Showing 17,841 - 17,860 results of 19,518 for search '(complement OR (implement OR implementing)) factors', query time: 0.27s Refine Results
  1. 17841

    Constitutional History as an Integral Part of General History: The German Case by Dieter Grimm

    Published 2023-09-01
    “…Many attribute the altogether lucky development of the Federal Republic of Germany not least to this constitution and its interpretation and implementation by the Federal Constitutional Court. However, neither the Basic Law nor the jurisprudence of the Constitutional Court play a significant role in the books of historians on the Federal Republic. …”
    Get full text
    Article
  2. 17842

    APPLICATION OF MODEL PREDICTIVE CONTROL TO BATCH POLYMERIZATION REACTOR by N.M. Ghasem, M.A. Hussain, S. A. Sata

    Published 2006-06-01
    “…In this study, advanced control methodology is implemented for controlling the operation of a batch polymerization reactor for polystyrene production utilizingmodel predictive control. …”
    Get full text
    Article
  3. 17843

    Founder’s assessment: insights into coachability and competencies crucial for investors’ decisions by Tatiana Somià

    Published 2025-12-01
    “…Competencies highlighted by investors include relationship and implementation skills. Entrepreneurs with these skills are more likely to secure funding and progress to due diligence.…”
    Get full text
    Article
  4. 17844

    FEATURES OF AUDIT OF SUSTAINABILITY REPORTING: EMPIRICAL EXPERIENCE OF THE EUROPEAN UNION COUNTRIES by Костянтин Безверхий, Ірина Парасій-Вергуненко, Олексій Пилипенко, Олександр Юрченко, Микола Матюха, Наталія Поддубна

    Published 2025-06-01
    “…Studying the experience of foreign countries, and analyzing existing international standards for the preparation and presentation of such reports are an important factor for the effective implementation of this practice in domestic economic realities. …”
    Get full text
    Article
  5. 17845

    ‘Over Time Everyone’s Gonna Be Open to It’: User Attitudes Toward Security and Privacy in Continuous Authentication for Smart Homes by Heting Wang, Yu-Peng Chen, Dinank Bista, Rodrigo Calvo, Niriksha Regmi, Xuanpu Zhang, Tempestt Neal, Jaime Ruiz, Lisa Anthony

    Published 2025-01-01
    “…We provide design recommendations for smart home CA systems, emphasizing transparency as a bridging factor that connects user perceptions with design features related to technology, implementation flexibility, and user interface.…”
    Get full text
    Article
  6. 17846

    First ElGamal Encryption/Decryption Scheme Based on Spiking Neural P Systems with Communication on Request, Weights on Synapses, and Delays in Rules by Irepan Rangel, Daniel-Eduardo Vázquez, Eduardo Vázquez, Gonzalo Duchen, Juan-Gerardo Avalos, Giovanny Sanchez

    Published 2025-04-01
    “…In this work, we present for the first time the implementation of an asymmetric encryption algorithm called ElGamal based on spiking neural P systems and their cutting-edge variants. …”
    Get full text
    Article
  7. 17847

    Benefits and Applications of Oncotype DX Breast Recurrence Score Testing among Breast Cancer Patients: Current Recommendations and Controversies. by Elena-Diana Chiru, Marcus Vetter

    Published 2023-06-01
    “…We hereby aimed to review Oncotype DX testing from its initial implementation to the actual clinical setting. In addition, we revise some of the most clinically relevant studies that led to its incorporation into the international breast cancer guidelines. …”
    Get full text
    Article
  8. 17848

    ASPECTS OF ORGANISATIONAL CULTURE AND CHANGE MANAGEMENT by ELENA-IZABELA POPA

    Published 2018-10-01
    “…Organisational culture can become a factor that either facilitates or prevents the adaptation process. …”
    Get full text
    Article
  9. 17849

    Research on formal description and verification of automated trust negotiation by GUAN Shang-yuan 1, WU Wei-guo 1, DONG Xiao-she 1, QIAN De-pei1

    Published 2011-01-01
    “…First,a unified ATN formal framework was presented,into which typical negotiation strategies could be reduced.Second,the formal verification of ATN was defined based on the formal framework.The objectives and procedures of the formal verification of ATN were described.Third,several typical negotiation strategies were discussed,and the computational complexity of the corresponding verification problems was shown,several conclusions had been obtained.Last,the formal verification of ATN was implemented by using logic programming and model checking methods.The experimental results show that the number of rules is a crucial factor in determining the runtime.Both logic programming and model checking are efficient when the number of transition rules is small,and logic programming does not scale as well as model checking.…”
    Get full text
    Article
  10. 17850

    Industrial big data technologies and architecture by Shuquan ZHENG, Haihuan QIN, Qian WANG

    Published 2017-07-01
    “…Industrial big data is an important asset of industrial enterprises.It is a crucial factor for an industrial enterprise to realize transformation and upgrading.The main sources and characteristics of industrial big data were analyzed,and reference architecture of industrial big data with three dimensions was proposed.Three aspects of the realization of business innovation and transformation of industrial enterprise based on industrial big data respectively were discussed,which included the typical application and business innovation of enterprise,cyber (physical) systems deployed at all levels of the enterprise,and the business architecture,information systems architecture and IT architecture that guide the implementation of application of industrial big data.Finally,the architecture and technology of a typical application of industrial big data were analyzed,which verified the validity of the proposed architecture.…”
    Get full text
    Article
  11. 17851

    Survey on privacy protection indoor positioning by Zhiheng WANG, Yanyan XU

    Published 2023-09-01
    “…Smartphones are usually provided with indoor positioning services by third-party positioning service providers, in which the unique privacy leakage risk has become a major factor limiting its development.How to protect the privacy of users and data in the positioning process has become an important issue to be solved.The research progress of indoor positioning privacy protection in recent years was reviewed.The commonly used indoor positioning technologies were introduced, different implementation architectures of indoor positioning systems and their threat models, privacy protection requirements were discussed, security technologies applied to indoor positioning privacy protection were summarized, indoor positioning privacy protection schemes for different architectures were classified and introduced, and the performance of different schemes and their advantages and disadvantages were comprehensively compared and analyzed, and finally future research trends were summarized and looked forward to.…”
    Get full text
    Article
  12. 17852

    “Hydrocarbon strategy” of Azerbaijan’s foreign policy: 2008 – 2015 by M. Volhonsky

    Published 2016-09-01
    “…This article examines the role of energy factor in Azerbaijan’s foreign policy in the period from 2008 to 2015. …”
    Get full text
    Article
  13. 17853

    Compatibility of sportswomen at selection in commands on group exercises of artistic gymnastics accounting their functional condition by O.S. Kozhanova

    Published 2013-02-01
    “…It was set that most corresponds the specific of group exercises the first group of gymnasts the heart of which is in a greater degree predispositioned to implementation of loadings of anaerobic and mixed orientation. …”
    Get full text
    Article
  14. 17854

    Determination of fracture toughness in plain concrete specimens by R curve by Chbani Hamza, Saadouki Bouchra, Barakat Mohamed

    Published 2019-07-01
    “…Experimental tests and computational algorithm are implemented to investigate crack growth phenomena in C0.7 concrete. …”
    Get full text
    Article
  15. 17855

    The Analysis of the Efficiency of Capital Investments in Trade of Serbia by Radojko LUKIC

    Published 2016-03-01
    “…The capital investments are significant factor of efficiency of trading companies business. …”
    Get full text
    Article
  16. 17856

    Research on the formation logic, practical problems and improvement path of data intellectual property registration system by ZHENG Shiyi

    Published 2025-01-01
    “…Although China has piloted data intellectual property registration systems in multiple regions, practical implementation reveals issues such as low legislative hierarchy, rough review mechanisms, and fragmented standard systems. …”
    Get full text
    Article
  17. 17857

    Economic Risk in the Cruise Sector by Wendy R London

    Published 2011-04-01
    “…Five strategies for managing economic risks are presented: the formation of an adequately funded peak committee; the cultivation of a cruise culture; the provision of appropriate training; the creation of a national cruise manual; and the design, development and implementation of a cruise brand. Each of these strategies is based on an approach to risk management which calls for a positive view of risk and how it can be transformed into competitive success.…”
    Get full text
    Article
  18. 17858

    Acceleration Response First Passage Failure Probability Analysis Method for Nonlinear Package by Dapeng Zhu

    Published 2018-01-01
    “…The model correction factor method (MCFM) is implemented in conjunction with the first-order reliability method (FORM) to analyze the first passage failure probability of the nonlinear package. …”
    Get full text
    Article
  19. 17859

    Comparison of two multiaxial fatigue models applied to dental implants by JM. Ayllon, C Navarro, J. Vázquez, J. Domínguez

    Published 2015-06-01
    “…This paper discusses which material properties are necessary for the implementation of these models and how to obtain them in the laboratory from simple test specimens. …”
    Get full text
    Article
  20. 17860

    Measurement Invariance of Science Self-Efficacy Scale in PISA by Nermin Kıbrıslıoğlu Uysal, Çiğdem Akın Arıkan

    Published 2018-05-01
    “…Sample of the study consists of 4791 students in PISA 2006 and 5071 students in PISA 2015 implementation. Multi-group Confirmatory Factor Analysis (MGCFI) was performed to determine invariance of the science self-efficacy scale across year and gender. …”
    Get full text
    Article