Suggested Topics within your search.
Suggested Topics within your search.
-
8421
Refining a paradigm of missional leadership
Published 2025-07-01“…The integration of biblical models with (global) missional leadership paradigms ensures an integrated approach that aligns with God’s mission while addressing the complexities of globalised contexts. …”
Get full text
Article -
8422
Exact Expressions for Kullback–Leibler Divergence for Univariate Distributions
Published 2024-11-01“…The derived expressions incorporate various special functions, highlighting the mathematical complexity and richness of the topic. This research contributes to a deeper understanding of KL divergence and its applications in statistical analysis and modeling.…”
Get full text
Article -
8423
Analysis of influencing factors on review efficiency of multidisciplinary scientific research projects using DEMATEL with a 5-point scale.
Published 2024-01-01“…This study aims to identify and analyze the factors influencing the review efficiency of multidisciplinary scientific research projects to ensure their smooth development and improved quality. …”
Get full text
Article -
8424
Proactive process evaluation of precision medicine platforms: a roadmap
Published 2025-07-01“…However, despite rapid technological development and increasing data complexity, practical applications of precision medicine remain limited. …”
Get full text
Article -
8425
Navigating Leadership Succession and Regeneration in a Private Christian School
Published 2025-05-01“… This study explores the complexity of leadership succession and regeneration in a private Christian school in West Jakarta and possible ways to navigate the challenges, as the school has experienced a high turnover rate in its leadership in the past five years. …”
Get full text
Article -
8426
Instrumentalizacja procesu legislacyjnego w carskiej Rosji i jej wpływ na specyfikę rosyjskiego systemu źródeł prawa
Published 2018-10-01“…The characteristic feature of the legislation in the Russian Empire was its complexity and lack of clarity both with regards to the types and forms of the law sources and the way in which laws were made. …”
Get full text
Article -
8427
Social-aware caching and forwarding for video streaming in information-centric 5G VANET
Published 2019-12-01“…The arrival of 5G-enabled communication technology has laid the foundation for providing high-quality video stream services in vehicular Ad Hoc network (VANET).However,current VANET still distribute video content over IP networks which design for host communication instead of content distribution.The mismatch between network function and design goals brings huge challenges for providing high quality video service.Based on the above questions,a social-aware caching and forwarding was proposed to support efficient video streaming services and the time complexity of the algorithm was O(m<sup>2</sup>).Firstly,a virtual community was constructed by analyzing the user's behaviors.Then,a fast forwarding scheme was introduced to ensure that users could discover the requested videos nearby.Finally,a community-based caching policy was proposed to optimize the in-community caching distributions.Simulation results show how the proposed strategy achieves better performance than other state-of-art solutions in terms of caching hit ratio,searching delay and control overhead.…”
Get full text
Article -
8428
Research and application of VoLTE video call quality based on machine learning
Published 2020-03-01“…To overcome the shortcomings of current methods for evaluating VoLTE video call quality,a method for evaluating VoLTE video call quality without reference based on machine learning and network index parameters was proposed.Firstly,the network parameters of the decoding core network were collected and preprocessed; then,the key features for VoLTE video call quality assessment were selected,and a reference-free evaluation model for VoLTE video quality assessment was constructed by comparing and selecting appropriate machine learning algorithms,so as to achieve real-time VoLTE video call quality assessment independent of the test environment and the original video.By researching the preprocessing of feature index data extracted from XDR data,the standardization of feature index was solved,and the evaluation model of feature input was convenient; the key features of VoLTE video call were selected and evaluated by feature engineering,which reduced the feature dimension and the complexity of the algorithm; at the same time,advanced machine learning technology was adopted to ensure and enhance the algorithm assessment accuracy.…”
Get full text
Article -
8429
Target detection of helicopter electric power inspection based on the feature embedding convolution model.
Published 2024-01-01“…In conclusion, the proposed model improves the accuracy and scope of inspection, provides a more scientific strategy for electric power inspection, and ensures inspection efficiency.…”
Get full text
Article -
8430
Cognitive Reframing in Anticipation and Prevention of Multiplex Threats to Critical Infrastructure
Published 2024-12-01“…Extra factors could increase the complexity, accuracy, and adaptability of the current model. …”
Article -
8431
Verifiable access control scheme based on unpaired CP-ABE in fog computing
Published 2021-08-01“…Fog computing extends computing power and data analysis applications to the edge of the network, solves the latency problem of cloud computing, and also brings new challenges to data security.Attribute encryption based on ciphertext strategy (CP-ABE) is a technology to ensure data confidentiality and fine-grained access control.The excessive computational overhead of bilinear pairing restricts its application and development.In response to this, a verifiable access control scheme was proposed based on unpaired CP-ABE in fog computing.In order to make CP-ABE more efficient, simple scalar multiplication in elliptic curve encryption was used to replace bilinear pairing, thereby reducing the overall computational overhead.Decryption operations were outsourced to fog nodes to reduce user computational complexity, and based on the tamper-proof and traceable characteristics of the blockchain, the correctness of the access transaction was verified and the access authorization process was recorded.Security and performance analysis shows that the scheme is safe under the elliptic curve decision-making DBDH (Diffie-Hellman) assumption, and the calculation efficiency is higher.…”
Get full text
Article -
8432
A twofold perspective on the quality of research publications: The use of ICTs and research activity models.
Published 2025-01-01“…Previous studies have highlighted the inherent subjectivity, complexity, and challenges associated with research quality leading to fragmented findings. …”
Get full text
Article -
8433
STEGANOGRAPHIC METHOD VERIFYING THE INTEGRITY AND AUTHENTICITY OF EMBEDDED INFORMATION
Published 2014-12-01“…This is connected with the complexity of TT and moreover a covert communication channel itself requires additional guaranteeing the reliability of perception and insensitivity of formed steganomessage against disturbing influences. …”
Get full text
Article -
8434
Operation Warp Speed as a “Moonshot”: Some Public Policy Lessons
Published 2021-11-01“…The article then qualifies the success of OWS as a moonshot, pointing to the competitive market elements built into the project which also helped ensure its success. Finally, this research strives to examine OWS and the US vaccination rollout using complexity analysis, to give some perspective to the emergence of vaccine resistance behaviour as of spring 2021.…”
Get full text
Article -
8435
Transparent reporting in forensic Science: Exploring its meaning and challenges
Published 2025-12-01“…Templates can mitigate some of these challenges, but must be coupled with ongoing collaboration among forensic scientists, legal stakeholders, and institutional bodies to ensure that reporting practices evolve in line with professional obligations, scientific rigor and the realities of forensic practice.…”
Get full text
Article -
8436
R-learning-based team game model for Internet of things quality-of-service control scheme
Published 2017-01-01“…For the effective Internet of things management, it is necessary to design and develop service models that ensure appropriate level of quality-of-service. Therefore, the design of quality-of-service management schemes has been a hot research issue. …”
Get full text
Article -
8437
Improved SOR signal detection algorithm in massive MIMO-TRDMA systems
Published 2021-10-01“…In the massive multi-input multi-output time-reversal division multiple access (MIMO-TRDMA) systems, the traditional linear minimum mean square error (MMSE) algorithm achieved approximately the best performance.However, the matrix inversion of the MMSE algorithm was too complicated to ensure real-time processing of signal detection.To solve this problem, an improved successive over-relaxation (SOR) signal detection optimization algorithm was proposed.The proposed algorithm reasonably upgraded the solution of linear equations to prevent the complicated calculation of matrix inversion.Meanwhile, the steepest descent idea was used to provide an effective search direction for the SOR signal detection algorithm, achieving a rapid convergence rate and stronger inspection performance.The simulation results show that the proposed algorithm has the similar best performance with fewer update times compared with the traditional MMSE algorithm, and the calculation complexity is reduced from O(M<sup>3</sup>)to O(<sup>2</sup>).…”
Get full text
Article -
8438
Interpretation of the concept of «modernization» in the context of sustainable development of economic entity
Published 2013-04-01“…This leads to the necessity of determining the long-term prospects, or "strategic management", and to ensure competitive advantages in the future. Companies should consider modernization as a strategy of development. …”
Get full text
Article -
8439
Safety risks and quality control in Huangjiu: From raw materials to fermentation process
Published 2025-06-01“…Precipitation in Huangjiu, caused by protein-polyphenol complexes and oxidation, can be mitigated by optimizing the storage conditions. …”
Get full text
Article -
8440
Perspective: Use of protein S100B as a quality assurance marker for endovascular therapy in acute ischemic stroke
Published 2025-02-01“…Mechanical thrombectomy (MT) is a highly effective treatment for ischemic stroke associated with large vessel occlusion. Given its complexity, this procedure is widely used throughout the world in hospitals with different levels of experience. …”
Get full text
Article