Showing 1,221 - 1,240 results of 31,041 for search '"strategy"', query time: 0.08s Refine Results
  1. 1221

    Humanities in Iran: Current Status and Strategies to Promotion that with Use of SWOT Model by Sayyed Hossein Hosseini, Rouhollah Shahabi

    Published 2018-03-01
    “…At the end, based on results of SWOT, we suggested numerous strategies and solutions to promote humanities in Iran. …”
    Get full text
    Article
  2. 1222

    Effectiveness of the Strategies Implemented in Sri Lanka for Controlling the COVID-19 Outbreak by K. K. W. H. Erandi, A. C. Mahasinghe, S. S. N. Perera, S. Jayasinghe

    Published 2020-01-01
    “…In order to bring the new coronavirus pandemic in the country under control, the government of Sri Lanka implemented a set of control strategies including social distancing, quarantine, lockdowns, travel restrictions, and isolation of villages. …”
    Get full text
    Article
  3. 1223

    Using the Decision-Ade™ Segmentation Strategy to Better Understand Extension Audiences by Randall A. Cantrell, Laura Warner, Joy Rumble, Alexa Lamm

    Published 2015-09-01
    “…FCS3331/FY1461: Using the Decision-Ade™ Segmentation Strategy to Better Understand Extension Audiences (ufl.edu) …”
    Get full text
    Article
  4. 1224
  5. 1225

    Modularity and adaptive architecture – A strategy for managing complex envelope systems by Valentino Manni, Luca Saverio Valzano

    Published 2023-12-01
    “…This contribution underscores the centrality of modularity as a strategy to address the multidimensional complexity of technological systems for adaptive envelopes.   …”
    Get full text
    Article
  6. 1226

    Study on photovoltaic primary frequency control strategy at different time scales by Lei Wang, Runtao Zhang, Qian Zang, Ziwei Cheng, Can Su, Zhiwei Li, Hao Zhang

    Published 2024-12-01
    “…For long‐term time scales, a strategy for controlling the variable reactive power reserve capacity is proposed to address the inadequacy of frequency regulation caused by traditional fixed de‐rating rate strategies and redundant standby power. …”
    Get full text
    Article
  7. 1227
  8. 1228

    Secure deployment strategy of virtual machines based on operating system diversity by Miao ZHANG, Xin-sheng JI, Jian-jian AI, Wen-yan LIU, Hong-chao HU, Shu-min HUO

    Published 2017-10-01
    “…The resource-sharing model for cloud computing raises many security issues,such as co-resident of virtual machines,while greatly improving resource utilization.In particular,when a user adopts a single operating system,an attacker can steal privacy and data by compromising the user's entire virtual machine at a smaller cost.In view of this security threat,a strategy for the security deployment of virtual machine based on operating system diversity was presented.This method firstly recommended an operating system configuration options for users applying for virtual machines with the highest degree in diversity,and then through the secure deployment strategy,maximized the effect of diversity,thus making the attacker pay more cost.The experimental results show that compared with the method of single operating system,this method can reduce the attack efficiency by 33.46% at least.…”
    Get full text
    Article
  9. 1229
  10. 1230

    Deep learning-based strategies for evaluating and enhancing university teaching quality by Ying Gao

    Published 2025-06-01
    Subjects: “…Teaching improvement strategies…”
    Get full text
    Article
  11. 1231
  12. 1232
  13. 1233

    Multi-controller balancing deployment strategy based on reliability evaluation in SDN by Tao HU, Jian-hui ZHANG, Teng MA, Wei ZHAO

    Published 2017-11-01
    “…The control plane has low reliability and controller loads were unbalanced in distributed software defined networks,and a multi-controller balancing deployment strategy based on reliability evaluation was proposed.Firstly,node reliability was evaluated by weighting node efficiency and path quality,optimizing the controller location with balancing factor.Then based on improved k-center clustering,the redundant functions was introduced and the switch allocation was completed according to node attractiveness degree and controller load balancing rate,achieving a reasonable SDN sub-domain planning.The simulations show that compared with the existing strategy the number of required controllers is reduced by an average of 22.1%.The control plane elasticity is enhanced,and the controller load balancing performance has been improved significantly.…”
    Get full text
    Article
  14. 1234

    Infectious scleritis: a review of etiologies, clinical features, and management strategies by Supriya Sharma, Jay U. Sheth, Somasheila I. Murthy, Somasheila I. Murthy

    Published 2025-02-01
    “…In this review, the authors have summarized the prevalence, clinical and microbiological profile, and management strategies of infectious scleritis and their outcomes.…”
    Get full text
    Article
  15. 1235

    Cardiovascular Disease Risk Factor Patterns and Their Implications for Intervention Strategies in Vietnam by Quang Ngoc Nguyen, Son Thai Pham, Loi Doan Do, Viet Lan Nguyen, Stig Wall, Lars Weinehall, Ruth Bonita, Peter Byass

    Published 2012-01-01
    “…This study explores the prevalence of each CVDRF and how they cluster to evaluate CVDRF burdens and potential prevention strategies. Methods. A cross-sectional survey in 2009 (2,130 adults) was done to collect data on behavioural CVDRF, anthropometry and blood pressure, lipidaemia profiles, and oral glucose tolerance tests. …”
    Get full text
    Article
  16. 1236
  17. 1237

    Dynamic computing offloading strategy in LEO constellation edge computing network by GAO Yufang, JI Zhi, ZHAO Kanglian, LI Wenfeng, HU Peicong

    Published 2024-07-01
    “…To address this problem, a multi-user computing offloading strategy based on stochastic game was proposed under the system model of dynamic environment low earth orbit constellation edge computing network. …”
    Get full text
    Article
  18. 1238
  19. 1239

    Priority Analysis of Influence Factors for Electric Vehicle Demand Response Strategies by Yin Yao, Yedong Zhu, Dongdong Li, Bo Zhou, Shunfu Lin

    Published 2023-01-01
    “…Therefore, an EV demand response strategy considering the influence of multiple factors is proposed in this paper. …”
    Get full text
    Article
  20. 1240

    Approach to making strategies for network security enhancement based on attack graphs by SI Jia-quan1, ZHANG Bing2, MAN Da-peng1, YANG Wu1

    Published 2009-01-01
    “…In order to improve the overall security of networks,a method of making strategies for the network security enhancement based on global attack graphs was proposed.The method calculated the probability of the network states transition by using global attack graphs.On this basis,the security loss of network states and the criticality of security elements were gotten.Finally,security elements were deleted based on maximum criticality first.The analysis of the ex-ample indicates that the enhancement strategies made by the method can improve the overall security of networks,and the operability is better than traditional methods.…”
    Get full text
    Article