期刊文献+
共找到1,583篇文章
< 1 2 80 >
每页显示 20 50 100
Early proactive monitoring of DNA-thioguanine in patients with Crohn’s disease predicts thiopurine-induced late leucopenia in NUDT15/TPMT normal metabolizers
1
作者 Ting Yang Kang Chao +9 位作者 Xia Zhu Xue-Ding Wang Sumyuet Chan Yan-Ping Guan Jing Mao Pan Li Shao-Xing Guan Wen Xie Xiang Gao Min Huang 《World Journal of Gastroenterology》 SCIE CAS 2024年第12期1751-1763,共13页
BACKGROUND Thiopurine-induced leucopenia significantly hinders the wide application of thiopurines.Dose optimization guided by nudix hydrolase 15(NUDT15)has significantly reduced the early leucopenia rate,but there ar... BACKGROUND Thiopurine-induced leucopenia significantly hinders the wide application of thiopurines.Dose optimization guided by nudix hydrolase 15(NUDT15)has significantly reduced the early leucopenia rate,but there are no definitive biomarkers for late risk leucopenia prediction.AIM To determine the predictive value of early monitoring of DNA-thioguanine(DNATG)or 6-thioguanine nucleotides(6TGN)for late leucopenia under a NUDT15-guided thiopurine dosing strategy in patients with Crohn’s disease(CD).METHODS Blood samples were collected within two months after thiopurine initiation for detection of metabolite concentrations.Late leucopenia was defined as a leukocyte count<3.5×10^(9)/L over two months.RESULTS Of 148 patients studied,late leucopenia was observed in 15.6%(17/109)of NUDT15/thiopurine methyltransferase(TPMT)normal and 64.1%(25/39)of intermediate metabolizers.In patients suffering late leucopenia,early DNATG levels were significantly higher than in those who did not develop late leucopenia(P=4.9×10^(-13)).The DNATG threshold of 319.43 fmol/μg DNA could predict late leucopenia in the entire sample with an area under the curve(AUC)of 0.855(sensitivity 83%,specificity 81%),and in NUDT15/TPMT normal metabolizers,the predictive performance of a threshold of 315.72 fmol/μg DNA was much more remarkable with an AUC of 0.902(sensitivity 88%,specificity 85%).6TGN had a relatively poor correlation with late leucopenia whether in the entire sample(P=0.021)or NUDT15/TPMT normal or intermediate metabolizers(P=0.018,P=0.55,respectively).CONCLUSION Proactive therapeutic drug monitoring of DNATG could be an effective strategy to prevent late leucopenia in both NUDT15/TPMT normal and intermediate metabolizers with CD,especially the former. 展开更多
关键词 Thiopurine-induced late leucopenia DNA-thioguanine 6-thioguanine nucleotide proactive therapeutic drug monitoring Crohn’s disease
下载PDF
Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises
2
作者 Meysam Tahmasebi 《Journal of Information Security》 2024年第2期106-133,共28页
As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respo... As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm. 展开更多
关键词 Advanced Persistent Threats (APT) Attack Phases Attack Surface DEFENSE-IN-DEPTH Disaster Recovery (DR) Incident Response Plan (IRP) Intrusion Detection Systems (IDS) Intrusion Prevention System (IPS) Key Risk Indicator (KRI) Layered Defense Lockheed martin Kill Chain proactive Defense Redundancy Risk management Threat Intelligence
下载PDF
The computerized LASSI-BC Test versus the Standard LASSI-L Paper-and-Pencil Version in Community-Based-Samples
3
作者 Rosie E. Curiel Cid Alexandra Ortega +13 位作者 Ubbo Visser Marcela Kitaigorodsky D. Diane Zheng Diana Hincapie Kirsten Horne Crenshaw Ashleigh Beaulieu Brooke Bosworth Liz Gallardo Emory Neer Sofia Ramirez Elizabeth A. Crocco Mike Georgiou Efrosyni Sfakianaki David A. Loewenstein 《Advances in Alzheimer's Disease》 CAS 2024年第1期11-25,共15页
Proactive Semantic Interference (PSI) and failure to recover from PSI (frPSI), are novel constructs assessed by the LASSI-L. These measures are sensitive to cognitive changes in early Mild Cognitive Impairment (MCI) a... Proactive Semantic Interference (PSI) and failure to recover from PSI (frPSI), are novel constructs assessed by the LASSI-L. These measures are sensitive to cognitive changes in early Mild Cognitive Impairment (MCI) and preclinical AD determined by Aβ load using PET. The goal of this study was to compare a new computerized version of the LASSI-L (LASSI-Brief Computerized) to the standard paper-and-pencil version of the test. In this study, we examined 110 cognitively unimpaired (CU) older adults and 79 with amnestic MCI (aMCI) who were administered the paper-and-pencil form of the LASSI-L. Their performance was compared with 62 CU older adults and 52 aMCI participants examined using the LASSI-BC. After adjustment for covariates (degree of initial learning, sex, education, and language of evaluation) both the standard and computerized versions distinguished between aMCI and CU participants. The performance of CU and aMCI groups using either form was relatively commensurate. Importantly, an optimal combination of Cued B2 recall and Cued B1 intrusions on the LASSI-BC yielded an area under the ROC curve of .927, a sensitivity of 92.3% and specificity of 88.1%, relative to an area under the ROC curve of .815, a sensitivity of 72.5%, and a specificity of 79.1% obtained for the paper-and-pencil LASSI-L. Overall, the LASSI-BC was comparable, and in some ways, superior to the paper-and-pencil LASSI-L. Advantages of the LASSI-BC include a more standardized administration, suitability for remote assessment, and an automated scoring mechanism that can be verified by a built-in audio recording of responses. 展开更多
关键词 mild Cognitive Impairment proactive Semantic Interference LASSI-L Computerized Cognitive Assessment
下载PDF
Certis: Cloud Asset Management & Threat Evaluation Using Behavioral Fingerprinting at Application Layer
4
作者 Kumardwij Bhatnagar Vijay K. Madisetti 《Journal of Software Engineering and Applications》 2024年第6期474-486,共13页
This paper introduces Certis, a powerful framework that addresses the challenges of cloud asset tracking, management, and threat detection in modern cybersecurity landscapes. It enhances asset identification and anoma... This paper introduces Certis, a powerful framework that addresses the challenges of cloud asset tracking, management, and threat detection in modern cybersecurity landscapes. It enhances asset identification and anomaly detection through SSL certificate parsing, cloud service provider integration, and advanced fingerprinting techniques like JARM at the application layer. Current work will focus on cross-layer malicious behavior identification to further enhance its capabilities, including minimizing false positives through AI-based learning techniques. Certis promises to offer a powerful solution for organizations seeking proactive cybersecurity defenses in the face of evolving threats. 展开更多
关键词 Certis SSL Certificate Parsing JARm Fingerprinting Anomaly Detection proactive Defense
下载PDF
China’s Proactive Fiscal Policy
5
作者 Xing Li Chen Long 《China Economist》 2024年第1期58-74,共17页
In contrast to the traditional Western approach to macro-fiscal management,China’s proactive fiscal policy is founded on a people-centered development philosophy and,with distinctive Chinese characteristics,is a sign... In contrast to the traditional Western approach to macro-fiscal management,China’s proactive fiscal policy is founded on a people-centered development philosophy and,with distinctive Chinese characteristics,is a significant policy innovation of macroeconomic management in the Chinese modernization.Although there are notable distinctions between the Western“Keynesian”and the“nonKeynesian”schools of thought,both of these approaches’core policy goals and methodological roots are the same,composing the traditional Western macro-fiscal approach.This approach faces increasing real dilemmas.China’s proactive fiscal policy,however,places greater emphasis on future potential growth rates in addition to equilibrium between supply and demand,achieving a fiscal policy transformation with a new approach.In this paper we argue that with such a new approach,China should reconsider the nature and reasonable level of the fiscal deficit,the function and risk assessment criteria of government debt,the scope and effects of reductions in taxes and fees,its approach and focus of demand management,and the costs and resulting efficiencies of policies in order to develop a new fiscal policy paradigm that is more in line with its stated goals. 展开更多
关键词 proactive fiscal policy fiscal approach potential growth rate
下载PDF
How Do Mind-Body Practices Benefit Employees? A Daily Diary Study of Mind–Body Practices after Work and Employees’ Next-Day Proactive Behavior
6
作者 Puwen Shang Jinfan Zhou Guanglei Zhang 《International Journal of Mental Health Promotion》 2023年第1期45-62,共18页
Although it is becoming increasingly popular for organizations to offer programs of mind–body practices to their employees to improve their physical and mental health,the effects that after-work sessions of mind–bod... Although it is becoming increasingly popular for organizations to offer programs of mind–body practices to their employees to improve their physical and mental health,the effects that after-work sessions of mind–body prac-tices have on employees’work behavior remain unclear.Using the model of proactive motivation and experience sampling,this study explored the relationship between employees’mind–body practices after work and their proactive behavior in the workplace on the following day.A multilevel path analysis of data from 82 employees over seven consecutive workdays showed that employees’mind–body practices after work had a positive effect on their proactive behavior in the workplace on the following day.The relationship was mediated by next-day high-activated positive affect and problem-solving confidence.Furthermore,job control positively moderated the rela-tionship between high-activated positive affect and proactive behavior but not that between problem-solving con-fidence and proactive behavior.We discuss the theoretical and practical implications of thesefindings,and propose future research directions. 展开更多
关键词 mind-body practices proactive motivation proactive behavior non-work experiences
下载PDF
A novel proactive soft load balancing framework for ultra dense network
7
作者 Miaona Huang Jun Chen 《Digital Communications and Networks》 SCIE CSCD 2023年第3期788-796,共9页
A major challenge for the future wireless network is to design the self-organizing architecture.The reactive self-organizing model of traditional networks needs to be transformed into an active self-organizing network... A major challenge for the future wireless network is to design the self-organizing architecture.The reactive self-organizing model of traditional networks needs to be transformed into an active self-organizing network.Due to the user mobility and the coverage of small cells,the network load often becomes unbalanced,resulting in poor network performance.Mobility management has become an important issue to ensure seamless communication when users move between cells,and proactive mobility management is one of the important functions of the active Self-Organizing Network(SON).This paper proposes a proactive mobility management framework for active SON,which transforms the original reactive load balancing into a forward-aware and proactive load balancing.The proposed framework firstly uses the BART model to predict the users’temporal and spatial mobility based on a weekly cycle and then formulate the MLB optimization problem based on the soft load.Two solutions are proposed to solve the above MLB problem.The simulation results show that the proposed method can better optimize the network performance and realize intelligent mobile management for the future network. 展开更多
关键词 5G and beyond proactive load balancing Heterogeneous network Soft load Location prediction
下载PDF
The Impact of Self-Efficacy and Work Engagement on Healthcare Professionals’ Proactive Behavior 被引量:2
8
作者 Chrysovalantis Karagkounis Georgios Manomenidis +2 位作者 Charalampos G. Platis Evgenia Minasidou Thalia Bellali 《Health》 2020年第4期305-316,共12页
Job crafting (JC) is a form of proactive behavior and refers to the initiatives employees that could take to change their tasks or other job characteristics to achieve the best person-job fit. JC consists of six dimen... Job crafting (JC) is a form of proactive behavior and refers to the initiatives employees that could take to change their tasks or other job characteristics to achieve the best person-job fit. JC consists of six dimensions: seeking structural and social job resources, as well as challenges, hindering job demands, optimizing job demands, and delegating tasks. The aim of the present study was to explore the impact of self-efficacy and work engagement on healthcare professionals’ (HP) proactive behavior. A convenience sample of 295 HP working in Primary and Secondary healthcare structures of Northern Greece completed a questionnaire that included: 1) demographic/occupational characteristics, 2) the Job Crafting Scale, 3) the Generalized Self-Efficacy Scale (GSE) and 4) the Utrecht Work Engagement Scale (UWES). Increased age was found to be associated with decreased levels of seeking social job resources (p < 0.01). Education level was positively associated with increased levels of seeking structural job resources (p < 0.01), seeking challenges (p < 0.05), and optimizing job demands (p < 0.05), while job position was found to be negatively related to delegating tasks (p < 0.01). Self-efficacy was positively associated with increased levels of seeking structural resources (p < 0.001), challenges (p < 0.001), and increased levels of optimizing job demands (p < 0.001), while it was positively associated with decreased levels of delegating tasks (p < 0.05). In addition, increased work engagement was found to be associated with increased levels of seeking social job resources (p < 0.05), challenges (p < 0.01), and optimizing job demands (p < 0.01). Findings highlight the importance of self-efficacy, work engagement and individual characteristics in the realization of a resourceful work environment and HP’ adjustment in the organization. Thus, interventions that promote HP’ JC proactive behaviors should be encouraged. 展开更多
关键词 JoB Crafting Healthcare PRoFESSIoNALS proactive BEHAVIoR SELF-EFFICACY Work ENGAGEmENT
下载PDF
A Novel Computerized Cognitive Test for the Detection of Mild Cognitive Impairment and Its Association with Neurodegeneration in Alzheimer’s Disease Prone Brain Regions
9
作者 Rosie E. Curiel Cid D. Diane Zheng +11 位作者 Marcela Kitaigorodsky Malek Adjouadi Elizabeth A. Crocco Mike Georgiou Christian Gonzalez-Jimenez Alexandra Ortega Mohammed Goryawala Natalya Nagornaya Pradip Pattany Efrosyni Sfakianaki Ubbo Visser David A. Loewenstein 《Advances in Alzheimer's Disease》 2023年第3期38-54,共17页
During the prodromal stage of Alzheimer’s disease (AD), neurodegenerative changes can be identified by measuring volumetric loss in AD-prone brain regions on MRI. Cognitive assessments that are sensitive enough to me... During the prodromal stage of Alzheimer’s disease (AD), neurodegenerative changes can be identified by measuring volumetric loss in AD-prone brain regions on MRI. Cognitive assessments that are sensitive enough to measure the early brain-behavior manifestations of AD and that correlate with biomarkers of neurodegeneration are needed to identify and monitor individuals at risk for dementia. Weak sensitivity to early cognitive change has been a major limitation of traditional cognitive assessments. In this study, we focused on expanding our previous work by determining whether a digitized cognitive stress test, the Loewenstein-Acevedo Scales for Semantic Interference and Learning, Brief Computerized Version (LASSI-BC) could differentiate between Cognitively Unimpaired (CU) and amnestic Mild Cognitive Impairment (aMCI) groups. A second focus was to correlate LASSI-BC performance to volumetric reductions in AD-prone brain regions. Data was gathered from 111 older adults who were comprehensively evaluated and administered the LASSI-BC. Eighty-seven of these participants (51 CU;36 aMCI) underwent MR imaging. The volumes of 12 AD-prone brain regions were related to LASSI-BC and other memory tests correcting for False Discovery Rate (FDR). Results indicated that, even after adjusting for initial learning ability, the failure to recover from proactive semantic interference (frPSI) on the LASSI-BC differentiated between CU and aMCI groups. An optimal combination of frPSI and initial learning strength on the LASSI-BC yielded an area under the ROC curve of 0.876 (76.1% sensitivity, 82.7% specificity). Further, frPSI on the LASSI-BC was associated with volumetric reductions in the hippocampus, amygdala, inferior temporal lobes, precuneus, and posterior cingulate. 展开更多
关键词 mild Cognitive Impairment proactive Semantic Interference mRI Volume Cortical Thickness LASSI-L
下载PDF
An efficient proactive RSA scheme for large-scale ad hoc networks 被引量:1
10
作者 张瑞山 陈克非 《Journal of Shanghai University(English Edition)》 CAS 2007年第1期64-67,共4页
A previous proactive RSA scheme for large-scale ad hoc network has been shown to be faulty. In this paper, we present a new proactive RSA scheme for ad hoc networks, which includes four protocols: the initial key dis... A previous proactive RSA scheme for large-scale ad hoc network has been shown to be faulty. In this paper, we present a new proactive RSA scheme for ad hoc networks, which includes four protocols: the initial key distribution protocol, the share refreshing protocol, the share distribution protocol, and the signature generation protocol. This scheme has two advantages: the building blocks are secure, and the system is efficient. 展开更多
关键词 ad hoc networks threshold signature proactive secret sharing RSA
下载PDF
Proactive Spectrum Monitoring for Suspicious Wireless Powered Communications in Dynamic Spectrum Sharing Networks 被引量:1
11
作者 Yu Zhang Guojie Hu Yueming Cai 《China Communications》 SCIE CSCD 2021年第12期119-138,共20页
This paper studies the proactive spec-trum monitoring with one half-duplex spectrum moni-tor(SM)to cope with the potential suspicious wireless powered communications(SWPC)in dynamic spec-trum sharing networks.The jamm... This paper studies the proactive spec-trum monitoring with one half-duplex spectrum moni-tor(SM)to cope with the potential suspicious wireless powered communications(SWPC)in dynamic spec-trum sharing networks.The jamming-assisted spec-trum monitoring scheme via spectrum monitoring data(SMD)transmission is proposed to maximize the sum ergodic monitoring rate at SM.In SWPC,the suspi-cious communications of each data block occupy mul-tiple independent blocks,with a block dedicated to the wireless energy transfer by the energy-constrained suspicious nodes with locations in a same cluster(symmetric scene)or randomly distributed(asymmet-ric scene)and the remaining blocks used for the in-formation transmission from suspicious transmitters(STs)to suspicious destination(SD).For the sym-metric scene,with a given number of blocks for SMD transmission,namely the jamming operation,we first reveal that SM should transmit SMD signal(jam the SD)with tolerable maximum power in the given blocks.The perceived suspicious signal power at SM could be maximized,and thus so does the correspond-ing sum ergodic monitoring rate.Then,we further reveal one fundamental trade-off in deciding the op-timal number of given blocks for SMD transmission.For the asymmetric scene,a low-complexity greedy block selection scheme is proposed to guarantee the optimal performance.Simulation results show that the jamming-assisted spectrum monitoring schemes via SMD transmission achieve much better perfor-mance than conventional passive spectrum monitor-ing,since the proposed schemes can obtain more accu-rate and effective spectrum characteristic parameters,which provide basic support for fine-grained spectrum management and a solution for spectrum security in dynamic spectrum sharing network. 展开更多
关键词 proactive spectrum monitoring sum er-godic monitoring rate jamming-assisted proactive spectrum monitoring HALF-DUPLEX fundamental trade-off dynamic spectrum sharing network
下载PDF
Data-Driven Model for Risk Assessment of Cable Fire in Utility Tunnels Using Evidential Reasoning Approach
12
作者 彭欣 姚帅寓 +1 位作者 胡昊 杜守继 《Journal of Donghua University(English Edition)》 CAS 2023年第2期202-215,共14页
Cable fire is one of the most important events for operation and maintenance(O&M)safety in underground utility tunnels(UUTs).Since there are limited studies about cable fire risk assessment,a comprehensive assessm... Cable fire is one of the most important events for operation and maintenance(O&M)safety in underground utility tunnels(UUTs).Since there are limited studies about cable fire risk assessment,a comprehensive assessment model is proposed to evaluate the cable fire risk in different UUT sections and improve O&M efficiency.Considering the uncertainties in the risk assessment,an evidential reasoning(ER)approach is used to combine quantitative sensor data and qualitative expert judgments.Meanwhile,a data transformation technique is contributed to transform continuous data into a five-grade distributed assessment.Then,a case study demonstrates how the model and the ER approach are established.The results show that in Shenzhen,China,the cable fire risk in District 8,B Road is the lowest,while more resources should be paid in District 3,C Road and District 25,C Road,which are selected as comparative roads.Based on the model,a data-driven O&M process is proposed to improve the O&M effectiveness,compared with traditional methods.This study contributes an effective ER-based cable fire evaluation model to improve the O&M efficiency of cable fire in UUTs. 展开更多
关键词 underground utility tunnel(UUT) risk assessment evidential reasoning(ER) operation and maintenance(o&m)
下载PDF
Failure Prediction for Scientific Workflows Using Nature-Inspired Machine Learning Approach
13
作者 S.Sridevi Jeevaa Katiravan 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期223-233,共11页
Scientific workflows have gained the emerging attention in sophisti-cated large-scale scientific problem-solving environments.The pay-per-use model of cloud,its scalability and dynamic deployment enables it suited for ex... Scientific workflows have gained the emerging attention in sophisti-cated large-scale scientific problem-solving environments.The pay-per-use model of cloud,its scalability and dynamic deployment enables it suited for executing scientific workflow applications.Since the cloud is not a utopian environment,failures are inevitable that may result in experiencingfluctuations in the delivered performance.Though a single task failure occurs in workflow based applications,due to its task dependency nature,the reliability of the overall system will be affected drastically.Hence rather than reactive fault-tolerant approaches,proactive measures are vital in scientific workflows.This work puts forth an attempt to con-centrate on the exploration issue of structuring a nature inspired metaheuristics-Intelligent Water Drops Algorithm(IWDA)combined with an efficient machine learning approach-Support Vector Regression(SVR)for task failure prognostica-tion which facilitates proactive fault-tolerance in the scheduling of scientific workflow applications.The failure prediction models in this study have been implemented through SVR-based machine learning approaches and the precision accuracy of prediction is optimized by IWDA and several performance metrics were evaluated on various benchmark workflows.The experimental results prove that the proposed proactive fault-tolerant approach performs better compared with the other existing techniques. 展开更多
关键词 Failure prediction intelligent water drops support vector regression proactive fault-tolerance scientific workflows precision accuracy resource provisioning
下载PDF
Verifiable Secret Redistribution for Proactive Secret Sharing Schemes 被引量:4
14
作者 于佳 孔凡玉 李大兴 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期236-241,共6页
A new scheme to verifiably redistribute a secret from the old to new shareholders without reconstruction of the secret is presented in this paper. The scheme allows redistribution between different access structures a... A new scheme to verifiably redistribute a secret from the old to new shareholders without reconstruction of the secret is presented in this paper. The scheme allows redistribution between different access structures and between different threshold schemes. A point worth mentioning is that this verifiable secret redistribution (VSR) scheme can identify dishonest old shareholders during redistribution without any assumption. A certain technique is adopted to verify the correctness of the old shares of the secret. As a result, the scheme is very efficient. It can be applied to proactive secret sharing (PSS) schemes to construct more flexible and practical proactive secret sharing schemes. 展开更多
关键词 分配方法 共享技术 网络安全 技术性能
下载PDF
Establishment and application of service mapping model for proactive remanufacturing impeller 被引量:2
15
作者 宋守许 邰莹莹 柯庆镝 《Journal of Central South University》 SCIE EI CAS CSCD 2016年第12期3143-3152,共10页
Since the complex impeller structure and the difficult remanufacturing process may easily cause advance remanufacturing or excessive use,an optimized design method of impeller and service mapping model was presented f... Since the complex impeller structure and the difficult remanufacturing process may easily cause advance remanufacturing or excessive use,an optimized design method of impeller and service mapping model was presented for its proactive remanufacturing with setting up to explore the best remanufacturing time point in this work.Considering a certain model of long distance pipeline compressor impeller with the Basquin equation and the design method of impeller,the mathematical relationship between the changes of structure and life of the impeller was established.And the service mapping model between the structure and life was set up and simulated by ANSYS software.Thus,the service mapping model was applied to feedback the original design for proactive remanufacturing.In this work,the best proactive remanufacturing time point of impeller was analyzed with the service mapping model,and the structural parameter values could be optimized at this time point.Meanwhile,in the results of this simulation,it proves that the impeller under this optimization performance could satisfy the impeller operating demands.Therefore,comparing with the traditional optimization design method,the remanufacturing optimized design based on the service mapping model is feasible in proactive remanufacturing for sustainable development. 展开更多
关键词 叶轮结构 映射模型 再制造 服务 优化设计方法 ANSYS软件 应用 仿真结果
下载PDF
Entrepreneurial Orientation and Innovation Ecosystems in the Industrial Sector, Central Region, Kampala, Uganda: A Review
16
作者 Serunjoji Ismah 《Open Journal of Applied Sciences》 2023年第12期2447-2460,共14页
This review explores entrepreneurial orientation and innovation ecosystems in the industrial sector of the Central Region, Kampala, Uganda, through an analysis of ten scholarly articles. The study contextualizes the r... This review explores entrepreneurial orientation and innovation ecosystems in the industrial sector of the Central Region, Kampala, Uganda, through an analysis of ten scholarly articles. The study contextualizes the research within the regional landscape and establishes a theoretical framework through a focused literature review. Key findings highlight the intersection of entrepreneurial activities and innovation dynamics, emphasizing the region’s unique contributions to the broader field. Discussions on discrepancies and unexplored territories within the articles offer insights into limitations and research gaps. The manuscript concludes by identifying future research avenues, providing a roadmap for ongoing inquiry into the entrepreneurial and innovative dimensions of the Central Region’s industrial sector. This synthesis underscores the importance of cultivating an entrepreneurial mindset and collaborative innovation strategies for sustainable industrial development in the region. 展开更多
关键词 Entrepreneurial orientation Innovation Ecosystems Industrial Sector Central Region Kampala Uganda mixed methods Collaborative Networks proactiveness Risk-Taking Competitive Aggressiveness
下载PDF
An Improved Logic Diagram of RCM with the Proactive Maintenance
17
作者 SONG Wenyuan1,KANG Jianshe1,WEN Liang1,HONG Qing2 (1.Material Commanding and Managing Department,Shijiazhuang Mechanic Engineering College,Shijiazhuang 050003, China 2.Foreign training Department,Shijiazhuang Mechanic Engineering College, Shijiazhuang 050003,China) 《武汉理工大学学报》 CAS CSCD 北大核心 2006年第S1期344-348,共5页
For some repeatedly occurring failure with root cause,the reliability centered maintenance (RCM) can’t deal with them effectively. So,the logic diagram of RCM was improved by combining it with proactive maintenance t... For some repeatedly occurring failure with root cause,the reliability centered maintenance (RCM) can’t deal with them effectively. So,the logic diagram of RCM was improved by combining it with proactive maintenance technology. First,root cause analysis is used to build a key result-cause chain of the repeatedly occur failure. Then,a reasonable link in the chain,which work station is suitable to be monitored and repaired,should be selected. Finally,the corresponding proactive maintenance measure should be adopted to prevent the matter occur on the chain and broken the key result-cause chain,and the repeatedly occur failure is to be prevent at a deeper level or from the root cause. By doing this,a system engineering method comes into being,not only it can determine the needs of preventive maintenance for equipment,but also determine the proactive maintenance needs for equipment. The analysis result of reliability centered maintenance and the analysis result considering proactive maintenance are combined to form a maintenance guideline containing proactive maintenance strategy. 展开更多
关键词 RCm proactive maintenance result-cause CHAIN ImPRoVED repeatedly occur failure
下载PDF
Proactive Weighted Threshold Signature Based on Generalized Chinese Remainder Theorem
18
作者 Cheng Guo Chin-Chen Chang 《Journal of Electronic Science and Technology》 CAS 2012年第3期250-255,共6页
This paper proposes a new proactive weighted threshold signature scheme based on Iflene's general secret sharing, the generalized Chinese remainder theorem, and the RSA threshold signature, which is itself based on t... This paper proposes a new proactive weighted threshold signature scheme based on Iflene's general secret sharing, the generalized Chinese remainder theorem, and the RSA threshold signature, which is itself based on the Chinese reminder theorem. In our scheme, group members are divided into different subgroups, and a positive weight is associated to each subgroup, where all members of the same subgroup have the same weight. The group signature can be generated if and only if the sum of the weights of members involved is greater than or equal to a fixed threshold value. Meanwhile, the private key of the group members and the public key of the group can be updated periodically by performing a simple operation aimed at refreshing the group signature message. This periodical refreshed individual signature message can enhance the security of the proposed weighted threshold signature scheme. 展开更多
关键词 Generalized Chinese remaindertheorem proactive weighted threshold signature RSAcryptosystem secret sharing.
下载PDF
Service-aware proactive vertical handoff algorithm based on bandwidth requirement prediction
19
作者 李屹 梅敬青 纪红 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2012年第2期36-42,共7页
Due to the heterogeneity and versatility of emerging services and applications in wireless networks,it has been a great challenge to improve the system performance with both the awareness of service characteristics an... Due to the heterogeneity and versatility of emerging services and applications in wireless networks,it has been a great challenge to improve the system performance with both the awareness of service characteristics and the balance of the traffic between adjacent networks.This paper is committed to solve this problem by introducing a Service-aware Proactive Vertical Handoff(SPVH) algorithm in Heterogeneous Wireless Networks(HWN).A Bandwidth Requirement Prediction Model(BRPM) is illustrated at first,which is adaptive to the system condition variants to forecast traffic requests.Moreover,by adopting a service-aware objective utility function,each user can optimize the vertical handover decisions with awareness of the related supporting networks and service characteristics.Since the decision process is executed with consideration of BRPM predictions,the SPVH algorithm can avoid congestion in HWN through a proactive method.The experiment results show that the proposed SPVH can solidly enhance the system performance in terms of service access ratio,average access delay,system throughput,usage ratio of spectrum resource,and eventually achieve higher network utility. 展开更多
关键词 service-aware heterogeneous wireless networks bandwidth requirement prediction proactive
下载PDF
A Dependent-Chance Programming Model for Proactive Scheduling
20
作者 柯华 王磊 黄虎 《Journal of Donghua University(English Edition)》 EI CAS 2015年第2期199-202,共4页
Proactive scheduling based on expected value model is an effective method to develop robust schedules in consideration of minimizing project cost caused by deviations between realized and planed activity starting time... Proactive scheduling based on expected value model is an effective method to develop robust schedules in consideration of minimizing project cost caused by deviations between realized and planed activity starting times.However,these schedules may be realized with low probabilities.In this paper,a novel model based on dependent-chance programming(DCP) is proposed,considering probability as well as solution robustness.A hybrid intelligent algorithm integrating stochastic simulation and genetic algorithm(GA)is designed to solve the proposed model.Moreover,a numerical example is conducted to reveal the effectiveness of the proposed model and the algorithm. 展开更多
关键词 project SCHEDULING GENETIC algorithm(GA) dependent-chance programming(DCP) stochastic activity durations proactive SCHEDULING
下载PDF
上一页 1 2 80 下一页 到第
使用帮助 返回顶部