Showing 19,921 - 19,940 results of 23,138 for search '"construction"', query time: 0.26s Refine Results
  1. 19921

    EN-Bypass: a security assessment method on e-mail user interface notification by Jingyi YUAN, Zichuan LI, Guojun PENG

    Published 2023-06-01
    “…Email plays an important role in people’s daily communications, while also attracts the attention of hackers.Email is frequently used in phishing attacks, with email sender spoofing being a key step.To prevent sender-spoofing attacks, email vendors often deploy email security protocols such as SPF, DKIM, and DMARC to verify the sender’s identity.Moreover, some vendors add email UI notification mechanism on email clients to help users identify the real sender.However, there is no uniform standard in the implementation of the email UI notification mechanism, which varies among vendors.Whether the mechanism effectively prevents sender-spoofing attacks still needs verification.In this paper, the security evaluation of the email UI notification mechanism was studied to gain better understanding of its efficacy and to eventually protect users from sender-spoofing attacks.Ten world-famous email services were researched and evaluated, of which seven deployed the email UI notification mechanism.Consequently, a new type of sender-spoofing attack was proposed which was called EN-Bypass, aiming to bypass the email UI notification mechanism by forging the “From” and “Sender” fields in the email header.To verify the email UI notification mechanism’s security and reliability, EmailSenderChecker was implemented, which can automatically evaluate the existence of the EN-Bypass attack.The result shows that all seven email service vendors suffer from EN-Bypass attack.Attackers could bypass the email UI notification mechanism by constructing special email headers and spoofing the sender.Finally, to improve the mail service security, three suggestions about the email UI notification mechanism were proposed for the mail service vendors.…”
    Get full text
    Article
  2. 19922

    The efficiency of using the technology of “edutainment” in teaching foreign languages by Julia D. Ermakova, Tamara M. Nosova

    Published 2019-06-01
    “…Modern tendencies to general digitalization in all spheres of life in our society create objective preconditions to pay teachers’attention to the new approach, constructing the educational process which has arisen recently - edutainment (from Eng. …”
    Get full text
    Article
  3. 19923

    Mechanisms of foreign language learning anxiety and enhancement strategies among Chinese tertiary students: a grounded theory approach by Junxia Gao, Yanpeng Zuo

    Published 2025-01-01
    “…The analysis identifies two core categories of anxiety: external sociocultural factors and internal self-regulation issues. The study constructs a model which indicates that external factors, such as maladaptation to the academic transition, disconnection between high school and university curricula, and intense academic competition, directly contribute to this anxiety. …”
    Get full text
    Article
  4. 19924

    Health-related quality of life in hemato-oncology patients: role of informativeness and doctor-patient communication by Stella Sremić, Lovorka Brajković, Vanja Kopilaš

    Published 2024-05-01
    “…# Background The patient's information about the disease and doctor-patient communication are both constructs whose importance is emphasized in the theory, but much less frequently researched and used in the practice…”
    Get full text
    Article
  5. 19925

    Developing Smart Measurement Device to Measure Kinetic Friction Coefficients of Bi-Tilt Isolator by Ming-Hsiang Shih, Wen-Pei Sung

    Published 2019-01-01
    “…The Arduino boards Arduino Nano, Arduino MPU-9250, and Arduino SD modules were combined to create this proposed smart device and mounted on three aluminum extrusions constructed as a horizontal platform. Then, varying amounts of steel gaskets were applied to adjust the various slopes for sliding tests. …”
    Get full text
    Article
  6. 19926

    Comparison and Selection of Channel Desilting Schemes Based on Hydrodynamic Models by TONG Yu, JIA Jinrui, HOU Jingming, JING Jing, ZHANG Fan, ZHOU Qingshi, WANG Tian, LIU Yuling

    Published 2025-01-01
    “…In order to explore the desilting effects of different channel desilting schemes, a hydrodynamic model accelerated by a graphic process unit (GPU) was used to construct a flood evolution model for the study area and simulate the flood inundation situation of the channels in the study area after implementing four desilting schemes at different return periods. …”
    Get full text
    Article
  7. 19927

    Toward <i>Mycobacterium tuberculosis</i> Virulence Inhibition: Beyond Cell Wall by Maria S. Kotliarova, Mikhail S. Shumkov, Anna V. Goncharenko

    Published 2024-12-01
    “…Additionally, models for the search of virulence inhibitors are discussed, such as virtual screening in silico, in vitro enzyme inhibition assay, the use of recombinant Mtb strains with reporter constructs, phenotypic analysis using in vitro cell infection models and specific environments.…”
    Get full text
    Article
  8. 19928

    N.Ya. Danilevsky and M.E. Saltykov-Shchedrin about Russia and Europe by Yu.A. Martynova, D.E. Martynov

    Published 2022-12-01
    “…Definite political conclusions were drawn from this general construct: cultural-historical types of different genesis cannot interact or successfully transfer a system of values to each other. …”
    Get full text
    Article
  9. 19929

    A phenomenological model of non-genomic variability of luminescent bacterial cells by S. I. Bartsev

    Published 2023-12-01
    “…To describe experimental distributions, a phenomenological model that links the light of a bacterial cell with the history of events at the molecular level was constructed. The proposed phenomenological model with a minimum number of fitting parameters (1.5) provides a satisfactory description of the complex process of formation of cell distributions by luminescence intensity at different stages of bacterial culture growth. …”
    Get full text
    Article
  10. 19930

    Lipoprotein Nanoplatform for Targeted Delivery of Diagnostic and Therapeutic Agents by Jerry D. Glickson, Sissel Lund-Katz, Rong Zhou, Hoon Choi, I-Wei Chen, Hui Li, Ian Corbin, Anatoliy V. Popov, Weiguo Cao, Liping Song, Chenze Qi, Diane Marotta, David S. Nelson, Juan Chen, Britton Chance, Gang Zheng

    Published 2008-03-01
    “…A semisynthetic nanoparticle has been constructed by coating magnetite iron oxide nanoparticles with carboxylated cholesterol and overlaying a monolayer of phospholipid to which apolipoprotein A1 or E was adsorbed for targeting HDL or adsorbing synthetic amphipathic helical peptides ltargeting LDL or folate receptors. …”
    Get full text
    Article
  11. 19931

    IN, THROUGH, WITH et l’expression de la causalité en anglais contemporain. Un exemple d’application des concepts de la TOPÉ by Lise Hamelin

    Published 2021-10-01
    “…This is what gives rise to the semantic difference between (3) and (4).(3) Managers can also be what [inaudible] referred to as ‘stress carriers’, causing stress for those around them, for example by being ‘the lovable incompetent boss who sets objectives, then changes his mind, or the flip-side of that, the dictator boss who rules with fear’.(4) Gordon Brown “I ruled in fear” he says more than once.By involving distinct locating operations, IN, THROUGH and WITH construct causality differently, hence the specifi semantic profile of each marker, for example the fact that with THROUGH, the locator is construed as infelicitous. …”
    Get full text
    Article
  12. 19932

    Public Transport in Rural Roads: Measures to Increase Its Modal Share in Iran by Alireza Afkham, Shahriar Afandizadeh, Ali Naderan

    Published 2021-01-01
    “…In the second section, based on the qualitative questions, a multivariate linear estimation model of the number of rural passengers was constructed. Moreover, in the third section, the users’ suggested keywords focused on policy-making, travel time optimization, quality of services, and safety. …”
    Get full text
    Article
  13. 19933

    The Analysis of Driver’s Recognition Time of Different Traffic Sign Combinations on Urban Roads via Driving Simulation by Kun Liu, Hongxing Deng

    Published 2021-01-01
    “…It abstracted the information transmission model to construct the driver’s information processing model. …”
    Get full text
    Article
  14. 19934

    ANALYSIS AND EVALUATION FUSELAGE SECTION’S CRASHWORTHINESS OF TYPICAL CIVIL AIRPLANE BASED ON PASSENGER RESPONSE by ZHU XianFei, FENG YunWen, XUE XiaoFeng, ZHU ZhengZheng

    Published 2020-01-01
    “…The crashworthiness of the constructed civil aircraft is systematically evaluated by the comprehensive crashworthiness evaluation method proposed in this paper,it shows that the crashworthiness of this civil aircraft is good,except for the occupant’s lumbar load slightly exceeding the airworthiness limit and requiring corresponding design improvements,the other evaluation indexes are all in accordance with the requirements.…”
    Get full text
    Article
  15. 19935

    Design and Analysis of a New Type of 3T1R Force Haptic Master Operating Parallel Mechanism by Pengcheng Zhang, Lubin Hang, Xiaobo Huang, Huibin Yang, Baojun Zhang, Lusheng Zhou, Junrong Chen, Ziyu Liu, Shisen Lin

    Published 2021-10-01
    “…In the light of motion characteristics of the ultrasonic testing probe for the hollow bolt detection,a new type of haptic master operation parallel mechanism (4-HSOC{-R<italic><sub>i</sub></italic><sub>1</sub>//R<italic><sub>i</sub></italic><sub>2</sub>(-P(4R))//R<italic><sub>i</sub></italic><sub>3</sub>⊥R<italic><sub>i</sub></italic><sub>4</sub>-}) is constructed by the topology synthesis method of parallel mechanism based on position and orientation characteristics (POC) set. …”
    Get full text
    Article
  16. 19936

    Use of the measurement tools of TeamSTEPPS®: a scoping review by Hümeyra Dener, Melih Elçin

    Published 2025-02-01
    “…Conclusion T-TAQ and T-TPQ were used in the studies involving the students and healthcare professionals with or without educational programs at all levels of healthcare education continuum and service, and were applied at various time intervals according to the aim of gathering data on the teamwork constructs seperately or holistically.…”
    Get full text
    Article
  17. 19937

    Enhancing lane detection in autonomous vehicles with multi-armed bandit ensemble learning by J. Arun Pandian, Ramkumar Thirunavukarasu, L. Thanga Mariappan

    Published 2025-01-01
    “…Convolutional Neural Networks (CNNs) architecture which includes ENet, PINet, ResNet-50, ResNet-101, SqueezeNet, and VGG16Net are employed in lane detection problems to construct segmentation models and demonstrate proficiency in distinct road conditions. …”
    Get full text
    Article
  18. 19938

    NLP neural network copyright protection based on black box watermark by Long DAI, Jing ZHANG, Xuefeng FAN, Xiaoyi ZHOU

    Published 2023-02-01
    “…With the rapid development of natural language processing techniques, the use of language models in text classification and sentiment analysis has been increasing.However, language models are susceptible to piracy and redistribution by adversaries, posing a serious threat to the intellectual property of model owners.Therefore, researchers have been working on designing protection mechanisms to identify the copyright information of language models.However, existing watermarking of language models for text classification tasks cannot be associated with the owner’s identity, and they are not robust enough and cannot regenerate trigger sets.To solve these problems, a new model, namely black-box watermarking scheme for text classification tasks, was proposed.It was a scheme that can remotely and quickly verify model ownership.The copyright message and the key of the model owner were obtained through the Hash-based Message Authentication Code (HMAC), and the message digest obtained by HMAC can prevent forgery and had high security.A certain amount of text data was randomly selected from each category of the original training set and the digest was combined with the text data to construct the trigger set, then the watermark was embedded on the language model during the training process.To evaluate the performance of the proposed scheme, watermarks were embedded on three common language models on the IMDB’s movie reviews and CNews text classification datasets.The experimental results show that the accuracy of the proposed watermarking verification scheme can reach 100% without affecting the original model.Even under common attacks such as model fine-tuning and pruning, the proposed watermarking scheme shows strong robustness and resistance to forgery attacks.Meanwhile, the embedding of the watermark does not affect the convergence time of the model and has high embedding efficiency.…”
    Get full text
    Article
  19. 19939

    The role of candidate genetic polymorphisms in covid-19 susceptibility and outcomes by Anthony Yazbeck, Reem Akika, Zainab Awada, Nathalie K. Zgheib

    Published 2025-02-01
    “…Candidate genetic variants were analyzed in association with COVID-19 susceptibility, severity, hospitalization and hypoxia, using univariate and multivariate models. PRS constructed from the weighted sum of variants was evaluated in association with COVID-19 outcomes. …”
    Get full text
    Article
  20. 19940

    Automatic Adaptive Algorithm for Delineation of Cerebral-Spinal Fluid Regions for Non-contrast Magnetic Resonance Imaging Volumetry and Cisternography in Mice by Ryszard Gomolka

    Published 2025-01-01
    “…The algorithm employs adaptive thresholding and region growing to accurately and repeatably delineate CSF space regions in 3D constructive interference steady-state (3D-CISS) images acquired using a 9.4 Tesla MR system and a cryogenically cooled transmit/receive resonator. …”
    Get full text
    Article