Suggested Topics within your search.
Suggested Topics within your search.
- Entrepreneurship 5
- Management 5
- English language 4
- Business enterprises 3
- Economic development 3
- Industrial management 3
- Information technology 3
- Methodology 3
- Research 3
- Study and teaching 3
- Classroom environment 2
- Communication in education 2
- Effective teaching 2
- Elementary school teaching 2
- Hospitality industry 2
- Inquiry-based learning 2
- Interaction analysis in education 2
- Intercultural communication 2
- Internet in public administration 2
- Internet marketing 2
- Marketing 2
- Moral and ethical aspects 2
- Psychological aspects 2
- Psychology 2
- Public administration 2
- Public relations 2
- Rhetoric 2
- Social networks 2
- Sustainable development 2
- Technical writing 2
-
10261
Automated Windows domain penetration method based on reinforcement learning
Published 2023-08-01“…Windows domain provides a unified system service for resource sharing and information interaction among users.However, this also introduces significant security risks while facilitating intranet management.In recent years, intranet attacks targeting domain controllers have become increasingly prevalent, necessitating automated penetration testing to detect vulnerabilities and ensure the ongoing maintenance of office network operations.Then efficient identification of attack paths within the domain environment is crucial.The penetration process was first modeled using reinforcement learning, and attack paths were then discovered and verified through the interaction of the model with the domain environment.Furthermore, unnecessary states in the reinforcement learning model were trimmed based on the contribution differences of hosts to the penetration process, aiming to optimize the path selection strategy and improve the actual attack efficiency.The Q-learning algorithms with solution space refinement and exploration policy optimization were utilized to filter the optimal attack path.By employing this method, all security threats in the domain can be automatically verified, providing a valuable protection basis for domain administrators.Experiments were conducted on typical Windows domain scenarios, and the results show that the optimal path is selected from the thirteen efficient paths generated by the proposed method, while also providing better performance optimization in terms of domain controller intrusion, domain host intrusion, attack steps, convergence, and time cost compared to other approaches.…”
Get full text
Article -
10262
Smoking Avoidance, Physical Activity and Diet as Preventative Behaviours for Lung, Prostate and Colorectal Cancer - A Comparison of the Extended Parallel Process Model Groups
Published 2025-02-01“…Respondents perceived smoking avoidance to be the most effective intervention, while considering this to be the least feasible strategy to implement for lung cancer. In all of the behaviours, the Indifferent group was the most numerous. …”
Get full text
Article -
10263
Improved Salt Tolerance of Lamtoro (Leucaena leucocephala) through the Application of Indigenous Mycorrhiza
Published 2021-01-01“…Arbuscular mycorrhizal fungi (AMF) have been implemented as a strategy to mitigate the adverse effects due to an impact of salt stress through the structural and physiological adjustment. …”
Get full text
Article -
10264
Effect of N-Acetylation Degree on the Properties of Chitosan-Stabilized Pickering Emulsions
Published 2024-12-01“…The aim of this study is to apply a modification strategy based on covalently grafting acetyl groups onto polysaccharide chains to improve the emulsifying properties of chitosan. …”
Get full text
Article -
10265
Effective Design of Profiling Float Network for Oceanic Heat-Content Monitoring
Published 2014-01-01“…We demonstrate a more effective geographic deployment strategy for the profiling floats monitoring changes in the oceanic heat content on a decadal timescale.…”
Get full text
Article -
10266
Russia and the Issues of the Korean Peninsula
Published 2014-08-01“…The importance of Korean Peninsula in Russian foreign strategy is based on the need to preserve peace and stability in the Russia's Far East "soft underbelly" and to be a part of international efforts to solve the Korean problem, as well as to promote regional economic cooperation. …”
Get full text
Article -
10267
Fault-Tolerant Model Predictive Control for Autonomous Underwater Vehicles Considering Unknown Disturbances
Published 2025-01-01“…Specifically, additive faults in the rudders are addressed, and an active fault-tolerant control strategy is employed. Fault models of autonomous underwater vehicles have been established to develop the fault-tolerant control method. …”
Get full text
Article -
10268
Anterior Abdominal Wall Pain
Published 2023-12-01“…Knowledge of pathognomonic clinical and instrumental signs is the basis for differential diagnosis and choice of treatment strategy for pathology of the anterior abdominal wall.…”
Get full text
Article -
10269
Role of Verticillium dahliae effectors in interaction with cotton plants
Published 2025-01-01“…Evading plant immunity by suppressing host recognition or successive immune signaling is a successful infection strategy employed by various microbial pathogens, posing a significant challenge to effectively utilizing host hereditary resistance genes in sustainable disease management. …”
Get full text
Article -
10270
Real-Time Integrated Limited-Stop and Short-Turning Bus Control with Stochastic Travel Time
Published 2017-01-01“…This paper formulates such an integrated strategy, presents the solution method of the formulation, and proves the validity of the real-time control method.…”
Get full text
Article -
10271
The Effects of a Professional Development Program on the Classroom Practices of Physics Teachers
Published 2022-05-01“…When the results were examined in relation to teaching strategies, materials/technologies, and assessment techniques used for various purposes, there was a clear increase in the number, variety, and quality of strategies, materials, and technologies used in these dimensions.…”
Get full text
Article -
10272
Clean-Room Air Conditioning Control Based on Improved Min-Max Robust Model Predictive Control Algorithm
Published 2025-01-01“…To improve the comfort of indoor environment in clean-room and to reduce the operating cost of the equipment, the study proposes an improved Min-Max robust model predictive control algorithm for clean-room air conditioning control strategy. Firstly, for the comfort of indoor air conditioning, the MPC algorithm is investigated to regulate the air conditioning air supply based on indoor temperature and humidity ratio in order to control the indoor comfort of the clean-room. …”
Get full text
Article -
10273
VIRTUAL REALITY: U.S. INFORMATION SECURITY THREATS CONCEPT AND ITS INTERNATIONAL DIMENSION
Published 2014-06-01“…The United States is developing a complex strategy for cyber space that includes maximization of ICT's advantages in all strategically important fields as well as improvement of national information systems and networks security. …”
Get full text
Article -
10274
Searchable encryption scheme based on attribute policy hiding in a cloud environment
Published 2022-04-01“…Attribute-based searchable encryption technology can achieve fine-grained access control of data, but the existing searchable encryption scheme, keyword search, access control and file encryption are basically performed separately, causing the attacker to directly skip the access policy for keyword index matching and file decryption.Besides, the data owners in the existing schemes need to pass the key of the encrypted file to the user in a secure channel, which increases the cost of the data owner.Furthermore, most tree-based access control policies are open and easy to cause privacy leakage.Therefore, based on the LSSS (linear secret sharing schemes) access architecture, the searchable encryption scheme based on attribute policy hiding in a cloud environment was proposed.Through the embedding of policy secret values into keyword encryption and file storage encryption, the combination of access control, keyword search and file encryption were realized.The aggregate key technology enables users to decrypt files without interacting with the data owner, reducing the burden of key management and increasing storage space by approximately 30%.The experimental results and security analysis show that the proposed scheme guarantees the security of stored data, privacy of access strategy and non-connectivity of trap gate.Compared with the existing mainstream scheme, the retrieval efficiency of the proposed scheme has improved to more than 20%.…”
Get full text
Article -
10275
A Decentralized Energy Flow Control Framework for Regional Energy Internet
Published 2019-01-01“…The numerical results of real-world traces show that the regional EI can better absorb the renewable energy under the optimized control strategy, which proves the feasibility and economy of the proposed decentralized energy flow control framework.…”
Get full text
Article -
10276
The Engineering Pedagogy Evolution: The Foundation and Three Measurements
Published 2021-11-01“…Based on the general foundations and laws of pedagogy, three measurements of engineering pedagogy enable to reveal its interdisciplinary strategy in different subject areas. Engineering pedagogy can participate in various formats– as teacher training technology both for school and university teachers.…”
Get full text
Article -
10277
Parental Knowledge, Attitudes, and Behaviours towards Human Papillomavirus Vaccination for Their Children: A Systematic Review from 2001 to 2011
Published 2012-01-01“…A systematic review of parental surveys about HPV and/or child HPV vaccination to understand parental knowledge, attitudes, and behaviour before and after FDA approval of the quadrivalent HPV vaccine and the bivalent HPV vaccine. Search Strategy. Searches were conducted using electronic databases limited to published studies between 2001 and 2011. …”
Get full text
Article -
10278
Scheduling in Targeted Transient Surveys and a New Telescope for CHASE
Published 2010-01-01“…In order to test this scheduling strategy we use a modified version of the genetic scheduler developed for the telescope control system RTS2. …”
Get full text
Article -
10279
Exploring distance learning in higher education: satisfaction and insights from Mexico, Saudi Arabia, Romania, Turkey
Published 2025-02-01“…Our research promotes the strategic deployment of DL in the current context as a resilient strategy of institutions for high-impact training and targeting of huge audiences, with emphasis on the deployment of new tools and teaching methods customized for a new, unique value proposition of the DL. …”
Get full text
Article -
10280
Cognitive flexibility in urban yellow mongooses, Cynictis penicillata
Published 2024-03-01“…The mongooses successfully unlearned their previously learned response in favour of learning a new response, possibly through a win-stay, lose-shift strategy. Attention task experiments were conducted using one puzzle box surrounded by zero, one, two or three objects, introducing various levels of distraction while solving the task. …”
Get full text
Article