Showing 2,101 - 2,120 results of 29,992 for search 'Achaea~', query time: 2.37s Refine Results
  1. 2101

    Implementation of Selected Sustainable Development Objectives in European Union Countries by Edyta Gajos

    Published 2017-12-01
    “…It was found, that European Union countries generally strive towards achieving those goals, though the effectiveness differs among them. …”
    Get full text
    Article
  2. 2102

    A study of value iteration and policy iteration for Markov decision processes in Deterministic systems by Haifeng Zheng, Dan Wang

    Published 2024-11-01
    “…Finally, a detailed example demonstrates the conditions under which convergence of the algorithm is achieved, underscoring the practicality of these methods in deterministic settings.…”
    Get full text
    Article
  3. 2103

    All-Optical 1-to-8 Wavelength Multicasting at 20 Gbit/s Exploiting Self-Phase Modulation in Dispersion Flattened Highly Nonlinear Photonic Crystal Fiber by Zhan-Qiang Hui

    Published 2014-01-01
    “…The results show our designed scheme achieve operation wavelength range of 25 nm, OSNR of 32.01 dB and Q factor of 12.8. …”
    Get full text
    Article
  4. 2104

    Inclusion of Diverse Learners in the Educational System by Eric D. Rubenstein, Andrew C. Thoron

    Published 2013-10-01
    “…Forms of diversity such as socioeconomic status, ethnicity/race, learning style, cognitive ability, gender, and ability to process and store knowledge can cause an “achievement gap” between students. This 4-page fact sheet highlights effective educational strategies for engaging students in the learning environment and assisting in closing achievement gaps. …”
    Get full text
    Article
  5. 2105

    The Role of Resource Management on MSMEs Financial Performance: Supporting SDG 8 - Decent Work and Economic Growth by Shaferi Intan, Nawarini Alisa Tri, Setyanto Refius Pradipta

    Published 2025-01-01
    “…This research examines that resource management is an element of MSMEs financial performance, closely tied to achieving sustainable economic growth as outlined in SDG 8. …”
    Get full text
    Article
  6. 2106

    Heterogeneous resource cooperative game in space-ground computing power network by Yutong ZHANG, Yuming PENG, Boya DI, Lingyang SONG

    Published 2023-12-01
    “…To deal with the resource competition among satellites in the multi-satellite space-ground computing network, a space-ground heterogeneous resource cooperative game mechanism was designed in terms of the computing and spectrum domains.Each satellite published a computing task which was independent of other tasks and relied on UE to generate raw data.By competing the resources of user terminals and UE, the task offloading and processing was achieved.To provide real-time data services, a distributed scheme was proposed based on multi-agent reinforcement learning to coordinate the computing and spectrum resource competition among satellites, thereby minimizing the system latency.Simulation results indicated that, compared with the existing schemes, the proposed algorithm achieves a lower system latency by fully utilizing the computing and spectrum resources and coordinating the resource competition.…”
    Get full text
    Article
  7. 2107

    Implementation of shared file encrypted storage hierarchical access control scheme by Li LI, Guo-zhen SHI, Xuan WANG, Yun-fei CI

    Published 2016-07-01
    “…The traditional file sharing way is single,lack of security,and the shared file's permission autonomous control is too high.To solve these problems,a file encrypted storage and hierarchical access control scheme was proposed.Through increasing classification management unit in the system,classification of users and documents,users of file access control were achieved,the scope of file access control was realized.Security of file storage and transmission was realized through encryption,the key storage was simplified using hierarchical key.Server file en-cryption and decryption operations were achieved through a special password card,which reduced the server work-load and accelerated the file encryption and decryption processing.The scheme was verified on PC and Zynq plat-form,and the predetermined function was realized.…”
    Get full text
    Article
  8. 2108

    Communication Skills by A. V. Raychenko

    Published 2016-06-01
    “…A key role in the formation, functioning and development of modern social organization plays communication, as a basis to establish, maintain and develop constructive relationships, connections and interactions that ensure consistent and effective achievement of personal, group and social goals. The ability to install, functionally diversify and expand communication in and outside the organization, largely determined by the skill level of the leader, determined, first of all, by business and personal qualities of constructive interactive leader. …”
    Get full text
    Article
  9. 2109

    Ensuring the Implementation of the Principle of Gender Equality De Jure and De Facto: the Experience of the Countries of the European Union by M. A. Kashina, A. A. Pyakhkel

    Published 2020-06-01
    “…Achieving equal rights and opportunities for men and women is an integral part of ensuring human rights. …”
    Get full text
    Article
  10. 2110

    DDNS + gateway separation method for interconnect of distributed data center by Sheng-jun XIE, Li-ping CAI, Feng YIN

    Published 2013-09-01
    “…The multi-campus university distributed data centers interconnected problems existing in the traditional gateway were analyzed and based on RHI + gateway unilateral separation methods on the Internet,a DDNS + gateway interconnection separation idea to front-end technology was proposed to achieve business traffic sites DDNS selection,using the device with the VMware SLB to achieve uninterrupted user access.In a lab environment,online or new on-line users drifting around in a virtual machine can fast access to the data center to the same kind of business,suitable for the business flow,IP planning complex continuous demanding scenarios.The interconnection method must increase DDNS equipments in the data center edge,hanging the SLB device next to the switch side of data centers in both places.…”
    Get full text
    Article
  11. 2111

    Performance analysis of multi-relay DF cooperative communication system based on directional antenna by Mingwei WANG, Huisheng ZHANG, Lixin LI, Lifeng HE

    Published 2016-06-01
    “…In order to achieve reliable communication in multi-relay cooperative communication,the directional antenna combining multi-relay cooperative communication system and optimal relay selection decode-and-forward cooperative strategy was presented.Firstly,the theoretical closed form of outage probability of the communication system using directional antenna operating in the three modes of DT-DR,DT-OR and OT-OR were presented.Then for three kinds mode,the collaboration communication system interrupt probability and signal-to-noise ratio,the number of relay nodes,the antenna gain channel fading efficiency and relationship between the channel capacity were analyzed in numerical simulation.These findings reveal that excellent performance of cooperative communication system with directional antennas could be achieved such as smaller outage probability and improved by best relay nodes and optimal power allocation coefficient.…”
    Get full text
    Article
  12. 2112

    A Case of Metastatic Adamantinoma That Responded Well to Sunitinib by Andrew D. Liman, Agnes K. Liman, Jenna Shields, Becky Englert, Rashmikant Shah

    Published 2016-01-01
    “…He received carboplatin and etoposide for 7 months and achieved a partial response. Four months later, PET scan showed disease progression. …”
    Get full text
    Article
  13. 2113

    A ± 1.55ppm Stable FBAR Reference Clock with Oven-Controlled Temperature Compensation by Jabeom Koo, Kannan Sankaragomathi, Richard Ruby, Brian Otis

    Published 2018-01-01
    “…We present an oven-controlled FBAR oscillator that achieves a frequency stability of +/-1.55ppm from -5°C to 85°C. …”
    Get full text
    Article
  14. 2114

    Efficient certificateless searchable encryption scheme with verifiability by Xinhua CUI, Youliang TIAN, Qijia ZHANG

    Published 2023-08-01
    “…Searchable encryption offers an effective way to achieve data privacy protection and keyword search in cloud computing environments.Currently, the existing schemes not only lack dynamic update and efficient verification mechanism, but also suffer from the certificate management burden and key escrow issue.To address these issues, a verifiable multi-keyword searchable encryption scheme based on improved Merkle-Tree had been proposed recently.However, through cryptoanalysis, that scheme could not achieve the indistinguishability.With improvement, an efficient able certificateless searchable encryption scheme with verifiability was proposed.Rigorous analysis show that the proposed scheme not only supports the indistinguishability and the unforgeability, but also enjoys higher computing efficiency and lower communication cost, which is more suitable for terminal devices with limited resources.…”
    Get full text
    Article
  15. 2115

    High Sensitivity Optically Pumped Quantum Magnetometer by Valentina Tiporlini, Kamal Alameh

    Published 2013-01-01
    “…Quantum magnetometers based on optical pumping can achieve sensitivity as high as what SQUID-based devices can attain. …”
    Get full text
    Article
  16. 2116

    Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services by Youngsook Lee, Juryon Paik

    Published 2014-01-01
    “…An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. …”
    Get full text
    Article
  17. 2117

    Combination strategy of active learning for hyperspectral images classification by Ying CUI, Kai XU, Zhongjun LU, Shubin LIU, Liguo WANG

    Published 2018-04-01
    “…In order to improve the phenomena of jitter and instability of the traditional active learning single strategy algorithm in selecting the most valuable unlabeled samples.The idea of weighted combination of ensemble learning classifier and proposes a joint selection based on the combination strategy method (ESAL,ensemble strategy active learning) was introduced,the combination of the model was extended to the combination of the strategy so as to achieve the fusion of multiple strategies in a single model and achieve higher stability.By analyzing the classification results of hyperspectral remote sensing images,the ESAL algorithm can save 25.4% of the cost compared with the single strategy algorithm and reduce the jitter frequency to 16.67% when the same accuracy threshold is obtained,and the jitter is obviously improved.ESAL algorithm is out of good stability.…”
    Get full text
    Article
  18. 2118

    A Fine-Grained Mobile Data Security Model by Yubin Yang, Liming Cheng

    Published 2014-01-01
    “…A kind of fine-grained security model for mobile data was proposed, tagged the mobile data and mobile applications in the intelligent terminal and the mobile access gateway/server, to control the operation of mobile data, and achieve the purpose of mobile data security isolation. …”
    Get full text
    Article
  19. 2119

    The role of pH in symptomatic relief and effective treatment of gastroesophageal reflux disease by Anita Gąsiorowska

    Published 2017-12-01
    “…Mucosal healing was achieved in most of patients who received different types of proton pump inhibitors, but only in 50% of those who received H2 blockers. …”
    Get full text
    Article
  20. 2120

    Stepped impedance patch antenna for sub-6GHz 5G range by Hamza Becirspahic, Sehabeddin Taha Imeci

    Published 2023-10-01
    “…The goal of the research is achieved and presented in this paper. …”
    Get full text
    Article