Suggested Topics within your search.
Suggested Topics within your search.
- Logic 2
- Methodology 2
- Clinical psychology 1
- Computer-aided design 1
- Context (Linguistics) 1
- Data processing 1
- Design and construction 1
- Electronic circuits 1
- Empiricism 1
- Fluid mechanics 1
- Historiography 1
- History 1
- Human-computer interaction 1
- Law 1
- Logic circuits 1
- Logic design 1
- Mass media 1
- Mass media and technology 1
- Mathematics 1
- Microprocessors 1
- Perspective (Linguistics) 1
- Philosophy 1
- Psychology, Clinical 1
- Reasoning 1
- Regression analysis 1
- Research 1
- Research Design 1
- Semantics 1
- Study and teaching 1
- Subjectivity (Linguistics) 1
-
2721
IKEChecker: grammar-guided stateful fuzzer for IKE protocol implementions
Published 2024-08-01“…Given the complex protocol logic, security vulnerabilities in the implementation of the IKE protocol are inevitably present. …”
Get full text
Article -
2722
Features of the female mentoring in the Russian management system
Published 2022-10-01“…The methods used also included the method of expert assessments, normative and logical methods. The analysis of methods, mechanisms, tools and other aspects of updating the track of female mentoring and its features in the Russian management system is carried out. …”
Get full text
Article -
2723
Load Forecasting in Electrical Grids: Analysis of Methods and their Trends
Published 2025-02-01“…This analysis evaluates various forecasting approaches, including statistical methods, artificial intelligence, fuzzy logic, ensemble methods, and hybrid systems, to understand their evolution and current state. …”
Get full text
Article -
2724
Concept and structure of the special forces of operative-search activity
Published 2019-06-01“…Attention has been paid to the fact that only those persons, who cooperate with law enforcement agencies on a confidential basis are logically treated as special forces of operative and search activity. …”
Get full text
Article -
2725
Investigating the Development of Urban Space in the face of Environmental Hazards (Case Study of Noor County)
Published 2024-12-01“…In order to analyze the questionnaires using ANP method and fuzzy logic method, evaluate each of the criteria and determine their importance coefficients. …”
Get full text
Article -
2726
Fuzzy Multicriteria Decision-Making Model for Time-Cost-Risk Trade-Off Optimization in Construction Projects
Published 2019-01-01“…In this model, an optimization algorithm based on fuzzy logic and analytic hierarchy process (AHP) has been used to analyze the time-cost-risk trade-off alternatives and select the best one based on selected criteria. …”
Get full text
Article -
2727
Cross-domain authentication scheme based on consortium blockchain
Published 2022-06-01“…To solve the security problems of traditional cross-domain authentication schemes, such as single point of failure and excessive dependence on third parties, a cross-domain authentication scheme was proposed which combines IBC and consortium blockchain.The consortium blockchain was introduced into the cross-domain authentication scene by designing the layered cross-domain authentication architecture including entity layer, proxy layer, blockchain layer and storage layer.In the storage layer, abstract data format was designed and stored in the chain, and the complete data corresponding to the abstract data was stored in the interplanetary file system under the chain.This safe and reliable on-chain distributed storage scheme solved the limitation problem of on-chain storage caused by introduction of blockchain.Besides, an identity management scheme based on permanent autonomy identity and temporary identity was proposed to solve the challenges that it is difficult to cancel identity and to supervise anonymous identity after combining IBC system.On this basis, complete cross-domain full authentication, re-authentication and key negotiation protocols were designed to implement the cross-domain authentication process.In terms of security, SVO logic was used to analyze the authentication protocol, and the security of the cross-domain authentication protocol was proved.The performance of calculation overhead, communication overhead and consortium blockchain were tested and analyzed by simulation.Analysis results showed that the protocol satisfies the security requirements and has improved calculation overhead performance on both server and client sides, comparing with other related works.In terms of communication overhead, it also has better performance.The query/write latency was tested by the consortium blockchain tool, and the results showed that the scheme has good usability.…”
Get full text
Article -
2728
Government environmental information disclosure and digital transformation of manufacturing companies: evidence from China
Published 2025-02-01“…Government environmental information disclosure (GEID), as a crucial information governance tool, enhances the collaborative environmental governance capabilities of both government and external stakeholders of companies. Logically, this indicates that by emphasizing environmental regulation, GEID can promote corporate digital transformation. …”
Get full text
Article -
2729
Paysage et intensification de l’élevage en Amazonie brésilienne : De nouvelles dynamiques spatio-temporelles à l’échelle des exploitations agricoles
Published 2017-12-01“…We used semi-structured and retrospective interviews as well as complex graphic model to analyze diachronically spatial logics of land-use intensification in six cattle farms, in old frontiers. …”
Get full text
Article -
2730
Java deserialization vulnerability defense technologybased on run-time detection
Published 2024-04-01“…The solution's efficacy was validated through testing on prevalent Java applications, including WebLogic, JBoss, and Jenkins. The results demonstrate that this approach can effectively protect against Java deserialization vulnerability attacks without inflicting a substantial performance penalty on the targeted system. …”
Get full text
Article -
2731
Insān Ilahī as The Main Concept of Mulla Sadra’s Transcendental Human Existences
Published 2020-12-01“…The result is, individual viewing perfection and potential actualization in him depends on the things which based on logic to view the object of perception based upon his physical existence in reality. …”
Get full text
Article -
2732
Theoretical foundations and practices of reengineering realization in construction
Published 2024-10-01“…The theoretical foundations of the analysis of reengineering in construction were the provisions of the following concepts: life cycle management; logistics of regulatory influences; technical rationing; sustainable development, as well as methods of system analysis such as: logical-semantic and simulation modelling, retrospective and functional-structural methods, the reserve of domestic and foreign scientists in the context of the research.Results. …”
Get full text
Article -
2733
MULTI-COMPONENT COMPLEX ORE: LEGAL PROBLEMS OF TAXATION
Published 2024-12-01“…Methods: empirical methods of description, interpretation; theoretical methods of formal and dialectical logic; specific scientific methods: legal-dogmatic and interpretation of legal norms. …”
Get full text
Article -
2734
Values in the Strategic Management of a Modern Russian University
Published 2018-04-01“…The paper reveals the logic of motivating function of values in relation to scientific and pedagogical staff of a University, substantiates the positive mutual influence of learning and educational processes. …”
Get full text
Article -
2735
University proceedings. Volga region. Social sciences
Published 2024-11-01“…Methods were also used: formal legal, logical, compar-ative. Results. The relationship between the above paired categories has been established, which manifests itself in the possibility of transition from one state to another. …”
Article -
2736
A Novel Hybrid MPPT Controller for PEMFC Fed High Step-Up Single Switch DC-DC Converter
Published 2024-01-01“…Here, the first objective of the work is the development of the Grey Wolf Optimization Technique (GWOT) involving a Fuzzy Logic Controller (FLC) for finding the Maximum Power Point (MPP) of the fuel stack. …”
Get full text
Article -
2737
Robust reinforcement learning algorithm based on pigeon-inspired optimization
Published 2022-10-01“…Reinforcement learning(RL) is an artificial intelligence algorithm with the advantages of clear calculation logic and easy expansion of the model.Through interacting with the environment and maximizing value functions on the premise of obtaining little or no prior information, RL can optimize the performance of strategies and effectively reduce the complexity caused by physical models .The RL algorithm based on strategy gradient has been successfully applied in many fields such as intelligent image recognition, robot control and path planning for automatic driving.However, the highly sampling-dependent characteristics of RL determine that the training process needs a large number of samples to converge, and the accuracy of decision making is easily affected by slight interference that does not match with the simulation environment.Especially when RL is applied to the control field, it is difficult to prove the stability of the algorithm because the convergence of the algorithm cannot be guaranteed.Considering that swarm intelligence algorithm can solve complex problems through group cooperation and has the characteristics of self-organization and strong stability, it is an effective way to be used for improving the stability of RL model.The pigeon-inspired optimization algorithm in swarm intelligence was combined to improve RL based on strategy gradient.A RL algorithm based on pigeon-inspired optimization was proposed to solve the strategy gradient in order to maximize long-term future rewards.Adaptive function of pigeon-inspired optimization algorithm and RL were combined to estimate the advantages and disadvantages of strategies, avoid solving into an infinite loop, and improve the stability of the algorithm.A nonlinear two-wheel inverted pendulum robot control system was selected for simulation verification.The simulation results show that the RL algorithm based on pigeon-inspired optimization can improve the robustness of the system, reduce the computational cost, and reduce the algorithm’s dependence on the sample database.…”
Get full text
Article -
2738
Approbation of the stochastic group virus protection model
Published 2022-01-01“…We propose a method of translating a system specification in the SHYMaude language, intended for the specification and analysis of DOBSHS models in the rewriting logic framework, into the corresponding Java implementation. …”
Get full text
Article -
2739
The “Nixon China Shock” in the Mirror of Japanese Domestic Politics
Published 2019-12-01“…Given the historical importance of the “1955 System” for contemporary Japanese politics, the article’s conclusions are significant for the understanding of the logic of Japan’s domestic politics and foreign policy of the entire post-war period.Author declares the absence of conflict of interests.…”
Get full text
Article -
2740
Student participation rate in their learning self-assessment
Published 2023-10-01“…Theoretical methods were used: analysis-synthesis, inductive-deductive and logical history; empirical: documentary review and content analysis; as well as the statistical mathematician.…”
Get full text
Article