Suggested Topics within your search.
Suggested Topics within your search.
- Entrepreneurship 5
- Management 5
- English language 4
- Business enterprises 3
- Economic development 3
- Industrial management 3
- Information technology 3
- Methodology 3
- Research 3
- Study and teaching 3
- Classroom environment 2
- Communication in education 2
- Effective teaching 2
- Elementary school teaching 2
- Hospitality industry 2
- Inquiry-based learning 2
- Interaction analysis in education 2
- Intercultural communication 2
- Internet in public administration 2
- Internet marketing 2
- Marketing 2
- Moral and ethical aspects 2
- Psychological aspects 2
- Psychology 2
- Public administration 2
- Public relations 2
- Rhetoric 2
- Social networks 2
- Sustainable development 2
- Technical writing 2
-
8021
Optimal tactics in community pension model for defined benefit pension plans.
Published 2025-01-01“…This study delves into the equilibrium strategy within the context of a defined benefit pension plan, employing a differential game framework with a community pension model. …”
Get full text
Article -
8022
Developing the Bank of Researchers for the E3UDRES2 European Universities Alliance
Published 2025-01-01“…Another key issue addressed is further development of Open Education, Open Science and Open Innovation experiences and strategies in the nine partner universities. Another important challenge faced by our Alliance is the digitalization strategy of the consortium, involving identification of each university’s specific needs, of their shared values and expectations, challenges and opportunities for joint collaboration. …”
Get full text
Article -
8023
Loosing no time to deploy digital economy and digital transformation to spur ICT innovation——The latest ICT development trend showcased in the science and technology award of CIC i...
Published 2021-01-01“…ICT Innovation, industrial development and the new information infrastructure construction, represented by 5G, artificial intelligence, and integrated space-air-ground networks will play an important role in the implementation of the national strategy of building a powerful communications network and comprehensively building a modern socialist country.Based on the current technological development in the ICT field, the China Institute of Communications summarized and sorted out the key directions of technological innovation in this field, including a new generation of mobile communications, network enabling, quantum communications, satellite internet, smart network operation and maintenance, cyberspace security, and the internet of things and the internet of vehicles, network cost reduction and efficiency enhancement, and basic technologies, etc., providing references for all walks of life to understand the technological development in the ICT field.…”
Get full text
Article -
8024
Force de la pudeur
Published 2013-05-01“…Other slave narratives are then examined to show how the slave narrators’ reticence does not simply stem from their desire to live up to the prudish expectations of their readers but constitutes a rhetorical strategy aiming at opposing fugitive slaves abiding by conservative moral values to slaveholders whose profligacy blurs the conventional boundaries between males and females, Blacks and Whites, animals and human beings. …”
Get full text
Article -
8025
Weed Management Guide for Florida Lawns
Published 2020-09-01“…Proper identification and some understanding of how and why weeds are present in a lawn are important when selecting the best control strategy. Knowing if weeds were previously present in an area also helps homeowners prepare control measures in the future. …”
Get full text
Article -
8026
Current Diagnosis and Therapeutic Approach of Functional Mitral Regurgitation
Published 2024-10-01“…Additionally, for the latter, an integrated qualitative and quantitative assessment is essential to determine the optimal therapeutic strategy. According to the current guidelines, medical therapy remains the main treatment for functional mitral regurgitation. …”
Get full text
Article -
8027
Le coût humain des pesticides : comment les viticulteurs et les techniciens viticoles français font face au risque
Published 2009-12-01“…Our assumption is that it is the only strategy offered to them to control their fear in their work. …”
Get full text
Article -
8028
Towards a Pattern Language Approach to Document Description
Published 2012-07-01“…We discuss the use of patterns across a range of disciplines before suggesting the need to place patterns in the context of genres, with each potentially belonging to a “home genre” in which it originates and to which it makes an implicit intertextual reference intended to produce a particular reader response in the form of a reading strategy or interpretative stance. We consider some conceptual and technical issues involved in the descriptive study of patterns in naturally-occurring documents, including the challenges involved in building a document corpus.…”
Get full text
Article -
8029
Insider Trading with Memory under Random Deadline
Published 2021-01-01“…By a filtering theory on fractional Brownian motion and the stochastic maximum principle, we obtain a necessary condition of the insider’s optimal strategy, an equation satisfied. It shows that when the volatility of noise traders is constant and the noise traders’ memories become weaker and weaker, the optimal trading intensity and the corresponding residual information tend to those, respectively, when noise traders have no any memory. …”
Get full text
Article -
8030
A trusted IoT architecture model
Published 2017-10-01“…The internet of things (IoT) has been widely concerned and developed in the world,and its security has been paid more and more attention.However,due to the characteristics of the IoT itself,a lot of security measures in the internet field can’t be applied directly.The current security strategy mainly provide solutions according to the threat of the IoT one by one.In face of increasingly intelligent,systematic,integrated security threats,a trusted IoT architecture of two layers and tri-elements,which brought about a whole trusted security mechanism according to the function of IoT.Starting with the integrity and safety inspection of hardware and software of sensor devices,the trusted chain was transmitted until the application layer,and data was processed according to behavior trusted value in application layer.At the same time,the control function and the data function were separated,and the security strategies cooperated and verified with each other,therefore improving the ability of the IoT to deal with security threats effectively.…”
Get full text
Article -
8031
Research on Adaptive Trajectory Tracking Algorithm for a Quadrotor Based on Backstepping and the Sigma-Pi Neural Network
Published 2019-01-01“…Simulation results are shown to demonstrate the effectiveness of the proposed control strategy, which could reduce tracking error, decrease tracking time, and improve the anti-interference ability of the system.…”
Get full text
Article -
8032
Approximate Analytical Solution to Nonlinear Delay Differential Equations by Using Sumudu Iterative Method
Published 2022-01-01“…Furthermore, the findings indicate that the recommended strategy is encouraging for solving other types of nonlinear delay differential equations.…”
Get full text
Article -
8033
Adaptive Broadcasting Mechanism for Bandwidth Allocation in Mobile Services
Published 2014-01-01“…This paper presents experiments to help evaluate the effectiveness of the proposed strategy. From the experimental results, it can be seen that the proposed mechanism is feasible in practice.…”
Get full text
Article -
8034
Discovering the backbone network with a novel designed ant colony algorithm
Published 2020-11-01“…Forthe problem that in interactive network,the illegal and abnormal behaviors were becoming more hidden,moreover,the complex relation in real interactive network heightens the difficulty of detecting anomalous entities,an ant colony model was proposed for extracting the backbone network from the complex interactive network.The novel model simulated the relationships among entities based on the theory of path optimization,reduced the network size after quantifying the significance of each flow of information.Firstly,a strategy of initial location selection was proposed taking advantage of network centrality.Secondly,a novel path transfer mechanism was devised for the ant colony to fit the flow behavior of entities.Finally,an adaptive and dynamic pheromone update mechanism was designed for guiding the optimization of information flows.The experimental results show that the proposed model is superior to the traditional ant colony algorithm in both solving quality and solving performance,and has better coverage and accuracy than the greedy algorithm.…”
Get full text
Article -
8035
Kierunki rozwoju systemu finansowania ekoinnowacji w Polsce – perspektywa na lata 2014–2020
Published 2014-06-01“…This study attempts to examine Polish preparations for the implementation of the European Union's "Europe 2020 strategy" and integrated strategies, with an emphasis on the implementation of the objectives related to eco-innovation. …”
Get full text
Article -
8036
Neimark–Sacker Bifurcation and Controlling Chaos in a Three-Species Food Chain Model through the OGY Method
Published 2021-01-01“…The chaotic motion is controlled on the stable periodic period-1 orbit using the implementation of the hybrid control strategy. The factor affecting the control time of chaos is also studied. …”
Get full text
Article -
8037
The Underground Railroad and the politics of narration in Harriet Beecher Stowe’s Uncle Tom’s Cabin (1852)
Published 2025-01-01“…It highlights the structuring function of philosophical and political principles drawn from romantic reform and transcendentalism, showing how they articulate with distinct literary strategies to convey an antislavery discourse targeting the 1850 Fugitive Slave Law. …”
Get full text
Article -
8038
Synchronization of Different Uncertain Fractional-Order Chaotic Systems with External Disturbances via T-S Fuzzy Model
Published 2018-01-01“…This paper presents an adaptive fuzzy synchronization control strategy for a class of different uncertain fractional-order chaotic/hyperchaotic systems with unknown external disturbances via T-S fuzzy systems, where the parallel distributed compensation technology is provided to design adaptive controller with fractional adaptation laws. …”
Get full text
Article -
8039
The Impact of Banks’ Commitment to the Decisions of the Basel II Committee and its Impact on their Performance: A Field Study in a Sample of Private Iraqi Banks
Published 2024-03-01“…The research aims to demonstrate the impact of banks’ commitment to the decisions of the Basel Committee on their performance The researcher used the analytical approach to demonstrate the impact of adopting the Basel principles، specifically capital adequacy، on banking performance The researcher concluded that commitment to capital adequacy reduces the risks to which the bank may be exposed It improves its performance، and commitment to supervisory review leads to coordination between the size of the risks facing the bank and the adequacy of capital، in addition to the strategy it follows in dealing with these risks. Market discipline also works to enhance disclosure and transparency in banking work. …”
Get full text
Article -
8040
Queering the City: Understanding Gravitational Forces
Published 2023-11-01“…Because these forces are unique to each LGBTQ space, the analytic strategy provides for greater generalizability across different sizes of cities, across various cultural and ethnic areas, and a wider array of geographies.…”
Get full text
Article