Showing 3,221 - 3,240 results of 12,054 for search '"name"', query time: 0.06s Refine Results
  1. 3221

    Nutrition for Health and Fitness: Fiber in Your Diet by Linda B. Bobroff

    Published 2012-09-01
    “…Fiber has many names, such as dietary fiber, total fiber, or just plain fiber. …”
    Get full text
    Article
  2. 3222

    Hyophorbe lagenicaulis, Bottle Palm by Melissa H. Friedman, Michael G. Andreu, Heather V. Quintana, Mary McKenzie

    Published 2010-07-01
    “…Quintana, and Mary McKenzie, describes this palm with a bottle shaped trunk that is endemic to the Mascarene Islands east of Madagascar, and can grow in south Florida — scientific and common names, description, and applications. Includes references. …”
    Get full text
    Article
  3. 3223

    Unfair Terms and Unpredictability in the Insurance Contract by Ioana Nely MILITARU

    Published 2025-01-01
    “…Thus, in order to prevent abusive practices in the insurance sector, namely of insurers (insurance companies), states have set up administrative authorities to control them, supervise their activity, and sanction their illegal actions.…”
    Get full text
    Article
  4. 3224

    Integrable 2D Time-Irreversible Systems with a Cubic Second Integral by H. M. Yehia, A. A. Elmandouh

    Published 2016-01-01
    “…Special cases are given interpretation as a motion of a particle on a sphere endowed with a Riemannian metric, a particle in the Euclidean plane, and new generalizations of two cases of motion of a rigid body with a cubic integral, known by names of Goriachev-Chaplygin and Goriachev.…”
    Get full text
    Article
  5. 3225

    Two-channel electric liquid helium level meter by K. K. Kim, A. A. Tkachuk, A. A. Kuznetsov

    Published 2019-10-01
    “…The need to develop such a meter is dictated by the specifics of the functioning of cryomodules that are part of transport systems, namely, functioning in the strong magnetic fields. …”
    Get full text
    Article
  6. 3226
  7. 3227
  8. 3228
  9. 3229
  10. 3230
  11. 3231
  12. 3232
  13. 3233
  14. 3234

    A STUDY ON THE REGISTER OF POLITY by Radityo Tri Nugroho, Afifah Linda Sari

    Published 2019-06-01
    “…Having analyzed the data, the writer finds two forms of polity register namely: word and phrase. The words are in the form of simple word (26, 7%), compound word (26, 7%), and complex word (24, 4%), abbreviation and blended, each has 2,2%. …”
    Get full text
    Article
  15. 3235

    THREE VIEWS ON THE PROBLEM OF A PRIORI: I. KANT, D. VON HILDEBRAND AND M. SCHELER by Aivaras Stepukonis

    Published 1999-01-01
    “…Hildebrand uses a priori in yet another sense, namely, in the sense of 'independent of blunt observation', but, he does not take the pain of explaining the meaning of the latter phrase. …”
    Get full text
    Article
  16. 3236

    PROSPECTS FOR THE HEREDITARY FUND IN MODERN RUSSIAN LAW by Tatyana Y. Naumova, Valentina M. Bolshakova, Petr Y. Naumov

    Published 2023-03-01
    “…However, the blind copying of trust legislation, together with the use of an inappropriate form of a Russian legal entity, namely a «fund» became a determining factor for turning a promising civil law institution into a non-working mechanism. …”
    Get full text
    Article
  17. 3237
  18. 3238

    Privacy leakage risk assessment for reversible neural network by Yifan HE, Jie ZHANG, Weiming ZHANG, Nenghai YU

    Published 2023-08-01
    “…In recent years, deep learning has emerged as a crucial technology in various fields.However, the training process of deep learning models often requires a substantial amount of data, which may contain private and sensitive information such as personal identities and financial or medical details.Consequently, research on the privacy risk associated with artificial intelligence models has garnered significant attention in academia.However, privacy research in deep learning models has mainly focused on traditional neural networks, with limited exploration of emerging networks like reversible networks.Reversible neural networks have a distinct structure where the upper information input can be directly obtained from the lower output.Intuitively, this structure retains more information about the training data, potentially resulting in a higher risk of privacy leakage compared to traditional networks.Therefore, the privacy of reversible networks was discussed from two aspects: data privacy leakage and model function privacy leakage.The risk assessment strategy was applied to reversible networks.Two classical reversible networks were selected, namely RevNet and i-RevNet.And four attack methods were used accordingly, namely membership inference attack, model inversion attack, attribute inference attack, and model extraction attack, to analyze privacy leakage.The experimental results demonstrate that reversible networks exhibit more serious privacy risks than traditional neural networks when subjected to membership inference attacks, model inversion attacks, and attribute inference attacks.And reversible networks have similar privacy risks to traditional neural networks when subjected to model extraction attack.Considering the increasing popularity of reversible neural networks in various tasks, including those involving sensitive data, it becomes imperative to address these privacy risks.Based on the analysis of the experimental results, potential solutions were proposed which can be applied to the development of reversible networks in the future.…”
    Get full text
    Article
  19. 3239

    Edge-centric optimization: a novel strategy for minimizing information loss in graph-to-text generation by Zheng Yao, Jingyuan Li, Jianhe Cen, Shiqi Sun, Dahu Yin, Yuanzhuo Wang

    Published 2024-12-01
    “…We propose a framework named Edge-Optimized Multi-Level Information refinement (EMLR), which aims to maximize the retention of the graph’s structural information from an edge perspective. …”
    Get full text
    Article
  20. 3240

    Measurement of JMSK PSMZA Lecturer Achievement Based on P & P Monitoring by Pazlina Binti Mat ali, Hasliza Binti Hashim

    Published 2018-11-01
    “…This study was conducted to determine the effect of monitoring the teaching and learning of lecturers based on five domains assessed namely the planning of teaching and instructional, instructional, competence and professionalism of lecturers, management teaching and learning process. …”
    Get full text
    Article