-
61
Mujeres invisibles y victimización sexual en México. El caso de la trata de mujeres en Monterrey
Published 2013-01-01Get full text
Article -
62
-
63
-
64
-
65
-
66
-
67
Examining the Gm18 and mG Modification Positions in tRNA Sequences
Published 2014-06-01Get full text
Article -
68
Análisis y propuesta de un modelo pedagógico para el aprendizaje organizacional: central hidroeléctrica de caldas-chec
Published 2014-01-01“…El objetivo principal de esta investigación es determinar cómo aprenden los trabajadores del área de Gestión Humana y Organizacional de la Central Hidroeléctrica de Caldas S.A. …”
Get full text
Article -
69
Melonworm, Diaphania hyalinata Linnaeus (Insecta: Lepidoptera: Pyralidae)
Published 2003-12-01Get full text
Article -
70
Multi-Element Composition of Honey as a Suitable Tool for Its Authenticity Analysis
Published 2015-06-01“…The principal component analysis allowed the reduction of the 27 variables to 2 principal components which explained 74% of the total variance. …”
Get full text
Article -
71
Prawno-finansowe aspekty wykorzystania w Polsce odnawialnych źródeł energii w kontekście realizacji konstytucyjnej zasady zrównoważonego rozwoju
Published 2006-12-01“…The article describes the use renewable sources of energy particularly with regard to National Energy Policy in order to achieve good ecological results, principally through the reduction of the use of Greenhouse gases.…”
Get full text
Article -
72
A Modified Fast Approximated Power Iteration Subspace Tracking Method for Space-Time Adaptive Processing
Published 2010-01-01“…By applying a modified approximated power iteration subspace tracing algorithm, the principal subspace in which the clutter-plus-interference reside is estimated. …”
Get full text
Article -
73
Incentive Contract in Supply Chain with Asymmetric Information
Published 2014-01-01“…The supply chain always appears inefficient because of the different targets of members and information asymmetry, especially when upstream enterprises not only hide information about their effort levels, but also hide information about their technology level. The paper uses principal-agent theory and the theory of regulation to design the contract to realize the maximization of principal's profit on the condition that the contract satisfies the participant and incentive conditions of agent. …”
Get full text
Article -
74
Shared Leadership in Schools: Strategies for Improving Teacher Performance
Published 2024-09-01“…The peak of performance improvement was achieved in 2023, with over 90% for most indicators. …”
Get full text
Article -
75
New remote authorization protocol for vehicle diagnosis
Published 2014-11-01“…The authorization of diagnosis principals is a critical problem in the remote fault diagnosis of vehicles.Considering the defects of the previous authorization protocol for the remote diagnosis,i.e.PVAUDS,a novel authorization protocol is proposed,named PVAUDS+.In addition to the enforcement on the security properties of PVAUDS,the bidirectional authentication and the freshness of authorization tickets for the diagnosis principals are provided.The resistance of Denial-of-Service (DoS) attack for the trusted third party is also provided.The proposed security targets are achieved through the cost increasing of requests for the resistance of DoS attack,the automatic proof of security properties with the ProVerif tool.The results of quantitative analysis show proposed protocol is practical for use.…”
Get full text
Article -
76
EMG- BASED HAND GESTURE RECOGNITION USING DEEP LEARNING AND SIGNAL-TO-IMAGE CONVERSION TOOLS
Published 2023-09-01“… In this paper, deep learning-based hand gesture recognition using surface EMG signals is presented. We use Principal component analysis (PCA) to reduce the data set. …”
Get full text
Article -
77
Fault early warning model of 4G base station out of service based on centralized monitoring data resources
Published 2016-07-01“…4G wireless base station equipment is an important link which has direct impact on information communication network customer service quality,and 4G wireless base stations out of service fault will directly block users' normal communication.Aiming at these problems,based on the centralized monitoring warning message data resources through association rule mining and time trace deduction analysis,4G base stations out of service fault short-term warning was achieved.Based on centralized monitoring equipment performance data resources,by the classification of network elements (data cleaning,feature selection,network elements clustering),index dimension reduction (grouped by cluster,principal component analysis),principal component expression and out of service fault correlation analysis,performance indicators selection and threshold analysis,4G base stations out of service fault long-term warning was achieved.The test can accurately predict the 27.8% of 4G base station equipment out of service fault next month.…”
Get full text
Article -
78
DAMAGE DETECTION OF BEAM STRUCTURE USING DERIVED SENSITIVITY BASED ON STRUCTURAL FLEXIBILITY
Published 2017-01-01“…When the first four modes are used,it is found that the principal eigenvector sensitivity and the flexibility sensitivity methods can achieve more accurate results than those obtained by the diagonal sensitivity and the unfavorable unit load distribution sensitivity techniques. …”
Get full text
Article -
79
Africa beyond Political Sovereignty
Published 2024-02-01“…It was established principally to support the achievement of independence and political freedom by African colonies during a decade that is associated with the idea of winds of change. …”
Get full text
Article -
80
Improving the quality of teachers through assessing the teacher’s performance
Published 2022-09-01“…Management activities, in addition to the principal's leadership in achieving quality schools, are the principal's primary responsibility. …”
Get full text
Article