Showing 12,081 - 12,100 results of 31,041 for search '"strategy"', query time: 0.13s Refine Results
  1. 12081

    International Experience of Organizing Cooperation between police and Public by A. V. Komziuk, M. A. Komziuk

    Published 2020-12-01
    “…Citizens’ participation in the fight against crime is a fundamental condition, because it was not possible to construct an effective system of influencing crime without the support of the population in any country. The strategy, which envisages cooperation between the population and police officers in the field of combating crime in the EU countries, complements police practice. …”
    Get full text
    Article
  2. 12082

    Nutritional value and antioxidant activity of ora-pro-nobis, tamarillo and green banana biomasses by Renata de Souza Ferreira, Jucenir dos Santos, Lívya Alves de Oliveira, Ceres Mattos Della Lucia, Márcia Cristina Teixeira Ribeiro Vidigal

    Published 2024-12-01
    “… The consumption of unconventional food plants (UFP) can be a strategy to promote food and nutritional security, for which it is necessary to know their nutritional composition. …”
    Get full text
    Article
  3. 12083

    Role of private providers in the implementation of the national health insurance scheme in Zambia: a qualitative study of perceptions and experiences by Jesper Sundewall, Warren Mukelabai Simangolwa

    Published 2025-02-01
    “…Zambia has implemented the NHIS since 2019 as a priority health financing strategy to support UHC. This study provides the first examination of the private sector’s experiences implementing the Zambia NHIS.Methods The study uses a qualitative study design and inductively synthesises data from 30 in-depth interviews with the private sector accredited to the Zambia NHIS in one rural and one urban province.Results The private sector was motivated by profits and complementarity with public providers regarding service readiness and availability. …”
    Get full text
    Article
  4. 12084

    Uptake and Determinants of Tetanus Vaccination among Female Clinical Medical Students in North-Western Nigeria by Muhammad Shakur Abubakar

    Published 2024-05-01
    “…Vaccination of women of childbearing age is the main strategy for their prevention/elimination. However, the uptake of these vaccines among these women has remained dismally low in these parts of the world. …”
    Get full text
    Article
  5. 12085

    HESS Management for Virtual Inertia, Frequency, and Voltage Support Through Off-Board EV Bidirectional Chargers by Jhonatan D. Paucara, Jose Carlos U. Pena, Damian Sal y Rosas

    Published 2024-01-01
    “…This article proposes a novel control strategy to manage a hybrid energy storage system (HESS) composed of dc-link capacitors and battery, through an isolated two-stage ac–dc converter (composed of a dual active bridge resonant type dc–dc converter cascaded to a voltage source inverter), intended for off-board EVBCs. …”
    Get full text
    Article
  6. 12086

    Task-Driven Computing Offloading and Resource Allocation Scheme for Maritime Autonomous Surface Ships Under Cloud–Shore–Ship Collaboration Framework by Supu Xiu, Ying Zhang, Hualong Chen, Yuanqiao Wen, Changshi Xiao

    Published 2024-12-01
    “…Due to the increasing number of MASS and asymmetrical distribution of traffic flows, the transportation management must design an efficient cloud–shore–ship collaboration framework and smart resource allocation strategy to improve the performance of the traffic network and provide high-quality applications to the ships. …”
    Get full text
    Article
  7. 12087

    Multimodal Autism Spectrum Disorder Method Using GCN With Dual Transformers by Tianming Song, Zhe Ren, Jian Zhang, Yawei Qu, Yingying Cui, Zhengda Liang

    Published 2025-01-01
    “…This study proposes a novel diagnostic approach that integrates Graph convolutional networks (GCN) with dual transformer architectures, optimized through a Co-training strategy. The first Transformer is dedicated to extracting intricate temporal features from fMRI data, which are crucial for understanding brain activity over time. …”
    Get full text
    Article
  8. 12088

    Evolution of Cluster Policy in Japan by А. V. Belov

    Published 2024-10-01
    “…This article offers a narrative analysis of Japan’s strategy for fostering economic growth through the establishment and advancement of clusters, defined as geographically concentrated groups of companies and organizations operating within related industries. …”
    Get full text
    Article
  9. 12089

    Simulation and Economic Benefit Analysis of Carburetor Combined Transport in Winter at a Liquefied Natural Gas Receiving Station by Song Cao, Tao Luan, Pengliang Zuo, Xiaolei Si, Pu Xie, Yingjun Guo

    Published 2025-01-01
    “…Next, the relationship between the seawater inlet–outlet temperature difference and the minimum seawater flow rate for the ORV was determined, and an optimized seawater pump operation strategy, considering LNG export volumes, was formulated. …”
    Get full text
    Article
  10. 12090

    Research on network slicing security for 5G mMTC by Zijun XU, Jianwei LIU, Geng LI

    Published 2022-02-01
    “…With the emergence of new 5G business, architecture and technology, more and more researchers pay attention to security issues and potential security risks.Massive machine type communication is one of the three major application scenarios of 5G.It provides high performance such as large connection and low power consumption.Due to factors such as limited resources of MTC equipment, it may also weaken the security of 5G networks.At the same time, different scenarios and applications have obvious demands for network performance, service quality and security level.The flexibility of 5G networking is realized by network slicing technology.It meets the diversity and customization of 5G network services, but also brings new security threats.5G commercial rapid development.The number of IoT devices has increased exponentially.In order to ensure that 5G networks provide more efficient and safe on-demand services, it is particularly important to study the security mechanism and strategy of network slicing for 5G mMTC application scenarios.Therefore, the characteristics and security requirements of 5G mMTC were analyzed.The main security threats of network slicing were listed.In view of the above security requirements and threats, the contribution and deficiency of existing security schemes around the aspects of specific network slice authentication, slice security isolation, security management and arrangement were summarized and expounded.And the future research in this field was prospected.A SM2-based secondary authentication and security isolation model for 5G mMTC network slicing was proposed.This model framework meeted the efficiency of large-scale authentication for 5G devices and users by introducing batch authentication and pre-authentication mechanisms.By hierarchical encryption of different communication data, the security isolation between 5G mMTC network slices was realized.The performance and security of the model were also analyzed.…”
    Get full text
    Article
  11. 12091

    Cyberbullying: Violence in the digital world by Mijatović Marina D.

    Published 2024-01-01
    “…In such an environment, phenomena such as cyberbullying, online abuse, identity theft and other digital threats have become more and more present, at the same time causing concern to society, which results in the need for an adequate prevention and response strategy. Cyberbullying can be defined as intentional abuse or harassment of an individual through social networks, e-mail, phone calls or messages, electronic media, which is repeated over time. …”
    Get full text
    Article
  12. 12092

    MicroRNA in Cervical Cancer: OncomiRs and Tumor Suppressor miRs in Diagnosis and Treatment by Kouji Banno, Miho Iida, Megumi Yanokura, Iori Kisu, Takashi Iwata, Eiichiro Tominaga, Kyoko Tanaka, Daisuke Aoki

    Published 2014-01-01
    “…Supplementation of miR-143 or inhibition of miR-21 activity in vivo may be therapeutic strategy for cervical cancer. Previous approaches to development of siRNA as a drug have provided information for establishment of therapy based on these approaches, and an anti-miR-21 inhibitor has been developed. miRNAs also have effects on drug resistance and may be useful in combination therapy with other drugs.…”
    Get full text
    Article
  13. 12093

    Performance comparison and energy-saving optimization for two DTRO systems in coal mine concentrated brine treatment by WANG Renlei, FENG Yun, ZHU Li, WANG Qingxi, CAO Rong

    Published 2025-01-01
    “…According to the characteristics of DTRO system, the energy saving optimization strategy was put forward in the aspects of concentrated water circulation, concentrated water energy recovery, circulating pump selection, high pressure pump operation. …”
    Get full text
    Article
  14. 12094

    Novel fingerprint key generation method based on the trimmed mean of feature distance by Zhongtian JIA, Qinglong QIN, Li MA, Lizhi PENG

    Published 2023-10-01
    “…In recent years, biometrics has become widely adopted in access control systems, effectively resolving the challenges associated with password management in identity authentication.However, traditional biometric-based authentication methods often lead to the loss or leakage of users’ biometric data, compromising the reliability of biometric authentication.In the literature, two primary technical approaches have been proposed to address these issues.The first approach involves processing the extracted biometric data in a way that the authentication information used in the final stage or stored in the database does not contain the original biometric data.The second approach entails writing the biometric data onto a smart card and utilizing the smart card to generate the private key for public key cryptography.To address the challenge of constructing the private key of a public key cryptosystem based on fingerprint data without relying on a smart card, a detailed study was conducted on the stable feature points and stable feature distances of fingerprints.This study involved the extraction and analysis of fingerprint minutiae.Calculation methods were presented for sets of stable feature points, sets of equidistant stable feature points, sets of key feature points, and sets of truncated means.Based on the feature distance truncated mean, an original fingerprint key generation algorithm and key update strategy were proposed.This scheme enables the reconstruction of the fingerprint key through re-collecting fingerprints, without the need for direct storage of the key.The revocation and update of the fingerprint key were achieved through a salted hash function, which solved the problem of converting ambiguous fingerprint data into precise key data.Experiments prove that the probability of successfully reconstructing the fingerprint key by re-collecting fingerprints ten times is 0.7354, and the probability of reconstructing the fingerprint key by re-collecting fingerprints sixty times is 98.06%.…”
    Get full text
    Article
  15. 12095

    Efficiency and safety of automated label cleaning on multimodal retinal images by Tian Lin, Meng Wang, Aidi Lin, Xiaoting Mai, Huiyu Liang, Yih-Chung Tham, Haoyu Chen

    Published 2025-01-01
    “…We also developed a DQS-guided cleaning strategy to mitigate over-cleaning. Furthermore, external validation on EyePACS and APTOS-2019 datasets boosted label accuracy by 1.3 and 1.8%, respectively. …”
    Get full text
    Article
  16. 12096

    Analysis of regulatory documents regulating the fight against COVID-19 and other healthcare tools used to manage the COVID-19 pandemic in Kazakhstan by V. V. Benberin, B. T. Kaikenov, Yu. V. Samsonov

    Published 2022-06-01
    “…The analysis of the regulatory legal acts regarding the types of assistance provided to the population to prevent the spread of infection, as well as the treatment strategy for patients suffering coronavirus infection. …”
    Get full text
    Article
  17. 12097

    Transformation of Russian-Chinese Interaction in Central Asia : from Strategic Partnership to Asymmetric Rivalry by Г. Жаксыгулова

    Published 2024-12-01
    “…The practical value of the results lies in their potential use in forming Russia's foreign policy strategy in Central Asia and adjusting mechanisms for maintaining regional influence in conditions of growing competition with China. …”
    Get full text
    Article
  18. 12098

    Development of mathematical competence as a key competence in English language teaching by A. Neguliaieva

    Published 2024-06-01
    “…Hence, this paper presents the research on implementing the competence-oriented strategy stated by the Law of Ukraine on Education in general and the features of developing mathematical competence in English language teaching/learning as a key one. …”
    Get full text
    Article
  19. 12099

    Gastronomy Tourism Promotion: The Uniqueness of Culinary Attraction and Storytelling by Ayu Nurwitasari, Vanessa Gaffar, Lili Adi Wibowo, Mokh Adib Sultan

    Published 2024-12-01
    “…It offers insights for developing strategies that promote gastronomic tourism, preserve cultural heritage, support local economies, and create a deeper connection between tourists and their destinations. …”
    Get full text
    Article
  20. 12100

    A Hybrid Distribution Network Model for Cost, Quality and Distribution Optimization in Perishable Goods Supply Chains by Tahjid Islam Samun, Shahed Mahmud, Maream Rahman, Md. Mehedi Hasan Ridoy

    Published 2025-01-01
    “…The findings highlight the strategic importance of optimal distribution center placement and a dual supply strategy, with plants meeting 63% of mango and 53% of jackfruit demand, reducing reliance on intermediaries by advocating direct shipping to markets while bypassing cold storage. …”
    Get full text
    Article