Showing 9,081 - 9,100 results of 23,900 for search 'Axact~', query time: 1.85s Refine Results
  1. 9081

    L’évaluation, un outil de l’ergonome pour transformer le contexte d’intervention by Aurélie Landry, Arnaud Tran Van

    Published 2010-05-01
    “…By communicating intervention process indicators with the other stakeholders, the ergonomist changes the context in which he acts during the intervention. By also using result indicators, the ergonomist can show the contribution of the intervention and attempt to better adapt his methods, considering the advantages or obstacles present in the context of the intervention.…”
    Get full text
    Article
  2. 9082

    University libraries and the indispensable changes in Medical Sciences by Maria Elinor Dulzaides Iglesias, Ana Maria Molina Gomez, Yuniet Rojas Mesa

    Published 2009-03-01
    “…We discuss the new challenges in information and knowledge management and conditions in Medical Science field to adapt traditional methods to the new environment. …”
    Get full text
    Article
  3. 9083

    Object-field. The multi-resolution study of topological optimization by Samuel Bernier-Lavigne

    Published 2020-06-01
    “…We believe that a solution to this limit lies in a change of scale in the design method, with multi-resolution systems, where each grain of matter can adapt to the structural information present at the macro scale. …”
    Get full text
    Article
  4. 9084

    Dynamic situation gateway based system cooperation access gatel model by Shu-hang GUO, Yu ZHANG

    Published 2013-08-01
    “…In order to adapt the centralized access control between the application system subject and object in the envi-ronment of network configurations, a dynamic situation based system cooperation access gatel model — DSGAC was proposed. …”
    Get full text
    Article
  5. 9085

    SOCIAL TECHNOLOGY OF UNIVERSITY INTERACTION MANAGEMENT WITH STAKEHOLDERS AS A TOOL FOR INCREASING COMPETITIVENESS by T. Bolshunova

    Published 2019-06-01
    “…The article has been devoted to the possibilities of using an interdisciplinary approach of sociology of management to adapt the management system of an organization of high education to the challenges of the «external» and «internal» environment using the potential of the theory of stakeholders in order to harmonize interests and increase competitiveness. …”
    Get full text
    Article
  6. 9086

    Book review: Tenterfield: My happy childhood in care, by Margaret Irvine Edinburgh, Fledgling Press, 2010, 226 pp, ISBN 978-1-905916-26-9 by Irene Stevens

    Published 2011-02-01
    “…When I first saw this book, I was slightly taken aback by the tide. This personal reaction caused me co reflect a little on how residential care is represented in the wider world. …”
    Article
  7. 9087

    Faults Identification and Corrective Actions in Rotating Machinery at Rated Speed by Nicolò Bachschmid, Paolo Pennacchi

    Published 2006-01-01
    “…This paper explores the possibility to adapt this method to the situation when the vibration data are available at one rotating speed only, which in real machines is generally the normal operating speed. …”
    Get full text
    Article
  8. 9088
  9. 9089

    Development of the conceptual and terminological apparatus of warehousing logistics in the works of Russian and foreign authors by M. Yu. Uchirova, A. N. Larina

    Published 2022-07-01
    “…The main approaches to the basic concepts of warehousing logistics in the works of russian and foreign authors are considered. the peculiarities of understanding the terms “warehouse”, “warehousing”, “warehousing system” are revealed. the main historical stages of the development of warehouses and storage facilities are reflected. based on the information provided, the following key features are highlighted: the warehouse is a complex system with its own interconnections and internal processes; a modern warehouse economy should be formed according to an optimized logistics system, of which it is a part, and be able to adapt to the slightest fluctuations and changes in this system; difficulties arising in the field of building a warehousing system can be solved with the help of a competently and clearly developed warehouse model based on the application of a logistics approach and the development of an adaptive warehouse management algorithm.…”
    Get full text
    Article
  10. 9090

    Improving Inservice Teacher Workshops in Florida by Martha C. Monroe, Jenny Seitz, Shruti Agrawal, Michelle Aldridge, Sheda Morshed, Elizabeth Swiman, Vicki Crisp

    Published 2005-12-01
    “…Project Learning Tree (PLT) workshops are used as an example of how nonformal education facilitators could adapt their workshops to better address the new professional development system. …”
    Get full text
    Article
  11. 9091

    « Mauvaise fatigue » et contrôle de soi : une approche sociohistorique by Marc Loriol

    Published 2002-05-01
    “…New pathological categories emerged, ranging from acedia to chronic fatigue syndrome, to give a socially recognized meaning to this new form of fatigue experienced by individuals who found it difficult to adapt to the new requirements, and often to convey a sense of normality. …”
    Get full text
    Article
  12. 9092

    Aide-toi, la viralité t’aidera. Ou de la création et diffusion des proverbes dans les médias by Vincenzo Lambertini

    Published 2024-12-01
    “…This study will show not only that virality and proverbs share many features, but also that proverbs can adapt to new realities (which may allow them to evolve in the future without disappearing). …”
    Get full text
    Article
  13. 9093

    Efficient ID-based multicast authentication protocol in wireless sensor networks by WANG Gang1, WEN Tao1, GUO Quan2, MA Xue-bin1

    Published 2009-01-01
    “…In order to overcome the drawback of the existent multicast authentication protocol in WSN,the PKC-based services for WSN was explored and an efficient ID-based multicast authentication protocol was presented.The protocol with message recovery provided the feature that the message was recoverable from the signature and hence the computa-tional cost and communication overhead of the protocol had been reduced greatly.This protocol was proved secure against existential forgery under adaptive chosen message and ID attack in the random oracle model.The performance analysis results show that the proposed scheme can effectively reduce resource cost,adapt the characteristics of WSN and is clearly superior to the HESS,Zhang and BLS protocols.…”
    Get full text
    Article
  14. 9094

    Traffic identification of network business based on multi-layer cascade algorithm by Feng HUANG, Yao WANG, Li HUANG, Jiming YAO, Shidong LIU

    Published 2015-12-01
    “…The contradiction between traffic demand and network bandwidth is the main problem of the current network.Traffic management is one of the effective solutions,at the same time it can improve the quality of service of the network,and network traffic identification is the basis of fine traffic management.The traffic identification method of network business based on multi-layer cascade algorithm was proposed,after the research of network traffic identification and machine learning techniques.This method can adapt to the situation of the complex network traffic flow,and can balance the contradiction between the time performance and the accuracy of the machine learning algorithm.Furthermore the cascade algorithm of this method takes the cost imbalance into account,and takes more attention to the identification of important business,so it can help enhance user experience.…”
    Get full text
    Article
  15. 9095

    Gentrification in the Global South: new insights from Chinese Studies by Haotian Guan, Huhua Cao

    Published 2020-11-01
    “…However, the challenges of studying gentrification in any country are to transfer and adapt the broad paradigm that could capture the complexities of local conditions. …”
    Get full text
    Article
  16. 9096

    Les Temps des territoires. Introduction du dossier thématique by Céline Clauzel, Jean Gardin, Catherine Carré, Anne Sourdril, Rhoda Fofack

    Published 2018-06-01
    “…It discusses notably the recurrent use of reference conditions to conduct a project, or the injunction to adapt to climate change. These papers examine the meaning that inhabitants and actors give to the territories trajectories and the resulting retrospective or prospective constructions. …”
    Get full text
    Article
  17. 9097

    6G endogenous security:architecture and key technologies by Yang LIU, Mugen PENG

    Published 2020-01-01
    “…At the beginning of design for the traditional mobile communication systems,security is considered as an independent technology,relying on “patch” and “plug-in” to realize the security protection of wireless communica-tion.The sixth-generation (6G) mobile communication system is designed based on software-defined slicing platform,edge computing,artificial intelligence and big data mining to adapt to different application scenarios and performance objectives,making the traditional network security mechanisms difficult to guarantee 6G's requirements for embed-ded security.6G endogenous security was proposed,the architecture and key technologies of 6G endogenous security were described,the security threats in the new technologies were discussed which 6G would adopt,and the chal-lenges and future research directions of 6G endogenous security were provided.…”
    Get full text
    Article
  18. 9098
  19. 9099
  20. 9100