Showing 4,481 - 4,500 results of 4,802 for search 'complex have problems', query time: 0.17s Refine Results
  1. 4481

    Non-recours aux droits et précarisations en Région bruxelloise by Laurence Noël

    Published 2021-05-01
    “…The Brussels Region in particular is confronted with the problem for several fundamental social rights. Analyses of individual situations, people's pathways and legal developments have shown specificities according to the benefits. …”
    Get full text
    Article
  2. 4482

    Non-take-up of rights and precariousness in the Brussels Region by Laurence Noël

    Published 2021-05-01
    “…The Brussels Region in particular is confronted with the problem for several fundamental social rights. Analyses of individual situations, people's pathways and legal developments have shown specificities according to the benefits. …”
    Get full text
    Article
  3. 4483

    THE ROLE OF GENITAL TUBERCULOSIS IN THE STRUCTURE OF INFERTILITY by A. A. Abashidze, V. F. Arakelyan

    Published 2016-06-01
    “…Many years the patient can have only one complaint – infertility. The relevance of genital tuberculosis modern diagnostics is determined by the mismatch objective of increasing the prevalence of pulmonary tuberculosis and subjective low prevalence of urogenital tuberculosis associated with the complexity of its detection and treatment outcomes. …”
    Get full text
    Article
  4. 4484

    Modern Approaches in Management of Children with Cystic fibrosis by Alexander A. Baranov, Leyla S. Namazova-Baranova, Sergey I. Kutsev, Sergey N. Avdeev, Elena V. Polevichenko, Andrey S. Belevskiy, Elena I. Kondratyeva, Olga I. Simonova, Nataliya Yu. Kashirskaya, Victoria D. Sherman, Anna Yu. Voronkova, Evgeniya L. Amelina, Tatyana E. Gembitskaya, Stanislav A. Krasovskiy, Alexey G. Chermenskiy, Tatyana A. Stepanenko, Liliia R. Selimzyanova, Elena A. Vishneva, Yulia V. Gorinova, Elena A. Roslavtseva, Irina K. Asherova, Natalya A. Ilyenkova, Sergey K. Zyryanov, Niso D. Odinayeva, Tatyana Yu. Maksimycheva, Alexander V. Orlov, Sergey Yu. Semykin, Marina Yu. Chernukha, Igor A. Shaginyan, Lusine R. Avetisyan, Galina L. Shumkova, Natalya A. Krylova, Ivan A. Dronov, Maria N. Kostyleva, Ludmila A. Zhelenina, Nikolay N. Klimko, Yuliya V. Borzova, Natalya V. Vasilyeva, Tatyana S. Bogomolova, Anna A. Speranskaya, Irina A. Baranova, Evgeny G. Furman, Vera V. Shadrina, Nikolay F. Shchapov, Nika V. Petrova, Ivan V. Pashkov, Olga M. Tsirulnikova, Dmitriy P. Polyakov, Valeriy M. Svistushkin, Eduard V. Sin'kov, Vyacheslav B. Chernykh, Svetlana A. Repina, Dmitriy A. Blagovidov, Mikhail P. Kostinov, Olga V. Kondratenko, Artem V. Lyamin, Svetlana V. Polikarpova, Alexander V. Polyakov, Tagui A. Adyan, Dmitry V. Goldshtein, Tatiana B. Bukharova, Anna S. Efremova, Elena S. Ovsyankina, Ludmila V. Panova, Irina V. Cherkashina

    Published 2022-05-01
    “…The problem of timely diagnosis and proper management of patients with cystic fibrosis is crucial not only in our country, but throughout the world. …”
    Get full text
    Article
  5. 4485

    Intelligent detection method on network malicious traffic based on sample enhancement by Tieming CHEN, Chengqiang JIN, Mingqi LYU, Tiantian ZHU

    Published 2020-06-01
    “…To address the problem that the existing methods of network traffic anomaly detection not only need a large number of training sets,but also have poor generalization ability,an intelligent detection method on network malicious traffic based on sample enhancement was proposed.The key words were extracted from the training set and the sample of the training set was enhanced based on the strategy of key word avoidance,and the ability for the method to extract the text features from the training set was improved.The experimental results show that,the accuracy of network traffic anomaly detection model and cross dataset can be significantly improved by small training set.Compared with other methods,the proposed method can reduce the computational complexity and achieve better detection ability.…”
    Get full text
    Article
  6. 4486

    Hybrid Obfuscation Using Signals and Encryption by Bahare Hashemzade, Ali Maroosi

    Published 2018-01-01
    “…Hence, the outlines of the obfuscation problem and its various methods have been studied in this article. …”
    Get full text
    Article
  7. 4487

    An analysis on the revoking mechanisms for JSON Web Tokens by László Viktor Jánoky, János Levendovszky, Péter Ekler

    Published 2018-09-01
    “…Token invalidation presently takes a considerable processing overhead or a drastically increased architectural complexity. Solving this problem without losing the main benefits of JSON Web Tokens still remains an open challenge which will be addressed in the article. …”
    Get full text
    Article
  8. 4488

    A similarity-based multi-objective test optimization technique using search algorithm by Amir Sohail Habib, Saif Ur Rehman Khan, Shahid Hussain, Naseem Ibrahim, Habib un Nisa, Abdullah Yousafzai

    Published 2024-12-01
    “…Problem:: However, regression testing becomes prohibitively expensive as the software grows in complexity and the size of the test suite also expands. …”
    Get full text
    Article
  9. 4489

    Improved quantum algorithm for calculating eigenvalues of differential operators and its application to estimating the decay rate of the perturbation distribution tail in stochasti... by Koichi Miyamoto, Yuichiro Tada

    Published 2025-06-01
    “…A common approach for this eigenvalue problem involves applying the finite-difference discretization to L and computing the eigenvalues of the resulting matrix, but this method suffers from the curse of dimensionality, namely, the exponential complexity with respect to d. …”
    Get full text
    Article
  10. 4490

    Joint Antenna Selection and Precoding Optimization for Small-Cell Network with Minimum Power Consumption by Qiang Sun, Xin Wang, Jue Wang, Chen Xu

    Published 2017-01-01
    “…Finally, simulation results demonstrate that our proposed suboptimal algorithm is very effective on power consumption minimization, with significantly reduced backhaul burden and computational complexity. Moreover, we show that our optimization algorithms with DCAS have less power consumption than the other benchmark algorithms.…”
    Get full text
    Article
  11. 4491

    CHALLENGES OF APPLICATION AND INTERPRETATION OF REGULATIONS IN THE PRACTICE OF MISDEMEANOR COURTS by Mladen Jeličić

    Published 2021-11-01
    “… The author analyzes the always current issue of application and interpretation of regulations in the practice of misdemeanor courts. The scope and complexity of the matter in which misdemeanor courts act is pointed out, but also the fact that shortcomings in the regulation of regulations represent a major problem in court practice. …”
    Get full text
    Article
  12. 4492

    КАЧЕСТВЕННОЕ ОБРАЗОВАНИЕ – ДЕТЕРМИНАНТА ПРИРОСТА ИНТЕЛЛЕКТУАЛЬНОГО ПОТЕНЦИАЛА СТРАНЫ by I. A. Vasilyev

    Published 2015-03-01
    “…The research findings emphasize the complexity of problem solving related to fostering the country’s intellectual potential, and the need for informal and systematic quality control. …”
    Get full text
    Article
  13. 4493

    Data Inconsistency Evaluation for Cyberphysical System by Hao Wang, Jianzhong Li, Hong Gao

    Published 2016-07-01
    “…Firstly, we give a sufficient analysis on the complexity and inapproximability of minimum culprit problem. …”
    Get full text
    Article
  14. 4494

    Multi-modal prediction of breast cancer using particle swarm optimization with non-dominating sorting by Vijayalakshmi S, John A, Sunder R, Senthilkumar Mohan, Sweta Bhattacharya, Rajesh Kaluri, Guang Feng, Usman Tariq

    Published 2020-11-01
    “…Various scientific studies have been conducted to combat this disease, and machine learning approaches have been an extremely popular choice. …”
    Get full text
    Article
  15. 4495

    ON THE THIN PRACTICAL RATIONALITY AND ITS THICKENINGS by Zenonas Norkus

    Published 1998-01-01
    “…This theory is unique having two ways of application: as the empirical theory and as the normative one. …”
    Get full text
    Article
  16. 4496

    ON THE THIN PRACTICAL RATIONALITY AND ITS THICKENINGS by Zenonas Norkus

    Published 1998-01-01
    “…This theory is unique having two ways of application: as the empirical theory and as the normative one. …”
    Get full text
    Article
  17. 4497

    ON THE THIN PRACTICAL RATIONALITY AND ITS THICKENINGS by Zenonas Norkus

    Published 1998-01-01
    “…This theory is unique having two ways of application: as the empirical theory and as the normative one. …”
    Get full text
    Article
  18. 4498

    ON THE THIN PRACTICAL RATIONALITY AND ITS THICKENINGS by Zenonas Norkus

    Published 1998-01-01
    “…This theory is unique having two ways of application: as the empirical theory and as the normative one. …”
    Get full text
    Article
  19. 4499

    Improving health-promoting workplaces through interdisciplinary approaches. The example of WISEWORK-C, a cluster of five work and health projects within Horizon-Europe by Deborah De Moortel, Michelle C Turner, Ella Arensman, Alex Binh Vinh Duc Nguyen, Víctor Gonzalez

    Published 2025-07-01
    “…In contrast, supportive work environments—characterized by ergonomic design, good environmental quality, and worker autonomy—have been shown to improve well-being, productivity, and job satisfaction (4). …”
    Get full text
    Article
  20. 4500

    A Rank-Two Feasible Direction Algorithm for the Binary Quadratic Programming by Xuewen Mu, Yaling Zhang

    Published 2013-01-01
    “…At last, we report some numerical examples to compare our algorithm with randomized algorithm based on the interior point method and the feasible direction algorithm on max-cut problem. Simulation results have shown that our method is faster than the other two methods.…”
    Get full text
    Article