Showing 1,621 - 1,640 results of 31,041 for search '"strategy"', query time: 0.12s Refine Results
  1. 1621

    Bispecific antibodies and CLEM: an analytical approach to advanced cell imaging for therapeutic strategies by Han-ul Kim, Young Kwan Kim

    Published 2025-01-01
    “…In this review, the integration of BsAbs and CLEM paves the way for targeted therapeutic strategies, fostering the development of more effective treatments that can adapt to the complexities of disease pathology.…”
    Get full text
    Article
  2. 1622

    Quelle stratégie de développement durable dans les hôtels en Tunisie ? by Chiraz Ghozzi-Nékhili

    Published 2012-02-01
    “…Since, water resources in Tunisia are characterized by scarcity and a pronounced irregularity is management should be done with appropriate strategies. The aim of this paper is to study the behavior of hotels operators in Tunisia in order to identify strategies for water management that would be part of their sustainable development (SD) strategies. …”
    Get full text
    Article
  3. 1623

    Synergy and Communication of IoT Industry Development Strategies in the Perspective of Low Carbon Economy by Shaobo Lu

    Published 2021-01-01
    “…In this paper, from the perspective of a low-carbon economy, the development mode and influencing factors of the IoT industry are studied, and development strategies are proposed in a targeted manner. Through the analysis of relevant literature, the connotation of the concept of cooperation and dissemination of IoT industry development strategy under low-carbon economy is enriched, emphasizing its systemic, multisubjectivity, and low-carbon effect, and its mechanistic effect is analyzed and different types of models are analyzed and established. …”
    Get full text
    Article
  4. 1624
  5. 1625

    Generalized Synchronization of Nonlinear Chaotic Systems through Natural Bioinspired Controlling Strategy by Shih-Yu Li, Shi-An Chen, Chin-Teng Lin, Li-Wei Ko, Cheng-Hsiung Yang, Heng-Hui Chen

    Published 2015-01-01
    “…A novel bioinspired control strategy design is proposed for generalized synchronization of nonlinear chaotic systems, combining the bioinspired stability theory, fuzzy modeling, and a novel, simple-form Lyapunov control function design of derived high efficient, heuristic and bioinspired controllers. …”
    Get full text
    Article
  6. 1626
  7. 1627

    Online medical privacy protection strategy under information value-added mechanism by Shengzhi MING, Jianming ZHU, Zhiyuan SUI, Xian ZHANG

    Published 2022-12-01
    “…China’s economic level and people’s living standards have developed rapidly in recent years, and the medical level and medical technology have made breakthroughs continuously.With the promotion and deepening of“Internet Plus” to business model innovation in various fields, the development of “Internet Plus” medical has been rapidly developed.Due to the continuous development of data processing technologies such as machine learning and data mining, the risk of users’ personal medical data disclosure in the process of online medical treatment has also attracted the attention of researchers.Considering the deductibility of information, the discount mechanism was adopted to describe the change of user’s private information value in different stages of the game.Combined with the current research status in the field of online medical privacy protection motivation, how to mobilize the enthusiasm of both players from the level of privacy protection motivation was explored with game analysis.In view of the game characteristics of users’ strong willingness to continually use the online medical platform and intermittently provide privacy, the repeated game method was adopted to better describe the game process between users and the online medical platform.The tendency change law of the players on both sides of the game was obtained.Moreover, the Nash equilibrium of the game model was analyzed under different model parameters and the change trend of the game strategy of both sides with the progress of the game stage.When the parameters were met 2(c<sub>p</sub>-c<sub>n</sub>)≥l<sub>p</sub>(p<sub>n</sub>-p<sub>p</sub>), the user started to choose from “agree to share private data” to “refuse to share private data”.The above conclusion was verified by simulation experiments.Based on the above conclusions, from the perspective of online medical platform and users, policy suggestions on how to realize privacy protection from the level of privacy protection motivation in the process of online medical treatment were given.…”
    Get full text
    Article
  8. 1628

    Latency Improvement Strategies for Reliability-Aware Scheduling in Industrial Wireless Sensor Networks by Felix Dobslaw, Tingting Zhang, Mikael Gidlund

    Published 2015-10-01
    “…We propose novel strategies for end-to-end reliability-aware scheduling in Industrial Wireless Sensor Networks (IWSNs). …”
    Get full text
    Article
  9. 1629
  10. 1630

    Strategy of container migration and honeypot deployment based on signal game in cloud environment by Lingshu LI, Jiangxing WU, Wei ZENG, Wenyan LIU

    Published 2022-06-01
    “…Multi-tenant coexistence and resource sharing in the SaaS cloud pose serious security risks.On the one hand, soft isolation of logical namespaces is easy to be bypassed or broken.On the other hand, it is easy to be subjected to co-resident attacks due to sharing of the host operating system and underlying physical resources.Therefore it poses a serious threat to data availability, integrity and confidentiality in the container cloud.Given the problem that SaaS cloud services are vulnerable to container escape and side-channel equivalent resident attack, network deception technology increases the uncertainty of the cloud environment and reduces the effectiveness of attack by hiding the business function and characteristic attributes of the executor.Aiming at the security threat caused by the co-resident attack, combining dynamic migration and virtual honeypot security technology, the economical and reasonable network deception method was studied.Specifically, a container migration and honeypot deployment strategy based on the signal game was proposed.According to the security threat analysis, container migration and honeypot were used as defense methods.The former improved the undetectability of the system based on the idea of moving to target defense, while the latter confused attackers by placing decoy containers or providing false services.Furthermore, since network reconnaissance was the pre-step of the network attack chain, the attack and defense process was modeled as a two-person signal game with incomplete information.The sender chose to release a signal according to his type, and the receiver could only obtain the signal released by the sender but could not determine the type.Then, a game tree was constructed for the complete but imperfect information dynamic game, and the costs and benefits of different strategy combinations were set.The optimal deception strategy was determined by equilibrium analysis of attack-defense model.Experimental results show that the proposed strategy can effectively improve system security.Besides, it can also reduce container migration frequency and defense cost.…”
    Get full text
    Article
  11. 1631
  12. 1632
  13. 1633

    Exploring Instagram Strategies: A Comparative Analysis of DMO in central region of Portugal by Vítor Sá, Lígia Azevedo, José Antonio Fraiz Brea

    Published 2025-01-01
    “…The research revealed different strategies for using Instagram, despite both DMOs promoting the same territory. …”
    Get full text
    Article
  14. 1634

    Immersive Haptic Technology to Support English Language Learning Based on Metacognitive Strategies by Adriana Guanuche, Wilman Paucar, William Oñate, Gustavo Caiza

    Published 2025-01-01
    “…One of the most widely used strategies for learning support is the use of Information and Communication Technologies (ICTs), due to the variety of applications and benefits they provide in the educational field. …”
    Get full text
    Article
  15. 1635

    Treatment strategies for combining immunostimulatory oncolytic virus therapeutics with dendritic cell injections by Joanna R. Wares, Joseph J. Crivelli, Chae-Ok Yun, Il-Kyu Choi, Jana L. Gevertz, Peter S. Kim

    Published 2015-07-01
    “…We used the model to determine the effect of varying doses of OV and DC injections and to test alternative treatment strategies. We found that the DC dose given in Huang et al. was near a bifurcation point and that a slightly larger dose could cause complete eradication of the tumor. …”
    Get full text
    Article
  16. 1636
  17. 1637

    Quality Investing and Pricing Strategies by Startups: Impacts of Demand Uncertainties and Capital Constraint by Bing Xia, Richard Y. K. Fung, Ju'e Guo

    Published 2018-01-01
    “…Finally, this paper provides the startup managers some guidance on the quality investing strategy under capital constraints.…”
    Get full text
    Article
  18. 1638

    Drosophila Models of Parkinson's Disease: Discovering Relevant Pathways and Novel Therapeutic Strategies by Verónica Muñoz-Soriano, Nuria Paricio

    Published 2011-01-01
    “…Indeed, many of the existing fly PD models exhibit key features of the disease and have been instrumental to discover pathways relevant for PD pathogenesis, which could facilitate the development of therapeutic strategies.…”
    Get full text
    Article
  19. 1639
  20. 1640