Suggested Topics within your search.
Suggested Topics within your search.
- Business 14
- Management 11
- Entrepreneurship 10
- Business communication 8
- Business enterprises 8
- Business writing 6
- Computer programs 6
- New business enterprises 6
- Moral and ethical aspects 5
- Business ethics 4
- Business mathematics 4
- English language 4
- Industrial management 4
- Law and legislation 4
- Leadership 4
- Marketing 4
- kiswahili 4
- Business English 3
- Business Management 3
- Business logistics 3
- Information technology 3
- Public administration 3
- Public relations 3
- Purchasing 3
- Study and teaching 3
- Anatomy 2
- BUSINESS & ECONOMICS / General 2
- Business and Management 2
- Business management 2
- Commerce 2
-
181
Multi-source localization with binary sensor networks
Published 2011-01-01Subjects: Get full text
Article -
182
Multi-level agent architecture for war games
Published 2025-02-01“…To address this, this paper proposes a multi-level agent architecture for military strategy games based on the "Intent-Task-Action" framework, aiming to integrate various technical strengths for intelligent agent modeling in these games. …”
Get full text
Article -
183
Multi-Joint Dynamics and the Development of Movement Control
Published 2005-01-01“…One hypothesis is that the nervous system controls multi-segment limbs by simply planning in terms of these equilibrium points and trajectories. …”
Get full text
Article -
184
Recent advanced applications of metasurfaces in multi-dimensions
Published 2023-02-01“…Here, we review the recent advances of metasurfaces in multi-dimensions, including light wavelength, polarization, orbital angular momentum(OAM), and angular response. …”
Get full text
Article -
185
Fermionic steering in multi-event horizon spacetime
Published 2025-01-01“…Interestingly, we can indirectly protect quantum steering by using appropriate types of Bell states in multi-event horizon spacetime. These conclusions are helpful to guide the task of processing relativistic quantum information for quantum steering in SdS spacetime.…”
Get full text
Article -
186
Dynamic multi-keyword searchable encryption scheme
Published 2023-04-01“…Users of cloud storage often outsource their data to cloud servers to save local storage resources.However, cloud storage data is out of the user’s physical control, which may lead to malicious theft or disclosure of private data on cloud.At present, dynamic searchable encryption schemes are mostly based on symmetric searchable encryption, which need to establish a secure key sharing channel in advance, and cannot be directly applied to data sharing in cloud storage scenarios.For the secure sharing scenario of multi-party data in cloud storage, a dynamic multi-keyword searchable encryption scheme was proposed.The forward index was constructed by a cuckoo filter to enable data owners to perform documents and index dynamic updates.The conjunctive multi-keywords search was supported by combining bilinear pairing with Lagrangian interpolation polynomials.To reduce the computational overhead in the ciphertext retrieval phase, a combination of inverted index and forward index was constructed to improve the retrieval efficiency of cloud server.This scheme is provably secure with the indistinguishability in adaptively chosen keyword attack under decision linear Diffie-Hellman problem.Simulation experiments were conducted to analyze the execution efficiency of the scheme for keyword search and index update in different datasets.The results show that the scheme effectively avoids the linear correlation between the retrieval time and the number of ciphertexts, and reduces the computational overhead in the update operation with a large amount of data.…”
Get full text
Article -
187
-
188
Modeling the intrinsic dynamics of foot-and-mouth disease
Published 2015-12-01Subjects: Get full text
Article -
189
Fair multi-party concurrent signature scheme
Published 2014-03-01Subjects: “…multi-party concurrent signature…”
Get full text
Article -
190
Emerging technologies of single-cell multi-omics
Published 2025-02-01“…Amidst the evolving landscape of single-cell multi-omics technologies, our main objective is to guide investigators in selecting the most suitable platforms for their research needs. …”
Get full text
Article -
191
Multi‐subband fusion algorithm based on autoencoder
Published 2022-12-01“…The method uses a deep‐learning autoencoder more fully described as a multi‐subband fusion autoencoder (MSFAE). This autoencoder comprises two parts: a multi‐subband encoder and a full‐band decoder. …”
Get full text
Article -
192
Date recognition based on multi feature extraction
Published 2022-09-01“…Drug production date and expiration date are important indicators to measure the safety and effectiveness of drugs.The production date and validity period of liquid drugs in vertical bags are printed with numbers of 0~9.The recognition of the drug date of the hospital needs to meet the requirements of high speed and accuracy.The conventional template matching method and neural network recognition method have large amount of calculation and complex training.A drug date recognition method was proposed based on multi feature extraction.The combination of vertical line feature and three features for fine feature extraction of different digital characters has advantages of small amount of calculation and fast recognition speed.Compared with the recognition method of single extracted feature, it can effectively distinguish 10 different numbers, especially suitable for numbers of similar shape.It can provide patients with safe drug use guarantee, improve the management mode of the medical staff, improve the work efficiency, so as to improve the level of the pharmaceutical service of the hospital.…”
Get full text
Article -
193
-
194
Cooperative Space Analysis and Simulation of Multi Manipulator
Published 2022-02-01Subjects: “…Multi manipulator cooperative system…”
Get full text
Article -
195
Improved certificateless sequential multi-signature scheme
Published 2015-10-01Subjects: Get full text
Article -
196
Multi-Granularity User Anomalous Behavior Detection
Published 2024-12-01“…To address these challenges, this paper presents a novel approach for insider threat detection, leveraging machine learning techniques to conduct multi-granularity anomaly detection. We introduce the Multi-Granularity User Anomalous Behavior Detection (MG-UABD) system, which combines coarse-grained and fine-grained anomaly detection to improve the accuracy and effectiveness of detecting anomalous behaviors. …”
Get full text
Article -
197
-
198
Information on mouth breathing in children and adolescents’ mothers
Published 2022-12-01“…<p><strong>Background:</strong> the mouth breather syndrome is more common than it seems; most people suffer from it, but affects frequently children and adolescents.…”
Get full text
Article -
199
VETOZIM MULTI - AN INNOVATIVE SOLUTION FOR THE POULTRY INDUSTRY
Published 2024-12-01Subjects: Get full text
Article -
200