Search alternatives:
complement » implement (Expand Search)
Showing 3,481 - 3,500 results of 107,686 for search '(complement OR implementing)', query time: 0.25s Refine Results
  1. 3481
  2. 3482

    Implementation of home blood pressure monitoring in preoperative anaesthesia assessment clinic by Xinyan Zhang, Xuan Han Koh, Shuhuei Neo, Avinash Gobindram, Anne S C Kiew, Eeteng Ong

    Published 2025-07-01
    “…None of the patients had surgery cancelled due to high BP readings on the day of the operation, and the number of unnecessary GP/ED referrals was significantly reduced after implementation of the new workflow.The comprehensive perioperative workflow using home BP monitoring offers an effective and feasible method to detect WCE. …”
    Get full text
    Article
  3. 3483

    Features of the Computational Implementation of the Algorithm for Estimating the Lyapunov Exponents of Systems with Delay by Vladimir E. Goryunov

    Published 2019-12-01
    “…We consider the computational implementation of the algorithm for Lyapunov exponents spectrum numerical estimation for delay differential equations. …”
    Get full text
    Article
  4. 3484
  5. 3485
  6. 3486

    Analysis, Optimization, and Hardware Implementation of Dipole Antenna Array for Wireless Applications by Norun Abdul Malek, Rob D. Seager, James A. Flint, Zuhairiah Zainal Abidin

    Published 2022-01-01
    “…The optimization results were compared to the full-wave simulation technique implemented in Empire XCCel. The design is realistically implemented at 2.45 GHz, with both simulation and measurement results shown. …”
    Get full text
    Article
  7. 3487

    Implementation of Freedom Mini Curriculum in Basic English at Tri Learning House by Tri Andayani -, Siti Aisyah

    Published 2024-12-01
    Subjects: “…Implementation, freedom mini curriculum, Tri Learning House…”
    Get full text
    Article
  8. 3488

    Assessing the implementation and impact of a social prescribing protocol in primary care by Marina Pola-Garcia, Natalia Enríquez Martín, Alberto Turón Lanuza, Fátima Méndez-López, Ángel Gasch-Gallén, María Luz Lou Alcaine, Carmén Belén Benedé Azagra

    Published 2025-05-01
    “…Abstract Background Social prescribing allows clinicians to refer people to resources or activities in their community to improve their abilities and health. Implementation of social prescribing is growing. However, there is not enough evidence on several related issues. …”
    Get full text
    Article
  9. 3489

    Development and implementation of a sensitivity training curriculum focused on equity in healthcare by Allen M. Chen

    Published 2025-07-01
    “…The purpose of this study was to report our single‐institutional experience with the development and implementation of this evidence‐based curriculum. Methods and Materials Core DEI themes on which to center the sensitivity training curriculum were identified through an evidence‐based review based on the Preferred Reporting Items for Systematic Review and Meta‐Analysis Protocols (PRISMA‐P) statement. …”
    Get full text
    Article
  10. 3490

    The Implementation of Enhanced Microgrid using Mayfly Algorithm based PID Controller by M Murali, A Hema Sekhar

    Published 2025-02-01
    “…To mitigate these challenges and balance the nonlinear output from renewable sources, Mayfly Algorithm (MA)-optimized Proportional-Integral-Derivative (PID) controller is proposed and implemented. Validation results demonstrate that the proposed MA-PID controller effectively regulates system in response to varying load demands and renewable energy sources. …”
    Get full text
    Article
  11. 3491

    Design and implementation of proxy-protected proxy signature based on SM2 by Qing-xiao GUO, Da-wei ZHANG, Liang CHANG, Xiao-dong LIU, Jing-wen SONG

    Published 2017-09-01
    “…Based on the SM2 digital signature standard,a proxy-protected proxy signature scheme was designed.Through the design of the agent authorization mechanism,the protection of the proxy signer was realized.The proxy signature was realized by the proxy signer who represents the original signer through the improvement of the SM2 digital signature algorithm.The security analysis shows that the designed algorithm is verifiable,identifiable,distinguishable,non-repudiation,and strong unforgeability.Finally,the program was implemented using the C language and the Polarssl library,and the performance was compared with the SM2 digital signature.The analysis shows that the algorithm has good usability in performance.…”
    Get full text
    Article
  12. 3492

    Formation of Russian magistracy: implementation of the digital economy requests in the educational process by E. V. Voevodina

    Published 2020-02-01
    “…The article reflects the results of the research in the framework of the project “Birth of the Russian master’s degree”, implemented by the HSE Institute of education, the winner of the Vladimir Potanin Scholarship program of The V. …”
    Get full text
    Article
  13. 3493
  14. 3494

    Analysis of Azure Zero Trust Architecture Implementation for Mid-Size Organizations by Vedran Dakić, Zlatan Morić, Ana Kapulica, Damir Regvart

    Published 2024-12-01
    “…This paper describes how Microsoft Azure uses ZTA to enforce strict identity verification and access rules across the cloud environment to improve security. Implementation takes time and effort. Azure’s extensive services and customizations require careful design and implementation. …”
    Get full text
    Article
  15. 3495

    IMPLEMENTATION OF ENTREPRENEURSHIP IDEAS IN EDUCATIONAL PROGRAMS FOR THE TRAINING OF SPECIALISTS: THE EUROPEAN EXPERIENCE by Olena Tadeush

    Published 2024-03-01
    “…The article analyzes the experience of implementing entrepreneurship ideas in the content of educational programs for training specialists in the countries of the European Union (Austria, Finland, France, Sweden, Spain, Croatia, Italy, Latvia) at the pan-European, national and institutional levels. …”
    Article
  16. 3496
  17. 3497
  18. 3498
  19. 3499

    Implementation of Minimally Invasive Mitral Valve Surgery in a Novice Center by Andre Korshin, Peter Hasse Møller-Sørensen, Jacob Eifer Møller, Christian Lildal Carranza

    Published 2025-04-01
    “…We thus investigated if a novice mitral valve center encountered difficulties implementing MIMVS. Methods: We investigated seven hundred and forty-eight mitral valve surgery patients, two years before and after MIMVS introduction. …”
    Get full text
    Article
  20. 3500

    Research and implementation of network architecture of LSN DCI EVPN VxLAN by Yongming YAN, Liang ZUO, Bin XU, Haifeng XU, Kechuang YE

    Published 2017-06-01
    “…With the rise of virtualization technology,the architecture of traditional data center is disrupted.There exit a large number of interconnected needs among the data centers,such as data center active-active,data center redundancy,data synchronous backup,data migration,integrated data store,shared virtual resource pool,virtual machine drift and so on.Thereby,a large amount of east-west flow was generated,it is necessary to build a reliable,flexible,secure,and easy to deploy layer-2 and layer-3 network to meet the requirement of DCI (data center interconnection).The network architecture of EVPN VxLAN was analyzed,there hasn’t been successful large-scale business case for implementation of multi-vendor DCI EVPN VxLAN networking.Combined with current status of LSN data center of Shanghai Telecom,the deployment of DCI via existing network was proposed and achieved.…”
    Get full text
    Article