-
121
Static Hand Gesture Recognition Based on Convolutional Neural Networks
Published 2019-01-01Get full text
Article -
122
The method of line protection construction with application of IEC 61850 standard on the example of Sepam 1000+ series microprocessor terminal
Published 2024-06-01“…The paper raises a variant of architecture of realization of logical line protection on the basis of implementation of modern technologies. …”
Get full text
Article -
123
Boosting Parallel Applications Performance on Applying DIM Technique in a Multiprocessing Environment
Published 2011-01-01Get full text
Article -
124
-
125
Safety Analysis of Integrated Modular Avionics System Based on FTGPN Method
Published 2020-01-01“…Compared with federated avionic architecture, the integrated modular avionic (IMA) system architecture in the aircraft can provide more sophisticated and powerful avionic functionality, and meanwhile, it becomes structurally dynamic, variably interconnected, and highly complex. …”
Get full text
Article -
126
-
127
Polytene chromosomes reflect functional organization of the Drosophila genome
Published 2019-03-01Get full text
Article -
128
Study on Mechanical Performance of Prestressed UHPFRC U-Beam Bridges
Published 2021-01-01Get full text
Article -
129
La question du logement social à New York
Published 2006-04-01“…The bifurcation of the housing market at local level paralleled a dual approach of the federal government. The 1930’s—and the political forces at work behind the scenes at local and federal level—were thus to shape the decades to come as the initial vision of a unified federal housing program was defeated by the emergence of a two‑tiered approach. …”
Get full text
Article -
130
-
131
From Cartilage to Matrix: Protocols for the Decellularization of Porcine Auricular Cartilage
Published 2025-01-01Get full text
Article -
132
Ontologies in modelling and analysing of big genetic data
Published 2025-01-01Get full text
Article -
133
Towards the Integration between IoT and Cloud Computing: An Approach for the Secure Self-Configuration of Embedded Devices
Published 2015-12-01“…After a discussion on the limits of current IoT and Cloud solutions in terms of secure self-configuration, we present a Cloud-based architecture that allows IoT devices to interact with several federated Cloud providers. …”
Get full text
Article -
134
Intrusion Detection Model for Wireless Sensor Networks Based on FedAvg and XGBoost Algorithm
Published 2024-01-01“…For the characteristics of channel instability in wireless sensor networks, this paper proposes an intrusion detection algorithm based on FedAvg (federated averaging) and XGBoost (extreme gradient boosting) wireless sensor networks using fog computing architecture. …”
Get full text
Article -
135
CHURCH RESPONSE TO SECURITY CHALLENGES IN THE 21ST CENTURY: THE NIGERIAN EXPERIENCE
Published 2023-07-01Get full text
Article -
136
APPLICATION OF THE INTERNET OF THINGS IN PHARMACEUTICAL INDUSTRY SUPPLY CHAINS
Published 2019-10-01Get full text
Article -
137
-
138
Analyzing the Pension System of the USSR
Published 2015-04-01“…It is highly recommended that the positive aspects of the soviet pension system are taken into consideration when reforming the actual pension system of Russian Federation.…”
Get full text
Article -
139
Digital ecosystem model of the agro-industrial complex
Published 2023-03-01“…The role of the system actor and IT integrator is assigned to the Ministry of Agriculture of the Russian Federation. The main and additional functions of the digital platform are highlighted. …”
Get full text
Article -
140