Suggested Topics within your search.
Suggested Topics within your search.
- Entrepreneurship 5
- Management 5
- English language 4
- Business enterprises 3
- Economic development 3
- Industrial management 3
- Information technology 3
- Methodology 3
- Research 3
- Study and teaching 3
- Classroom environment 2
- Communication in education 2
- Effective teaching 2
- Elementary school teaching 2
- Hospitality industry 2
- Inquiry-based learning 2
- Interaction analysis in education 2
- Intercultural communication 2
- Internet in public administration 2
- Internet marketing 2
- Marketing 2
- Moral and ethical aspects 2
- Psychological aspects 2
- Psychology 2
- Public administration 2
- Public relations 2
- Rhetoric 2
- Social networks 2
- Sustainable development 2
- Technical writing 2
-
1621
Bispecific antibodies and CLEM: an analytical approach to advanced cell imaging for therapeutic strategies
Published 2025-01-01“…In this review, the integration of BsAbs and CLEM paves the way for targeted therapeutic strategies, fostering the development of more effective treatments that can adapt to the complexities of disease pathology.…”
Get full text
Article -
1622
Quelle stratégie de développement durable dans les hôtels en Tunisie ?
Published 2012-02-01“…Since, water resources in Tunisia are characterized by scarcity and a pronounced irregularity is management should be done with appropriate strategies. The aim of this paper is to study the behavior of hotels operators in Tunisia in order to identify strategies for water management that would be part of their sustainable development (SD) strategies. …”
Get full text
Article -
1623
Synergy and Communication of IoT Industry Development Strategies in the Perspective of Low Carbon Economy
Published 2021-01-01“…In this paper, from the perspective of a low-carbon economy, the development mode and influencing factors of the IoT industry are studied, and development strategies are proposed in a targeted manner. Through the analysis of relevant literature, the connotation of the concept of cooperation and dissemination of IoT industry development strategy under low-carbon economy is enriched, emphasizing its systemic, multisubjectivity, and low-carbon effect, and its mechanistic effect is analyzed and different types of models are analyzed and established. …”
Get full text
Article -
1624
-
1625
Generalized Synchronization of Nonlinear Chaotic Systems through Natural Bioinspired Controlling Strategy
Published 2015-01-01“…A novel bioinspired control strategy design is proposed for generalized synchronization of nonlinear chaotic systems, combining the bioinspired stability theory, fuzzy modeling, and a novel, simple-form Lyapunov control function design of derived high efficient, heuristic and bioinspired controllers. …”
Get full text
Article -
1626
Social Media Will Tell Your Story: The Digital Strategy of #Ham4Ham
Published 2023-02-01Get full text
Article -
1627
Online medical privacy protection strategy under information value-added mechanism
Published 2022-12-01“…China’s economic level and people’s living standards have developed rapidly in recent years, and the medical level and medical technology have made breakthroughs continuously.With the promotion and deepening of“Internet Plus” to business model innovation in various fields, the development of “Internet Plus” medical has been rapidly developed.Due to the continuous development of data processing technologies such as machine learning and data mining, the risk of users’ personal medical data disclosure in the process of online medical treatment has also attracted the attention of researchers.Considering the deductibility of information, the discount mechanism was adopted to describe the change of user’s private information value in different stages of the game.Combined with the current research status in the field of online medical privacy protection motivation, how to mobilize the enthusiasm of both players from the level of privacy protection motivation was explored with game analysis.In view of the game characteristics of users’ strong willingness to continually use the online medical platform and intermittently provide privacy, the repeated game method was adopted to better describe the game process between users and the online medical platform.The tendency change law of the players on both sides of the game was obtained.Moreover, the Nash equilibrium of the game model was analyzed under different model parameters and the change trend of the game strategy of both sides with the progress of the game stage.When the parameters were met 2(c<sub>p</sub>-c<sub>n</sub>)≥l<sub>p</sub>(p<sub>n</sub>-p<sub>p</sub>), the user started to choose from “agree to share private data” to “refuse to share private data”.The above conclusion was verified by simulation experiments.Based on the above conclusions, from the perspective of online medical platform and users, policy suggestions on how to realize privacy protection from the level of privacy protection motivation in the process of online medical treatment were given.…”
Get full text
Article -
1628
Latency Improvement Strategies for Reliability-Aware Scheduling in Industrial Wireless Sensor Networks
Published 2015-10-01“…We propose novel strategies for end-to-end reliability-aware scheduling in Industrial Wireless Sensor Networks (IWSNs). …”
Get full text
Article -
1629
The Evolution of Antimicrobial Resistance in <i>Acinetobacter baumannii</i> and New Strategies to Fight It
Published 2025-01-01Get full text
Article -
1630
Strategy of container migration and honeypot deployment based on signal game in cloud environment
Published 2022-06-01“…Multi-tenant coexistence and resource sharing in the SaaS cloud pose serious security risks.On the one hand, soft isolation of logical namespaces is easy to be bypassed or broken.On the other hand, it is easy to be subjected to co-resident attacks due to sharing of the host operating system and underlying physical resources.Therefore it poses a serious threat to data availability, integrity and confidentiality in the container cloud.Given the problem that SaaS cloud services are vulnerable to container escape and side-channel equivalent resident attack, network deception technology increases the uncertainty of the cloud environment and reduces the effectiveness of attack by hiding the business function and characteristic attributes of the executor.Aiming at the security threat caused by the co-resident attack, combining dynamic migration and virtual honeypot security technology, the economical and reasonable network deception method was studied.Specifically, a container migration and honeypot deployment strategy based on the signal game was proposed.According to the security threat analysis, container migration and honeypot were used as defense methods.The former improved the undetectability of the system based on the idea of moving to target defense, while the latter confused attackers by placing decoy containers or providing false services.Furthermore, since network reconnaissance was the pre-step of the network attack chain, the attack and defense process was modeled as a two-person signal game with incomplete information.The sender chose to release a signal according to his type, and the receiver could only obtain the signal released by the sender but could not determine the type.Then, a game tree was constructed for the complete but imperfect information dynamic game, and the costs and benefits of different strategy combinations were set.The optimal deception strategy was determined by equilibrium analysis of attack-defense model.Experimental results show that the proposed strategy can effectively improve system security.Besides, it can also reduce container migration frequency and defense cost.…”
Get full text
Article -
1631
PENGEMBANGAN FARM CYCLING SEBAGAI STRATEGI AGROWISATA DI DESA PITRA, TABANAN
Published 2025-01-01Get full text
Article -
1632
The strategy of sustainable development and waste management: Case study: Commercial power industry
Published 2019-08-01Subjects: Get full text
Article -
1633
Exploring Instagram Strategies: A Comparative Analysis of DMO in central region of Portugal
Published 2025-01-01“…The research revealed different strategies for using Instagram, despite both DMOs promoting the same territory. …”
Get full text
Article -
1634
Immersive Haptic Technology to Support English Language Learning Based on Metacognitive Strategies
Published 2025-01-01“…One of the most widely used strategies for learning support is the use of Information and Communication Technologies (ICTs), due to the variety of applications and benefits they provide in the educational field. …”
Get full text
Article -
1635
Treatment strategies for combining immunostimulatory oncolytic virus therapeutics with dendritic cell injections
Published 2015-07-01“…We used the model to determine the effect of varying doses of OV and DC injections and to test alternative treatment strategies. We found that the DC dose given in Huang et al. was near a bifurcation point and that a slightly larger dose could cause complete eradication of the tumor. …”
Get full text
Article -
1636
Minimum-cost network hardening algorithm based on stochastic loose optimize strategy
Published 2015-01-01Subjects: “…stochastic loose optimize strategy…”
Get full text
Article -
1637
Quality Investing and Pricing Strategies by Startups: Impacts of Demand Uncertainties and Capital Constraint
Published 2018-01-01“…Finally, this paper provides the startup managers some guidance on the quality investing strategy under capital constraints.…”
Get full text
Article -
1638
Drosophila Models of Parkinson's Disease: Discovering Relevant Pathways and Novel Therapeutic Strategies
Published 2011-01-01“…Indeed, many of the existing fly PD models exhibit key features of the disease and have been instrumental to discover pathways relevant for PD pathogenesis, which could facilitate the development of therapeutic strategies.…”
Get full text
Article -
1639
-
1640
Research on the cooperative offloading strategy of sensory data based on delay and energy constraints
Published 2023-03-01Get full text
Article