Suggested Topics within your search.
Suggested Topics within your search.
- Personnel management 2
- ARCHITECTURE / Urban & Land Use Planning 1
- Community development 1
- Critical Care 1
- Critical care medicine 1
- Diagnostic ultrasonic imaging 1
- Economic development 1
- Electronic circuits 1
- Examinations 1
- French language 1
- Medical economics 1
- Medicine 1
- TECHNOLOGY & ENGINEERING / General 1
- Ultrasonography 1
-
3881
Hardcoded vulnerability detection approach for IoT device firmware
Published 2022-10-01“…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
Get full text
Article -
3882
MONEY LAUNDERING: MACROECONOMIC ASSESSMENT METHODS AND CURRENT TREND IN UKRAINE
Published 2021-01-01“…The grounds for determining the priorities of further state policy in the sphere of anti-money laundering have been formed, for the national financial monitoring of relevant benchmarks of increased risk of financial transactions in specific sectors of the economy and possible further methodological use of sectoral analysis (with wider coverage of the national economic sectors) money laundering risks. …”
Get full text
Article -
3883
The Nogai Nomads in the XVIII–XIX centuries: the choice between the Russian State and the Ottoman Empire
Published 2021-12-01“…The relevance of the study is due to the little-studied and fragmentary coverage of the problem of Nogai society’s choice between Russian and Ottoman citizenship in the XVIII-XIX centuries. …”
Get full text
Article -
3884
Definition of the marketing management categorical apparatus
Published 2020-06-01“…The presented study is devoted to the coverage of the issues related to the development of the potential of a modern employee. …”
Get full text
Article -
3885
Advancing Future Amyotrophic Lateral Sclerosis Medicines by Incorporating The Patient Voice Into Patient-Centered Holistic Measurement Strategies for Clinical and Real-World Studie...
Published 2025-05-01“…Abstract Introduction This analysis sought to understand the patient experience in amyotrophic lateral sclerosis (ALS) and to assess whether commonly used clinical outcome assessments (COAs) reliably and validly capture that experience. …”
Get full text
Article -
3886
Impact of disease information (Ebola and COVID-19) on the pharmaceutical sector in Russia and USA
Published 2021-07-01“…Objective: identification of the relationship between the news coverage of global diseases and the dynamics of the return on shares of the pharmaceutical sector for Russia and the United States.Material and methods. …”
Get full text
Article -
3887
Innovation in Comprehensive Transportation Network Planning in the Context of National Spatial Development: Institutional Constraints and Policy Responses
Published 2025-05-01“…., ecological sensitivity veto power) can reduce planning conflicts effectively, while adaptive governance models enhance land use efficiency and stakeholder collaboration. Key findings reveal a significant negative correlation (R<sup>2</sup> = 0.75) between ecological protection redline (EPR) coverage and transportation network density, underscoring the necessity for differentiated governance strategies in high-conflict regions. …”
Get full text
Article -
3888
Effects of Eucalyptus Tree Plantations and Croplands on Selected Soil Physicochemical Properties in Lake Bunyonyi Sub-Catchment of South-Western Uganda.
Published 2024“…This study, therefore, investigated the effect of Eucalyptus spp. on soil physicochemical properties in the Lake Bunyonyi sub-catchment. Two land use types (EPs and cropland) were used for comparison in the study area. …”
Get full text
Thesis -
3889
L’objectivité en trompe-l’œil
Published 2017-07-01“…Le Figaro’s framing of the creation of France’s Ministry of Immigration, Integration, National Identity, and Mutually Supportive Development (MIIIN) in 2007, under president Nicolas Sarkozy, shows that this right-leaning newspaper uses different types of journalistic artifacts to objectify coverage of this event and give the impression of encouraging debate about it by applying a strategy based on the appearance of non-engagement of today's general press.…”
Get full text
Article -
3890
-
3891
Long read whole genome sequencing-based discovery of structural variants and their role in aetiology of non-syndromic autism spectrum disorder in India
Published 2025-08-01“…SVs were called using five variant callers- Sniffles2, cuteSV, NanoVar, SVIM, and npInv, and annotated using AnnotSV. …”
Get full text
Article -
3892
Gantry-based pencil beam scanning proton therapy for uveal melanoma: IMPT versus proton arc therapy
Published 2025-04-01“…Treatment quality for both plans was evaluated daily using CBCT-generated synthetic CT. Target coverage, conformity, and mean/maximum doses to adjacent organs were assessed. …”
Get full text
Article -
3893
Assessment of Urban Landscape Patterns to Measure the Effects of Urbanization on Landscape Structure (Case Study: Kermanshah City)
Published 2017-02-01“…In the next step (step processing) primary land use was marked. That human land use, wasteland and without cover, tree cover, agricultural and water according to the understanding of the area. …”
Get full text
Article -
3894
Uptake of voluntary counselling and testing among young people participating in an HIV prevention trial: comparison of opt-out and opt-in strategies.
Published 2012-01-01“…As treatment becomes more widely available, strategies to expand VCT coverage are critically important. We compare VCT uptake using two delivery strategies (opt-in and opt-out) within the MEMA kwa Vijana trial in 20 communities in northwest Tanzania.…”
Get full text
Article -
3895
Optimizing Access Point Placement in Industrial IoT: A Deep Reinforcement Learning Approach With Q-Learning Verification and Signal Heatmap Visualization
Published 2025-01-01“…The performance metrics used are average received signal strength (RSS), average interference, and signal coverage across the industrial floor. …”
Get full text
Article -
3896
Certain aspects of the implementation of imputed insurance of environmental risks in the Russian Federation
Published 2024-10-01“…Purpose: of this article is to justify the implementation of insurance of environmental risks in the Russian Federation in the form of a pilot project based on imputed insurance with the definition of the main conditions of insurance coverage.Methods: the presented work uses statistical and predictive methods and the integrated approach for processing data on natural, climatic and human activity risks. …”
Get full text
Article -
3897
A discrete-time split-state framework for multi-state modeling with application to describing the course of heart disease
Published 2025-02-01“…In the simulation study, we simulated a Markov process with an exponential distribution, a semi-Markov process with a Weibull distribution, and a non-Markov process with an exponential distribution. The coverage rate of transition rates estimated using our framework was 94% for the Markov process and 93% for the non-Markov process. …”
Get full text
Article -
3898
Assessing soil erosion and sediment yield in the Bou Rouina watershed (Northeast of Algeria): a RUSLE-SDR modeling approach
Published 2025-05-01“…Key factors including rainfall erosivity (R-factor), soil erodibility (K-factor), slope length-steepness factor (LS-factor), and vegetation coverage factor (C-factor) were computed and mapped using GIS tools. …”
Get full text
Article -
3899
A Cross-sectional Descriptive Study to Assess the Knowledge, Attitudes and Practices Regarding Cancer Preventive Vaccines among Undergraduate Medical Students
Published 2025-04-01“…A semi-structured, validated and pilot-tested questionnaire (Google Forms) was used to collect the data. The collected data were analysed using Statistical Package for the Social Sciences (SPSS) version 16.0. …”
Get full text
Article -
3900
Whole genome sequence of a virulent and multidrug resistant Staphylococcus aureus strain MD02 isolated from a diabetic foot ulcer in Uganda
Published 2025-07-01“…Data description : Genomic DNA of S. aureus strain MD02 was extracted and sequenced using the Illumina platform, generating high-quality paired-end reads with an average genome coverage of 32.6×. …”
Get full text
Article