-
141
University proceedings. Volga region. Natural sciences
Published 2024-11-01“…Thanks to this preparation, plants take root easily and simply, you can grow healthy planting material, fruits are well tied on fruit trees and do not crumble. …”
Article -
142
Privacy in the Internet: Myth or reality
Published 2016-01-01“…The present time, unthinkable without using Internet - from e-mail, through social networks, cloud services, GPS, to YouTube and mobile computing in business, as well as on a private level, poses a question: Is there a way to protect data and their privacy on the Internet? …”
Get full text
Article -
143
Unclear Predication in the Construction
Published 2012-03-01“…(Examples from the BNC)(2) EU 1623 You’d be crazy to sell today. Intuitively, this construction appears to be a case of Stage-level predication (Stowell, 1991). …”
Get full text
Article -
144
SUSTAINABILITY IN SERVICE´S SECTOR: NEW TRENDS OF SUSTAINABILITY TOOLS AND POSITIONING OF SERVICES IN ECONOMY
Published 2013-12-01“…The goal of sustainable development is to meet the needs of the present without compromising the ability of future generations to meet their own needs. …”
Get full text
Article -
145
Pakanta in the Lithuanian Worldview
Published 2024-12-01“…Although rarely using the term, young people primarily associate it with patience—this lexeme appears in half of the responses to the question “What does pakanta mean to you?”. The concept of tolerancija (tolerance) is more familiar and understood without explanation, appearing in 48% of the responses. …”
Get full text
Article -
146
-
147
Artificial Neural Network in the CATS Training System
Published 2019-08-01“…This approach allows you to build an individual learning trajectory, significantly reduce the time to study academic disciplines and improve the quality of the educational process. …”
Get full text
Article -
148
« Ok boomer ». Les dérives d’un même
Published 2024-12-01“…We will be noticing arguments promoted by the comunity ‘we vs you/they-them’ for weighing the violence grade and definiting the kind of discrimination. …”
Get full text
Article -
149
Adversarial patch defense algorithm based on PatchTracker
Published 2024-02-01“…The application of deep neural networks in target detection has been widely adopted in various fields.However, the introduction of adversarial patch attacks, which add local perturbations to images to mislead deep neural networks, poses a significant threat to target detection systems based on vision techniques.To tackle this issue, an adversarial patch defense algorithm based on PatchTracker was proposed, leveraging the semantic differences between adversarial patches and image backgrounds.This algorithm comprised an upstream patch detector and a downstream data enhancement module.The upstream patch detector employed a YOLOV5 (you only look once-v5) model with attention mechanism to determine the locations of adversarial patches, thereby improving the detection accuracy of small-scale adversarial patches.Subsequently, the detected regions were covered with appropriate pixel values to remove the adversarial patches.This module effectively reduced the impact of adversarial examples without relying on extensive training data.The downstream data enhancement module enhanced the robustness of the target detector by modifying the model training paradigm.Finally, the image with removed patches was input into the downstream YOLOV5 target detection model, which had been enhanced through data augmentation.Cross-validation was performed on the public TT100K traffic sign dataset.Experimental results demonstrated that the proposed algorithm effectively defended against various types of generic adversarial patch attacks when compared to situations without defense measures.The algorithm improves the mean average precision (mAP) by approximately 65% when detecting adversarial patch images, effectively reducing the false negative rate of small-scale adversarial patches.Moreover, compared to existing algorithms, this approach significantly enhances the accuracy of neural networks in detecting adversarial samples.Additionally, the method exhibited excellent compatibility as it does not require modification of the downstream model structure.…”
Get full text
Article -
150
Efektivitas rational emotive behavioral therapy dengan teknik self-talk dalam meningkatkan kepercayaan diri siswa untuk berbicara di depan umum
Published 2024-07-01“…Apart from that, this activity will help you deepen your mind so you can get various interesting ideas. …”
Get full text
Article -
151
RUSSIA'S RELATIONS WITH THE EUROPEAN UNION AND CHINA: COMPARATIVE ANALYSIS OF MUTUAL PERCEPTION IN THE BORDER REGIONS
Published 2016-06-01“…Moreover, it is impossible to do without a debate in the society, standing in the darkness. …”
Get full text
Article -
152
Chief Isaac Oluwole Delano: A Legend and His Legacy
Published 2021-12-01“… No honor befits a person who enjoys life without helping his country. What glory is entitled to a lazy person that the courageous man does not have? …”
Get full text
Article -
153
North, Iran-Contra, and the Doomsday Project: The Original Congressional Cover Up of Continuity-of-Government Planning
Published 2011-02-01“…In 1989 I published the following article, "Northwards without North: Bush, Counterterrorism, and the Continuation of Secret Power." …”
Get full text
Article -
154
A new perspective on social sustainability: examining Amazon workers’ working conditions and protests applying computational methods in social sciences
Published 2025-01-01“…The originality of the study lies in the analysis of 5500 comments from the YouTube channel on the subject in terms of social sustainability applying the computational methods in social sciences (CMSS). …”
Get full text
Article -
155
Using statistical traffic analysis to calculate the confidential means of information transmission
Published 2021-01-01“…The article considers the modeling of security problems in the Internet as stochastic systems. This allows you to find flaws in existing security systems and offer new solutions. …”
Get full text
Article -
156
Medical Jousting: Going for the kill!
Published 2023-01-01“…It is essentially a term meant to describe the use of derogatory comments or gestures in front of a patient or attendant, concerning previous medical care provided by a fellow healthcare professional, without complete or accurate knowledge about real facts.1 “I do not even consider her a doctor; who told you to get operated by her?” …”
Get full text
Article -
157
Is it Time to Recognize Political Anxiety as a Social Determinant of Health?
Published 2024-12-01“…Questions that once might have felt invasive (“Does anyone in your household regularly scream at you?”) now feature regularly in clinical encounters. …”
Get full text
Article -
158
Repositioning Religious Organization Activism in The Digital Era
Published 2024-07-01“…Second, through a form of resistance, by having NU activists engage on social media without prominently displaying their organizational affiliation.…”
Get full text
Article -
159
Classification Of Prospective Scholarship Recipients Kartu Indonesia Pintar (KIP) With Decision Tree Algorithm And Naïve Bayes
Published 2022-12-01“…Furthermore, for accuracy without using diploma value data and the average report card is 79.41 %. …”
Get full text
Article -
160
Body Percussion: Active and inclusive teaching oriented to disciplinary knowledge and transversal skills
Published 2025-01-01“…Can promote inclusion in education without neglecting soft skills. This type of activity favours the inclusion of all, especially disabled pupils who, being able to work as au pairs, can feel part of a group by increasing their self-esteem, with positive effects on group dynamics. …”
Get full text
Article