Suggested Topics within your search.
Suggested Topics within your search.
- Entrepreneurship 5
- Management 5
- English language 4
- Business enterprises 3
- Economic development 3
- Industrial management 3
- Information technology 3
- Methodology 3
- Research 3
- Study and teaching 3
- Classroom environment 2
- Communication in education 2
- Effective teaching 2
- Elementary school teaching 2
- Hospitality industry 2
- Inquiry-based learning 2
- Interaction analysis in education 2
- Intercultural communication 2
- Internet in public administration 2
- Internet marketing 2
- Marketing 2
- Moral and ethical aspects 2
- Psychological aspects 2
- Psychology 2
- Public administration 2
- Public relations 2
- Rhetoric 2
- Social networks 2
- Sustainable development 2
- Technical writing 2
-
8521
De l’argument à l’action : la biodiversité au service des jardins familiaux
Published 2015-12-01“…On the national level, it shows that biodiversity is an integral part of the strategy developed by the National Federation of Allotment and Community Gardens (in French Fédération nationale des jardins familiaux et collectifs) in support of these urban vegetable gardens. …”
Get full text
Article -
8522
Parameterised design of robust point‐to‐point fast motion controller
Published 2017-03-01“…The controller initially resorts to a saturated control signal for the fastest acceleration or braking if possible and then seamlessly gives way to a linear control strategy once the motion slows down. The damping ratio and natural frequency of the linear control law are chosen as the design parameters to allow for a better tuning of the control performance. …”
Get full text
Article -
8523
Verifiable access control scheme based on unpaired CP-ABE in fog computing
Published 2021-08-01“…Fog computing extends computing power and data analysis applications to the edge of the network, solves the latency problem of cloud computing, and also brings new challenges to data security.Attribute encryption based on ciphertext strategy (CP-ABE) is a technology to ensure data confidentiality and fine-grained access control.The excessive computational overhead of bilinear pairing restricts its application and development.In response to this, a verifiable access control scheme was proposed based on unpaired CP-ABE in fog computing.In order to make CP-ABE more efficient, simple scalar multiplication in elliptic curve encryption was used to replace bilinear pairing, thereby reducing the overall computational overhead.Decryption operations were outsourced to fog nodes to reduce user computational complexity, and based on the tamper-proof and traceable characteristics of the blockchain, the correctness of the access transaction was verified and the access authorization process was recorded.Security and performance analysis shows that the scheme is safe under the elliptic curve decision-making DBDH (Diffie-Hellman) assumption, and the calculation efficiency is higher.…”
Get full text
Article -
8524
Network Evolutionary Game-Based Diffusion Mechanism regarding the Nonperformance of Farmers in Agricultural Supply Chain Finance
Published 2022-01-01“…The results indicate the following: (a) When some farmers choose the default strategy because their default income is greater than their performance income, the default behavior in the small-world network will not spread to the whole network. …”
Get full text
Article -
8525
Phosphodiesterase-5 Inhibitors: Action on the Signaling Pathways of Neuroinflammation, Neurodegeneration, and Cognition
Published 2015-01-01“…Phosphodiesterase type 5 inhibitors (PDE5-Is) have recently emerged as a potential therapeutic strategy for neuroinflammatory, neurodegenerative, and memory loss diseases. …”
Get full text
Article -
8526
THE CONSEQUENCES OF THE INTERNET FOR POLITICS
Published 2013-08-01“…The author believes that Obama plans his second term in power as a turning point for the development of the country which is connected to the economic development. USA political strategy is global; the same is true for the information sphere. …”
Get full text
Article -
8527
An optimized approach for container deployment driven by a two-stage load balancing mechanism.
Published 2025-01-01“…This paper presents an optimization strategy for container deployment that consists of two stages: coarse-grained and fine-grained load balancing. …”
Get full text
Article -
8528
A shared value network model based on synergy theory in intelligent manufacturing
Published 2025-01-01“…Then, to meet the market demand and maximize the value gain, the optimization scheme is given according to the coordination theory and priority strategy in the design of the operation mechanism of the shared value network model. …”
Get full text
Article -
8529
A Q-Learning-Based Parameters Adaptive Algorithm for Formation Tracking Control of Multi-Mobile Robot Systems
Published 2022-01-01“…In order to handle the model uncertainties and external disturbances, a desired linear extended state observer is designed to develop an adaptive formation tracking control strategy. Then an adaptive method of sliding mode control parameters optimized by Q-learning scheme is employed, which can avoid the complex parameter tuning process. …”
Get full text
Article -
8530
Reframing tradition: how NGOs sell market-based conservation to Indigenous communities—lessons from the Leco community in Bolivia
Published 2025-01-01“…To understand the communication strategy for swaying the community, we apply framing theory from communicative and social movements literature. …”
Get full text
Article -
8531
Gain-aware caching scheme for information-centric networking
Published 2016-05-01“…The in-network caching system of information-centric networking had to deal with the popularity of huge number of content chunks and make efficient usage of storage resources.A content popularity based caching gain opti-mization model aimed to get maximum reduction of content retrieve cost was established,and a gain-aware caching scheme was proposed.By utilizing filtering effect of cache to request flow is scheme achieves caching cooperation and diversity potentially while maximizing caching gain of every single node.Bloom filter based sliding window strategy captures the content chunks with high caching gain according to request arrival interval and retrieval cost from the source.Analysis shows that the method can drastically reduce memory consumption caused by popularity monitoring.The simu-lation results illuminate that this scheme is well aware of content popularity based caching gain,and gets better band-width saving and cache hit ratio when content popularity is changing dynamically.…”
Get full text
Article -
8532
Solutions to No-Wait Flow Shop Scheduling Problem Using the Flower Pollination Algorithm Based on the Hormone Modulation Mechanism
Published 2018-01-01“…A variable neighborhood search strategy based on dynamic self-adaptive variable work piece blocks is constructed to improve the local search quality. …”
Get full text
Article -
8533
Electric power communication network service importance evaluation method for quantum key application
Published 2019-01-01“…A relative importance matrix based on the transmission performance indicators of each service was built under the background of quantum communication, so as to obtain the importance of the power communication network business, and to carry out subsequent quantum key application strategy research.…”
Get full text
Article -
8534
Increasing the cyber resilience of SMEs through open-source solutions and international collaboration
Published 2025-01-01“…In conclusion, open-source solutions and the use of advanced technologies, such as AI, provide SMEs with an effective strategy to address modern cyber challenges, improving their resilience and protection against threats. …”
Get full text
Article -
8535
The Research of Maneuverability Modeling and Environmental Monitoring Based on a Robotic Dolphin
Published 2021-01-01“…Furthermore, a combined strategy of environment recognition was used for the positional control of the robotic dolphin, incorporating sonar, path planning with an artificial potential field, and trajectory tracking. …”
Get full text
Article -
8536
“Unnatural, unnatural, unnatural, unnatural unnatural” . . . but real? The Toolbox Murders (Dennis Donnelly, 1978) and the Exploitation of True Story Adaptations
Published 2016-07-01“…1970s horror film and exploitation staple, The Toolbox Murders (Dennis Donnelly, 1978), is here used as a case study in incoherent narrative strategy and ideology and explores the incoherencies of this relationship to adapting “true stories.” …”
Get full text
Article -
8537
Suppressing Polarization Mode Dispersion with the Quantum Zeno Effect
Published 2025-01-01“…Polarization mode dispersion can introduce quantum decoherence in polarization encoded information, limiting the range of quantum communications protocols. Therefore, strategies to nullify the effect would reduce quantum decoherence and potentially increase the operational range of such technology. …”
Get full text
Article -
8538
Ensuring competitiveness in the XXI century: development of organizational skills in the conditions of the Internet economy
Published 2023-11-01“…It is noted that the traditional thinking of management can lead to a mismatch of the strategy of the organization and its environment, making it difficult to implement the strategic process.In conclusion, the article presents the main results and formulates brief conclusions of the study, emphasizing the importance of continuing the study of management practices of the XXI century.…”
Get full text
Article -
8539
Cognitive waveform design for radar-communication transceiver networks
Published 2021-12-01“…The system architecture for cognitive radar-communication (CRC) transceiver was proposed.A cognitive waveforms design approach, which is suitable for simultaneously performing both data communication and target detection was presented.This approach aims at estimating target scattering coefficient (TSC) from the radar scene and facilitating high-data-rate communications.In order to minimize the mean square error (MSE) of the TSC, a convex cost function was established.The peak to average power ratio (PAPR)-constrained optimal solution was achieved by applying the Kalman filtering-based strategy to design the set of ultra-wideband (UWB) transmission pulses and embed into them the information data with the M-ary position phase shift keying modulation technique.In addition to theoretical considerations, the simulation results show an improvement in TSC estimation and target detection probability as the number of iterations increases, while still transmitting data rates in the range of several Mbit/s with low bit error rates between CRC transceivers.…”
Get full text
Article -
8540
Carbohydrate intolerance
Published 2018-08-01“…To present the modern concept on etiology and pathogenesis of food intolerance, to analyze the modern strategy of diagnosis and treatment of carbohydrate intolerance. …”
Get full text
Article