Suggested Topics within your search.
Suggested Topics within your search.
- Entrepreneurship 5
- Management 5
- English language 4
- Business enterprises 3
- Economic development 3
- Industrial management 3
- Information technology 3
- Methodology 3
- Research 3
- Study and teaching 3
- Classroom environment 2
- Communication in education 2
- Effective teaching 2
- Elementary school teaching 2
- Hospitality industry 2
- Inquiry-based learning 2
- Interaction analysis in education 2
- Intercultural communication 2
- Internet in public administration 2
- Internet marketing 2
- Marketing 2
- Moral and ethical aspects 2
- Psychological aspects 2
- Psychology 2
- Public administration 2
- Public relations 2
- Rhetoric 2
- Social networks 2
- Sustainable development 2
- Technical writing 2
-
7841
Vers une complémentarité des alternatives alimentaires : relocalisation des activités et écologisation des pratiques au sein de trois alternatives de distribution à Bruxelles
Published 2020-04-01“…It illustrates that AFNs projects’ are leading the main choices but that no strategy makes the difference regarding the effects on direct stakeholders in each AFN. …”
Get full text
Article -
7842
Application of Improved Grey Wolf Optimization KFCM Algorithm in Fault Diagnosis of Wind Turbine Gearbox
Published 2020-06-01“…The introduction of Levy flight strategy and non-linear coefficient vector in the improved grey wolf optimization algorithm can improve the convergence speed and accuracy of the algorithm, and the clustering centers and kernel parameters can be obtained under the optimal classification results. …”
Get full text
Article -
7843
A survey on edge computing offloading
Published 2019-04-01“…Edge computing integrate the computing,storage and other resources on the edge of the network into a unified user service platform.According to the principle of nearest service,the network edge node task request is timely and correspondingly processed.Computational migration is a key issue in edge computing due to limited edge node capabilities,resources,bandwidth,and energy.The causes,evolution and development trends of mobile edge computing were reviewed from the distributed computing,pervasive computing,cloud computing to edge computing as the main line.The characteristics of computing migration at each stage were compared and analyzed,and the classical models were reviewed.The latest research progress and application fields of edge computing were focused on,mobile edge computing models based on energy optimization management were researched and compared.Finally,a time division multiple access based multi-user edge mobile terminal computing migration strategy system for LTE applications was proposed.…”
Get full text
Article -
7844
Vascular Complications and Bleeding After Transfemoral TAVR With Surgical Versus Percutaneous Approach: A Contemporary Prospective Study
Published 2024-01-01“…SC may be considered when vascular access is anticipated as complex, but this strategy might be confirmed in a randomized study.…”
Get full text
Article -
7845
A Systematic Review on the Advancement in the Study of Fuzzy Variational Problems
Published 2022-01-01“…We begin with the preliminary concepts and definitions of fuzzy theory and scrutinize the Euler-Lagrange’s strategy via systematically searched studies concerning fuzzy variational problems to highlight the importance of improving the existing methods. …”
Get full text
Article -
7846
Evolutionary game on mutually influenceing double-layer network.
Published 2025-01-01“…Strength individuals are located in the upper network layer, influencing the strategy choices of ordinary individuals in the lower layer, and vice versa. …”
Get full text
Article -
7847
Reliability Assessment of Active Distribution System Using Monte Carlo Simulation Method
Published 2014-01-01“…The problem is formulated as a two-case program, the program of low penetration simulation and the program of high penetration simulation. The load shedding strategy and the simulation process were introduced in detail during each FMEA process. …”
Get full text
Article -
7848
Consumer Trust in and Emotional Response to Advertisements on Social Media and their Influence on Brand Evaluation
Published 2016-01-01“…Social media is becoming an important part of an organization's media strategy. This study examines the effects of trust and consumer emotional response to advertisements on brand evaluation in an online social media context. …”
Get full text
Article -
7849
DEMATEL Method for Contradiction Network Analyzing
Published 2017-01-01“…In the process of innovation design,the contradiction network are often constructed as more than one contradiction which interact each other emerge from analyzing step of initial problem situation.It is the key problem for innovation design that how to select important contradiction,root cause contradiction and core contradiction correctly from contradiction network.As the result of analyzing on contradiction interaction pattern and strategy of contradiction network decomposing,oriented graph is used to expressed the interaction between contradictions in the network of contradiction,and the equation to get the cause degree of contradiction to others is built,then the selecting method of important contradiction,root cause contradictions and core contradictions based on DEMATEL is proposed,which involves the calculation of the important weight,causes degree and centers degree of a contradiction.Finally,a case study of reversing winch is used to verify that the proposal method is correct.…”
Get full text
Article -
7850
Excessive Belching: a Separate Syndrome or Another Symptom of Functional Dyspepsia?
Published 2020-07-01“…Combination of high-resolution manometry and impedancemetry allows an accurate diagnosis of belching and selection of optimal treatment strategy. Belching complicated by other symptoms of dyspepsia is to be considered yet another FD symptom according to the Rome IV criteria of FGID. …”
Get full text
Article -
7851
Dynamic Multicompartment Refrigerated Vehicle Routing Problem with Multigraph Based on Real-Time Traffic Information
Published 2022-01-01“…In the real-time adjustment phase, the order in which customers are served remains the same and a path selection strategy is proposed to solve the problem according to the real-time traffic information of different paths. …”
Get full text
Article -
7852
Dynamic load balancing algorithm based on queuing theory comprehensive index evaluation
Published 2018-07-01“…Internet communication,computer cluster and cloud environment have complex and dynamic characteristics,which can cause load imbalance easily,reduce the service efficiency and increase the energy consumption.Therefore,the load balancing technology becomes the focus of research.The existing load balancing strategy uses the occupancy of CPU,memories,processes to estimate the current load of each server.But it is hard to guarantee its accuracy.Aiming at this problem,a dynamic load balancing algorithm based on queuing theory comprehensive index evaluation was proposed.Firstly,queuing theory model was introduced to estimate the real-time load of each server,and then the tasks of input queue was distributed to each server separately according to the load comprehensive index of each server.Experimental results show that this method can balance the load of each server effectively and reduce the average waiting time of the task requests,which is of great application value.…”
Get full text
Article -
7853
Research on SaaS Support Architecture and Key Technologies
Published 2013-12-01“…The problems of performance and scalability by consistent hashing feedback algorithm and three stages of dynamical extending and deploying strategy were solved. It was proved that BIRISF was superior to the classical multi-tier architecture in development, operations, maintenance and performance because of BIRISF applied successful in international shipping logistics.…”
Get full text
Article -
7854
Immunosuppressive Role of Myeloid-Derived Suppressor Cells and Therapeutic Targeting in Lung Cancer
Published 2018-01-01“…Myeloid-derived suppressor cells (MDSCs) are the main tumor suppressor factors, and the treatment strategy of targeting MDSCs is gradually emerging. …”
Get full text
Article -
7855
Adaptive Predictive Control: A Data-Driven Closed-Loop Subspace Identification Approach
Published 2014-01-01“…Further, the data inspection strategy is introduced to eliminate the negative impact of the harmful (or useless) data on the system performance. …”
Get full text
Article -
7856
Patent Portfolios and Competition Law: Some Reflections After the Recent RPSA Cases
Published 2023-06-01“…In fact, once patent protection on the main invention expires, originator firms adopt a two-tiered strategy, centred on the enforcement of secondary patents composing the portfolios. …”
Get full text
Article -
7857
Collective Competencies and their Constitutive Elements: a case study in a Brazilian Fashion Group
Published 2023-01-01“…Through exploratory and qualitative research, applying the case study strategy, conducted semi-structured interviews (with 36 employees from 6 work teams of the Lunelli Group's brands), and realizing a participant observation. …”
Get full text
Article -
7858
Adaptive fractional-order Darwinian particle swarm optimization algorithm
Published 2014-04-01“…In AFO-DPSO, both particle's position and velocity information were utilized adequately, together an adaptive acceleration coefficient control strategy and mutation processing mechanism were introduced for better convergence performance. …”
Get full text
Article -
7859
Expedient Protocols for the Installation of Pyrimidine Based Privileged Templates on 2-Position of Pyrrolo[2,1-c][1,4]-benzodiazepine Nucleus Linked Through a p-phenoxyl Spacer
Published 2012-01-01“…Exceedingly facile single step expedient protocols based on the versatility and reactivity of corresponding intermediates : [2-(dimethylaminomethylene) ketone] (5) and chalcone (6), derived from 2-(p-acetyl phenoxyl) substituted analogue of pyrrolo[2,1-c][1,4]-benzodiazepine (4), have been developed to provide an easy installation of the pyrimidine based privileged templates at 2-position of pyrrolo[2,1-c][1,4]-benzodiazepine through a p-phenoxyl spacer, by utilizing the synthetic strategy depicted in schemes-1 and 2.…”
Get full text
Article -
7860
Kafkaesque Algorithms: Kafka’s Writing in the Age of Artificial Intelligence
Published 2025-01-01“…And third, is the notion of outsourcing low-level repetitive labor to machines—a common promotional strategy for contemporary AI writing aids—truly novel, or would it instead have already been familiar to Kafka himself?…”
Get full text
Article