Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- Management 8
- Technological innovations 8
- Moral and ethical aspects 7
- Social aspects 5
- Economic development 4
- Study and teaching 4
- information technology 4
- Economic aspects 3
- Economic policy 3
- Educational technology 3
- History 3
- Information Technology 3
- Mass media 3
- Photography 3
- Advertising 2
- Application software 2
- Automobiles 2
- Biochemical Phenomena 2
- Biochemistry 2
- Biotechnology 2
- Computer networks 2
- Computer-assisted instruction 2
- Data processing 2
- Design 2
- Design and construction 2
- Economic conditions 2
- Education 2
- Education, Elementary 2
- Electrical engineering 2
-
52321
Degradable hypercrosslinked porous polymer generated from aromatic polyketone
Published 2025-02-01Get full text
Article -
52322
-
52323
Digital Media Hotspot Mining Algorithm Implementation with Complex Systems in the Mobile Internet Environment
Published 2021-01-01“…Internet hot events mining and analysis technology can effectively solve the above problems by alleviating information overload, integrating redundant information, and refining core information. …”
Get full text
Article -
52324
Thermal insulation of military boots using a thermal foot manikin in cold environments
Published 2025-01-01Get full text
Article -
52325
Epidemic Modeling and Flattening the Infection Curve in Social Networks
Published 2024-04-01Get full text
Article -
52326
-
52327
Nowcasting Solar EUV Irradiance With Photospheric Magnetic Fields and the Mg II Index
Published 2024-04-01Get full text
Article -
52328
Analysis of Application Cases of Foreign Re-coupling Marshalling Operation Organization Modes and Implications for Urban Rail Transit Operation Organization in China
Published 2025-01-01“…The efficient train coupling and uncoupling technology is one of the key technologies for the re-coupling marshalling operation organization mode. …”
Get full text
Article -
52329
-
52330
-
52331
Knowledge and behavior: a study on adoption of best management practices among Sri Lankan shrimp farmers
Published 2025-01-01Get full text
Article -
52332
Food insecurity confrontation by pastoralist and agrarian communities in South Omo Zone, Ethiopia: a facility-based qualitative study
Published 2025-01-01“…Participants in both in-depth interviews and focus group discussions frequently identified several causes of food insecurity in the community, such as food shortages, climate change, rising prices of agricultural products, inadequate agricultural technology, scarcity of farmland, and income constraints. …”
Get full text
Article -
52333
Preliminary Results on Irradiance Measurements from Lyra and Swap
Published 2012-01-01Get full text
Article -
52334
Copepod Lipidomics: Fatty Acid Substituents of Structural Lipids in <i>Labidocerca aestiva</i>, a Dominant Species in the Food Chain of the Apalachicola Estuary of the Gulf of Mexi...
Published 2024-12-01“…Since the lipidomes of marine organisms are known to adapt to alterations in pH, temperature, and availability of metabolic precursors, lipidomics is one technology that can be used for monitoring copepod adaptations. …”
Get full text
Article -
52335
-
52336
Balancing the risks: continuous vs. interrupted anticoagulation during TAVI – what does the evidence say?
Published 2025-01-01Get full text
Article -
52337
-
52338
Removal of minocycline from wastewater via Co/Zn-MOFs -derived porous carbon materials as adsorbents
Published 2025-03-01Get full text
Article -
52339
Software diversification method based on binary rewriting
Published 2023-04-01“…Software diversity is an effective defense against code-reuse attacks, but most existing software diversification technologies are based on source code.Obtaining program source code may be difficult, while binary files are challenging to disassemble accurately and distinguish between code pointers and data constants.This makes binary file diversification difficult to generate high levels of randomization entropy, and easily compromised by attackers.To overcome these challenges, a binary file oriented software diversification method was proposed based on static binary rewriting technology, namely instruction offset randomization.This method inserted NOP instructions of varying byte lengths before program instructions with a certain probability, reducing the number of unintended gadgets in the program and randomly offsetting the original instruction address.This disrupts the program’s original memory layout and increases the cost of code-reuse attacks.At the same time, an optimization strategy based on hot code was designed for this method.The execution times of basic blocks in binary files were obtained by dynamic pile insertion, so as to adjust the NOP instruction insertion probability in each basic block.The higher the execution frequency, the fewer NOP instructions were inserted into the basic block, which can ensure lower performance overhead and produce higher randomization entropy.In the experimental part, the SPEC benchmark program was used to test the optimized method from the aspects of performance overhead, gadget survival rate and file size.The results show that a 15% insertion probability achieves the best effect, with an average gadget survival rate of less than 1.49%, increasing attackers’ difficulty in reusing the same gadget attack chain.Furthermore, only a 4.1% operation overhead and 7.7% space overhead are added, maintaining high levels of security.…”
Get full text
Article -
52340
Norway spruce (Picea abies (L.) Karst.) seedlings survival in progeny test “Drinić”
Published 2015-11-01Get full text
Article