Suggested Topics within your search.
Suggested Topics within your search.
- Leadership 4
- Management 4
- Executive ability 3
- Methodology 3
- Common law 2
- History 2
- Interpretation and construction 2
- Law 2
- African Americans 1
- Business and Management 1
- Character 1
- Communication 1
- Corporate culture 1
- Courtship 1
- Decision making 1
- Evaluation 1
- Executive coaching 1
- Farmers 1
- Financial services industry 1
- Führung 1
- Integrity 1
- Internet marketing 1
- Organizational change 1
- Policy sciences 1
- Political planning 1
- Quality control 1
- Quantitative research 1
- Research 1
- Six sigma (Quality control standard) 1
- Social justice 1
-
2721
Understanding enablers and barriers in Indonesia’s noncommunicable disease program: A qualitative study from nurses’ perspectives
Published 2024-12-01“…Conversely, three main challenges were identified: (1) resource constraints that hinder program execution, (2) timing conflicts affecting participant engagement, and (3) data entry bottlenecks that complicate monitoring and evaluation. …”
Get full text
Article -
2722
An analysis of urban governance based on providing an optimal model (Case study of Garmadreh city)
Published 2021-12-01“…From the results of the first part, 4 basic effective indicators in the implementation of urban governance in the study area have been studied. In the executive level of Garmadreh city, in the field of accountability index of weakness factor in continuous and public supervision with an average rank of 5.38, in the index of rule of law rule, there are multiple, parallel, interpretable and sometimes contradictory laws with an average rank of 3.73, in the transparency index of factor of lack of access to information 4.56 And in the participation index, the factor of intense centralism and top-down management with an average rank of 4.48 have the greatest impact on the lack of proper implementation of urban governance in the city of Garmadreh.…”
Get full text
Article -
2723
Survey of software anomaly detection based on deception
Published 2022-02-01“…Advanced persistent threats (APT) will use vulnerabilities to automatically load attack code and hide attack behavior, and exploits code reuse to bypass the non-executable stack & heap protection, which is an essential threat to network security.Traditional control flow integrity and address space randomization technologies have effectively prevented the pace of APT.However, the complexity of the software and the evolution of attacks make the software still being vulnerable.For this reason, deception defense with resources as bait is an indispensable supplement for network security.The trapping mechanism consists of bait design and attack detection, which infer possible unauthorized access or malicious attacks by sensing the interaction behavior with the bait.According to the three types of bait, which are file, data and code, the automatic construction scheme of bait is designed and deployed, and the effectiveness of bait is measured from the aspects of believability, detectability and enticement, etc.Ransom ware detection based on deception defense focuses on the deployment location of bait files, and in the area of vulnerability detection, code reuse attacks are detected by injecting bait code.Research work related to the implementation of deception defense in each phase of APT attacks was introduced, and the mechanism of deception defense from bait type, bait generation, bait deployment, and bait measurement was described.Simultaneously, deception defense applications in ransom ware detection, vulnerability detection, and Web security were analyzed.In response to the shortcomings of existing ransom ware detection research in terms of bait file design and deployment, a dynamic update method of bait for ransom ware detection was proposed.The deception defense challenges were discussed and hoped that deception defense can provide theoretical and technical support for discovering unknown attacks and attack attribution.…”
Get full text
Article -
2724
Molecular Circuits of Resolution in the Eye
Published 2010-01-01“…., LXA4), which are an integral component for the successful execution of beneficial and essential acute inflammatory responses. …”
Get full text
Article -
2725
Building trustful relationships through intrapreneurship in Academic Development
Published 2025-01-01“…We argue, however, that efforts to achieve more robustly trustful relationships between Academic Developers and the communities they serve require investment, buy-in and championing by senior executive teams to ensure Academic Developers are themselves appropriately developed to fulfil their potential. …”
Get full text
Article -
2726
Bolsonaro’s ‘Anti-Diplomacy'
Published 2022-07-01“…To strengthen his positions, the president appeals to the population, looks for support in the Parliament and pushes through an administrative bill aimed at making the president more autonomous in managing the executive branch structures.The appearance of the “right-wing” president and powerful influence of the conservative military stem from the economic and political crisis in Brazil, and Bolsonaro’s “special” governance style fits a worldwide trend of populism and active politics coverage in social networks.…”
Get full text
Article -
2727
Advances in Surface Plasmon Resonance-Based Biosensor Technologies for Cancer Cell Detection
Published 2022-01-01“…The titanium disilicide (TiSi2) nanosheet is placed in between silver (Ag) and black phosphorus (BP) films in the Kretschmann arrangement. This biosensor executes better over a wide range of refractive index variations, including biological cell distribution in individual blood. …”
Get full text
Article -
2728
INTEGRITY WHISTLEBLOWERS IN THE ROMANIAN LEGAL SYSTEM
Published 2024-05-01“…A law itself gives the appearance of a safety instrument for situations in which an official public or contract employee intends to refuse the execution of an order that he considers illegal. Although this provision is theoretically included in the legislation, any employee who does not fulfils an order outside of legality was subject to a series of unsustainable behaviors that resulted in removal or withdrawal from the system. …”
Get full text
Article -
2729
Two-party cooperative blind signature based on SM2
Published 2022-12-01“…SM2, issued by China in 2010, is a public key cryptography standard based on elliptic curves.It has been widely used in finance, social security and other fields thanks to its advantages of improved signature efficiency, decreased storage space and computing complexity than RSA.With the popularization and application of SM2, the issues of its key security and data privacy are of great concern.The single-key mode inhibits the potential application in multi-user settings, and the leakage of the key will threaten the security of the entire cryptosystem due to the centralization.The problem of secure storage and reasonable utilization of keys needs to be solved urgently.In addition, the SM2 digital signature algorithm cannot guarantee the message privacy.Aiming at the issues of key security and data privacy of the signature algorithm, many researchers have proposed the idea of cooperative signature and blind signature for SM2.However, there isn’t SM2 collaborative blind signature scheme proposed.Then a two-party cooperative blind signing protocol based on SM2 was proposed in this paper, which allowed two parties to sign except the user.The signing process did not require recovering the complete private key, while not revealing the information of the partial private key and secret number.The key was stored separately to improve the security of the key, while the blind signature protected the privacy of the message.In terms of security, the protocol satisfied unforgeability and unlinkability.The protocol was implemented using C to demonstrate the efficiency of each participant’s local operation.In the honest model, the time cost of each entity in the cooperative signature phase was similar as that of executing a lightweight SM2 blind signature.Overall, the proposed protocol has certain advantages in terms of function and efficiency.…”
Get full text
Article -
2730
Sociological portrait of the higher bureaucracy in Russia
Published 2024-12-01“…The predictor variables describe personal characteristics of senior executives and the mode of their recruitment. The author tested two hypotheses about the predominance of one of two higher bureaucrats’ recruitment models: patrimonial (political, patronage) or meritorious; the second model seems to prevail. …”
Get full text
Article -
2731
Implementasi kebijakan pelayanan angkutan laut perintis di pelabuhan kelas II teluk palu propinsi Sulawesi Tengah
Published 2024-11-01“…The results of the research showed that: (1) communication to socialize the maritime transportation services of pioneer ships in hammer bay ports is still not maximized; (2) resources in terms of human resources and means are optimum, but budget (financial) and Prasarana resources are not sufficient; (3) dispositions on implementation are well running in connection with the appointment of the Commitment Maker Office (PPK) including incentives; (4) bureaucratic structures are still ineffective in relation to the mechanisms of implementation of the marine transportation service of the pioneers that have not been followed up by creating a Standard Operation Procedures (SOPs) and on the execution of the established shipping route is not appropriate and the time of sail in 1 (one) voyage is too long. …”
Get full text
Article -
2732
Anies Baswedan-Muhaimin Iskandar Campaign Communication Strategy in the 2024 Presidential Election: Case Study of the “Ubah Bareng” Movement
Published 2024-09-01“…This relation allows Ubah Bareng to operates independently from the official campaign structure while playing pivotal role in designing and executing campaign strategies. This study further identifies Ubah Bareng’s mixed use of pre-modern and post-modern campaign as its main strategy while its hub model represents a new phenomenon that can prevent fragmentation within electoral volunteer movements. …”
Get full text
Article -
2733
Self-trainable and adaptive sensor intelligence for selective data generation
Published 2025-01-01“…Through a sequential training and execution process, the framework achieves continuous adaptability without prior knowledge of the deployment environment. …”
Get full text
Article -
2734
Are Anthropometric Measures, Range of Motion, or Movement Control Tests Associated with Lumbopelvic Flexion during Barbell Back Squats?
Published 2024-09-01“… # Purpose The aim of the study was to investigate the association among anthropometric measurements, range of motion in the hips and ankle joints, lumbopelvic movement control tests, and flexion of the lumbopelvic region during execution of the BBS. # Study design Observational, cross sectional…”
Get full text
Article -
2735
Kinematic and Dynamic Characteristics of the Free-Floating Space Manipulator with Free-Swinging Joint Failure
Published 2019-01-01“…Finally, simulation experiments are carried out to verify the existence and correctness of the first-order and second-order nonholonomic constraints and display task execution effects of the space manipulator. This research analyzes the kinematic and dynamic characteristics of the free-floating space manipulator with free-swinging joint failure for the first time. …”
Get full text
Article -
2736
De la logique à l’algorithme : la traduction dans le design de programmes
Published 2022-07-01“…This layering allows the machine to execute the program while simultaneously making it difficult for the end user to understand the machine-based logic, which would be equivalent to a noisy translation resulting in an unintelligible language. …”
Get full text
Article -
2737
Security protection method based on mimic defense and Paillier encryption for smart IoT terminals
Published 2024-12-01“…During data encryption, it employed blind factor technology to execute a blind signature, rendering ciphertext information indecipherable even if an attacker obtained access to the decryption key of the Paillier encryption algorithm. …”
Get full text
Article -
2738
The Spiralling of Corporate Corruption and the Plummeting of Corporate Governance and Ethical Leadership in African Institutions
Published 2024-09-01“…The conceptual, strategic model provided by this study may be selected and used by African leaders, authorities, boards of directors, shareholders, and Chief Executive Officers (CEOs), as a tool to address corruption in African organizations and institutions. …”
Get full text
Article -
2739
Learning-based page replacement scheme for efficient I/O processing
Published 2025-02-01“…We compare the performance of LPR against existing page replacement policies using metrics such as miss ratio and execution time. Experimental results demonstrate that our scheme effectively detects changes in memory access patterns and manages page replacement online using the best-fit policy with minimal overhead.…”
Get full text
Article -
2740
Ken Livingstone : The Thorn in (New) Labour’s Side
Published 2014-12-01“…Had they realised that the post of executive mayor was almost tailor made for “red” Kenneth Livingstone, they would most certainly have had second thoughts.…”
Get full text
Article