To see the other types of publications on this topic, follow the link: Key executers.

Journal articles on the topic 'Key executers'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Key executers.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Hosseini, Seyed Hamind Khodadad, Seyed Farhad Hosseini, Asadollah Kordaniej, and Parviz Ahmadi. "Survey and Explain the role of Sensemaking in Successful Strategy Implementation in Iran's Automotive Companies." Business: Theory and Practice 17, no. (3) (2016): 202–15. https://doi.org/10.3846/btp.2016.672.

Full text
Abstract:
There is not a dominant model that could explain key factors of sensemaking of strategy implementation and interactions between them. The purpose of this study is designing and explaining the role of sensemaking in successful strategy implementation along with a combination of factors which influence implementation sensemaking. This study surveyed the factors influencing sensemaking of successful strategy implementation in top Iran's automotive companies. This is a qualitative research that uses grounded theory to obtain insight about the role of sensemaking in successful implementation throug
APA, Harvard, Vancouver, ISO, and other styles
2

Farhad Hosseini, Seyed, Seyed Hamid Khodadad Hosseini, Asadollah Kordnaiej, and Parviz Ahmadi. "Survey and Explain the role of Sensemaking in Successful Strategy Implementation in Iran’s Automotive Companies." Verslas: teorija ir praktika 17, no. 3 (2016): 202–15. http://dx.doi.org/10.3846/btp.2016.672.

Full text
Abstract:
There is not a dominant model that could explain key factors of sensemaking of strategy implementation and interactions between them. The purpose of this study is designing and explaining the role of sensemaking in successful strategy implementation along with a combination of factors which influence implementation sensemaking. This study surveyed the factors influencing sensemaking of successful strategy implementation in top Iran’s automotive companies. This is a qualitative research that uses grounded theory to obtain insight about the role of sensemaking in successful implementation through
APA, Harvard, Vancouver, ISO, and other styles
3

Schanz, Oliver, Isabelle Cornez, Sowmya Parampalli Yajnanarayana, et al. "Tumor rejection in Cblb−/− mice depends on IL-9 and Th9 cells." Journal for ImmunoTherapy of Cancer 9, no. 7 (2021): e002889. http://dx.doi.org/10.1136/jitc-2021-002889.

Full text
Abstract:
BackgroundCasitas B lymphoma-b (Cbl-b) is a central negative regulator of cytotoxic T and natural killer (NK) cells and functions as an intracellular checkpoint in cancer. In particular, Th9 cells support mast cell activation, promote dendritic cell recruitment, enhance the cytolytic function of cytotoxic T lymphocytes and NK cells, and directly kill tumor cells, thereby contributing to tumor immunity. However, the role of Cbl-b in the differentiation and antitumor function of Th9 cells is not sufficiently resolved.MethodsUsing Cblb−/− mice, we investigated the effect of knocking out Cblb on t
APA, Harvard, Vancouver, ISO, and other styles
4

Zakharova, O. V. "Scientific documents metadata as a component of the system of the “open science” information resources." PROBLEMS IN PROGRAMMING, no. 4 (December 2023): 27–38. http://dx.doi.org/10.15407/pp2023.04.027.

Full text
Abstract:
Open science is a movement that aims to make research results more accessible, including code, data, and scientific papers. It covers many different but often related aspects affecting the entire research life cycle, including open access to publications, open data of research, open source software, open workflows, public science, open educational resources and alternative methods of the research evaluation, including open peer review, expert reviews, etc. The key to effective application and integration of open science resources is their structured description based on the principles of compl
APA, Harvard, Vancouver, ISO, and other styles
5

Sami Hasan, Amer, and Zaid Hashim Jaber. "FPKIN: Firewall Public Key Infrastructure for NEMO." International Journal of Engineering & Technology 7, no. 3.20 (2018): 422. http://dx.doi.org/10.14419/ijet.v7i3.20.20585.

Full text
Abstract:
Network mobility (NEMO) is an important requirement for internet networks to reach the goal of ubiquitous connectivity. With NEMO basic support protocols, correspondent entities suffer from a number of limitations and problems that prevent route-optimization procedures to be established between the correspondent nodes and mobile network nodes associated with NEMO. The goal is to alleviate the signaling load and execute the route-optimization steps on behalf of the correspondent entities that are not sophisticated enough to support route optimization. This paper introduces a new architecture th
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Xin He, and Guan Nan Liu. "Study on AES and its Efficient Implementation on STM32F103 Processor." Applied Mechanics and Materials 397-400 (September 2013): 1828–32. http://dx.doi.org/10.4028/www.scientific.net/amm.397-400.1828.

Full text
Abstract:
A optimized Rijndael algorithm which can execute effectively on STM32F103 processor is presented. Firstly, a theoretical analysis of the Rijndael algorithm and code optimization are carried out, and then simulation results of the optimized algorithm on stm32f103 processor are given. Subsequently, the conclusions as follow can be drawn. The cycles of key schedule for decryption are more than those for encryption. Key schedule for decryption demands larger memory than that for encryption. Decryption is slower than encryption. At last, the experiment shows that the algorithm can be executed on ST
APA, Harvard, Vancouver, ISO, and other styles
7

Mumford, Michael D., and Tyler J. Mulhearn. "Leading creative research and development efforts: A literature review and proposed framework for the engineering domain." Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science 233, no. 2 (2018): 403–14. http://dx.doi.org/10.1177/0954406218763449.

Full text
Abstract:
We commonly assume that leadership is not critical to the success of creative efforts. Prior research, however, indicates that effective leadership is, in fact, critical to the success of research and development efforts that allow creative ideas to be developed into innovative new technologies. In the present effort, we examine the key functions that must be executed by those asked to lead research and development efforts. We argue that leaders, to ensure project success, must execute three key functions: (1) lead the work, (2) lead the people doing the work, and (3) lead the firm. The specif
APA, Harvard, Vancouver, ISO, and other styles
8

Kungurtsev, Оleksii B., and Radim V. Chorba. "Task execution flow management in the software development process under the minor change event." Herald of Advanced Information Technology 6, no. 4 (2023): 297–307. http://dx.doi.org/10.15276/hait.06.2023.19.

Full text
Abstract:
In modern project management methodologies, insufficient attention is devoted to the process of promptly responding to minor changes during task execution, which necessitate adjustments to the priorities of ongoing tasks. The existing approaches are not sufficiently detailed for a fundamental reassessment of priorities while such changes significantly impact project execution. The available materials and approaches do not provide ready-made solutions. This article proposes a task planning model during project execution. The model comprises the following key elements: Executor, Task Set, Task E
APA, Harvard, Vancouver, ISO, and other styles
9

Simion, Eduard. "Encapsulating Secrets Using Lockable Obfuscation and a RMERS-Based Public Key Encryption." Sustainability 14, no. 18 (2022): 11412. http://dx.doi.org/10.3390/su141811412.

Full text
Abstract:
Lockable obfuscation, a new primitive that occurs in cryptography, makes it possible to execute arbitrary polynomial-sized functions and recover a secret under specific equality conditions. More concretely, if the function executed over a specific input produces an output that matches an expected target value, here denoted by a, some secret string of bits s is exposed. Written in algebraic terms, if f:X→A has the property that for some x,f(x)=a, s is revealed. This work explores the possibility for safely decrypting ciphertexts, and based on the recovered plaintext’s equality to a stored messa
APA, Harvard, Vancouver, ISO, and other styles
10

Verwey, Willem B. "A Forthcoming Key Press Can Be Selected While Earlier Ones Are Executed." Journal of Motor Behavior 27, no. 3 (1995): 275–84. http://dx.doi.org/10.1080/00222895.1995.9941717.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Inoue, Takamasa, and Billy Tsai. "The Grp170 nucleotide exchange factor executes a key role during ERAD of cellular misfolded clients." Molecular Biology of the Cell 27, no. 10 (2016): 1650–62. http://dx.doi.org/10.1091/mbc.e16-01-0033.

Full text
Abstract:
When a protein misfolds in the endoplasmic reticulum (ER), it retrotranslocates to the cytosol and is degraded by the proteasome via a pathway called ER-associated degradation (ERAD). To initiate ERAD, ADP-BiP is often recruited to the misfolded client, rendering it soluble and translocation competent. How the misfolded client is subsequently released from BiP so that it undergoes retrotranslocation, however, remains enigmatic. Here we demonstrate that the ER-resident nucleotide exchange factor (NEF) Grp170 plays an important role during ERAD of the misfolded glycosylated client null Hong Kong
APA, Harvard, Vancouver, ISO, and other styles
12

ÖZKILBAÇ, Bahadır, and Tevhit KARACALI. "Design of 32-bit RISC Processor with IEEE754 Standard Floating-Point Unit in FPGA for Digital Signal Processing Applications." Erzincan Üniversitesi Fen Bilimleri Enstitüsü Dergisi 15, no. 3 (2022): 699–714. http://dx.doi.org/10.18185/erzifbed.1077921.

Full text
Abstract:
The design of RISC processors, which are the key of digital signal processing applications, are increasing in reconfigurable hardware. FPGAs are suitable reconfigurable hardware for RISC processor design, with advantages such as parallel processing and low power consumption. In this study, the design of the 32-bit RISC processor in a FPGA is presented. The designed RISC processor contains IEEE754 standard floating-point number processing unit, which is executed in a one clock cycle. The verification of the processor is performed for the Zynq-7000 SoC Artix-7 FPGA chip in the Xilinx Vivado tool
APA, Harvard, Vancouver, ISO, and other styles
13

Udayasri, Allu, Manchikanti Chandrasekhar, Brahmeswararao Naga, Ganesh Varanasi, and Duggirala Ramakrishna. "Green chemical principles based regioselective functionalization of 2,4,6-trichloropyrimidine-5-carbaldehyde: Application in the synthesis of new pyrimidines and pyrrolopyrimidine." Journal of the Serbian Chemical Society, no. 00 (2022): 63. http://dx.doi.org/10.2298/jsc210804063u.

Full text
Abstract:
The present work reports the synthesis of three new nitrogen-containing heteronuclear molecules (two pyrimidines and one pyrrolopyrimidine). Based on the 12 principles of green chemistry, chemical methodologies are planned and executed. Various phase transfer catalysts were examined in the crucial step to execute C-N bond formation (through SnAr mechanism), TBAI was found to be a better option than that of TBand CTAB. The one-pot synthetic methodology was optimized involving Wittig olefination and bromination to achieve a key precursor for the synthesis of a new pyrrolopyrimidine.
APA, Harvard, Vancouver, ISO, and other styles
14

Yang, Xu, Kai Chen, Yaohui Wang, Dehong Yang, and Yongping Huang. "The Sex Determination Cascade in the Silkworm." Genes 12, no. 2 (2021): 315. http://dx.doi.org/10.3390/genes12020315.

Full text
Abstract:
In insects, sex determination pathways involve three levels of master regulators: primary signals, which determine the sex; executors, which control sex-specific differentiation of tissues and organs; and transducers, which link the primary signals to the executors. The primary signals differ widely among insect species. In Diptera alone, several unrelated primary sex determiners have been identified. However, the doublesex (dsx) gene is highly conserved as the executor component across multiple insect orders. The transducer level shows an intermediate level of conservation. In many, but not a
APA, Harvard, Vancouver, ISO, and other styles
15

Holmila, M., K. Warpenius, and C. Tigerstedt. "Visions and means to execute them: key actors' opinions on local alcohol policy." Nordic Studies on Alcohol and Drugs 25, no. 5 (2008): 1. http://dx.doi.org/10.1177/145507250802500501.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

BENNETT, KATHLEEN. "Research pathways and outreach to drive cellulosic nanomaterials development." TAPPI Journal 15, no. 6 (2016): 358–61. http://dx.doi.org/10.32964/tj15.6.358.

Full text
Abstract:
There are many opportunities for development and use of cellulosic nanomaterials, sustainably made from renewable raw materials. Significant challenges in manufacturing and application are being overcome. The Agenda 2020 Technology Alliance has issued a technology roadmap identifying key research challenges in a number of priority areas. The purpose of the roadmap is to seek the engagement of researchers and the support of partners to execute the identified research needs to accelerate commercialization. New research funding opportunities are identified. In addition to the research challenges,
APA, Harvard, Vancouver, ISO, and other styles
17

Kim, Ju-Won, Jae-Geun Song, In-Hwan Park, Dong-Hwan Jo, Yong-Jin Kim, and Ju-Wook Jang. "Dependency Reduction Techniques for Performance Improvement of Hyperledger Fabric Blockchain." Big Data and Cognitive Computing 9, no. 2 (2025): 32. https://doi.org/10.3390/bdcc9020032.

Full text
Abstract:
We propose dependency reduction techniques for the performance enhancement of the Hyperledger Fabric blockchain. A dependency hazard may result from the parallelism in Hyperledger Fabric, which executes multiple transactions simultaneously in a single block. Since multiple transactions in a block are executed in parallel for throughput enhancement, dependency problems may arise among transactions involving the same key (If Z = A + D is executed in parallel with A = B + C, a read-after-write hazard for A will occur). To address these issues, our scheme proposes a transaction dependency checking
APA, Harvard, Vancouver, ISO, and other styles
18

Zhu, Zhengbin, Hong Yu, Qinrang Liu, Dongpei Liu, and Huapeng Yu. "An Adaptive Multiexecutors Scheduling Algorithm Based on Heterogeneity for Cyberspace Mimic Defense." Security and Communication Networks 2022 (December 26, 2022): 1–23. http://dx.doi.org/10.1155/2022/2300407.

Full text
Abstract:
With the rapid development of network technology, the traditional defense of “mending the fold after the sheep have been stolen” cannot accurately prevent various potential threats and attacks in cyberspace. At the same time, cyberspace mimic defense (CMD) makes the system uncertain and dynamic in time and space to effectively defend against potential attacks. As the key technology of CMD, the scheduling algorithm still needs to be improved in reliability and active defense. Aiming at current problems, this paper first innovatively proposes a new heterogeneous measure algorithm HVTG combined w
APA, Harvard, Vancouver, ISO, and other styles
19

Hashimoto, Ari, and Shigeru Hashimoto. "ADP-Ribosylation Factor 6 Pathway Acts as a Key Executor of Mesenchymal Tumor Plasticity." International Journal of Molecular Sciences 24, no. 19 (2023): 14934. http://dx.doi.org/10.3390/ijms241914934.

Full text
Abstract:
Despite the “big data” on cancer from recent breakthroughs in high-throughput technology and the development of new therapeutic modalities, it remains unclear as to how intra-tumor heterogeneity and phenotypic plasticity created by various somatic abnormalities and epigenetic and metabolic adaptations orchestrate therapy resistance, immune evasiveness, and metastatic ability. Tumors are formed by various cells, including immune cells, cancer-associated fibroblasts, and endothelial cells, and their tumor microenvironment (TME) plays a crucial role in malignant tumor progression and responses to
APA, Harvard, Vancouver, ISO, and other styles
20

Liu, Kang, Ruijuan Zheng, Mingchuan Zhang, Chao Han, Junlong Zhu, and Qingtao Wu. "SRAF: A Service-Aware Resource Allocation Framework for VM Management in Mobile Data Networks." Mobile Information Systems 2018 (December 2, 2018): 1–12. http://dx.doi.org/10.1155/2018/1904636.

Full text
Abstract:
Service latency and resource utilization are the key factors which limit the development of mobile data networks. To this end, we present a service-aware resource allocation framework, called SRAF, to allocate the basic resources by managing virtual machine (VM). In SRAF, we design two new methods for better virtual machine (VM) management. Firstly, we propose the self-learning classification algorithm (SCA) which executes the service request classification. Then, we use the classification results to schedule different types of VMs. Secondly, we design a sharing mode to jointly execute service
APA, Harvard, Vancouver, ISO, and other styles
21

Dai, Huihui, Jingfeng Gao, Dingchang Li, Zhiqi Wang, Yingchao Cui, and Yifan Zhao. "Family Sphingomonadaceae as the key executor of triclosan degradation in both nitrification and denitrification systems." Chemical Engineering Journal 442 (August 2022): 136202. http://dx.doi.org/10.1016/j.cej.2022.136202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Frentsch, Marco, Regina Stark, Nadine Matzmohr, et al. "CD40L expression permits CD8+ T cells to execute immunologic helper functions." Blood 122, no. 3 (2013): 405–12. http://dx.doi.org/10.1182/blood-2013-02-483586.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Hong, Seong Uk, Yong Taeg Lee, Seung Hun Kim, and J. H. Na. "Estimation of Thickness of Concrete Slab Members Using Impact Echo Method." Key Engineering Materials 605 (April 2014): 139–42. http://dx.doi.org/10.4028/www.scientific.net/kem.605.139.

Full text
Abstract:
Recently, the interest in maintenance and repair of existing concrete structures have increased, and it is typical to use non-destructive testing methods such as rebound hardness test or ultrasonic pulse velocity method to execute maintenance and repair of structures efficiently. Many non-destructive testing methods are being used in practice such as at construction sites, but verification for site applications are quite inadequate. Thus, this study intends to evaluate the applicability of Impact Echo Method which is one of the non-destructive testing methods using stress wave. Total of four s
APA, Harvard, Vancouver, ISO, and other styles
24

Labarta, J., E. Ayguadé, J. Oliver, and D. S. Henty. "New OpenMP Directives for Irregular Data Access Loops." Scientific Programming 9, no. 2-3 (2001): 175–83. http://dx.doi.org/10.1155/2001/798505.

Full text
Abstract:
Many scientific applications involve array operations that are sparse in nature, ie array elements depend on the values of relatively few elements of the same or another array. When parallelised in the shared-memory model, there are often inter-thread dependencies which require that the individual array updates are protected in some way. Possible strategies include protecting all the updates, or having each thread compute local temporary results which are then combined globally across threads. However, for the extremely common situation of sparse array access, neither of these approaches is pa
APA, Harvard, Vancouver, ISO, and other styles
25

Liu, Jinxin, Huanwen Chen, Xiaoli Li, Chunmei Song, Li Wang, and Deguo Wang. "Micro-Executor of Natural Products in Metabolic Diseases." Molecules 28, no. 17 (2023): 6202. http://dx.doi.org/10.3390/molecules28176202.

Full text
Abstract:
Obesity, diabetes, and cardiovascular diseases are the major chronic metabolic diseases that threaten human health. In order to combat these epidemics, there remains a desperate need for effective, safe, and easily available therapeutic strategies. Recently, the development of natural product research has provided new methods and options for these diseases. Numerous studies have demonstrated that microRNAs (miRNAs) are key regulators of metabolic diseases, and natural products can improve lipid and glucose metabolism disorders and cardiovascular diseases by regulating the expression of miRNAs.
APA, Harvard, Vancouver, ISO, and other styles
26

S., Hemasri, S. Kiran Dr., A. Ranichitra Dr., and A. Rajesh Kanna Dr. "Improved Data Encryption Standard Algorithm using Zigzag Scan for Secured Data Transmission." International Journal of Innovative Technology and Exploring Engineering (IJITEE) 12, no. 6 (2023): 26–37. https://doi.org/10.35940/ijitee.F9516.0512623.

Full text
Abstract:
<strong>Abstract: </strong>The cryptosystem is a combination of cryptographic algorithms used to provide security services for the information. One of them is the data encryption standard also known as DES which is a symmetric-key block cipher released by national bureau of standard (NBS). DES is a block cipher and perform encryption of each block of size 64 bits. Encryption of the data by using an algorithm which translates the original data into an unreadable format which is not easy for the intruder to attack. The DES is secure than the other cryptosystems, because the time required for pro
APA, Harvard, Vancouver, ISO, and other styles
27

Bhattara, Subash Kumar. "Analysis of Key Performance Indicators in Health Building Construction in Nepal." Journal of Advanced Research in Civil and Environmental Engineering 08, no. 3&4 (2021): 18–30. http://dx.doi.org/10.24321/2393.8307.202107.

Full text
Abstract:
Key Performance Indicators (KPI) in a construction project show how successfully the project has been executed. The information from the KPI measurement guides the implementer to collect the feedback which can be fed in for the new projects to be implemented. This study aim was to assess key performance indicators for health building construction, its ranking, the most important affecting factor for each KPI, and how to improving KPIs in a health building construction in Nepal. The data were collected from project stakeholders through a questionnaire survey. The project stakeholders were the c
APA, Harvard, Vancouver, ISO, and other styles
28

George, Dipu Jo, and Tony Thomas. "A Comparative Study of Symmetric Key Algorithms." International Journal of Computer Science and Mobile Computing 12, no. 6 (2023): 71–75. http://dx.doi.org/10.47760/ijcsmc.2023.v12i06.008.

Full text
Abstract:
Security is the prime issue while transferring information across a network. Therefore, the concept of encryption and decryption of information was introduced. Cryptography is a technique of converting plain information into encrypted text. This is done so that only legitimate users can access the data being sent. Cryptography can be mainly classified into two: 1) Symmetric key cryptography: Encryption and decryption are done using the same keys, and 2) Asymmetric key cryptography: Encryption and decryption of data is executed using private and public key. The symmetric key algorithm can be fu
APA, Harvard, Vancouver, ISO, and other styles
29

Silva, Kevin. "Culture: a key ingredient in business success." Strategic HR Review 16, no. 4 (2017): 166–70. http://dx.doi.org/10.1108/shr-03-2017-0021.

Full text
Abstract:
Purpose The purpose of this paper is to serve as a reference on how to revamp an organization’s culture following a re-brand. Design/methodology/approach Culture change: creating a framework for executing the transformation. Leadership competency model: establishing performance standards that align with how employees execute on the strategy. Findings A strong culture with the best talent helps promote problem solving, continuous improvement, idea exchanging, communication and team work, and ultimately, creates value for both the business and the community. Originality/value This case study wil
APA, Harvard, Vancouver, ISO, and other styles
30

Zhang, Dandan, Di Liu, Xiaomeng Lv, et al. "The Cysteine Protease CEP1, a Key Executor Involved in Tapetal Programmed Cell Death, Regulates Pollen Development in Arabidopsis." Plant Cell 26, no. 7 (2014): 2939–61. http://dx.doi.org/10.1105/tpc.114.127282.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Xu, Bing, Mingzuo Jiang, Yi Chu, et al. "Gasdermin D plays a key role as a pyroptosis executor of non-alcoholic steatohepatitis in humans and mice." Journal of Hepatology 68, no. 4 (2018): 773–82. http://dx.doi.org/10.1016/j.jhep.2017.11.040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Risnaldi, Reri, Masril Masril, and Helga Yermadona. "IMPLEMENTASI SISTIM MANAJEMEN KESELAMATAN DAN KESEHATAN KERJA (SMK3) DI PROYEK KONSTRUKSI GEDUNG OLEH PELAKSANA JASA KONSTRUKSI DI KOTA SOLOK TAHUN 2021." Ensiklopedia Research and Community Service Review 2, no. 3 (2023): 77–84. http://dx.doi.org/10.33559/err.v2i3.1762.

Full text
Abstract:
Abstract: In construction projects, it is hoped that there will be zero accidents, this can be implemented properly if 6 (six) key elements for the successful implementation of the Occupational Safety and Health Management System (K3), namely K3 policy, planning, implementation and operation, inspection and corrective action , management review and continuous improvement, well executed. This research is a quantitative research using descriptive analysis. Data was collected using a questionnaire in the form of interviews and field observations. The research was conducted in the Solok City build
APA, Harvard, Vancouver, ISO, and other styles
33

Hwang, Min-Shiang, Jung-Wen Lo, and Chia-Hsin Liu. "Enhanced of Key Agreement Protocols Resistant to a Denial-of-Service Attack." Fundamenta Informaticae 61, no. 3-4 (2004): 389–98. https://doi.org/10.3233/fun-2004-613-412.

Full text
Abstract:
The denial-of-service attack, a malicious client executes a key agreement protocol simultaneously many times to exhaust the server's memory or computing resource and to interfere the honest client connecting with the server. It is a serious problem in the key agreement protocol. A key agreement protocol which resists to the storage-exhaustion and the CPU-exhaustion attack was firstly proposed by Hiros-Matsuura. However, their protocol is not efficient enough during the weak key validation. Our proposed protocol modifies the weak key validation and avoids the unnecessary heavy computation to en
APA, Harvard, Vancouver, ISO, and other styles
34

Martinez-Osorio, Veronica, Yasmin Abdelwahab, and Uris Ros. "The Many Faces of MLKL, the Executor of Necroptosis." International Journal of Molecular Sciences 24, no. 12 (2023): 10108. http://dx.doi.org/10.3390/ijms241210108.

Full text
Abstract:
Necroptosis is a recently discovered form of regulated cell death characterized by the disruption of plasma membrane integrity and the release of intracellular content. Mixed lineage kinase domain-like (MLKL) protein is the main player of this cell death pathway as it mediates the final step of plasma membrane permeabilization. Despite the significant progress in our knowledge of the necroptotic pathway and MLKL biology, the precise mechanism of how MLKL functions remain unclear. To understand in what way MLKL executes necroptosis, it is crucial to decipher how the molecular machinery of regul
APA, Harvard, Vancouver, ISO, and other styles
35

Yurik, Wanti, and Sarwo Edi. "ANALYSIS OF THE PERFORMANCE OF HAJJ UMRAH EXECUTORS DURING THE COVID-19 PANDEMIC PT.GADIKA TRAVEL MEDAN." Journal Of Management Analytical and Solution (JoMAS) 3, no. 2 (2023): 75–78. http://dx.doi.org/10.32734/jomas.v3i2.9580.

Full text
Abstract:
This research was conducted with the aim of analyzing the travel performance of the performance of Hajj and Umrah at PT.Gadika Travel Medan. This reseach was obtained by the formance of the executor of travel that the performance of Hajj and Umrah could improve the walfare of the pligrims. This reseach method uses qualitative research with the type of case study reseach. Data collection tecniques used in this study were observation, interviews and documentation. Based on the result of reseach and analysis of key data that with the performance of this Umrah pilgrimage can improve the welfare of
APA, Harvard, Vancouver, ISO, and other styles
36

Hassan, Mohammad R., Feras A. Alnaimait, Qasem Kharma, Ashraf Sharah, and Khalil H. Al-Shqeerat. "Secure Group Key Management Protocol for Grid Computing." Webology 18, no. 2 (2021): 1055–65. http://dx.doi.org/10.14704/web/v18i2/web18374.

Full text
Abstract:
In any multi–device / party systems supporting GRID and cloud-based applications, an essential constraint of these systems is the need of all tools and participants to interconnect with each other as members of a group in a secure approach. Group key management method is an essential functional element for any protected distributed communication setting. Key distribution method is a crucial factor in securing communication in grid computing. After the secure key management is executed, messages will be able to be securely exchanged between the grid units. A number of protocols have been propos
APA, Harvard, Vancouver, ISO, and other styles
37

Sun, Chia-Chi, and Shu-Ni Yen. "Evaluate the Causal Relations among the Criteria in Successful CSR Practices." Journal of Risk and Financial Management 15, no. 11 (2022): 529. http://dx.doi.org/10.3390/jrfm15110529.

Full text
Abstract:
With the growing awareness of Corporate Social Responsibility (CSR), increasingly more companies are becoming aware that business cannot be limited to just maximizing stakeholders’ profit. An enterprise should include social responsibility to protect the environment and develop people’s talents. Maintaining business competitive power and sustainability while bringing contributions to society has become the new corporate performance target. In Taiwan, the hi-tech industry is an important economics index. Although some hi-tech companies have executed CSR, many of them have not. The reason is mai
APA, Harvard, Vancouver, ISO, and other styles
38

Kumar, B. Siva. "Role of Key Performance Indicators (KPI's) in Project Management." ANUSANDHAN – NDIM's Journal of Business and Management Research 2, no. 1 (2020): 49–53. http://dx.doi.org/10.56411/anusandhan.2020.v2i1.49-53.

Full text
Abstract:
A project has many moving parts and it is critical that you measure the timeliness, budget, Quality and effectiveness of the Project along the way. There is need to execute these projects effectively with a limited budget. There are Key Performance Indicators (KPIs) i.e Planned Value, Actual Cost, Earned Value, Cost variance, Scheduled variance, Scheduled Performance Index, Cost Performance Index, Return on Investment. Every Project Manager can't afford to miss. To frame actionable project Key Performance Indicators (KPIs) that help to improve your team's performance. The following list of fre
APA, Harvard, Vancouver, ISO, and other styles
39

Yuan, Zheng, Mark F. van Delft, Mark Xiang Li, et al. "Key residues in the VDAC2-BAK complex can be targeted to modulate apoptosis." PLOS Biology 22, no. 5 (2024): e3002617. http://dx.doi.org/10.1371/journal.pbio.3002617.

Full text
Abstract:
BAK and BAX execute intrinsic apoptosis by permeabilising the mitochondrial outer membrane. Their activity is regulated through interactions with pro-survival BCL-2 family proteins and with non-BCL-2 proteins including the mitochondrial porin VDAC2. VDAC2 is important for bringing both BAK and BAX to mitochondria where they execute their apoptotic function. Despite this important function in apoptosis, while interactions with pro-survival family members are well characterised and have culminated in the development of drugs that target these interfaces to induce cancer cell apoptosis, the inter
APA, Harvard, Vancouver, ISO, and other styles
40

Su, Chun-Li, Lynn L. H. Huang, Li-Min Huang, Jenq-Chang Lee, Chun-Nan Lin, and Shen-Jeu Won. "Caspase-8 acts as a key upstream executor of mitochondria during justicidin A-induced apoptosis in human hepatoma cells." FEBS Letters 580, no. 13 (2006): 3185–91. http://dx.doi.org/10.1016/j.febslet.2006.04.085.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Londhe, Satish, and Smita Mahajan. "EFFECTIVE AND EFFICIENT WAY OF REDUCE DEPENDENCY ON DATASET WITH THE HELP OF MAPREDUCE ON BIG DATA." International Journal of Students' Research in Technology & Management 3, no. 6 (2015): 401. http://dx.doi.org/10.18510/ijsrtm.2015.364.

Full text
Abstract:
With the fast development of networks these days organizations has overflowing with the collection of millions of data with big number of combination. This big data challenges over trade troubles. It requires more analysis for the high-performance procedure. The new method of hadoop and MapReduce methods are discussed starting the data mining standpoint. In the proposed research work we have to progress performance through parallelization of different operations such as loading the information, index building and evaluating the queries. Thus the performance analysis is completed with the minim
APA, Harvard, Vancouver, ISO, and other styles
42

FARIDAH BINTI YUNOS, Nur Aqilah Fakhira Binti Ayub, Nurul Fatin Atiqa Binti Mohammad Rasyidi, and Muhammad Asyraf Bin Asbullah. "Self-Invertible Key on Cipher Polygraphic Polyfunction with Eigen Matrix based IMIE." Applied Mathematics and Computational Intelligence (AMCI) 13, no. 3 (2024): 13–25. http://dx.doi.org/10.58915/amci.v13i3.344.

Full text
Abstract:
Hill Cipher’s System and its modifications are still practiced mainly in sending a secret message involving images. One drawback that the recipient of the message is trying to overcome is to get the decryption key from the cipher text to plain text during the decryption process. Previous studies have proven that using self-invertible keys can reduce the computation cost to obtain this key. This paper generates a self-invertible matrix based on Integer-Entry Matrix with all Integer Eigenvalues (IMIE). Subsequently, we executed it into Cipher Polygraphic Polyfunction Cryptosystem and observed th
APA, Harvard, Vancouver, ISO, and other styles
43

Cheng, Shing Hing William, Chitchanok Chuengsatiansup, Daniel Genkin, et al. "Evict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing Attacks." IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, no. 3 (2024): 224–48. http://dx.doi.org/10.46586/tches.v2024.i3.224-248.

Full text
Abstract:
Speculative out-of-order execution is a strategy of masking execution latency by allowing younger instructions to execute before older instructions. While originally considered to be innocuous, speculative out-of-order execution was brought into the spotlight with the 2018 publication of the Spectre and Meltdown attacks. These attacks demonstrated that microarchitectural side channels can leak sensitive data accessed by speculatively executed instructions that are not part of the normal program execution. Since then, a significant effort has been vested in investigating how microarchitectural
APA, Harvard, Vancouver, ISO, and other styles
44

Ferrara, Daniele, Paolo Cicconi, Angelo Minotti, Michele Trovato, and Antonio Casimiro Caputo. "New Space Engineering Design: Characterization of Key Drivers." Applied Sciences 15, no. 15 (2025): 8138. https://doi.org/10.3390/app15158138.

Full text
Abstract:
The recent evolution of the space industry, commonly referred to as New Space, has changed the way space missions are conceived, developed, and executed. In contrast to traditional approaches, the current paradigm emphasizes accessibility, commercial competitiveness, and rapid and sustainable innovation. This study proposes a research methodology for selecting relevant literature to identify the key design drivers and associated enablers that characterize the New Space context from an engineering design perspective. These elements are then organized into three categories: the evolution of trad
APA, Harvard, Vancouver, ISO, and other styles
45

Manivannan, S. S., and E. Sathiyamoorthy. "A Prevention Model for Session Hijack Attacks in Wireless Networks Using Strong and Encrypted Session ID." Cybernetics and Information Technologies 14, no. 3 (2014): 46–60. http://dx.doi.org/10.2478/cait-2014-0032.

Full text
Abstract:
Abstract Most of the web applications are establishing the web session with the client. It is very important to protect the wireless networks against session hijacking attack. Session Hijack attack is easy to execute and difficult to detect. Wireless networks do not have specific boundary regions for the packets to be transferred. As the data packets are transferred in air, the chances of sniffing the network packets by the hackers or attackers are high by using the network sniffing tools. In this paper, we have proposed the Strong and Encrypted Session ID to prevent the session hijack attacks
APA, Harvard, Vancouver, ISO, and other styles
46

Liu, Shu Qing, and Wan He Zhang. "Study on Thread Foreign Matter Separation Key Technology Based on Intelligent Method." Advanced Materials Research 562-564 (August 2012): 2101–5. http://dx.doi.org/10.4028/www.scientific.net/amr.562-564.2101.

Full text
Abstract:
Efficient separation of cotton foreign fiber is an important and difficult task in spinning industry. For the main problems of foreign matter separator, This paper proposes cotton foreign fiber detection arithmetic based on multi-scale wavelet transform and fuzzy methods. Firstly, the image is executed through multi-scale wavelet transform in order to detect the line edge of foreign fiber. Then the size of line edge is mapped to membership space. The line edge recognition is carried out through compares the sum of all memberships with threshold value. This method can restrain the interference
APA, Harvard, Vancouver, ISO, and other styles
47

Hammouda, Kareem Nabil. "Heritage as a Key Element of Cities and Destinations Branding." Academic Research Community publication 3, no. 4 (2019): 32. http://dx.doi.org/10.21625/archive.v3i4.536.

Full text
Abstract:
Today, in a globalized connected world, Nations, cities, destinations are in a continuous competition with international rivals to define their place and value among others. It’s no longer valid for cities to stand still in such competition, depending on their basic momentum of their resources to position themselves in such global contest. Branding is an essential part of the economic sustainable development of a city and marketing it as a destination for tourism.Heritage plays a central role in creating destination brand, as heritage, with its tangible and intangible qualities is a prime fact
APA, Harvard, Vancouver, ISO, and other styles
48

Lüdemann, Jonas, Sven Rabung, and Sylke Andreas. "Systematic Review on Mentalization as Key Factor in Psychotherapy." International Journal of Environmental Research and Public Health 18, no. 17 (2021): 9161. http://dx.doi.org/10.3390/ijerph18179161.

Full text
Abstract:
Background: Mentalization processes seem to be of high relevance for social learning and seem important in all psychotherapies. The exact role of mentalization processes in psychotherapy is still unknown. The aim of the present systematic review is to investigate whether mentalization is related to the therapeutic outcome and, if so, whether it has a moderating, mediative, or predictive function. Method: A systematic review with an electronic database search was conducted. A total of 2567 records were identified, and 10 studies were included in the final synthesis. Results: Psychotherapy resea
APA, Harvard, Vancouver, ISO, and other styles
49

Tsai, Chia-Wei, Chun-Wei Yang, Jason Lin, Yao-Chung Chang, and Ruay-Shiung Chang. "Quantum Key Distribution Networks: Challenges and Future Research Issues in Security." Applied Sciences 11, no. 9 (2021): 3767. http://dx.doi.org/10.3390/app11093767.

Full text
Abstract:
A quantum key distribution (QKD) network is proposed to allow QKD protocols to be the infrastructure of the Internet for distributing unconditional security keys instead of existing public-key cryptography based on computationally complex mathematical problems. Numerous countries and research institutes have invested enormous resources to execute correlation studies on QKD networks. Thus, in this study, we surveyed existing QKD network studies and practical field experiments to summarize the research results (e.g., type and architecture of QKD networks, key generating rate, maximum communicati
APA, Harvard, Vancouver, ISO, and other styles
50

Fiorenzoli, Giuliano. "Because of Seeing Architecture: To Execute, It Is First Necessary To Conceive." Architectural Design 94, no. 6 (2024): 48–55. http://dx.doi.org/10.1002/ad.3118.

Full text
Abstract:
AbstractIn a world where the speed of architectural production is much accelerated, and the specificity of its representations requires a lack of ambiguity, the power and force of the hand‐drawing is still, to a few, a proving ground for testing interstitial ideas situated at the threshold of art and architecture. New York‐based Professor at the Pratt Institute School of Architecture and co‐founder of Atelier ZZiggurat, Giuliano Fiorenzoli reflects on some of his key projects, ideas and drawings – their dynamic constitutions and their symbiotic relationship with landscape/site and architecture
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!