Suggested Topics within your search.
Suggested Topics within your search.
-
17841
Constitutional History as an Integral Part of General History: The German Case
Published 2023-09-01“…Many attribute the altogether lucky development of the Federal Republic of Germany not least to this constitution and its interpretation and implementation by the Federal Constitutional Court. However, neither the Basic Law nor the jurisprudence of the Constitutional Court play a significant role in the books of historians on the Federal Republic. …”
Get full text
Article -
17842
APPLICATION OF MODEL PREDICTIVE CONTROL TO BATCH POLYMERIZATION REACTOR
Published 2006-06-01“…In this study, advanced control methodology is implemented for controlling the operation of a batch polymerization reactor for polystyrene production utilizingmodel predictive control. …”
Get full text
Article -
17843
Founder’s assessment: insights into coachability and competencies crucial for investors’ decisions
Published 2025-12-01“…Competencies highlighted by investors include relationship and implementation skills. Entrepreneurs with these skills are more likely to secure funding and progress to due diligence.…”
Get full text
Article -
17844
FEATURES OF AUDIT OF SUSTAINABILITY REPORTING: EMPIRICAL EXPERIENCE OF THE EUROPEAN UNION COUNTRIES
Published 2025-06-01“…Studying the experience of foreign countries, and analyzing existing international standards for the preparation and presentation of such reports are an important factor for the effective implementation of this practice in domestic economic realities. …”
Get full text
Article -
17845
‘Over Time Everyone’s Gonna Be Open to It’: User Attitudes Toward Security and Privacy in Continuous Authentication for Smart Homes
Published 2025-01-01“…We provide design recommendations for smart home CA systems, emphasizing transparency as a bridging factor that connects user perceptions with design features related to technology, implementation flexibility, and user interface.…”
Get full text
Article -
17846
First ElGamal Encryption/Decryption Scheme Based on Spiking Neural P Systems with Communication on Request, Weights on Synapses, and Delays in Rules
Published 2025-04-01“…In this work, we present for the first time the implementation of an asymmetric encryption algorithm called ElGamal based on spiking neural P systems and their cutting-edge variants. …”
Get full text
Article -
17847
Benefits and Applications of Oncotype DX Breast Recurrence Score Testing among Breast Cancer Patients: Current Recommendations and Controversies.
Published 2023-06-01“…We hereby aimed to review Oncotype DX testing from its initial implementation to the actual clinical setting. In addition, we revise some of the most clinically relevant studies that led to its incorporation into the international breast cancer guidelines. …”
Get full text
Article -
17848
ASPECTS OF ORGANISATIONAL CULTURE AND CHANGE MANAGEMENT
Published 2018-10-01“…Organisational culture can become a factor that either facilitates or prevents the adaptation process. …”
Get full text
Article -
17849
Research on formal description and verification of automated trust negotiation
Published 2011-01-01“…First,a unified ATN formal framework was presented,into which typical negotiation strategies could be reduced.Second,the formal verification of ATN was defined based on the formal framework.The objectives and procedures of the formal verification of ATN were described.Third,several typical negotiation strategies were discussed,and the computational complexity of the corresponding verification problems was shown,several conclusions had been obtained.Last,the formal verification of ATN was implemented by using logic programming and model checking methods.The experimental results show that the number of rules is a crucial factor in determining the runtime.Both logic programming and model checking are efficient when the number of transition rules is small,and logic programming does not scale as well as model checking.…”
Get full text
Article -
17850
Industrial big data technologies and architecture
Published 2017-07-01“…Industrial big data is an important asset of industrial enterprises.It is a crucial factor for an industrial enterprise to realize transformation and upgrading.The main sources and characteristics of industrial big data were analyzed,and reference architecture of industrial big data with three dimensions was proposed.Three aspects of the realization of business innovation and transformation of industrial enterprise based on industrial big data respectively were discussed,which included the typical application and business innovation of enterprise,cyber (physical) systems deployed at all levels of the enterprise,and the business architecture,information systems architecture and IT architecture that guide the implementation of application of industrial big data.Finally,the architecture and technology of a typical application of industrial big data were analyzed,which verified the validity of the proposed architecture.…”
Get full text
Article -
17851
Survey on privacy protection indoor positioning
Published 2023-09-01“…Smartphones are usually provided with indoor positioning services by third-party positioning service providers, in which the unique privacy leakage risk has become a major factor limiting its development.How to protect the privacy of users and data in the positioning process has become an important issue to be solved.The research progress of indoor positioning privacy protection in recent years was reviewed.The commonly used indoor positioning technologies were introduced, different implementation architectures of indoor positioning systems and their threat models, privacy protection requirements were discussed, security technologies applied to indoor positioning privacy protection were summarized, indoor positioning privacy protection schemes for different architectures were classified and introduced, and the performance of different schemes and their advantages and disadvantages were comprehensively compared and analyzed, and finally future research trends were summarized and looked forward to.…”
Get full text
Article -
17852
“Hydrocarbon strategy” of Azerbaijan’s foreign policy: 2008 – 2015
Published 2016-09-01“…This article examines the role of energy factor in Azerbaijan’s foreign policy in the period from 2008 to 2015. …”
Get full text
Article -
17853
Compatibility of sportswomen at selection in commands on group exercises of artistic gymnastics accounting their functional condition
Published 2013-02-01“…It was set that most corresponds the specific of group exercises the first group of gymnasts the heart of which is in a greater degree predispositioned to implementation of loadings of anaerobic and mixed orientation. …”
Get full text
Article -
17854
Determination of fracture toughness in plain concrete specimens by R curve
Published 2019-07-01“…Experimental tests and computational algorithm are implemented to investigate crack growth phenomena in C0.7 concrete. …”
Get full text
Article -
17855
The Analysis of the Efficiency of Capital Investments in Trade of Serbia
Published 2016-03-01“…The capital investments are significant factor of efficiency of trading companies business. …”
Get full text
Article -
17856
Research on the formation logic, practical problems and improvement path of data intellectual property registration system
Published 2025-01-01“…Although China has piloted data intellectual property registration systems in multiple regions, practical implementation reveals issues such as low legislative hierarchy, rough review mechanisms, and fragmented standard systems. …”
Get full text
Article -
17857
Economic Risk in the Cruise Sector
Published 2011-04-01“…Five strategies for managing economic risks are presented: the formation of an adequately funded peak committee; the cultivation of a cruise culture; the provision of appropriate training; the creation of a national cruise manual; and the design, development and implementation of a cruise brand. Each of these strategies is based on an approach to risk management which calls for a positive view of risk and how it can be transformed into competitive success.…”
Get full text
Article -
17858
Acceleration Response First Passage Failure Probability Analysis Method for Nonlinear Package
Published 2018-01-01“…The model correction factor method (MCFM) is implemented in conjunction with the first-order reliability method (FORM) to analyze the first passage failure probability of the nonlinear package. …”
Get full text
Article -
17859
Comparison of two multiaxial fatigue models applied to dental implants
Published 2015-06-01“…This paper discusses which material properties are necessary for the implementation of these models and how to obtain them in the laboratory from simple test specimens. …”
Get full text
Article -
17860
Measurement Invariance of Science Self-Efficacy Scale in PISA
Published 2018-05-01“…Sample of the study consists of 4791 students in PISA 2006 and 5071 students in PISA 2015 implementation. Multi-group Confirmatory Factor Analysis (MGCFI) was performed to determine invariance of the science self-efficacy scale across year and gender. …”
Get full text
Article