Suggested Topics within your search.
Suggested Topics within your search.
- Appreciation 2
- Experimental fiction 2
- History and criticism 2
- Swahili fiction 2
- Swahili literature 2
- Themes, motives 2
- Academic achievement 1
- Behavior modification 1
- Classroom management 1
- Connecting with others 1
- Domestic relations 1
- Economic conditions 1
- Education and state 1
- Education, Humanistic 1
- Fiction 1
- Genocide (International law) 1
- Inclusive education 1
- International criminal law 1
- Knowing yourself 1
- LAW / International 1
- Microbiology 1
- Motivation in education 1
- Neoliberalism 1
- Politicians 1
- Sex role 1
- Social conditions 1
- Social skills 1
- Study and teaching 1
- Teenage girls 1
- Torts 1
-
2101
Implementation of Selected Sustainable Development Objectives in European Union Countries
Published 2017-12-01“…It was found, that European Union countries generally strive towards achieving those goals, though the effectiveness differs among them. …”
Get full text
Article -
2102
A study of value iteration and policy iteration for Markov decision processes in Deterministic systems
Published 2024-11-01“…Finally, a detailed example demonstrates the conditions under which convergence of the algorithm is achieved, underscoring the practicality of these methods in deterministic settings.…”
Get full text
Article -
2103
All-Optical 1-to-8 Wavelength Multicasting at 20 Gbit/s Exploiting Self-Phase Modulation in Dispersion Flattened Highly Nonlinear Photonic Crystal Fiber
Published 2014-01-01“…The results show our designed scheme achieve operation wavelength range of 25 nm, OSNR of 32.01 dB and Q factor of 12.8. …”
Get full text
Article -
2104
Inclusion of Diverse Learners in the Educational System
Published 2013-10-01“…Forms of diversity such as socioeconomic status, ethnicity/race, learning style, cognitive ability, gender, and ability to process and store knowledge can cause an “achievement gap” between students. This 4-page fact sheet highlights effective educational strategies for engaging students in the learning environment and assisting in closing achievement gaps. …”
Get full text
Article -
2105
The Role of Resource Management on MSMEs Financial Performance: Supporting SDG 8 - Decent Work and Economic Growth
Published 2025-01-01“…This research examines that resource management is an element of MSMEs financial performance, closely tied to achieving sustainable economic growth as outlined in SDG 8. …”
Get full text
Article -
2106
Heterogeneous resource cooperative game in space-ground computing power network
Published 2023-12-01“…To deal with the resource competition among satellites in the multi-satellite space-ground computing network, a space-ground heterogeneous resource cooperative game mechanism was designed in terms of the computing and spectrum domains.Each satellite published a computing task which was independent of other tasks and relied on UE to generate raw data.By competing the resources of user terminals and UE, the task offloading and processing was achieved.To provide real-time data services, a distributed scheme was proposed based on multi-agent reinforcement learning to coordinate the computing and spectrum resource competition among satellites, thereby minimizing the system latency.Simulation results indicated that, compared with the existing schemes, the proposed algorithm achieves a lower system latency by fully utilizing the computing and spectrum resources and coordinating the resource competition.…”
Get full text
Article -
2107
Implementation of shared file encrypted storage hierarchical access control scheme
Published 2016-07-01“…The traditional file sharing way is single,lack of security,and the shared file's permission autonomous control is too high.To solve these problems,a file encrypted storage and hierarchical access control scheme was proposed.Through increasing classification management unit in the system,classification of users and documents,users of file access control were achieved,the scope of file access control was realized.Security of file storage and transmission was realized through encryption,the key storage was simplified using hierarchical key.Server file en-cryption and decryption operations were achieved through a special password card,which reduced the server work-load and accelerated the file encryption and decryption processing.The scheme was verified on PC and Zynq plat-form,and the predetermined function was realized.…”
Get full text
Article -
2108
Communication Skills
Published 2016-06-01“…A key role in the formation, functioning and development of modern social organization plays communication, as a basis to establish, maintain and develop constructive relationships, connections and interactions that ensure consistent and effective achievement of personal, group and social goals. The ability to install, functionally diversify and expand communication in and outside the organization, largely determined by the skill level of the leader, determined, first of all, by business and personal qualities of constructive interactive leader. …”
Get full text
Article -
2109
Ensuring the Implementation of the Principle of Gender Equality De Jure and De Facto: the Experience of the Countries of the European Union
Published 2020-06-01“…Achieving equal rights and opportunities for men and women is an integral part of ensuring human rights. …”
Get full text
Article -
2110
DDNS + gateway separation method for interconnect of distributed data center
Published 2013-09-01“…The multi-campus university distributed data centers interconnected problems existing in the traditional gateway were analyzed and based on RHI + gateway unilateral separation methods on the Internet,a DDNS + gateway interconnection separation idea to front-end technology was proposed to achieve business traffic sites DDNS selection,using the device with the VMware SLB to achieve uninterrupted user access.In a lab environment,online or new on-line users drifting around in a virtual machine can fast access to the data center to the same kind of business,suitable for the business flow,IP planning complex continuous demanding scenarios.The interconnection method must increase DDNS equipments in the data center edge,hanging the SLB device next to the switch side of data centers in both places.…”
Get full text
Article -
2111
Performance analysis of multi-relay DF cooperative communication system based on directional antenna
Published 2016-06-01“…In order to achieve reliable communication in multi-relay cooperative communication,the directional antenna combining multi-relay cooperative communication system and optimal relay selection decode-and-forward cooperative strategy was presented.Firstly,the theoretical closed form of outage probability of the communication system using directional antenna operating in the three modes of DT-DR,DT-OR and OT-OR were presented.Then for three kinds mode,the collaboration communication system interrupt probability and signal-to-noise ratio,the number of relay nodes,the antenna gain channel fading efficiency and relationship between the channel capacity were analyzed in numerical simulation.These findings reveal that excellent performance of cooperative communication system with directional antennas could be achieved such as smaller outage probability and improved by best relay nodes and optimal power allocation coefficient.…”
Get full text
Article -
2112
A Case of Metastatic Adamantinoma That Responded Well to Sunitinib
Published 2016-01-01“…He received carboplatin and etoposide for 7 months and achieved a partial response. Four months later, PET scan showed disease progression. …”
Get full text
Article -
2113
A ± 1.55ppm Stable FBAR Reference Clock with Oven-Controlled Temperature Compensation
Published 2018-01-01“…We present an oven-controlled FBAR oscillator that achieves a frequency stability of +/-1.55ppm from -5°C to 85°C. …”
Get full text
Article -
2114
Efficient certificateless searchable encryption scheme with verifiability
Published 2023-08-01“…Searchable encryption offers an effective way to achieve data privacy protection and keyword search in cloud computing environments.Currently, the existing schemes not only lack dynamic update and efficient verification mechanism, but also suffer from the certificate management burden and key escrow issue.To address these issues, a verifiable multi-keyword searchable encryption scheme based on improved Merkle-Tree had been proposed recently.However, through cryptoanalysis, that scheme could not achieve the indistinguishability.With improvement, an efficient able certificateless searchable encryption scheme with verifiability was proposed.Rigorous analysis show that the proposed scheme not only supports the indistinguishability and the unforgeability, but also enjoys higher computing efficiency and lower communication cost, which is more suitable for terminal devices with limited resources.…”
Get full text
Article -
2115
High Sensitivity Optically Pumped Quantum Magnetometer
Published 2013-01-01“…Quantum magnetometers based on optical pumping can achieve sensitivity as high as what SQUID-based devices can attain. …”
Get full text
Article -
2116
Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services
Published 2014-01-01“…An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. …”
Get full text
Article -
2117
Combination strategy of active learning for hyperspectral images classification
Published 2018-04-01“…In order to improve the phenomena of jitter and instability of the traditional active learning single strategy algorithm in selecting the most valuable unlabeled samples.The idea of weighted combination of ensemble learning classifier and proposes a joint selection based on the combination strategy method (ESAL,ensemble strategy active learning) was introduced,the combination of the model was extended to the combination of the strategy so as to achieve the fusion of multiple strategies in a single model and achieve higher stability.By analyzing the classification results of hyperspectral remote sensing images,the ESAL algorithm can save 25.4% of the cost compared with the single strategy algorithm and reduce the jitter frequency to 16.67% when the same accuracy threshold is obtained,and the jitter is obviously improved.ESAL algorithm is out of good stability.…”
Get full text
Article -
2118
A Fine-Grained Mobile Data Security Model
Published 2014-01-01“…A kind of fine-grained security model for mobile data was proposed, tagged the mobile data and mobile applications in the intelligent terminal and the mobile access gateway/server, to control the operation of mobile data, and achieve the purpose of mobile data security isolation. …”
Get full text
Article -
2119
The role of pH in symptomatic relief and effective treatment of gastroesophageal reflux disease
Published 2017-12-01“…Mucosal healing was achieved in most of patients who received different types of proton pump inhibitors, but only in 50% of those who received H2 blockers. …”
Get full text
Article -
2120
Stepped impedance patch antenna for sub-6GHz 5G range
Published 2023-10-01“…The goal of the research is achieved and presented in this paper. …”
Get full text
Article