Suggested Topics within your search.
Suggested Topics within your search.
- Leadership 4
- Management 4
- Executive ability 3
- Methodology 3
- Common law 2
- History 2
- Interpretation and construction 2
- Law 2
- African Americans 1
- Business and Management 1
- Character 1
- Communication 1
- Corporate culture 1
- Courtship 1
- Decision making 1
- Evaluation 1
- Executive coaching 1
- Farmers 1
- Financial services industry 1
- Führung 1
- Integrity 1
- Internet marketing 1
- Organizational change 1
- Policy sciences 1
- Political planning 1
- Quality control 1
- Quantitative research 1
- Research 1
- Six sigma (Quality control standard) 1
- Social justice 1
-
501
Cathodic tandem alkylation/dearomatization of heterocycles enabled by Al-facilitated carbonyl deoxygenation
Published 2025-01-01“…Our approach can be executed via two distinct paths: the aluminum (Al)-facilitated spin-center shift (SCS) path and the Al-facilitated direct deoxygenation path. …”
Get full text
Article -
502
Nepomucká sousoší v Olomouci a v Žarošicích a jejich východočeské paralely. Příspěvek k poznání barokního sochařství na Moravě
Published 2006-01-01“…John´s statue in Olomouc standing in front of the Hradisko monastery, which was executed by Josef Antonín Winterhalder. St. John of Nepomuk is presented here as the heavenly protector of all ages of human generations which are represented by three suppliants: infant, juvenile and old man. …”
Get full text
Article -
503
A Solution to Reconstruct Cross-Cut Shredded Text Documents Based on Character Recognition and Genetic Algorithm
Published 2014-01-01“…In this paper, a feature-matching algorithm based on the character recognition via establishing the database of the letters is presented, reconstructing the shredded document by row clustering, intrarow splicing, and interrow splicing. Row clustering is executed through the clustering algorithm according to the clustering vectors of the fragments. …”
Get full text
Article -
504
Blockchain-based payment channel network: challenges and recent advances
Published 2024-10-01“…Payment channel networks allow a large number of transactions to be executed off-chain, which can reduce costs and facilitate blockchain scaling while keeping assets secure. …”
Get full text
Article -
505
Marker and source-marker reprogramming of Most Permissive Boolean networks and ensembles with BoNesis
Published 2023-03-01“…Finally, we lift the reprogramming problems to ensembles of BNs, as supported by BoNesis, bringing insight on possible and universal reprogramming strategies. This paper can be executed and modified interactively. …”
Get full text
Article -
506
Antipoisoning activities in Bulgaria to enforce raptors conservation in the country
Published 2023-10-01“…The majority of the patrols were executed in the Eastern Rhodopes (80%) which is the core area of the vulture populations in Bulgaria. …”
Get full text
Article -
507
Social organizations and habitat self-management in neoliberal urban contexts
Published 2020-05-01“…This article analyzes the characteristics and effects of the execution of the Housing Self-Management Program (Law No. 341/00) in the City of Buenos Aires from the beginning of the century to the present and the historiographic course of the dispute for the centrality of the popular sectors in this policy. …”
Get full text
Article -
508
ANALYSIS OF LABORATORY TESTS FOR SEVERAL VIRAL SWINE DISEASES IN RUSSIA IN 2011–2017
Published 2018-05-01“…Retrospective analysis of laboratory diagnostics carried out in Russia for dangerous viral swine diseases demonstrated that during the last seven years (the period when the Rosselkhoznadzor orders to implement National Monitoring Plans were executed) the amount of performed tests had increased. …”
Get full text
Article -
509
Evaluation of quality of life of patients after rectal surgery
Published 2010-11-01“…Original study included results of 86 patients rectal cancer in whom the anterior rectectomy has been executed. Investigation was carried out in 3 months after intervention. …”
Get full text
Article -
510
Analyzing the 2021 Kaseya Ransomware Attack: Combined Spearphishing Through SonicWall SSLVPN Vulnerability
Published 2025-01-01“…This paper addresses the general events of the incident and the actions executed by the constituents involved. The attack was conducted through specially crafted hypertext transfer protocol (HTTP) requests to circumvent authentication and allow hackers to upload malicious payloads through Kaseya’s virtual system administrator (VSA). …”
Get full text
Article -
511
Effects of concrete strength and steel reinforcement area on the mechanical performance of functionally graded reinforced concrete beams: experimental and numerical investigation
Published 2023-07-01“…The results also approved that; higher strength in the compression zone can be used in beams with a high tensile steel ratio for decreasing compression steel as an economic side. 3D finite element was executed using ABAQUS to simulate experimental beams. …”
Get full text
Article -
512
IMSC: Instruction set architecture monitor and secure cache for protecting processor systems from undocumented instructions
Published 2022-07-01“…Abstract A secure processor requires that no secret, undocumented instructions be executed. Unfortunately, as today's processor design and supply chain are increasingly complex, undocumented instructions that can execute some specific functions can still be secretly introduced into the processor system as flaws or vulnerabilities. …”
Get full text
Article -
513
Doubt in the Legal Capacity of Smart Contract’s Parties and the Possibility of Applying the Principle of Correctness in the Assumption of Non-Qualification
Published 2024-09-01“…As one of the relatively new topics of the technology world, the smart contract has different angles and dimensions in the field of conclusion and execution, which must be analyzed from a legal perspective. …”
Get full text
Article -
514
Robust and Energy-Efficient Data Gathering in Wireless Sensor Network
Published 2014-10-01“…In REEDG, data gathering is executed by a data transmitting chain which is composed by a series of virtual grids. …”
Get full text
Article -
515
Data Transmission with Reduced Delay for Distributed Acoustic Sensors
Published 2015-11-01“…Detection by acoustic sensors can be executed periodically or randomly. As a result, each acoustic sensor generates its packets (50 bytes each) periodically or randomly over short time intervals (400 ms~4 seconds) and transmits directly to a cluster head (coordinator node). …”
Get full text
Article -
516
An Effective Privacy-Preserving Algorithm Based on Logistic Map and Rubik’s Cube Transformation
Published 2014-01-01“…In EPPA, data object is organized to be several Rubik’s cubes executed for several rounds transformation at the first phase. …”
Get full text
Article -
517
Missing Poetry: A historiography of Albanian Literature during the Communist Regime
Published 2023-12-01“…Who were the most noticeable authors and poets, and why were they set aside, censored, imprisoned, executed, and not published? The answers suggest that only thanks to political change and awareness of literature can the reader today reassess this missing part of Albanian literature in historical texts published during the communist regime. …”
Get full text
Article -
518
Research on serum na, k and inorganic p values in southern anatolian red, holstein with their first and second cros - bred
Get full text
Article -
519
Le Cycle pictural de la cour d’appel de Toulouse par Georges d’Espagnat (1942-1944) : un témoignage de la permanence d’une formule décorative
Published 2022-08-01“…Despite its prestigious setting, the modest decoration, inaugurated in 1944 executed by Georges d'Espagnat, takes on another dimension in the distance of History.At a time when the genre was disappearing, the project was supported by influential institutional figures, first and foremost President Joseph Guérin. …”
Get full text
Article -
520
FPGA multi-unit parallel optimization and implementation of post-quantum cryptography CRYSTALS-Kyber
Published 2022-02-01“…In lattice-based post-quantum cryptography, polynomial multiplication is complicated and time-consuming.In order to improve the computational efficiency of lattice cryptography in practical applications, an FPGA multi-unit parallel optimization and implementation of post-quantum cryptography CRYSTALS-Kyber was proposed.Firstly, the flow of Kyber algorithm was described and the execution of NTT, INTT and CWM were analyzed.Secondly, the overall structure of FPGA was given, the butterfly arithmetic unit was designed by pipeline technology, and the Barrett modulus reduction and CWM scheduling optimization were used to improve the calculation efficiency.At the same time, 32 butterfly arithmetic units were executed in parallel, which shortens the overall calculation cycle.Finally, the multi-RAM channel was optimized to improve the memory access efficiency with alternate data access control and RAM resource reuse.In addition, with the loosely coupled architecture, the overall operation scheduling was realized by DMA communication.The experimental results and analysis show that the proposed scheme implemented can complete NTT, INTT and CWM operations within 44, 49, and 163 clock cycles, which is superior to other schemes and has high energy efficiency ratio.…”
Get full text
Article