Showing 17,161 - 17,180 results of 20,708 for search 'Tecmo~', query time: 1.75s Refine Results
  1. 17161

    Hybrid quantum neural networks show strongly reduced need for free parameters in entity matching by Lukas Bischof, Stefan Teodoropol, Rudolf M. Füchslin, Kurt Stockinger

    Published 2025-02-01
    “…This data is sometimes redundant, incomplete or inaccurate and needs to be cleaned and merged with other data before becoming useful for scientific exploration. Hence, entity matching, i.e. the process of linking data about a given entity gathered from multiple data sets, is a major problem in artificial intelligence with applications in science and industry. …”
    Get full text
    Article
  2. 17162

    The Role of the P1 Latency in Auditory and Speech Performance Evaluation in Cochlear Implanted Children by Shan Xiong, Liwei Jiang, Yu Wang, Tao Pan, Furong Ma

    Published 2022-01-01
    “…Cochlear implants (CIs) have already become the best treatment strategy for severe to profound hearing impairment. …”
    Get full text
    Article
  3. 17163

    THE SOCIO-ANTHROPOLOGICAL IDEAS IN THE AMERICAN CRITICAL REALISM (GEORGE SANTAYANA) by V. M. Petrushov, I. V. Tolstov

    Published 2017-12-01
    “…Reason may help to rationalize life, at least partially, so that it could become more stable and safe to ensure happiness and freedom, which are the greatest desires of every human being.…”
    Get full text
    Article
  4. 17164

    TRANSFORMATION OF THE GENDER DICHOTOMY OF SPIRIT AND BODY IN POSTMODERN PHILOSOPHY AND CULTURE by O. P. Vlasova, Y. V. Makieshyna

    Published 2018-12-01
    “…In the post modernity, the body and corporality become dominant themes not only in the philosophy and "high" culture, but also in mass culture; at the same time, the emphasis on their common narratives and intertexts testifies to the fundamental transformations that reflect the "condition" of postmodernity. …”
    Get full text
    Article
  5. 17165

    Java deserialization gadget chain discovery method based on hybrid analysis by Yongxing WU, Libo CHEN, Kaida JIANG

    Published 2022-04-01
    “…Java deserialization vulnerabilities have become a common threat to Java application security nowadays.Finding out the gadget chain determines whether this type of vulnerability can be exploited.Due to the large code space of Java applications and dependent libraries and the polymorphism of Java itself, manual analysis of Java deserialization gadget chains consumes a lot of time and effort and it is highly dependent on the experienced knowledge.Therefore, it is crucial to study how to efficiently and accurately automate the discovery of gadget chains.Java deserialization gadget chain discovery method based on hybrid analysis was proposed.Call graph based on the variable declaration type was constructed, and then the deserialization entry functions that may reach the dangerous functions were screened using the call graph analysis.The screened entry functions were used as the entry point of the hybrid information flow analysis.The hybrid information flow analysis was carried out for both pointer and tainted variables.The tainted objects created implicitly were marked.The tainted information and the pointer information were propagated simultaneously to construct the hybrid information flow graph.The reachability of external taint data propagation to the dangerous function was judged based on the hybrid information flow graph.The corresponding deserialization gadget chain was constructed according to the taint propagation path.The hybrid analysis took into account the efficiency of call graph analysis and the accuracy of hybrid information flow analysis.The corresponding static analysis tool, namely GadgetSearch, was implemented based on the proposed hybrid analysis method.In the experimental evaluation, GadgetSearch had lower false positive and lower false negative than the existing tool GadgetInspector on four datasets of Ysoserial, Marshalsec, Jackson historical CVE, and XStream historical CVE.Additionally, GadgetSearch also found multiple undisclosed gadget chains.The experimental results show that the proposed method can efficiently and accurately discover the Java deserialization gadget chain in multiple practical Java applications.…”
    Get full text
    Article
  6. 17166

    Négocier la climatisation de la strate glaciaire. Le cas du projet d’aménagement du troisième tronçon du téléphérique de La Grave by Marie Poulain, Pierre-Olivier Garcia

    Published 2024-04-01
    “…However, since 2020, this site become embroiled in a territorial conflict over the planned extension of a third section of the cable car, with could take visitors beyond the glacier to an altitude of 3,600m. …”
    Get full text
    Article
  7. 17167

    Practical skills of psychology bachelors in working with automated HR platforms by P. Bleshmudt, O. Fil

    Published 2024-12-01
    “…Particular attention should be paid to improving data security, which is becoming critical when working with HR platforms, as employees’ personal data needs to be protected from unauthorized access. …”
    Get full text
    Article
  8. 17168

    Nutrient loss due to food waste in urban households: Insights from Bogor City, Indonesia by Mayang Soliha Annisa, Briawan Dodik, Meti Dwiriani Cesilia, Dhiyani Swamilaksita Prita

    Published 2025-01-01
    “…Background: Food waste (FW) has become a pressing global issue, contributing significantly to nutrient loss and significantly achieving sustainable healthy diets. …”
    Get full text
    Article
  9. 17169

    Rat Hippocampal Neural Stem Cell Modulation Using PDGF, VEGF, PDGF/VEGF, and BDNF by Neus Gomila Pelegri, Catherine A. Gorrie, Jerran Santos

    Published 2019-01-01
    “…Neural stem cells have become the focus of many studies as they have the potential to differentiate into all three neural lineages. …”
    Get full text
    Article
  10. 17170

    Machine Learning Model-Based Applications for Food Management in Alzheimer’s Using Regression Analysis Approach by Sajadul Hassan Kumhar, Prabhakara Rao Kapula, Harveen Kaur, Radeep R. Krishna, Mudasir M Kirmani, Vijay Anant Athavale, Mohd Wazih Ahmad

    Published 2022-01-01
    “…Alzheimer’s disease (AD) has become a public health concern due to its misinterpretation with vascular dementia (VD) and mixed dementia Alzheimer’s disease (MXD). …”
    Get full text
    Article
  11. 17171

    The Problem of Methodological Fixation of Analytical Jurisprudence by D. G. Alova, A. A. Iljushkin

    Published 2024-10-01
    “…The main thesis of the article submitted for discussion is the assertion that the methodological fixation of analytical jurisprudence, which has become established as a relevant research tradition, must be overcome, since it is justified exclusively discursively, and not on the basis of sound reflection.…”
    Get full text
    Article
  12. 17172

    Corneal Cross-Linking as Treatment in Pediatric Keratoconus: Comparison of Two Protocols by Shira Hed, Ran Matlov Kormas, Sagi Shashar, Boris E. Malyugin, Matthew Boyko, Boris Knyazer

    Published 2021-01-01
    “…Accelerated protocols have recently become common. This study sought to compare the outcomes of accelerated and standard CXL in terms of visual acuity, keratometry, and tomographic parameters in pediatric population. …”
    Get full text
    Article
  13. 17173

    Theories and Practices of Societal Security in the Scandinavian Countries: A Comparative Analysis by Mikhail S. Topchiev

    Published 2024-12-01
    “…Strategies of ‘resilience’, risk management’, ‘crisis’ or ‘emergency management’ become important. In the Nordic countries, the need for societal security is coming to the fore, linked to the development of a social welfare society. …”
    Get full text
    Article
  14. 17174

    A Man “Resembling Sancho Panza”: Viktor Petrov's Self-Presentation in Letters to Sofiia Zerova by Valentyna Borbuniuk

    Published 2024-12-01
    “…Everyday life and longing for his beloved become the basis for imagery and sensuality. It is proved that the "I" image presented by V. …”
    Get full text
    Article
  15. 17175

    A Credit Card Fraud Detection Algorithm Based on SDT and Federated Learning by Yuxuan Tang, Zhanjun Liu

    Published 2024-01-01
    “…With the rise of digital payment methods and the growth in financial transactions, the issue of credit card fraud has become increasingly severe. Traditional fraud detection methods are currently facing challenges such as poor model performance, difficulty in obtaining accurate results, and limitations in distributed deployment. …”
    Get full text
    Article
  16. 17176

    Exploring social media appearance preoccupation in relation to self-esteem, well-being, and mental health by Rosa Angela Fabio, Rosa Tripodi

    Published 2024-07-01
    “…Background Social media platforms have become integral to modern society, facilitating diverse content interactions for individuals. …”
    Get full text
    Article
  17. 17177

    Teaching System Design of Art Design Major under the Background of Economic Management Mode Change by Jiaxin Zheng

    Published 2022-01-01
    “…With the continuous development of information technology and the continuous maturity of campus network technology, teaching resources have become an important part of information resources. …”
    Get full text
    Article
  18. 17178

    Mobile robot navigation path algorithm in 3d industrial internet of thing (iot) environment based on 5g mobile communication by Pei Ping, Yu. N. Petrenko

    Published 2019-07-01
    “…Currently, Internet of Things (IoT) has become one of the hottest topics in both industry and academia of wireless communication field. …”
    Get full text
    Article
  19. 17179

    The Tuan Guru Tradition of Nahdlatul Wathan in Pesantren by Supratman Muslim, Suprapto Suprapto, Jamaluddin Jamaluddin

    Published 2022-07-01
    “…However, the MDQH NW Islamic Boarding School in Anjani still maintains the rule that has become the legacy of its founders, namely three years for the talibat and four the tullab.…”
    Get full text
    Article
  20. 17180

    A Multi-Disciplinary Approach in the Management of Endo-Perio Lesions: A 4-year Follow-Up Case Report by Stephani Dwiyanti

    Published 2023-01-01
    “…This case report discusses the multi-disciplinary approach and long-term follow-up of a 66-year-old male who suffered a combined endodontic–periodontal lesion (EPL). …”
    Get full text
    Article