Showing 7,821 - 7,840 results of 31,041 for search '"strategy"', query time: 0.13s Refine Results
  1. 7821

    Design and Kinematics Analysis of the Wearable Lower Limb Exoskeleton by Wang Xiaowei, Chen Xu, Gao Shenglu

    Published 2023-12-01
    “…The joint curve data provides the data basis for the formulation of the control strategy of the lower limb exoskeleton.…”
    Get full text
    Article
  2. 7822

    Application of wireless LoRa in multi-service state grid e-ubiquitous power internet of things by Wei LIU, Yanli ZHAGN, Jie LIU, Lijuan XING

    Published 2020-09-01
    “…The “multi-service state grid e-ubiquitous power internet of things” proposed by the State Grid Corporation of China is the integration and evolution of the energy network and the internet of things,and is a key energy infrastructure serving the majority of users.With the rise of the power internet of things strategy,the online monitoring and acquisition nodes and monitoring scale of transmission lines will increase rapidly.What kind of technical system will be used to construct the on-site communication network? …”
    Get full text
    Article
  3. 7823

    Agreeing and Impacting: The Effect of the Shareholders' Agreement on Firms' Market Value by Andre Leonardo Pruner da Silva, Jeferson Lana, Rosilene Marcon

    Published 2018-01-01
    “…The sample is composed by 472 companies, including 86 companies with shareholder’ agreements. The empirical strategy comprises the fixed effects method on a panel data model. …”
    Get full text
    Article
  4. 7824

    SOCIO-PSYCHOLOGICAL APPROACHES TO THE DEFINITION OF TERRORISM by E. B. Batueva

    Published 2020-08-01
    “…As a result of the analysis of works devoted to the psychology of terrorism, five approaches to the definition of terrorism have been distinguished: terrorism as a form of activity; terrorism as a communicative strategy; terrorism as a form of war; terrorism as a form of conflict; terrorism as a form of extremism. …”
    Get full text
    Article
  5. 7825

    New Exact Solutions of Nonlinear (3 + 1)-Dimensional Boiti-Leon-Manna-Pempinelli Equation by Mohamed R. Ali, Wen-Xiu Ma

    Published 2019-01-01
    “…New lump arrangement is built by applying the bilinear strategy and picking appropriate polynomial. Under various parameter settings, this lump arrangement has three sorts of numerous irregularity waves, blended arrangements including lump waves and solitons are additionally developed. …”
    Get full text
    Article
  6. 7826

    Survey research in practical theology and congregational studies by C. Hermans, W. J. Schoeman

    Published 2015-12-01
    “…The best-known data-based research strategy is survey research. In practical theology, survey research is probably one of the most used research strategies. …”
    Get full text
    Article
  7. 7827

    REAL DRIVING FORCE PAVING THE WAY FOR A TREND OF INTEGRATION FOR HOCHIMINH’S LANGUAGE by Nguyễn Lai

    Published 2018-05-01
    “…Here, the real strength of Hochiminh’s speech strategy, which is the crystallization of the experiential process of putting linguistic actions into social interactions, verifies the integration theories that are of interest. …”
    Get full text
    Article
  8. 7828

    Relaxing the sharp density stratification and columnar motion assumptions in layered shallow water systems by Adim, Mahieddine, Bianchini, Roberta, Duchêne, Vincent

    Published 2024-11-01
    “…Because the hydrostatic Euler equations are not known to enjoy suitable stability estimates, we rely on thickness-diffusivity contributions proposed by Gent and McWilliams. Our strategy also applies to one-layer and multilayer frameworks.…”
    Get full text
    Article
  9. 7829

    An energy conservation method for locating wireless sensor network nodes in smart grid by Chong WANG, Zeng ZENG

    Published 2016-03-01
    “…Wireless sensor network has been increasingly applied for detecting,monitoring and locating targets in smart grid.In a wireless sensor network,energy is deemed as a critical resource and life of the system can be prolonged by energy saving strategy.A node detection and localization method based on energy-aware was presented.The method could be used for the clustering-based wireless sensor networks.It employed a posterior algorithm using a two-step communication protocol between the clustering head sensor and sensors inside.Only a small amount of node information was needed for the clustering head to run the localization program to determine the subset of sensors for further localization.In this way,consumption of energy and demand for communication bandwidth could be reduced,and the system life could be prolonged as well.Experiment results show that this locating method is able to save up to 32% of energy.…”
    Get full text
    Article
  10. 7830

    Comparative study of specific physical abilities to prove the efficacy of working with performance subgroups. by Nicolás Castellanos Gil, Roberto Rodríguez Valdés, Raúl López Fernández

    Published 2005-12-01
    “…<strong>Objective</strong>: To suggest a strategy of subgroups-work to develop some physical capacities. …”
    Get full text
    Article
  11. 7831

    Cartografia e geopolítica das relações sul-sul: sobre a cooperação técnica Brasil-África. by André Santos da Rocha

    Published 2019-03-01
    “…We understand the foreign policy and South-South cooperation as a form of geopolitical exercise of hegemonic projection and that the incentives to the cooperation agreements were part of a projection that would territorialize the global strategies of a State. Throughout 2003-2010, the Africa continent was the target of this Brazilian South-South foreign policy strategy, thus receiving great part of the technical cooperation investments. …”
    Get full text
    Article
  12. 7832

    An Evolutionary Game Analysis on Public Information Communication between the Government and the Public in China by Hongsen Luo, Ying Gao, Fulei Shi

    Published 2021-01-01
    “…Our objective is to find how the evolutionary path changes between the two players when strategies are changing. Then, a simulation analysis is presented in six scenarios to illustrate the results. …”
    Get full text
    Article
  13. 7833

    Sustainable Development Principles for Engineering Educator by J. C. Quadrado, M. F. Galikhanov, K. K. Zaitseva

    Published 2020-07-01
    “…The main aim of this course is to help educators to develop a strategy how to integrate sustainable development principles into engineering education at large.…”
    Get full text
    Article
  14. 7834

    Evacuation Model of Emotional Contagion Crowd Based on Cellular Automata by Qian Xiao, Jiayang Li

    Published 2021-01-01
    “…The evacuation efficiency of the whole system is also effectively improved due to the consideration of emotional contagion and evacuation strategy.…”
    Get full text
    Article
  15. 7835

    Adieu, Paris ! de Simone Routier à la croisée de l’intime et du médiatique  by Mylène Bédard

    Published 2018-04-01
    “…The form of the report that modulates Routier’s diary is also compatible with the strategy of success preferred by the writer since she stages a figure, the reporter one, who wants to unifier.  …”
    Get full text
    Article
  16. 7836

    Satirical Frame of Mind: Ken Kalfus’s A Disorder Peculiar to the Country and the Literary Engagement with 9/11 by Katherina Dodou

    Published 2017-08-01
    “…Prompted by debates on the role of comedy in the USA after 9/11, the essay explores the use of satire as one important narrative strategy that emerged in the subgenre of the American 9/11 novel. …”
    Get full text
    Article
  17. 7837

    CLB-Defense: based on contrastive learning defense for graph neural network against backdoor attack by Jinyin CHEN, Haiyang XIONG, Haonan MA, Yayu ZHENG

    Published 2023-04-01
    “…For the problem that the existing backdoor attack defense methods are difficult to deal with irregular and unstructured discrete graph data to alleviate the threat of backdoor attacks, a backdoor attack defense method for GNN based on contrastive learning was proposed, namely CLB-Defense.Specifically, a contrastive model was built by using contrastive learning in an unsupervised way, which searches suspicious backdoored samples.Then the suspicious backdoored samples were reshaped by using the graph importance indexes and the label smoothing strategy, and the defense against graph backdoor attack was realized.Finally, extensive experimental results show that CLB-Defense realizes the effect of defense performance on four public datasets and five popular graph backdoor attacks, e.g., CLB-Defense can reduce the attack success rate by an average of 75.66% (compared with the baselines, an improvement of 54.01%).…”
    Get full text
    Article
  18. 7838

    Is it the End of the Ice Age? by Susan Y Kwiecien

    Published 2023-06-01
    “…However, the efficacy of using ice as a recovery strategy following injury in humans remains uncertain, and there is a growing trend recommending against icing following injury. …”
    Get full text
    Article
  19. 7839

    Knowledge graph and data application:intelligent recommendation by Jing ZHOU, Ximin SUN, Xiaokun YU, Xinning BIAN

    Published 2019-08-01
    “…Knowledge graph technology is an emerging internet technology with good forward-looking and strong technological advancement,and has broad application prospects.Knowledge graph technology provides the ability to analyze problems from the “relationship” perspective.It can deeply mine data,transform natural language into computer language,and display the value of data to the greatest extent.It can serve intelligent search,intelligent recommendation,risk early warning,intelligent operation,intelligent customer service,public opinion monitoring,equipment early warning and other businesses,greatly improving the production efficiency of enterprises.The comprehensive clustering algorithm,SVD decomposition algorithm,commodity-based collaborative concerns recommendation algorithm,user-based collaborative concerns recommendation algorithm and commodity similarity algorithm were studied.Combined with recommendation strategy,an intelligent recommendation system based on knowledge graph data application was proposed.It proves the feasibility and deployability of the data application with knowledge graph as the basic tool,which can fully meet the user’s demand for information on the internet platform.…”
    Get full text
    Article
  20. 7840

    Feminist Interventions in Political Representation in the United States and Canada: Training Programs and Legal Quotas by Chantal Maillé

    Published 2015-03-01
    “…Women's groups involved in the promotion of women in politics in the U.S. and Canada do not support the strategy of legal quota implementation; rather, one type of intervention is favored over all others: training programs. …”
    Get full text
    Article