Showing 8,421 - 8,440 results of 9,373 for search 'ensuring complex', query time: 0.14s Refine Results
  1. 8421

    Refining a paradigm of missional leadership by Kirk J. Franklin

    Published 2025-07-01
    “…The integration of biblical models with (global) missional leadership paradigms ensures an integrated approach that aligns with God’s mission while addressing the complexities of globalised contexts. …”
    Get full text
    Article
  2. 8422

    Exact Expressions for Kullback–Leibler Divergence for Univariate Distributions by Victor Nawa, Saralees Nadarajah

    Published 2024-11-01
    “…The derived expressions incorporate various special functions, highlighting the mathematical complexity and richness of the topic. This research contributes to a deeper understanding of KL divergence and its applications in statistical analysis and modeling.…”
    Get full text
    Article
  3. 8423

    Analysis of influencing factors on review efficiency of multidisciplinary scientific research projects using DEMATEL with a 5-point scale. by Junyi Li, Yana Xiao

    Published 2024-01-01
    “…This study aims to identify and analyze the factors influencing the review efficiency of multidisciplinary scientific research projects to ensure their smooth development and improved quality. …”
    Get full text
    Article
  4. 8424

    Proactive process evaluation of precision medicine platforms: a roadmap by Kathrin Cresswell

    Published 2025-07-01
    “…However, despite rapid technological development and increasing data complexity, practical applications of precision medicine remain limited. …”
    Get full text
    Article
  5. 8425

    Navigating Leadership Succession and Regeneration in a Private Christian School by Laksmi Maharani, Yonathan Winardi

    Published 2025-05-01
    “… This study explores the complexity of leadership succession and regeneration in a private Christian school in West Jakarta and possible ways to navigate the challenges, as the school has experienced a high turnover rate in its leadership in the past five years. …”
    Get full text
    Article
  6. 8426

    Instrumentalizacja procesu legislacyjnego w carskiej Rosji i jej wpływ na specyfikę rosyjskiego systemu źródeł prawa by Grzegorz Smyk

    Published 2018-10-01
    “…The characteristic feature of the legislation in the Russian Empire was its complexity and lack of clarity both with regards to the types and forms of the law sources and the way in which laws were made. …”
    Get full text
    Article
  7. 8427

    Social-aware caching and forwarding for video streaming in information-centric 5G VANET by Tengfei CAO, Cuili JIANG, Zhiqiang LIU, Xiaoying WANG

    Published 2019-12-01
    “…The arrival of 5G-enabled communication technology has laid the foundation for providing high-quality video stream services in vehicular Ad Hoc network (VANET).However,current VANET still distribute video content over IP networks which design for host communication instead of content distribution.The mismatch between network function and design goals brings huge challenges for providing high quality video service.Based on the above questions,a social-aware caching and forwarding was proposed to support efficient video streaming services and the time complexity of the algorithm was O(m<sup>2</sup>).Firstly,a virtual community was constructed by analyzing the user's behaviors.Then,a fast forwarding scheme was introduced to ensure that users could discover the requested videos nearby.Finally,a community-based caching policy was proposed to optimize the in-community caching distributions.Simulation results show how the proposed strategy achieves better performance than other state-of-art solutions in terms of caching hit ratio,searching delay and control overhead.…”
    Get full text
    Article
  8. 8428

    Research and application of VoLTE video call quality based on machine learning by Qizhu ZHONG

    Published 2020-03-01
    “…To overcome the shortcomings of current methods for evaluating VoLTE video call quality,a method for evaluating VoLTE video call quality without reference based on machine learning and network index parameters was proposed.Firstly,the network parameters of the decoding core network were collected and preprocessed; then,the key features for VoLTE video call quality assessment were selected,and a reference-free evaluation model for VoLTE video quality assessment was constructed by comparing and selecting appropriate machine learning algorithms,so as to achieve real-time VoLTE video call quality assessment independent of the test environment and the original video.By researching the preprocessing of feature index data extracted from XDR data,the standardization of feature index was solved,and the evaluation model of feature input was convenient; the key features of VoLTE video call were selected and evaluated by feature engineering,which reduced the feature dimension and the complexity of the algorithm; at the same time,advanced machine learning technology was adopted to ensure and enhance the algorithm assessment accuracy.…”
    Get full text
    Article
  9. 8429

    Target detection of helicopter electric power inspection based on the feature embedding convolution model. by Dakun Liu, Wei Zhou, Linzhen Zhou, Wen Guan

    Published 2024-01-01
    “…In conclusion, the proposed model improves the accuracy and scope of inspection, provides a more scientific strategy for electric power inspection, and ensures inspection efficiency.…”
    Get full text
    Article
  10. 8430

    Cognitive Reframing in Anticipation and Prevention of Multiplex Threats to Critical Infrastructure by Pavel A. Panilov

    Published 2024-12-01
    “…Extra factors could increase the complexity, accuracy, and adaptability of the current model. …”
    Article
  11. 8431

    Verifiable access control scheme based on unpaired CP-ABE in fog computing by Jiangtao DONG, Peiwen YAN, Ruizhong DU

    Published 2021-08-01
    “…Fog computing extends computing power and data analysis applications to the edge of the network, solves the latency problem of cloud computing, and also brings new challenges to data security.Attribute encryption based on ciphertext strategy (CP-ABE) is a technology to ensure data confidentiality and fine-grained access control.The excessive computational overhead of bilinear pairing restricts its application and development.In response to this, a verifiable access control scheme was proposed based on unpaired CP-ABE in fog computing.In order to make CP-ABE more efficient, simple scalar multiplication in elliptic curve encryption was used to replace bilinear pairing, thereby reducing the overall computational overhead.Decryption operations were outsourced to fog nodes to reduce user computational complexity, and based on the tamper-proof and traceable characteristics of the blockchain, the correctness of the access transaction was verified and the access authorization process was recorded.Security and performance analysis shows that the scheme is safe under the elliptic curve decision-making DBDH (Diffie-Hellman) assumption, and the calculation efficiency is higher.…”
    Get full text
    Article
  12. 8432

    A twofold perspective on the quality of research publications: The use of ICTs and research activity models. by Jolanta Wartini-Twardowska, Natalia Paulina Twardowska

    Published 2025-01-01
    “…Previous studies have highlighted the inherent subjectivity, complexity, and challenges associated with research quality leading to fragmented findings. …”
    Get full text
    Article
  13. 8433

    STEGANOGRAPHIC METHOD VERIFYING THE INTEGRITY AND AUTHENTICITY OF EMBEDDED INFORMATION by Kobozeva A.A., Kozina M.A.

    Published 2014-12-01
    “…This is connected with the complexity of TT and moreover a covert communication channel itself requires additional guaranteeing the reliability of perception and insensitivity of formed steganomessage against disturbing influences. …”
    Get full text
    Article
  14. 8434

    Operation Warp Speed as a “Moonshot”: Some Public Policy Lessons by Nicholas Sowels

    Published 2021-11-01
    “…The article then qualifies the success of OWS as a moonshot, pointing to the competitive market elements built into the project which also helped ensure its success. Finally, this research strives to examine OWS and the US vaccination rollout using complexity analysis, to give some perspective to the emergence of vaccine resistance behaviour as of spring 2021.…”
    Get full text
    Article
  15. 8435

    Transparent reporting in forensic Science: Exploring its meaning and challenges by Kristy A. Martire

    Published 2025-12-01
    “…Templates can mitigate some of these challenges, but must be coupled with ongoing collaboration among forensic scientists, legal stakeholders, and institutional bodies to ensure that reporting practices evolve in line with professional obligations, scientific rigor and the realities of forensic practice.…”
    Get full text
    Article
  16. 8436

    R-learning-based team game model for Internet of things quality-of-service control scheme by Sungwook Kim

    Published 2017-01-01
    “…For the effective Internet of things management, it is necessary to design and develop service models that ensure appropriate level of quality-of-service. Therefore, the design of quality-of-service management schemes has been a hot research issue. …”
    Get full text
    Article
  17. 8437

    Improved SOR signal detection algorithm in massive MIMO-TRDMA systems by Mingyue WANG, Fangwei LI, Xiaorong JING, Haibo ZHANG, Junzhou XIONG

    Published 2021-10-01
    “…In the massive multi-input multi-output time-reversal division multiple access (MIMO-TRDMA) systems, the traditional linear minimum mean square error (MMSE) algorithm achieved approximately the best performance.However, the matrix inversion of the MMSE algorithm was too complicated to ensure real-time processing of signal detection.To solve this problem, an improved successive over-relaxation (SOR) signal detection optimization algorithm was proposed.The proposed algorithm reasonably upgraded the solution of linear equations to prevent the complicated calculation of matrix inversion.Meanwhile, the steepest descent idea was used to provide an effective search direction for the SOR signal detection algorithm, achieving a rapid convergence rate and stronger inspection performance.The simulation results show that the proposed algorithm has the similar best performance with fewer update times compared with the traditional MMSE algorithm, and the calculation complexity is reduced from O(M<sup>3</sup>)to O(<sup>2</sup>).…”
    Get full text
    Article
  18. 8438

    Interpretation of the concept of «modernization» in the context of sustainable development of economic entity by Yu. G. Borodin, E. I. Khabarova

    Published 2013-04-01
    “…This leads to the necessity of determining the long-term prospects, or "strategic management", and to ensure competitive advantages in the future. Companies should consider modernization as a strategy of development. …”
    Get full text
    Article
  19. 8439

    Safety risks and quality control in Huangjiu: From raw materials to fermentation process by Qisi Xu, Shanshan Zhao, Jieyin Chen, Ran Wang, Kangxu Wang, Xiaofeng Dai, Zhiqiang Kong

    Published 2025-06-01
    “…Precipitation in Huangjiu, caused by protein-polyphenol complexes and oxidation, can be mitigated by optimizing the storage conditions. …”
    Get full text
    Article
  20. 8440

    Perspective: Use of protein S100B as a quality assurance marker for endovascular therapy in acute ischemic stroke by Franziska Lieschke, Christian Foerch, Christian Foerch

    Published 2025-02-01
    “…Mechanical thrombectomy (MT) is a highly effective treatment for ischemic stroke associated with large vessel occlusion. Given its complexity, this procedure is widely used throughout the world in hospitals with different levels of experience. …”
    Get full text
    Article