Showing 1,881 - 1,900 results of 14,278 for search 'Contai*', query time: 0.12s Refine Results
  1. 1881

    Contribution of Cloud Accounting to Employment and Economic Growth: An Evaluation from Nigerian Public Sector by Ayoola Azeez Olaoye

    Published 2024-03-01
    “…The data obtained were analyzed using descriptive statistics and time series data containing ordinary least square technique. The results highlight a positive and statistically significant correlation between the adoption rate of cloud accounting, the number of cloud accounting software providers, and the General Cloud Accounting Metric. …”
    Get full text
    Article
  2. 1882

    Privacy leakage risk assessment for reversible neural network by Yifan HE, Jie ZHANG, Weiming ZHANG, Nenghai YU

    Published 2023-08-01
    “…In recent years, deep learning has emerged as a crucial technology in various fields.However, the training process of deep learning models often requires a substantial amount of data, which may contain private and sensitive information such as personal identities and financial or medical details.Consequently, research on the privacy risk associated with artificial intelligence models has garnered significant attention in academia.However, privacy research in deep learning models has mainly focused on traditional neural networks, with limited exploration of emerging networks like reversible networks.Reversible neural networks have a distinct structure where the upper information input can be directly obtained from the lower output.Intuitively, this structure retains more information about the training data, potentially resulting in a higher risk of privacy leakage compared to traditional networks.Therefore, the privacy of reversible networks was discussed from two aspects: data privacy leakage and model function privacy leakage.The risk assessment strategy was applied to reversible networks.Two classical reversible networks were selected, namely RevNet and i-RevNet.And four attack methods were used accordingly, namely membership inference attack, model inversion attack, attribute inference attack, and model extraction attack, to analyze privacy leakage.The experimental results demonstrate that reversible networks exhibit more serious privacy risks than traditional neural networks when subjected to membership inference attacks, model inversion attacks, and attribute inference attacks.And reversible networks have similar privacy risks to traditional neural networks when subjected to model extraction attack.Considering the increasing popularity of reversible neural networks in various tasks, including those involving sensitive data, it becomes imperative to address these privacy risks.Based on the analysis of the experimental results, potential solutions were proposed which can be applied to the development of reversible networks in the future.…”
    Get full text
    Article
  3. 1883

    Le choix des espaces communs dans l’habité, support écologique et solidaire by Nicole Roux, Camille Noûs

    Published 2021-11-01
    “…The common spaces in housing, also called intermediary or common areas, are an in-between of the public and the private and contain a whole part of social life: from the garbage room to the bicycle garage, from the lift to the corridor, from the entrance hall to the car park, from the courtyard to the garden. …”
    Get full text
    Article
  4. 1884

    Selected Mechanisms of Action of Bacteriophages in Bacterial Infections in Animals by Renata Urban-Chmiel, Ewelina Pyzik

    Published 2025-01-01
    “…The results of our own experiments using calves are also presented as examples. The paper contains many new examples of potential uses of bacteriophages and their effects on eukaryotic cells, especially in the course of bacterial infections, which are extremely important in experimental treatments exploiting phages as alternatives to antibiotics. …”
    Get full text
    Article
  5. 1885

    Securing cyber-physical robotic systems for enhanced data security and real-time threat mitigation by Akashdeep Bhardwaj, Salil Bharany, Ateeq Ur Rehman, Ghanshyam G. Tejani, Seada Hussen

    Published 2025-01-01
    “…The systematic categorization of each physical device and its associated integrated sensors has been accomplished via data from logs and an information repository contained within a sensor index device library.…”
    Get full text
    Article
  6. 1886

    Application of Electro-Fenton Technology to Remediation of Polluted Effluents by Self-Sustaining Process by Maria Ángeles Fernández de Dios, Olaia Iglesias, Marta Pazos, Maria Ángeles Sanromán

    Published 2014-01-01
    “…Afterwards, the degradation of Reactive Black 5 dye and phenanthrene was evaluated in an electro-Fenton reactor, containing iron-enriched zeolite as catalyst, using the electricity supplied by the MFC. …”
    Get full text
    Article
  7. 1887

    Sperm Cryopreservation before Testicular Cancer Treatment and Its Subsequent Utilization for the Treatment of Infertility by Jana Žáková, Eva Lousová, Pavel Ventruba, Igor Crha, Hana Pochopová, Jaroslava Vinklárková, Eva Tesařová, Mohamed Nussir

    Published 2014-01-01
    “…The testicular cancer survivors have a good chance of fathering a child by using sperm cryopreserved prior to the oncology treatment, even when it contains only limited number of spermatozoa.…”
    Get full text
    Article
  8. 1888

    Dynamic System Simulation to Improve the Effectiveness and Efficiency of Supply Chain Performance and Behaviour on Waste Bank Resik Becik by Ratih Setyaningrum, Vida Auralita, Dwi Izzhati, Pramudi Arsiwi, Tita Thalitha

    Published 2025-01-01
    “…Waste bank Resik Becik (BSRB) is one of the containers that help with waste management in the city of Semarang. …”
    Get full text
    Article
  9. 1889

    The BnaBPs gene regulates flowering time and leaf angle in Brassica napus by Jiang Yu, Yi‐Xuan Xue, Rehman Sarwar, Shi‐Hao Wei, Rui Geng, Yan‐Feng Zhang, Jian‐Xin Mu, Xiao‐Li Tan

    Published 2024-10-01
    “…The protein sequence analysis showed two proteins containing conserved domains KNOX I, KNOX II, ELK, and HOX of the KONX protein family. …”
    Get full text
    Article
  10. 1890

    Malicious code within model detection method based on model similarity by Degang WANG, Yi SUN, Chuanxin ZHOU, Qi GAO, Fan YANG

    Published 2023-08-01
    “…The privacy of user data in federated learning is mainly protected by exchanging model parameters instead of source data.However, federated learning still encounters many security challenges.Extensive research has been conducted to enhance model privacy and detect malicious model attacks.Nevertheless, the issue of risk-spreading through malicious code propagation during the frequent exchange of model data in the federated learning process has received limited attention.To address this issue, a method for detecting malicious code within models, based on model similarity, was proposed.By analyzing the iterative process of local and global models in federated learning, a model distance calculation method was introduced to quantify the similarity between models.Subsequently, the presence of a model carrying malicious code is detected based on the similarity between client models.Experimental results demonstrate the effectiveness of the proposed detection method.For a 178MB model containing 0.375MB embedded malicious code in a training set that is independent and identically distributed, the detection method achieves a true rate of 82.9% and a false positive rate of 1.8%.With 0.75MB of malicious code embedded in the model, the detection method achieves a true rate of 96.6% and a false positive rate of 0.38%.In the case of a non-independent and non-identically distributed training set, the accuracy of the detection method improves as the rate of malicious code embedding and the number of federated learning training rounds increase.Even when the malicious code is encrypted, the accuracy of the proposed detection method still achieves over 90%.In a multi-attacker scenario, the detection method maintains an accuracy of approximately 90% regardless of whether the number of attackers is known or unknown.…”
    Get full text
    Article
  11. 1891

    Morphogenesis of the tumor patterns by Elena Izquierdo-Kulich, José Manuel Nieto-Villar

    Published 2008-02-01
    “…It was found that the tumor has a characteristicfractal dimension, which contains the necessary information to predictthe tumor growth until it reaches a stationary state. …”
    Get full text
    Article
  12. 1892

    Peritoneal Dialysis with Marked Pneumoperitoneum by Norio Nakamura, Masamichi Nakata, Daiki Nagawa, Ikuyo Narita, Takeshi Fujita, Reiichi Murakami, Michiko Shimada, Hirofumi Tomita

    Published 2020-01-01
    “…Pneumoperitoneum, the presence of free air within the peritoneal cavity, is often caused by the perforation of gas-containing viscus and commonly requires surgical treatment. …”
    Get full text
    Article
  13. 1893

    High-Performance Region-of-Interest Image Error Concealment with Hiding Technique by Shih-Chang Hsia, Szu-Hong Wang, Ming-Huei Chen

    Published 2010-01-01
    “…Recently region-of-interest (ROI) based image coding is a popular topic. Since ROI area contains much more important information for an image, it must be prevented from error decoding while suffering from channel lost or unexpected attack. …”
    Get full text
    Article
  14. 1894

    HSP70-Inducible hNIS-IRES-eGFP Reporter Imaging: Response to Heat Shock by Jiantu Che, Mikhail Doubrovin, Inna Serganova, Lyudmila Ageyeva, Tatiana Beresten, Ronald Finn, Ronald Blasberg

    Published 2007-11-01
    “…A retroviral vector pQHSP70/hNIS-IRES-eGFP (pQHNIG70) was constructed containing the hNIS-IRES-eGFP dual-reporter genes under the control of an inducible human heat shock protein (HSP)70 promoter and RG2-pQHSP70/hNIS-IRES-eGFP (RG2-pQHNIG70) transduced cells were generated. …”
    Get full text
    Article
  15. 1895

    HEIDEGGER’S HUMAN DIMENSION UNDERSTANDING OF TECHNOLOGY by Uliana R. Vynnyk

    Published 2013-12-01
    “…Technological dependence is hardly fatal to humans in the sense that it contains distinct preconceived thinking, behavior and consciousness.…”
    Get full text
    Article
  16. 1896

    Nucleosome patterns in four plant pathogenic fungi with contrasted genome structures by Clairet, Colin, Lapalu, Nicolas, Simon, Adeline, Soyer, Jessica L., Viaud, Muriel, Zehraoui, Enric, Dalmais, Berengère, Fudal, Isabelle, Ponts, Nadia

    Published 2023-01-01
    “…Genomes of phytopathogenic fungi are often compartmentalized: the core genome contains housekeeping genes whereas the fast-evolving genome mainly contains transposable elements and species-specific genes. …”
    Get full text
    Article
  17. 1897

    Concentration of nitric oxide oxidation products and antioxidant vitamins in chicken fed with supplemental zinc by Semiha Dede, Yeter Değer, Tahir Kahraman, Nurcan Dönmez

    “…Chicken were divided into three experimental groups and one control group, each group containing seven chicken. The experimental groups were treated supplement zinc (125, 500, 1000 ppm). …”
    Get full text
    Article
  18. 1898

    Reconstructing a Longitudinal Dataset for Tasmania by Trudy Cowley, Lucy Frost, Kris Inwood, Rebecca Kippen, Hamish Maxwell-Stewart, Monika Schwarz, John Shepherd, Richard Tuffin, Mark Williams, John Wilson, Paul Wilson

    Published 2021-08-01
    “…This article describes the formation of The Tasmanian Historical Dataset a longitudinal data resource spanning the 19th and early 20th century. This resource contains over 1.6 million records drawn from digitised prison and hospital admission registers, military enlistment papers, births, deaths and marriages, census and muster records, arrival and departure lists, bank accounts and property valuations, maps and plans and meteorological observations. …”
    Get full text
    Article
  19. 1899

    Integration, Game, and Sustainable Development of Shenzhen Port Based on Governmental Regulations by Xuanfei Wang, Shan Liang, Zhenjie Liao

    Published 2022-01-01
    “…The results show that, along with the promoting effect of port cooperation on the increase in container throughput, there is a gradual increase in the punishment of speculative behaviours. …”
    Get full text
    Article
  20. 1900

    Genome-wide identification and characterization of the bZIP family in the Mangrove Plant Kandelia obovata and its role in response to stress by Yuchong Yi, Yuting Qiu, Hongyao Hu, Dandan Qin, Hechen Huang, Taiping Chen, Wenqi Zha, Yingjia Shen

    Published 2025-02-01
    “…Conserved motif analysis showed that all bZIP family members contained motifs in the basic and hinge regions, with subfamily D displaying the greatest motif diversity. …”
    Get full text
    Article