Showing 1,481 - 1,500 results of 3,373 for search '"executed"', query time: 0.06s Refine Results
  1. 1481

    Accelerating cryptographic computation with parallel computing mechanisms in Android platform by Ning FANG, Weibing CAO, Donghe NI, Guandong DI

    Published 2019-02-01
    “…Aiming to accelerate cryptographic computation in Android platform,parallel computing method is adopted.Utilizing RenderScript framework in Android platform,big integer multiplication operation is implemented in parallel,which provides efficient and fast basic operations for cryptographic schemes such as elliptic curve.Storage structure and computing logic are designed and implemented for parallel computation of big integer multiplication.Integers are decomposed and handled as matrix elements,so that all additive and multiplicative operations can be performed simultaneously,which provides accelerated intermediate result for multiplication operations.Experiment results show that,compared to the original Java library for big integers in the Android platform,the proposed method has distinctive advantage in execution time.…”
    Get full text
    Article
  2. 1482

    Research of the Electric Drive with Intermittent Motion Law by N. A. Voronina, A. D. Umurzakova, L. A. Payuk, K. V. Khatsevskiy

    Published 2020-04-01
    “…An electric drive with an intermittent law of the shaft motion of the executive motor, which is widely used in various fields of industry, is considered. …”
    Get full text
    Article
  3. 1483

    «Today we need to talk about the Civil War with restraint, without the desire to take anyone’s side...» by R. G. Gagkuev

    Published 2024-02-01
    “…Ruslan Grigorievich Gagkuev — Doctor of Historical Sciences, Chairman of the Board of the Russian Historical Society, Executive Director of the History of the Fatherland Foundation, leading researcher at the Center for Military History of Russia at the Institute of Russian History of the Russian Academy of Sciences. …”
    Get full text
    Article
  4. 1484

    Automation Processes for Efficient Verification of Complex Systems: An Empirical Case Study by Rune Andre Haugen, Nils-Olav Skeie, Gerrit Muller

    Published 2024-12-01
    “…The automation efforts focused on four areas: (1) test setup, (2) test execution, (3) test result analysis, and (4) documentation. …”
    Get full text
    Article
  5. 1485

    Exploiting Neural-Network Statistics for Low-Power DNN Inference by Lennart Bamberg, Ardalan Najafi, Alberto Garcia-Ortiz

    Published 2024-01-01
    “…Specialized compute blocks have been developed for efficient nn execution. However, due to the vast amount of data and parameter movements, the interconnects and on-chip memories form another bottleneck, impairing power and performance. …”
    Get full text
    Article
  6. 1486

    A RESEARCH ON THE ESTABLISHMENT OF TOTAL QUALITY MANAGEMENT IN MUNICIPALITIES by Onur Kemal Yılmaz

    Published 2023-03-01
    “…As a result, the ranking was made by the experts who participated in the research as follows; training of municipal top executives, public demand, establishment of Total Quality Management Directorate in municipalities, development of municipal legislation, supervision of municipalities by the General Directorate of local administrations.…”
    Get full text
    Article
  7. 1487

    Protocol for assessing the clogging of the mitochondrial translocase of the outer membrane by precursor proteins in human cells by John Kim, Hilla Weidberg

    Published 2025-03-01
    “…We then show how co-immunoprecipitation can be used to test the stalling of precursors inside TOM.For complete details on the use and execution of this protocol, please refer to Kim et al.1 : Publisher’s note: Undertaking any experimental protocol requires adherence to local institutional guidelines for laboratory safety and ethics.…”
    Get full text
    Article
  8. 1488

    Defense of hidden backdoor technology for Web by Liyue CHEN, Xin SUN, Tiansheng CHENG, Chunming WU, Shuangxi CHEN

    Published 2020-05-01
    “…Rootkit is a set of persistent and undetectable attack technologies,which can hide their attack behavior and backdoor trace by modifying software or kernel in operating system and changing execution path of instruction.Firstly,the basic definition and evolution of Rootkit were introduced,then the operating principle,current mainstream technology and detection methods of Rootkit were discussed.Then,through comparative experiments on performance and security,the application of mimic defense system was described for Web based on dynamic,heterogeneous,redundant structure under Trojan Horse attack.Experiments show that mimic defense system can effectively defend against Trojan Horse in tests in the premise of low overhead.At last,the opportunities and challenges of the DHR system were summarized.…”
    Get full text
    Article
  9. 1489

    Entre ethos professionnel et logiques d’entreprises : La recherche et l’innovation dans les agences d’architecture by Mélanie Guenot

    Published 2020-12-01
    “…Encouraged by an incentive and reforming public policy, agency executives are showing a real interest in integrating research or innovation practices into their structures. …”
    Get full text
    Article
  10. 1490

    Direct Applicability of Generally Accepted Principles of International Law in Legal Order of the Republic of Slovenia by Anton Olaj

    Published 2013-11-01
    “…Self-executing, incorporated and generally accepted principles of international law have been used directly in legal order of the Republic of Slovenia. …”
    Get full text
    Article
  11. 1491

    Design and fabrication study of a small remote-controlled bionic butterfly flapping-wing flying machine by Yaozeng Mao, Fan Wu, Junjie Lao, Minglei Li

    Published 2024-12-01
    “…This study not only demonstrates the feasibility of the design and implementation of small bionic butterfly aircraft, but also emphasizes its potential application value in the execution of small space missions, providing a new perspective for the design and optimization of bionic aircraft in the future. …”
    Get full text
    Article
  12. 1492

    An automatic verification method for software quality with real business data by TIAN Biao, CUI Wei, HUANG Hui, FENG Xiaolong

    Published 2024-03-01
    “…This scheme automatically perceives responses, adjusts access rates accordingly, and schedules additional server executions using real business data, significantly enhancing operational efficiency and result intuitiveness.…”
    Get full text
    Article
  13. 1493

    BARRIERS OF EXTERNAL ECONOMIC ACTIVITIES TO RUSSIAN NON-COMMODITY EXPORTS by E. A. Amiraslanova, N. Yu. Barkova, T. O. Shpunt

    Published 2019-06-01
    “…Also the classification of such “barriers of ignorance” has been developed and the measures, allowing to reduce the impact of these barriers have been proposed: creation of an electronic commercial site; creation of multifunctional centers, in which certification and licensing procedures would be carried out, customs and tax сonsultancy to potential exporters, advice and assistance in obtaining the necessary permission documentation in foreign countries; сounselling on the correct execution of foreign economic contracts to avoid double taxation and transfer pricing and other measures.…”
    Get full text
    Article
  14. 1494

    Protocol for the isolation of silk glands from silkworms for snRNA-seq and spatial transcriptomics by Yan Ma, Keshu Dong, Jie Hu, Yiyun Tang, Hanfu Xu

    Published 2025-03-01
    “…This protocol enables the exploration of the spatial distribution of SG cells at single-cell resolution.For complete details on the use and execution of this protocol, please refer to Ma et al.1 : Publisher’s note: Undertaking any experimental protocol requires adherence to local institutional guidelines for laboratory safety and ethics.…”
    Get full text
    Article
  15. 1495

    Survey on static software vulnerability detection for source code by Zhen LI, Deqing ZOU, Zeli WANG, Hai JIN

    Published 2019-02-01
    “…Static software vulnerability detection is mainly divided into two types according to different analysis objects:vulnerability detection for binary code and vulnerability detection for source code.Because the source codecontains more semantic information,it is more favored by code auditors.The existing vulnerability detection research works for source code are summarized from four aspects:code similarity-based vulnerability detection,symbolic execution-based vulnerability detection,rule-based vulnerability detection,and machine learning-based vulnerability detection.The vulnerability detection system based on source code similarity and the intelligent software vulnerability detection system for source code are taken as two examples to introduce the process of vulnerability detection in detail.…”
    Get full text
    Article
  16. 1496

    Hand Gesture Recognition Algorithm Using SVM and HOG Model for Control of Robotic System by Phat Nguyen Huu, Tan Phung Ngoc

    Published 2021-01-01
    “…Results show that the algorithm is up to 99% accuracy with a 70-millisecond execution time per frame that is suitable for industrial applications.…”
    Get full text
    Article
  17. 1497

    La Organización de la Justicia en España durante la primera mitad del siglo XIX by José Antonio Pérez Juan

    Published 2020-12-01
    “…The city mayor was a complex figure with respect to sharing judicial and executive powers. Over time, legislation would try to address this clear misrepresentation, by first reducing the participation of these local authorities in the administration of Justice and then later eliminating it.…”
    Get full text
    Article
  18. 1498

    Rafael del Riego, mártir en vida by Maud Le Guellec

    Published 2024-02-01
    “…The fact that Rafael del Riego became a «martyr to freedom» following his trial and his particularly ferocious and vengeful execution is undeniable. His sacrificial death enabled him to be immortalised as the most emblematic victim of tyranny, and this status was widely used by the defenders of liberalism and later on by republicans. …”
    Get full text
    Article
  19. 1499

    Protocol for generating human assembloids to investigate thalamocortical and corticothalamic synaptic transmission and plasticity by Anjana Nityanandam, Mary H. Patton, Ildar T. Bayazitov, Kyle D. Newman, Kristen T. Thomas, Stanislav S. Zakharenko

    Published 2025-03-01
    “…We detail the steps for using whole-cell patch-clamp electrophysiology to investigate the properties of synaptic transmission and synaptic plasticity in this model system.For complete details on the use and execution of this protocol, please refer to Patton et al.1 : Publisher’s note: Undertaking any experimental protocol requires adherence to local institutional guidelines for laboratory safety and ethics.…”
    Get full text
    Article
  20. 1500

    Determining substitutability of cloud services supported by semantically extended type theory by Xian-qing WANG, Chang-qin HUANG, UOXuan LUO, Rui-hua NIE, Yong TANG, Xiao-yong MEI

    Published 2016-02-01
    “…The method was proved feasibly by a case determining, and the experimental results show that it brings higher success rate of execution.…”
    Get full text
    Article