Showing 8,021 - 8,040 results of 31,041 for search '"strategy"', query time: 0.10s Refine Results
  1. 8021

    Optimal tactics in community pension model for defined benefit pension plans. by Jun Wang, Chunli Cui, Tian Tian

    Published 2025-01-01
    “…This study delves into the equilibrium strategy within the context of a defined benefit pension plan, employing a differential game framework with a community pension model. …”
    Get full text
    Article
  2. 8022

    Developing the Bank of Researchers for the E3UDRES2 European Universities Alliance by Radu Vasiu, Andrei Ternauciuc, Muguras Mocofan, Diana Andone

    Published 2025-01-01
    “…Another key issue addressed is further development of Open Education, Open Science and Open Innovation experiences and strategies in the nine partner universities. Another important challenge faced by our Alliance is the digitalization strategy of the consortium, involving identification of each university’s specific needs, of their shared values and expectations, challenges and opportunities for joint collaboration. …”
    Get full text
    Article
  3. 8023

    Loosing no time to deploy digital economy and digital transformation to spur ICT innovation——The latest ICT development trend showcased in the science and technology award of CIC i... by China InstituteofCommunications(CIC)

    Published 2021-01-01
    “…ICT Innovation, industrial development and the new information infrastructure construction, represented by 5G, artificial intelligence, and integrated space-air-ground networks will play an important role in the implementation of the national strategy of building a powerful communications network and comprehensively building a modern socialist country.Based on the current technological development in the ICT field, the China Institute of Communications summarized and sorted out the key directions of technological innovation in this field, including a new generation of mobile communications, network enabling, quantum communications, satellite internet, smart network operation and maintenance, cyberspace security, and the internet of things and the internet of vehicles, network cost reduction and efficiency enhancement, and basic technologies, etc., providing references for all walks of life to understand the technological development in the ICT field.…”
    Get full text
    Article
  4. 8024

    Force de la pudeur by Suzanne Fraysse

    Published 2013-05-01
    “…Other slave narratives are then examined to show how the slave narrators’ reticence does not simply stem from their desire to live up to the prudish expectations of their readers but constitutes a rhetorical strategy aiming at opposing fugitive slaves abiding by conservative moral values to slaveholders whose profligacy blurs the conventional boundaries between males and females, Blacks and Whites, animals and human beings. …”
    Get full text
    Article
  5. 8025

    Weed Management Guide for Florida Lawns by J. Bryan Unruh, Laurie Trenholm, Erin Harlow, Ramon G. Leon

    Published 2020-09-01
    “…Proper identification and some understanding of how and why weeds are present in a lawn are important when selecting the best control strategy. Knowing if weeds were previously present in an area also helps homeowners prepare control measures in the future. …”
    Get full text
    Article
  6. 8026

    Current Diagnosis and Therapeutic Approach of Functional Mitral Regurgitation by Prima Almazini

    Published 2024-10-01
    “…Additionally, for the latter, an integrated qualitative and quantitative assessment is essential to determine the optimal therapeutic strategy. According to the current guidelines, medical therapy remains the main treatment for functional mitral regurgitation. …”
    Get full text
    Article
  7. 8027

    Le coût humain des pesticides : comment les viticulteurs et les techniciens viticoles français font face au risque by Christian Nicourt, Jean Max Girault

    Published 2009-12-01
    “…Our assumption is that it is the only strategy offered to them to control their fear in their work. …”
    Get full text
    Article
  8. 8028

    Towards a Pattern Language Approach to Document Description by Robert Waller, Judy Delin, Martin Thomas

    Published 2012-07-01
    “…We discuss the use of patterns across a range of disciplines before suggesting the need to place patterns in the context of genres, with each potentially belonging to a “home genre” in which it originates and to which it makes an implicit intertextual reference intended to produce a particular reader response in the form of a reading strategy or interpretative stance. We consider some conceptual and technical issues involved in the descriptive study of patterns in naturally-occurring documents, including the challenges involved in building a document corpus.…”
    Get full text
    Article
  9. 8029

    Insider Trading with Memory under Random Deadline by Kai Xiao, Yonghui Zhou

    Published 2021-01-01
    “…By a filtering theory on fractional Brownian motion and the stochastic maximum principle, we obtain a necessary condition of the insider’s optimal strategy, an equation satisfied. It shows that when the volatility of noise traders is constant and the noise traders’ memories become weaker and weaker, the optimal trading intensity and the corresponding residual information tend to those, respectively, when noise traders have no any memory. …”
    Get full text
    Article
  10. 8030

    A trusted IoT architecture model by Ansheng YIN, Shijun ZHANG

    Published 2017-10-01
    “…The internet of things (IoT) has been widely concerned and developed in the world,and its security has been paid more and more attention.However,due to the characteristics of the IoT itself,a lot of security measures in the internet field can’t be applied directly.The current security strategy mainly provide solutions according to the threat of the IoT one by one.In face of increasingly intelligent,systematic,integrated security threats,a trusted IoT architecture of two layers and tri-elements,which brought about a whole trusted security mechanism according to the function of IoT.Starting with the integrity and safety inspection of hardware and software of sensor devices,the trusted chain was transmitted until the application layer,and data was processed according to behavior trusted value in application layer.At the same time,the control function and the data function were separated,and the security strategies cooperated and verified with each other,therefore improving the ability of the IoT to deal with security threats effectively.…”
    Get full text
    Article
  11. 8031

    Research on Adaptive Trajectory Tracking Algorithm for a Quadrotor Based on Backstepping and the Sigma-Pi Neural Network by Zhiming Chen, Kang Niu, Lei Li

    Published 2019-01-01
    “…Simulation results are shown to demonstrate the effectiveness of the proposed control strategy, which could reduce tracking error, decrease tracking time, and improve the anti-interference ability of the system.…”
    Get full text
    Article
  12. 8032

    Approximate Analytical Solution to Nonlinear Delay Differential Equations by Using Sumudu Iterative Method by Asfaw Tsegaye Moltot, Alemayehu Tamirie Deresse

    Published 2022-01-01
    “…Furthermore, the findings indicate that the recommended strategy is encouraging for solving other types of nonlinear delay differential equations.…”
    Get full text
    Article
  13. 8033

    Adaptive Broadcasting Mechanism for Bandwidth Allocation in Mobile Services by Gwo-Jiun Horng, Chi-Hsuan Wang, Chih-Lun Chou

    Published 2014-01-01
    “…This paper presents experiments to help evaluate the effectiveness of the proposed strategy. From the experimental results, it can be seen that the proposed mechanism is feasible in practice.…”
    Get full text
    Article
  14. 8034

    Discovering the backbone network with a novel designed ant colony algorithm by Fang LYU, Jun BAI, Junheng HUANG, Bailing WANG

    Published 2020-11-01
    “…Forthe problem that in interactive network,the illegal and abnormal behaviors were becoming more hidden,moreover,the complex relation in real interactive network heightens the difficulty of detecting anomalous entities,an ant colony model was proposed for extracting the backbone network from the complex interactive network.The novel model simulated the relationships among entities based on the theory of path optimization,reduced the network size after quantifying the significance of each flow of information.Firstly,a strategy of initial location selection was proposed taking advantage of network centrality.Secondly,a novel path transfer mechanism was devised for the ant colony to fit the flow behavior of entities.Finally,an adaptive and dynamic pheromone update mechanism was designed for guiding the optimization of information flows.The experimental results show that the proposed model is superior to the traditional ant colony algorithm in both solving quality and solving performance,and has better coverage and accuracy than the greedy algorithm.…”
    Get full text
    Article
  15. 8035

    Kierunki rozwoju systemu finansowania ekoinnowacji w Polsce – perspektywa na lata 2014–2020 by Ewa Osuch-Rak, Magdalena Proczek

    Published 2014-06-01
    “…This study attempts to examine Polish preparations for the implementation of the European Union's "Europe 2020 strategy" and integrated strategies, with an emphasis on the implementation of the objectives related to eco-innovation. …”
    Get full text
    Article
  16. 8036

    Neimark–Sacker Bifurcation and Controlling Chaos in a Three-Species Food Chain Model through the OGY Method by Guo Feng, Ding Yin, Li Jiacheng

    Published 2021-01-01
    “…The chaotic motion is controlled on the stable periodic period-1 orbit using the implementation of the hybrid control strategy. The factor affecting the control time of chaos is also studied. …”
    Get full text
    Article
  17. 8037

    The Underground Railroad and the politics of narration in Harriet Beecher Stowe’s Uncle Tom’s Cabin (1852) by Delphine Louis-Dimitrov

    Published 2025-01-01
    “…It highlights the structuring function of philosophical and political principles drawn from romantic reform and transcendentalism, showing how they articulate with distinct literary strategies to convey an antislavery discourse targeting the 1850 Fugitive Slave Law. …”
    Get full text
    Article
  18. 8038

    Synchronization of Different Uncertain Fractional-Order Chaotic Systems with External Disturbances via T-S Fuzzy Model by Lin Wang, Jinbo Ni, Chunzhi Yang

    Published 2018-01-01
    “…This paper presents an adaptive fuzzy synchronization control strategy for a class of different uncertain fractional-order chaotic/hyperchaotic systems with unknown external disturbances via T-S fuzzy systems, where the parallel distributed compensation technology is provided to design adaptive controller with fractional adaptation laws. …”
    Get full text
    Article
  19. 8039

    The Impact of Banks’ Commitment to the Decisions of the Basel II Committee and its Impact on their Performance: A Field Study in a Sample of Private Iraqi Banks by Rami Abbas Hameed

    Published 2024-03-01
    “…The research aims to demonstrate the impact of banks’ commitment to the decisions of the Basel Committee on their performance The researcher used the analytical approach to demonstrate the impact of adopting the Basel principles، specifically capital adequacy، on banking performance The researcher concluded that commitment to capital adequacy reduces the risks to which the bank may be exposed It improves its performance، and commitment to supervisory review leads to coordination between the size of the risks facing the bank and the adequacy of capital، in addition to the strategy it follows in dealing with these risks. Market discipline also works to enhance disclosure and transparency in banking work. …”
    Get full text
    Article
  20. 8040

    Queering the City: Understanding Gravitational Forces by Petra L. Doan

    Published 2023-11-01
    “…Because these forces are unique to each LGBTQ space, the analytic strategy provides for greater generalizability across different sizes of cities, across various cultural and ethnic areas, and a wider array of geographies.…”
    Get full text
    Article