Showing 14,081 - 14,100 results of 16,357 for search '"innovator"', query time: 0.10s Refine Results
  1. 14081
  2. 14082
  3. 14083
  4. 14084
  5. 14085
  6. 14086

    Unfaithful Words: Tolerance by Ferenc Ruzsa

    Published 2025-01-01
    “…Further, it seems that Buddhism is not a very special case; rather it appears that the idea that other religions should be suppressed is an innovation of the Abrahamic religions only. There is an important lesson to be learned from this for interreligious and intercultural dialogue. …”
    Get full text
    Article
  7. 14087
  8. 14088
  9. 14089
  10. 14090

    Facilitating Large Language Model Russian Adaptation with Learned Embedding Propagation by Михаил Тихомиров, Даниил Чернышев

    Published 2024-12-01
    “…Method: To tackle language-adaptation challenges, we introduce Learned Embedding Propagation (LEP), a novel method with lower training data requirements and minimal disruption of existing LLM knowledge. LEP employs an innovative embedding propagation technique, bypassing the need for instruction-tuning and directly integrating new language knowledge into any instruct-tuned LLM variant. …”
    Get full text
    Article
  11. 14091

    Relationship between the learning gains and learning style preferences among students from the school of medicine and health sciences by Blanca Bazán-Perkins, José Alfredo Santibañez-Salgado

    Published 2025-01-01
    “…Additionally, it is recommended that students work collaboratively, share and discuss learning materials, foster innovation and abstract learning, and follow logical and sequential approaches to optimize their educational achievements. …”
    Get full text
    Article
  12. 14092
  13. 14093
  14. 14094
  15. 14095
  16. 14096
  17. 14097
  18. 14098

    Predictors of physical and mental health among unemployed people in Greece by Dimitra Latsou, Mary Geitona

    Published 2020-03-01
    “…Policymakers should continuously support unemployed people through the development of innovative labor and unemployment policies as well as the expansion of their health coverage and access to healthcare in order to improve their overall health status.…”
    Article
  19. 14099

    High-performance reconfigurable encryption scheme for distributed storage by Zhihua FENG, Yuxuan ZHANG, Chong LUO, Jianing WANG

    Published 2023-10-01
    “…As the world embraces the digital economy and enters an information society, data has emerged as a critical production factor.The collection, processing, and storage of data have become increasingly prevalent.Distributed storage systems, known for their efficiency, are widely used in various data fields.However, as the scale of data storage continues to expand, distributed storage faces more significant security risks, such as information leakage and data destruction.These challenges drive the need for innovative advancements in big data distributed storage security technology and foster the integration of domestic cryptographic technology with computing storage technology.This work focused on addressing security issues, particularly information leakage, in distributed storage nodes.A dynamic and reconfigurable encryption storage solution was proposed, which considered the requirements for encryption performance and flexibility.A high-performance reconfigurable cryptographic module was designed based on the bio mapping framework.Based on this module, multiple storage pools equipped with different cryptographic algorithms were constructed to facilitate high-performance encryption and decryption operations on hard disk data.The scheme also enabled dynamic switching of cryptographic algorithms within the storage pools.A cryptographic protocol with remote online loading functions for cryptographic algorithms and keys was developed to meet the unified management and convenient security update requirements of reconfigurable cryptographic modules in various storage nodes.Furthermore, the scheme implemented fine-grained data encryption protection and logical security isolation functions based on cryptographic reconstruction technology.Experimental results demonstrate that the performance loss of this scheme for encryption protection and security isolation of stored data is approximately 10%.It provides a technical approach for distributed storage systems to meet the cryptographic application technology requirements outlined in GB/T 39786-2021 “Information Security Technology-Basic Requirements for Cryptography Applications” Level 3 and above in terms of device and computing security, application and data security.…”
    Get full text
    Article
  20. 14100