Showing 2,541 - 2,560 results of 3,373 for search '"executed"', query time: 0.05s Refine Results
  1. 2541

    Exploiting Partial Reconfiguration through PCIe for a Microphone Array Network Emulator by Bruno da Silva, An Braeken, Federico Domínguez, Abdellah Touhafi

    Published 2018-01-01
    “…On the other hand, a set of strategies and heuristics to properly use partial reconfiguration allows the acceleration of the emulation by exploiting the execution parallelism. Several experiments are presented to demonstrate some of the capabilities of our platform and the benefits of using partial reconfiguration.…”
    Get full text
    Article
  2. 2542

    Modeling and Optimization of Multiaction Dynamic Dispatching Problem for Shared Autonomous Electric Vehicles by Ning Wang, Jiahui Guo

    Published 2021-01-01
    “…The fusion of electricity, automation, and sharing is forming a new Autonomous Mobility-on-Demand (AMoD) system in current urban transportation, in which the Shared Autonomous Electric Vehicles (SAEVs) are a fleet to execute delivery, parking, recharging, and repositioning tasks automatically. …”
    Get full text
    Article
  3. 2543

    Study of a Pathological E-Learning via Content Analysis on the Campus of the University of Tehran by Fatemeh Bahrami, Ali Rashidi

    Published 2024-12-01
    “…The advantage of this type of training for the educational organization in 4 categories (executive benefits, human resources, economic and educational-developmental) And the problems of this education were summarized by students in 3 general categories (learning problems, security and technology). …”
    Get full text
    Article
  4. 2544
  5. 2545

    Resource Scheduling Method for Integration of TT&C and Observation Based on Multi-Agent Deep Reinforcement Learning by Siyue CHENG, Haoran LI, Weigang BAI, Di ZHOU, Yan ZHU

    Published 2023-03-01
    “…With the development of satellite communication technology and the continuous expansion of the constellation scale, the integration of TT&C and observation technology has become the mainstream trend.The large constellation scale, many scheduling objects and complex operation joint control bring great challenges to the integrated resource scheduling of satellite network TT&C and observation.Subject to the low solution effi ciency and complex constraints of scheduling algorithms, the traditional TT&C resource scheduling technology adopts the advance injection TT&C instructions to perform tasks according to the fi xed deployment, which is diffi cult to meet the scheduling needs of emergencies and emergency tasks.Therefore, a kind of resource scheduling method based on multi-agent actor-Agent Actor-Critic Deterministic Policy Gradient Algorithms (MADDPG) was presented.With centralized training and distributed execution, the multi-agent model of integrated task of TT&C and observation was established.By analyzed the scheduling strategy of neighbor agent, the response speed of local information was improved.According to the model and constraints in the integrated resource scheduling problem of TT&C and observation, selected signifi cant and interpretable constraints, then established the multi-agent resource scheduling reinforcement learning model, and carried on the simulation test.The simulation results showed that the task benefi t of this method was 22% higher than the traditional method.…”
    Get full text
    Article
  6. 2546

    DARE: A decentralized association rules extraction scheme for embedded data sets in distributed IoT devices by Márcio Alencar, Raimundo Barreto, Horácio Fernandes, Eduardo Souto, Richard Pazzi

    Published 2020-10-01
    “…Finding these patterns and using them for decision-making can provide ease, comfort, practicality, and autonomy when executing daily activities. Performing knowledge extraction in a decentralized approach is a computational challenge considering the tight storage and processing constraints of IoT devices, unlike deep learning, which demands a massive amount of data, memory, and processing capability. …”
    Get full text
    Article
  7. 2547

    State-of-the-art survey of smart contract verification based on formal methods by Wenbo ZHANG, Simin CHEN, Lifei WEI, Wei SONG, Dongmei HUANG

    Published 2022-08-01
    “…Smart contract represents an essential application scenario of blockchain technology.Smart contract technology improves programmability and scalability of blockchain, and has broad development prospects.However, a series of security incidents caused a great number of economic losses and weakened users’ confidence in the Ethereum platform.The security of smart contract has become a critical problem that restricts the further development of smart contract.Defects in smart contract code may cause serious consequences and cannot be modified once deployed, it is especially important to verify the correctness of smart contract in advance.In recent years, researchers have obtained many achievements in verification of smart contract, but there is a lack of systematic summary of these research results.Therefore, some basic principles of Ethereum were introduced, including the transaction, gas mechanism, storage and programming language.Eight common types of vulnerabilities in smart contract were summarized and their causes were explained.Some real security events were reviewed and some examples of vulnerability codes were presented.Then, the research work on automatic verification of smart contract based on symbolic execution, model checking and theorem proving was classified and summarized.Three open-source automated tools were selected, including Mythril, Slither and Oyente.And experiments were implemented to evaluate and compare the three tools from the aspects of efficiency, accuracy and the types of vulnerability can be detected.Furthermore, related review articles were surveyed, and the advantages of this paper compared with these works were summarized.The critical problems in the vulnerability detection technology of smart contract were also summarized and the direction of future research was proposed at last.…”
    Get full text
    Article
  8. 2548

    Shape Restoration by Active Self-Assembly by D. Arbuckle, A. A. G. Requicha

    Published 2005-01-01
    “…The assembly agents initially execute a random walk. When two robots meet, they may exchange a small number of messages. …”
    Get full text
    Article
  9. 2549

    The governing system of the Vatican City State under the Fundamental Law of the Vatican City State of 2023 by Agnieszka Romanko

    Published 2024-12-01
    “…This issue required an in-depth analysis due to the fact that the Vatican City State, despite being an absolute monarchy in which the Sovereign enjoys full power, has specialised bodies equipped with legislative, executive and judicial functions, which they always exercise on behalf of the Pope. …”
    Get full text
    Article
  10. 2550

    Opportunities of Artificial Intelligence and Machine Learning in the Food Industry by Indrajeet Kumar, Jyoti Rawat, Noor Mohd, Shahnawaz Husain

    Published 2021-01-01
    “…The human workforce plays an essential role in the smooth execution of the production and packaging of food products. …”
    Get full text
    Article
  11. 2551

    A guidance to intelligent metamaterials and metamaterials intelligence by Chao Qian, Ido Kaminer, Hongsheng Chen

    Published 2025-01-01
    “…., wave-based neural network, mathematical operation, and logic operation, all of which directly execute computation, detection, and inference task in physical space. …”
    Get full text
    Article
  12. 2552

    Analisis Penyelesaian Dana Macet di Koperasi Konsumen Guru dan Pegawai Negeri di Medan Area by Ripho Delzy Perkasa, Indah Cahyaning Wulandari Prabowo, Naiya Syahfitri Siregar

    Published 2024-06-01
    “…The research subjects are (1) Chairman of the Board (2) IT Expert (3) Administrative Executive of the “Consumer Teachers and Civil Servants” cooperative located on Jl.A.R. …”
    Get full text
    Article
  13. 2553

    Corporate Governance and Cash Holdings among Non-Financial Companies Listed in the Nigerian Exchange Group by Agbonrha-Oghoye Imas Iyoha, Victor Chukwudeme Odu, Okuns Omokhudu

    Published 2024-02-01
    “…With exception of board gender diversity and institutional ownership, variables such as board independence, size, and chief executive officer equity ownership exhibit a significant inverse impact on cash holdings at a 5% level. …”
    Get full text
    Article
  14. 2554
  15. 2555

    Fishing Industry in Eighteenth-Century Astrakhan Governorate: Eyewitness Accounts of Travelers and St. Petersburg Academy of Sciences Expeditionists by Andrey A. Kurapov

    Published 2024-09-01
    “…Our insights into a variety of published sources and unpublished documents discovered in Collection 394 of the Archive attest to comprehensive descriptions of Astrakhan fisheries were first made by members of academic expeditions in accordance with duly assigned tasks and through the support of regional executives. Notes by chiefs of ‘physical expeditions’ make it possible to localize and characterize key areas of fish production in the region, identify some prominent fishery owners, determine the actual fish species’ range, production volumes and incomes, tools and methods of fishing. …”
    Get full text
    Article
  16. 2556

    Regulation of local self-government bodies powers in health care by O. V. Batryn

    Published 2023-12-01
    “…It is proposed to enhance the legal regulation of the powers of local self-government bodies by including the full list of powers of local councils and their executive committees in the healthcare field in a separate section of Article 32 of the Law on Local Self-Government.…”
    Get full text
    Article
  17. 2557

    Protective Effect of Thyme Extract on Albino Rats Exposed to Paraquat by Nazar M. Shareef Mahmood

    Published 2022-01-01
    “…The treatment duration was continued for eight executive days. Paraquat administration showed significant decrease in BW, food intake, liver, kidney weight also PQ increased malondialdehyde (MDA), low density lipoprotein (LDL), alkaline phosphatase (ALP) and, uric acid (UA) significantly. …”
    Get full text
    Article
  18. 2558

    A Low-Power Streaming Speech Enhancement Accelerator for Edge Devices by Ci-Hao Wu, Tian-Sheuan Chang

    Published 2024-01-01
    “…The proposed high performance model is optimized for hardware execution with the co-design of model compression and target application, which reduces 93.9% of model size by the proposed domain-aware and streaming-aware pruning techniques. …”
    Get full text
    Article
  19. 2559

    Constructing method of opaque predicate based on type conversion and operation of floating point numbers by Qingfeng WANG, Hao LIANG, Yawen WANG, Genlin XIE, Benwei HE

    Published 2023-10-01
    “…With the increasing complexity of software functions and the evolving technologies of network attacks, malicious behaviors such as software piracy, software cracking, data leakage, and malicious software modification are on the rise.As a result, software security has become a focal point in industry research.Code obfuscation is a common software protection technique used to hinder reverse engineering.It aims to make program analyzing and understanding more difficult for attackers while preserving the original program functionality.However, many existing code obfuscation techniques suffer from performance loss and poor concealment in pursuit of obfuscation effectiveness.Control flow obfuscation, particularly opaque predicate obfuscation, is widely used to increase the difficulty of code reverse engineering by disrupting the program’s control flow.A method was proposed to address the limitations of existing code obfuscation techniques.It utilized the phenomenon of precision loss that occurred during type conversion and floating-point number operations in computers.Under certain conditions, this method produced operation results that contradict common sense.By performing forced type conversion, addition, and multiplication with selected decimal numbers, a series of opaque predicates can be constructed based on the statistical analysis of their operation results.This approach achieved code obfuscation with high concealment, good generality, reversibility, and low overhead compared to traditional opaque predicates.Experimental verification demonstrates that this method significantly slows down attackers’ reverse engineering efforts and exhibits good resistance to dynamic analysis techniques such as symbolic execution.…”
    Get full text
    Article
  20. 2560

    A Novel Integrated Fuzzy-Rough MCDM Model for Evaluation of Companies for Transport of Dangerous Goods by Nikolina Vojinović, Siniša Sremac, Dragan Zlatanović

    Published 2021-01-01
    “…The organization and execution of the transport of dangerous goods is conditioned by a series of legal, technical, technological, safety, and engineering requirements, which must be met. …”
    Get full text
    Article