Showing 7,841 - 7,860 results of 31,041 for search '"strategy"', query time: 0.20s Refine Results
  1. 7841

    Vers une complémentarité des alternatives alimentaires : relocalisation des activités et écologisation des pratiques au sein de trois alternatives de distribution à Bruxelles by François Lohest, Tom Bauler, Solène Sureau, Joris Van Mol, Wouter Achten

    Published 2020-04-01
    “…It illustrates that AFNs projects’ are leading the main choices but that no strategy makes the difference regarding the effects on direct stakeholders in each AFN. …”
    Get full text
    Article
  2. 7842

    Application of Improved Grey Wolf Optimization KFCM Algorithm in Fault Diagnosis of Wind Turbine Gearbox by Zheng Xiaoxia, Qian Yiqun, Wang Shuai, Zhao Kun

    Published 2020-06-01
    “…The introduction of Levy flight strategy and non-linear coefficient vector in the improved grey wolf optimization algorithm can improve the convergence speed and accuracy of the algorithm, and the clustering centers and kernel parameters can be obtained under the optimal classification results. …”
    Get full text
    Article
  3. 7843

    A survey on edge computing offloading by Youkang ZHU, Guangxue YUE, Xiaohui YANG, Jiansheng LIU

    Published 2019-04-01
    “…Edge computing integrate the computing,storage and other resources on the edge of the network into a unified user service platform.According to the principle of nearest service,the network edge node task request is timely and correspondingly processed.Computational migration is a key issue in edge computing due to limited edge node capabilities,resources,bandwidth,and energy.The causes,evolution and development trends of mobile edge computing were reviewed from the distributed computing,pervasive computing,cloud computing to edge computing as the main line.The characteristics of computing migration at each stage were compared and analyzed,and the classical models were reviewed.The latest research progress and application fields of edge computing were focused on,mobile edge computing models based on energy optimization management were researched and compared.Finally,a time division multiple access based multi-user edge mobile terminal computing migration strategy system for LTE applications was proposed.…”
    Get full text
    Article
  4. 7844
  5. 7845

    A Systematic Review on the Advancement in the Study of Fuzzy Variational Problems by Mansi Verma, Chuei Yee Chen, Adem Kılıçman, Risman Mat Hasim

    Published 2022-01-01
    “…We begin with the preliminary concepts and definitions of fuzzy theory and scrutinize the Euler-Lagrange’s strategy via systematically searched studies concerning fuzzy variational problems to highlight the importance of improving the existing methods. …”
    Get full text
    Article
  6. 7846

    Evolutionary game on mutually influenceing double-layer network. by Qinzhi Hao, Haochun Yang, Yao Sun, Tao Xu, Huang Huang

    Published 2025-01-01
    “…Strength individuals are located in the upper network layer, influencing the strategy choices of ordinary individuals in the lower layer, and vice versa. …”
    Get full text
    Article
  7. 7847

    Reliability Assessment of Active Distribution System Using Monte Carlo Simulation Method by Shaoyun Ge, Li Xu, Hong Liu, Mingxin Zhao

    Published 2014-01-01
    “…The problem is formulated as a two-case program, the program of low penetration simulation and the program of high penetration simulation. The load shedding strategy and the simulation process were introduced in detail during each FMEA process. …”
    Get full text
    Article
  8. 7848

    Consumer Trust in and Emotional Response to Advertisements on Social Media and their Influence on Brand Evaluation by Ivanete Schneider Hahn, Flavia Luciane Scherer, Kenny Basso, Marindia Brachak dos Santos

    Published 2016-01-01
    “…Social media is becoming an important part of an organization's media strategy. This study examines the effects of trust and consumer emotional response to advertisements on brand evaluation in an online social media context. …”
    Get full text
    Article
  9. 7849

    DEMATEL Method for Contradiction Network Analyzing by Liu Shang, Hu Ji, Cao Zhongliang, Guo Jianhua, Wang Zhongshuang

    Published 2017-01-01
    “…In the process of innovation design,the contradiction network are often constructed as more than one contradiction which interact each other emerge from analyzing step of initial problem situation.It is the key problem for innovation design that how to select important contradiction,root cause contradiction and core contradiction correctly from contradiction network.As the result of analyzing on contradiction interaction pattern and strategy of contradiction network decomposing,oriented graph is used to expressed the interaction between contradictions in the network of contradiction,and the equation to get the cause degree of contradiction to others is built,then the selecting method of important contradiction,root cause contradictions and core contradictions based on DEMATEL is proposed,which involves the calculation of the important weight,causes degree and centers degree of a contradiction.Finally,a case study of reversing winch is used to verify that the proposal method is correct.…”
    Get full text
    Article
  10. 7850

    Excessive Belching: a Separate Syndrome or Another Symptom of Functional Dyspepsia? by A. A. Sheptulin, O. A. Storonova

    Published 2020-07-01
    “…Combination of high-resolution manometry and impedancemetry allows an accurate diagnosis of belching and selection of optimal treatment strategy. Belching complicated by other symptoms of dyspepsia is to be considered yet another FD symptom according to the Rome IV criteria of FGID. …”
    Get full text
    Article
  11. 7851

    Dynamic Multicompartment Refrigerated Vehicle Routing Problem with Multigraph Based on Real-Time Traffic Information by Deng-Kai Hou, Hou-Ming Fan, Ying-Chun Lv, Xiao-Xue Ren

    Published 2022-01-01
    “…In the real-time adjustment phase, the order in which customers are served remains the same and a path selection strategy is proposed to solve the problem according to the real-time traffic information of different paths. …”
    Get full text
    Article
  12. 7852

    Dynamic load balancing algorithm based on queuing theory comprehensive index evaluation by Wenbo WANG, Qingwei YE, Yu ZHOU, Zhihua LU

    Published 2018-07-01
    “…Internet communication,computer cluster and cloud environment have complex and dynamic characteristics,which can cause load imbalance easily,reduce the service efficiency and increase the energy consumption.Therefore,the load balancing technology becomes the focus of research.The existing load balancing strategy uses the occupancy of CPU,memories,processes to estimate the current load of each server.But it is hard to guarantee its accuracy.Aiming at this problem,a dynamic load balancing algorithm based on queuing theory comprehensive index evaluation was proposed.Firstly,queuing theory model was introduced to estimate the real-time load of each server,and then the tasks of input queue was distributed to each server separately according to the load comprehensive index of each server.Experimental results show that this method can balance the load of each server effectively and reduce the average waiting time of the task requests,which is of great application value.…”
    Get full text
    Article
  13. 7853

    Research on SaaS Support Architecture and Key Technologies by Xiaodong Zhang, Lanshun Nie, Fanchao Meng

    Published 2013-12-01
    “…The problems of performance and scalability by consistent hashing feedback algorithm and three stages of dynamical extending and deploying strategy were solved. It was proved that BIRISF was superior to the classical multi-tier architecture in development, operations, maintenance and performance because of BIRISF applied successful in international shipping logistics.…”
    Get full text
    Article
  14. 7854

    Immunosuppressive Role of Myeloid-Derived Suppressor Cells and Therapeutic Targeting in Lung Cancer by Jie Ma, Huaxi Xu, Shengjun Wang

    Published 2018-01-01
    “…Myeloid-derived suppressor cells (MDSCs) are the main tumor suppressor factors, and the treatment strategy of targeting MDSCs is gradually emerging. …”
    Get full text
    Article
  15. 7855

    Adaptive Predictive Control: A Data-Driven Closed-Loop Subspace Identification Approach by Xiaosuo Luo, Yongduan Song

    Published 2014-01-01
    “…Further, the data inspection strategy is introduced to eliminate the negative impact of the harmful (or useless) data on the system performance. …”
    Get full text
    Article
  16. 7856

    Patent Portfolios and Competition Law: Some Reflections After the Recent RPSA Cases by Emanuela Arezzo

    Published 2023-06-01
    “…In fact, once patent protection on the main invention expires, originator firms adopt a two-tiered strategy, centred on the enforcement of secondary patents composing the portfolios. …”
    Get full text
    Article
  17. 7857

    Collective Competencies and their Constitutive Elements: a case study in a Brazilian Fashion Group by Luiz Henrique da Silva, Tatiana Ghedine

    Published 2023-01-01
    “…Through exploratory and qualitative research, applying the case study strategy, conducted semi-structured interviews (with 36 employees from 6 work teams of the Lunelli Group's brands), and realizing a participant observation. …”
    Get full text
    Article
  18. 7858

    Adaptive fractional-order Darwinian particle swarm optimization algorithm by Tong GUO, Ju-long LAN, Yu-feng LI, Shi-wen CHEN

    Published 2014-04-01
    “…In AFO-DPSO, both particle's position and velocity information were utilized adequately, together an adaptive acceleration coefficient control strategy and mutation processing mechanism were introduced for better convergence performance. …”
    Get full text
    Article
  19. 7859

    Expedient Protocols for the Installation of Pyrimidine Based Privileged Templates on 2-Position of Pyrrolo[2,1-c][1,4]-benzodiazepine Nucleus Linked Through a p-phenoxyl Spacer by Anshu Agarwal, Meenakshi Sharma, Meenakshi Agrawal, D. Kishore

    Published 2012-01-01
    “…Exceedingly facile single step expedient protocols based on the versatility and reactivity of corresponding intermediates : [2-(dimethylaminomethylene) ketone] (5) and chalcone (6), derived from 2-(p-acetyl phenoxyl) substituted analogue of pyrrolo[2,1-c][1,4]-benzodiazepine (4), have been developed to provide an easy installation of the pyrimidine based privileged templates at 2-position of pyrrolo[2,1-c][1,4]-benzodiazepine through a p-phenoxyl spacer, by utilizing the synthetic strategy depicted in schemes-1 and 2.…”
    Get full text
    Article
  20. 7860

    Kafkaesque Algorithms: Kafka’s Writing in the Age of Artificial Intelligence by Jake Fraser

    Published 2025-01-01
    “…And third, is the notion of outsourcing low-level repetitive labor to machines—a common promotional strategy for contemporary AI writing aids—truly novel, or would it instead have already been familiar to Kafka himself?…”
    Get full text
    Article