Showing 8,521 - 8,540 results of 31,041 for search '"strategy"', query time: 0.11s Refine Results
  1. 8521

    De l’argument à l’action : la biodiversité au service des jardins familiaux by Jean-Noël Consalès, Sophie Joimel, France Cordier, Cloé Jareno, Élodie-Denise Chenot, Christophe Schwartz

    Published 2015-12-01
    “…On the national level, it shows that biodiversity is an integral part of the strategy developed by the National Federation of Allotment and Community Gardens (in French Fédération nationale des jardins familiaux et collectifs) in support of these urban vegetable gardens. …”
    Get full text
    Article
  2. 8522

    Parameterised design of robust point‐to‐point fast motion controller by Wentao Yu, Guoyang Cheng

    Published 2017-03-01
    “…The controller initially resorts to a saturated control signal for the fastest acceleration or braking if possible and then seamlessly gives way to a linear control strategy once the motion slows down. The damping ratio and natural frequency of the linear control law are chosen as the design parameters to allow for a better tuning of the control performance. …”
    Get full text
    Article
  3. 8523

    Verifiable access control scheme based on unpaired CP-ABE in fog computing by Jiangtao DONG, Peiwen YAN, Ruizhong DU

    Published 2021-08-01
    “…Fog computing extends computing power and data analysis applications to the edge of the network, solves the latency problem of cloud computing, and also brings new challenges to data security.Attribute encryption based on ciphertext strategy (CP-ABE) is a technology to ensure data confidentiality and fine-grained access control.The excessive computational overhead of bilinear pairing restricts its application and development.In response to this, a verifiable access control scheme was proposed based on unpaired CP-ABE in fog computing.In order to make CP-ABE more efficient, simple scalar multiplication in elliptic curve encryption was used to replace bilinear pairing, thereby reducing the overall computational overhead.Decryption operations were outsourced to fog nodes to reduce user computational complexity, and based on the tamper-proof and traceable characteristics of the blockchain, the correctness of the access transaction was verified and the access authorization process was recorded.Security and performance analysis shows that the scheme is safe under the elliptic curve decision-making DBDH (Diffie-Hellman) assumption, and the calculation efficiency is higher.…”
    Get full text
    Article
  4. 8524

    Network Evolutionary Game-Based Diffusion Mechanism regarding the Nonperformance of Farmers in Agricultural Supply Chain Finance by Xiaoli Li, Yanming Sun

    Published 2022-01-01
    “…The results indicate the following: (a) When some farmers choose the default strategy because their default income is greater than their performance income, the default behavior in the small-world network will not spread to the whole network. …”
    Get full text
    Article
  5. 8525

    Phosphodiesterase-5 Inhibitors: Action on the Signaling Pathways of Neuroinflammation, Neurodegeneration, and Cognition by Christina Alves Peixoto, Ana Karolina Santana Nunes, Ana Garcia-Osta

    Published 2015-01-01
    “…Phosphodiesterase type 5 inhibitors (PDE5-Is) have recently emerged as a potential therapeutic strategy for neuroinflammatory, neurodegenerative, and memory loss diseases. …”
    Get full text
    Article
  6. 8526

    THE CONSEQUENCES OF THE INTERNET FOR POLITICS by V. P. Terin

    Published 2013-08-01
    “…The author believes that Obama plans his second term in power as a turning point for the development of the country which is connected to the economic development. USA political strategy is global; the same is true for the information sphere. …”
    Get full text
    Article
  7. 8527

    An optimized approach for container deployment driven by a two-stage load balancing mechanism. by Chaoze Lu, Jianchao Zhou, Qifeng Zou

    Published 2025-01-01
    “…This paper presents an optimization strategy for container deployment that consists of two stages: coarse-grained and fine-grained load balancing. …”
    Get full text
    Article
  8. 8528

    A shared value network model based on synergy theory in intelligent manufacturing by Pingping Gu, Jiahui Yu, Xianzhong Zhou, Hengrong Ju

    Published 2025-01-01
    “…Then, to meet the market demand and maximize the value gain, the optimization scheme is given according to the coordination theory and priority strategy in the design of the operation mechanism of the shared value network model. …”
    Get full text
    Article
  9. 8529

    A Q-Learning-Based Parameters Adaptive Algorithm for Formation Tracking Control of Multi-Mobile Robot Systems by Chen Zhang, Wen Qin, Ming-Can Fan, Ting Wang, Mou-Quan Shen

    Published 2022-01-01
    “…In order to handle the model uncertainties and external disturbances, a desired linear extended state observer is designed to develop an adaptive formation tracking control strategy. Then an adaptive method of sliding mode control parameters optimized by Q-learning scheme is employed, which can avoid the complex parameter tuning process. …”
    Get full text
    Article
  10. 8530

    Reframing tradition: how NGOs sell market-based conservation to Indigenous communities—lessons from the Leco community in Bolivia by Rajiv Maher, Nanna Schmidt

    Published 2025-01-01
    “…To understand the communication strategy for swaying the community, we apply framing theory from communicative and social movements literature. …”
    Get full text
    Article
  11. 8531

    Gain-aware caching scheme for information-centric networking by Long CHEN, Hong-bo TANG, Xing-guo LUO, Yi BAI, Zhen ZHANG

    Published 2016-05-01
    “…The in-network caching system of information-centric networking had to deal with the popularity of huge number of content chunks and make efficient usage of storage resources.A content popularity based caching gain opti-mization model aimed to get maximum reduction of content retrieve cost was established,and a gain-aware caching scheme was proposed.By utilizing filtering effect of cache to request flow is scheme achieves caching cooperation and diversity potentially while maximizing caching gain of every single node.Bloom filter based sliding window strategy captures the content chunks with high caching gain according to request arrival interval and retrieval cost from the source.Analysis shows that the method can drastically reduce memory consumption caused by popularity monitoring.The simu-lation results illuminate that this scheme is well aware of content popularity based caching gain,and gets better band-width saving and cache hit ratio when content popularity is changing dynamically.…”
    Get full text
    Article
  12. 8532

    Solutions to No-Wait Flow Shop Scheduling Problem Using the Flower Pollination Algorithm Based on the Hormone Modulation Mechanism by Chiwen Qu, Yanming Fu, Zhongjun Yi, Jun Tan

    Published 2018-01-01
    “…A variable neighborhood search strategy based on dynamic self-adaptive variable work piece blocks is constructed to improve the local search quality. …”
    Get full text
    Article
  13. 8533

    Electric power communication network service importance evaluation method for quantum key application by Guochun LI, Suxiang ZHANG, Wei DENG, Zhuozhi YU, Yefeng ZHANG, Yukun ZHU

    Published 2019-01-01
    “…A relative importance matrix based on the transmission performance indicators of each service was built under the background of quantum communication, so as to obtain the importance of the power communication network business, and to carry out subsequent quantum key application strategy research.…”
    Get full text
    Article
  14. 8534

    Increasing the cyber resilience of SMEs through open-source solutions and international collaboration by Ionica ȘERBAN, Florentina-Mihaela CURCĂ, Robert-Ștefan ȘANDRU

    Published 2025-01-01
    “…In conclusion, open-source solutions and the use of advanced technologies, such as AI, provide SMEs with an effective strategy to address modern cyber challenges, improving their resilience and protection against threats. …”
    Get full text
    Article
  15. 8535

    The Research of Maneuverability Modeling and Environmental Monitoring Based on a Robotic Dolphin by Zhibin Xue, Liangliang Li, Yixiao Song

    Published 2021-01-01
    “…Furthermore, a combined strategy of environment recognition was used for the positional control of the robotic dolphin, incorporating sonar, path planning with an artificial potential field, and trajectory tracking. …”
    Get full text
    Article
  16. 8536

    “Unnatural, unnatural, unnatural, unnatural unnatural” . . . but real? The Toolbox Murders (Dennis Donnelly, 1978) and the Exploitation of True Story Adaptations by Wickham Clayton

    Published 2016-07-01
    “…1970s horror film and exploitation staple, The Toolbox Murders (Dennis Donnelly, 1978), is here used as a case study in incoherent narrative strategy and ideology and explores the incoherencies of this relationship to adapting “true stories.” …”
    Get full text
    Article
  17. 8537

    Suppressing Polarization Mode Dispersion with the Quantum Zeno Effect by Ian Nodurft, Alejandro Rodriguez Perez, Naveed Naimipour, Harry C. Shaw

    Published 2025-01-01
    “…Polarization mode dispersion can introduce quantum decoherence in polarization encoded information, limiting the range of quantum communications protocols. Therefore, strategies to nullify the effect would reduce quantum decoherence and potentially increase the operational range of such technology. …”
    Get full text
    Article
  18. 8538

    Ensuring competitiveness in the XXI century: development of organizational skills in the conditions of the Internet economy by A. A. Madyarov

    Published 2023-11-01
    “…It is noted that the traditional thinking of management can lead to a mismatch of the strategy of the organization and its environment, making it difficult to implement the strategic process.In conclusion, the article presents the main results and formulates brief conclusions of the study, emphasizing the importance of continuing the study of management practices of the XXI century.…”
    Get full text
    Article
  19. 8539

    Cognitive waveform design for radar-communication transceiver networks by Yu YAO, Yanjie LI, Lenan WU, Pu MIAO, Xiaoyu TANG

    Published 2021-12-01
    “…The system architecture for cognitive radar-communication (CRC) transceiver was proposed.A cognitive waveforms design approach, which is suitable for simultaneously performing both data communication and target detection was presented.This approach aims at estimating target scattering coefficient (TSC) from the radar scene and facilitating high-data-rate communications.In order to minimize the mean square error (MSE) of the TSC, a convex cost function was established.The peak to average power ratio (PAPR)-constrained optimal solution was achieved by applying the Kalman filtering-based strategy to design the set of ultra-wideband (UWB) transmission pulses and embed into them the information data with the M-ary position phase shift keying modulation technique.In addition to theoretical considerations, the simulation results show an improvement in TSC estimation and target detection probability as the number of iterations increases, while still transmitting data rates in the range of several Mbit/s with low bit error rates between CRC transceivers.…”
    Get full text
    Article
  20. 8540

    Carbohydrate intolerance by V. O. Kaybysheva, Ye. K. Baranskaya

    Published 2018-08-01
    “…To present the modern concept on etiology and pathogenesis of food intolerance, to analyze the modern strategy of diagnosis and treatment of carbohydrate intolerance. …”
    Get full text
    Article