Suggested Topics within your search.
Suggested Topics within your search.
- Architecture 4
- Information technology 2
- Internet in public administration 2
- Public administration 2
- ARCHITECTURE / Design, Drafting, Drawing & Presentation 1
- ARCHITECTURE / General 1
- ARCHITECTURE / Reference 1
- ARCHITECTURE / Urban & Land Use Planning 1
- Anatomy of a project 1
- Ancient greek society 1
- Antiquities 1
- Architecture--Study and teaching (Graduate) 1
- Artificial Intelligence 1
- Artificial intelligence 1
- Bouwkunst 1
- Building 1
- Building materials 1
- Church buildings 1
- Collection and preservation 1
- Communication in architecture 1
- Communication policy 1
- Community development 1
- Conservation and restoration 1
- Cultural property 1
- Data Mining and Knowledge Discovery 1
- Data mining 1
- Dressmaking 1
- Economic development 1
- Electronic commerce 1
- Enterprise application integration (Computer systems) 1
-
9541
Effect of Discarded Group B and Group D Car Category Tyre Rubber Chippings as Partial Replacement for Coarse Aggregates in M25 Concrete.
Published 2023“…Although there was a decrease in strength, it was determined from this experimental study that this type of concrete was suitable for a number of architectural applications requiring medium to low compressive strength. …”
Get full text
Thesis -
9542
Improved BCI calibration in multimodal emotion recognition using heterogeneous adversarial transfer learning
Published 2025-01-01“…We benchmark the efficacy of three generative adversarial network (GAN) architectures, such as conditional GAN (CGAN), conditional Wasserstein GAN (CWGAN), and CWGAN with gradient penalty (CWGAN-GP) within this framework. …”
Get full text
Article -
9543
Ultra-compact quintuple-band terahertz metamaterial biosensor for enhanced blood cancer diagnostics.
Published 2025-01-01“…It is constructed using a polyethylene terephthalate (PET) dielectric layer and two aluminum (Al) layers, with the top layer serving as a base for the THz-range resonator. Careful design, architectural arrangement, and optimization of the geometry parameters allow for achieving nearly perfect absorption rates (>95%) across all operating bands. …”
Get full text
Article -
9544
Application of electric boilers for water apartment heat supply
Published 2023-09-01“…The issues of equipment safety and costs of service maintenance are considered. Constructive and architectural solutions of equipment placement are proposed.Materials and methods. …”
Get full text
Article -
9545
New Data on the Middle Paleolithic Site Chelyuskinets II (Based on 2024 Fieldwork Results)
Published 2024-12-01Get full text
Article -
9546
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article -
9547
-
9548
Statistical properties and material partial factors of ECC material based on shear failure member
Published 2025-01-01Get full text
Article -
9549
Land use/cover change simulation research: A system literature review based on bibliometric analyses
Published 2025-01-01Get full text
Article -
9550
Advancing hybrid ventilation in hot climates: a review of current research and limitations
Published 2025-01-01Get full text
Article -
9551
-
9552
-
9553
-
9554
A New Method for Artificial Core Reconstruction of a Fracture-Control Matrix Unit
Published 2020-01-01Get full text
Article -
9555
-
9556
La restitution architecturale et hydraulique du rampant des Massues sur l’aqueduc de la Brévenne à Lyon et ses conséquences sur l’aval du parcours
Published 2023-12-01“…The determination of the flow rate using our proposed method, on the other hand, makes it possible to test the relevance of certain hypotheses advanced by architectural restoration or reconstruction of the aqueducts’ course. …”
Get full text
Article -
9557
-
9558
-
9559
Anti-Impact Performance Enhancement of Two-Way Spanning Slab through the Implementation of Steel Trussed Bars
Published 2024-01-01“…Reinforced concrete (RC) slabs represent integral structural components extensively employed in architectural and infrastructural frameworks owing to their inherent robustness and longevity. …”
Get full text
Article -
9560