA) scheme coexists with the connection-based random access (CBRA) scheme in 5G networks.Yet, given the traffic characteristic of mMTC, which random access scheme should be chosen is still an open issue.To address this issue, the network throughput and signaling overhead analysis of mMTC with PBRA and CBRA were presented, and the problem of throughput maximization while maintaining the signaling-to-throughput ratio below a certain level was solved.Based on this, the optimal access scheme selection strategy and the corresponding optimal network parameter configuration were obtained and verified via simulations.…”
Get full text
Article -
7723
Sustentabilidade e economia verde, limites e potencialidades da gestão sustentável
Published 2016-01-01“…The content analysis points to the expansion of the scope of the documents and their target audience, but also demonstrates the limits and the increasing relevance of the concept of integrated sustainability to the business for the corporaret strategy. The article also proposes a discussion on the ability of this integration to set up a new economic paradigm of sustainability, also known as green economy.…”
Get full text
Article -
7724
Ambitions et limites du grand projet chinois des Nouvelles Routes de la soie
Published 2021-12-01“…What is more original is to understand China's proposal to project beyond its borders in the aim to deploy a very extensive network both in economic and security fields is a worldwide and massive global strategy for the future. So much so that it would be wrong to confront the « New Silk Roads » project against the pro-American « Indo-Pacific » with a bipolar interpretation of the international relations. …”
Get full text
Article -
7725
The Clinical Cost of Delays in Switching Therapy
Published 2007-01-01“…The key lesson is that these strategies should be built on potency and agents should not be held back in case the strategy fails.…”
Get full text
Article -
7726
Weed Management Guide for Florida Lawns
Published 2013-08-01“…Proper identification and some understanding of how and why weeds are present in a lawn are important when selecting the best control strategy. Knowing whether or not weeds were previously present in a particular area also helps homeowners prepare control measures in the future. …”
Get full text
Article -
7727
Optimum hierarchical segmentation of OCT images in retina based on macular distance
Published 2017-04-01“…Retina layering was the basis of optic disc structure analysis and 3D feature extraction of glaucoma.In order to improve the layering effect of retinal OCT images,an intensity based multilayer segmentation algorithm for two-dimensional retinal OCT images was proposed.Through preprocessing and filtering operation,the segmentation algorithm calculated the intensity and intensity gradient of each A-scan in the retinal OCT image to obtain the upper bound RNFL,the dividing line IS and OS,and the lower bound RPE.Then macular distance strategy,calculated by the shortest distance,was used to further optimize the layering result of macular area,so as to achieve layering segmentation of the retinal OCT images.The experimental results show the algorithm has good optimization effect,low time complexity and fast running speed.…”
Get full text
Article -
7728
EU ‘DEEP’ PERIPHERY: A CASE STUDY OF MOUNTAIN BORDERLANDS IN BULGARIA
Published 2016-07-01“…These study results suggest special regional development policy attention to such areas, among which adoption of a Mountain Sustainable Development Strategy for all mountains within the EU geographic space, and, in particular, a Southeast European Convention on Sustainable Development of Mountain Regions.…”
Get full text
Article -
7729
Qualitative research in journalism
Published 2022-11-01“…It is concluded that the qualitative approach should form an integral part or compontent of any encompassing research strategy. …”
Get full text
Article -
7730
A hybrid cooperative jamming protocol for full-duplex relay wiretap system
Published 2017-01-01“…A hybrid cooperative jamming protocol was proposed to improve secrecy capacity for the full-duplex relay system with a passive eavesdropper,which chose the relay-and-source-based cooperative jamming (RSCJ) protocol or the relay-and-destination-based cooperative jamming (RDCJ) protocol according to the channel state information.Taking the self-interference at both the relay and the receiver into consideration,a protocol selection strategy was proposed and the expressions of secrecy outage probability of the system with RSCJ or RDCJ were derived.Simulation results show that the secrecy performance is significantly improved when the proposed hybrid cooperative jamming protocol is applied.Compared to the conventional transmission scheme,the proposed protocol has significant safety performance advantages.…”
Get full text
Article -
7731
Increasing Efficiency in Extension Using the Train-the-Trainer Approach
Published 2014-09-01“… Extension has adapted to today’s financial realities through a number of strategies, including increased reliance on partnerships. …”
Get full text
Article -
7732
Pathophysiology of Portal Hypertension and Esophageal Varices
Published 2012-01-01“…The major therapeutic strategy of esophageal varices consists of primary prevention, treatment for bleeding varices, and secondary prevention, which are provided by pharmacological, endoscopic, interventional and surgical treatments. …”
Get full text
Article -
7733
Chefs d’établissements scolaires privés du premier degré multisites
Published 2023-06-01“…The implementation of this principle produces a systemic set of adjustments made at different scales, from individual action to the adjustments instructed in each school to the institutional action of the adjustments instructed by the CESPs in networks and by the supervisory authorities which oversee it. become a political strategy. Our study reports, from the comments of the actors, the effects of some adjustments made at different levels of the design and implementation of this multisite governance.…”
Get full text
Article -
7734
Les mots maoris dans The Bone People de Keri Hulme : exotisme et intimisme
Published 2015-02-01“…This paper shows how the use of Maori words in the English text may be accused of participating in a strategy of “exoticisation” of the text, though they still have a strong symbolic meaning within the economy of the narrative. …”
Get full text
Article -
7735
Nouvelle méthodologie d’analyse bayésienne du report des voix et de l’abstention lors du deuxième tour des élections
Published 2023-01-01“…The mechanism for deferring votes in two-round elections is a big unknown: does the voter follow a voting instruction, when there is one, or does he develop a personal voting strategy? The information from the counts of the first and second rounds is used to model voter behavior as an inverse problem solved using a Bayesian approach. …”
Get full text
Article -
7736
QL-STCT: an intelligent routing convergence method for SDN link failure
Published 2022-02-01“…Aiming at the problem of routing convergence when SDN link failure occurs, a Q-Learning sub-topological convergence technique (QL-STCT) was proposed to realize intelligent route convergence when SDN links fail.Firstly, some nodes were selected in the network as hub nodes and divides the hub domains according to the hub nodes, and the regional features were constructed with the hub domain as the unit.Secondly, the reinforcement learning agent exploration strategy was proposed by using the features to accelerate the convergence of reinforcement learning.Finally, a sub-topology network was constructed through reinforcement learning to plan the alternate path and ensure the performance of the alternate path in the periodic window.Experimental simulation results show that the proposed method effectively improves the convergence speed and performance of the link failure network.…”
Get full text
Article -
7737
Research of Dynamics Modeling and Simulation of Rigid-flexible Coupled Parallel Robot
Published 2019-01-01“…Then the simulation model of robot SimMechanics is established by Matlab software, and the trajectory tracking of the robot is simulated based on PID control strategy. The simulation results show that the actual trajectory of the robot is in good agreement with the expected trajectory, and the system motion is stable. …”
Get full text
Article -
7738
Psychosynthesis in Positive Psychotherapy
Published 2025-01-01“…The integration of these modalities combines psychosynthesis’s spiritual depth with the practical tools of positive psychotherapy, offering a comprehensive strategy for addressing complex clinical issues such as identity crises, existential challenges, and developmental trauma. …”
Get full text
Article -
7739
Ewosṭateans at the Council of Florence (1441): Diplomatic Implications between Ethiopia, Europe, Jerusalem and Cairo
Published 2016-06-01“…It further proposes that the monks’ participation in the Council of Florence was part of the Ewosṭateans’ larger strategy of pressuring Ethiopian authorities to adopt their own religious positions, at a time when the king’s sympathy for their views was not yet clear; that the Council of Florence highlighted Ethiopian tensions with the Coptic patriarch in a way that furthered the Ewosṭateans’ goals; and that subsequent events suggest that their participation in the Council did indeed contribute to their full incorporation in the Ethiopian Church, and possibly to King Zära Ya‘ǝqob’s interest in continued European diplomacy.…”
Get full text
Article -
7740
Design and Construction of Hybrid Music Recommendation System Integrating Music Gene
Published 2022-01-01“…In addition, while adopting the optimal individual retention strategy, this study makes the eigenvalues of the input matrix IX all fall within the unit circle or unit circumference and makes the maximum fitness value of the individuals in the population equal to the global optimal fitness value. …”
Get full text
Article