Showing 2,481 - 2,500 results of 2,827 for search 'making and coding', query time: 0.11s Refine Results
  1. 2481

    INFLUENCE OF COMPUTER ASSISTED INSTRUCTION ON PRIMARY EDUCATION IN NIGERIA by Amede Lucky

    Published 2022-05-01
    “…The data collected were collated, coded and analyzed, using descriptive statistics and mean rating because of their appropriateness to the study. …”
    Get full text
    Article
  2. 2482

    Terms and Procedures of Insurance Payments are in Need of Rectification by Viktor Grigor’evich Get’Man

    Published 2019-01-01
    “…Among the causes that give rise to them, an important place is occupied by separate provisions of the Tax Code of the Russian Federation, which allow an ambiguous interpretation of their content by each of these parties. …”
    Get full text
    Article
  3. 2483

    The factors that attract healthcare professionals to and retain them in rural areas in South Africa by A. Rose, E. Janse van Rensburg-Bonthuyzen

    Published 2015-02-01
    “…Fourteen participants were purposively selected for the study. Data were coded and the themes extracted and critically analysed by two researchers. …”
    Get full text
    Article
  4. 2484

    Generating diversity and securing completeness in algorithmic retrosynthesis by Florian Mrugalla, Christopher Franz, Yannic Alber, Georg Mogk, Martín Villalba, Thomas Mrziglod, Kevin Schewior

    Published 2025-05-01
    “…We also make progress on understanding DFPN in terms of completeness, i.e., the ability to find a solution whenever there exists one. …”
    Get full text
    Article
  5. 2485

    Avec la série The Expanse, penser l’expérience du corps face aux images by Jean-Albert Bron

    Published 2023-12-01
    “…By taking into account the particular space of the series, we show that the relationship to the body is effectively modified - and in this way, the sensitive, affective and biological performances of the body itself - to the extent of the belief in the image that makes the filmic experience a form of magical ritual, a pivotal moment between social codes and instructions and the restitution of the biological body.…”
    Get full text
    Article
  6. 2486

    Optimization Algorithm of Neural Network Structure Based on Adaptive Genetic Algorithm by XILiang, WANGRui dong

    Published 2021-02-01
    “…The structural design of neural network is one of the hot issues in neural network research The number of hidden layers and nodes has a great influence on the convergence speed and generalization ability of neural network Genetic algorithm is an adaptive optimization probability search algorithm formed by simulating biological heredity and evolution Its core idea is derived from the natural law of biological genetics and survival of the fittest, and it is a search algorithm with the iterative process of “survival + detection” However, the selection of genetic algorithm parameters is subjective, slow convergence and easy to fall into premature convergence To solve these problems, an adaptive genetic algorithm is proposed to find the optimal neural network structure The adaptive genetic algorithm selects the first n optimal individuals and adds a certain amount of random individuals in the optimization process of each iteration to update the population, and selfadaptive optimization of the search step size of the population can ensure the diversity of the population and improve the convergence rate at the same time Then we code and the structure of neural network processing, adaptive genetic algorithm, neural network structure optimization, so as to make the neural network as soon as possible to find the optimal network structure and parameters, in order to improve the accuracy of neural network. …”
    Get full text
    Article
  7. 2487

    Study of the pine wilt disease occurrence and its range expansion pattern based on GIS by ZHANG Zhi-cheng, SUN Jiang-hua, HUANG Bao-xu, ZHANG Feng, OUYANG Hua

    Published 2006-09-01
    “…Through exploring the spatially referenced pine wilt disease (PWD) occurrence data and mining the centroid of its infested forest stand, distance matrix of the geo-coded PWD infested rate was derived, and the spatial statistic autocorrelation index Moran's Ⅰ was used in exploring PWD spatial expansion mechanism. …”
    Get full text
    Article
  8. 2488

    Design Improvement of a Semi-submersible Floating Offshore Wind Turbines through Frequency-domain Load Analyses by Soo Bin Lee, Joonmo Choung

    Published 2025-04-01
    “…The results are expected to make a significant contribution to improving the motion performance of FOWTs.…”
    Get full text
    Article
  9. 2489

    Universal patching method for side-channel vulnerabilities based on atomic obfuscation by Deqing ZOU, Pan ZHANG, Wei LIU, Weijie CHEN, Yifan LU

    Published 2022-04-01
    “…Executing code containing side-channel vulnerabilities exhibits different non-functional behaviors related to inputs.Attackers can obtain these behaviors by leveraging micro architecture side-channel attacks and then analyze the pattern between the behaviors and the inputs to access sensitive data.Vulnerability repairing at the software layer brings low overheads to a program’s execution.Besides, it does not require modifying hardware or system, which enables fast patching and widespread deployment.It becomes the mainstream strategy applied to the current cryptographic implementations.However, existing solutions are deeply bound to the program’s implementation and requires manual intervention.This brings challenge to implement and is not versatile enough.A general patching method was proposed for side-channel vulnerabilities that combined dynamic obfuscated execution with hardware atomic transaction.To hide the real accesses of the side-channel vulnerabilities of a program, the proposed method inserted dynamic confusing accesses into the vulnerabilities.To avoid an attacker using fine-grained side-channel attack to distinguish the real access and the confusing access, both of them were encapsulated as transactions and they were guaranteed to be uninterrupted during the running period.In addition, a prototype system called SC-Patcher was implemented based on the LLVM compiler.Various optimization strategies were supported, including secure springboard and transaction aggregation, to further improve system security and performance.Experimental results show that the proposed method makes it impossible for an attacker to restore accurate sensitive data through side-channel attack, and it also brings almost no additional performance overhead to the program.…”
    Get full text
    Article
  10. 2490

    The Issue of Nullifying a Judgment in Criminal Procedural Law by Gökhan Ölmez

    Published 2023-12-01
    “…Lastly, study will examine judgments indicative of a nullification in Turkish criminal procedural law and discuss whether the practice of distinctly subjecting a judgment to nullification is accurate or not without regard to the general legal remedial system ensured in Turkish Criminal Procedural Code.…”
    Get full text
    Article
  11. 2491

    Domain Adaptation for Underwater Image Enhancement via Content and Style Separation by Yu-Wei Chen, Soo-Chang Pei

    Published 2022-01-01
    “…Although some work leverage transfer learning and domain adaptation to alleviate this problem, they target to minimize the latent discrepancy of synthesis and real-world data, and make the latent space hard to interpret and cannot manipulate. …”
    Get full text
    Article
  12. 2492

    THE CONCEPT OF SOCIAL, ENVIRONMENTAL, AND ECONOMIC BEHAVIOR OF CORPO- RATES by Iryna O. Shcherbatyuk, Ihor S. Pyroha

    Published 2025-06-01
    “…Therefore, effective CSR should involve corporate governance reform and regulatory intervention to make it mandatory and ensure control over the process. …”
    Get full text
    Article
  13. 2493

    Integrity of Best-Answer Assignments in Large Enrollment Classes; the role of Compulsory Attribution by Kurt Schmitz, Veda Storey

    Published 2024-12-01
    “…The method secures compulsory attribution of digital solutions using meta-data, access controls, and extensible code available in many common applications, including Microsoft Office. …”
    Get full text
    Article
  14. 2494

    Rock Crushing Analysis of TBM Disc Cutter Assisted by Ultra-High-Frequency Loading by Dajun Zhao, Junpeng Han, Yu Zhou, Xiaoshu Lv, Shulei Zhang, Ke Gao, Yan Zhao

    Published 2022-01-01
    “…The addition of ultrahigh-frequency loading also reduces the fluctuation increase of cracks, which makes the operation state of the disc cutter more stable and avoids abnormal damage to tools.…”
    Get full text
    Article
  15. 2495

    Domownik Workbook. A Resource for Shaping Children’s Cultural Identity in Grades I–III by Kinga Lisowska

    Published 2025-01-01
    “…These features guide the pupil towards the knowledge and education of language (linguistic codes), customs (communal celebrations), history (collective memory) and being rooted in religion. …”
    Get full text
    Article
  16. 2496

    The Impact of Technology on the Gender Wage Gap by Marzieh Shakeri HosseinAbad, Zahra Nasrollahi

    Published 2024-12-01
    “…This result shows that women should be encouraged and justified to make more investments in the field of technological education…”
    Get full text
    Article
  17. 2497

    Fault classification in inverter based resources system using spherical coordinate system by Vivek Sahu, Pratim Kundu

    Published 2025-09-01
    “…Modern grid codes require renewable energy source (RES) plants to remain connected with the grid even during fault scenarios. …”
    Get full text
    Article
  18. 2498

    Survey on automated vulnerability mining techniques for IoT device firmware by LIU Hangtian, GAN Shuitao, ZHANG Chao, ZHANG Hongqi, SUN Wenhou, GAO Zicong, ZHAO Min, BAI Xue

    Published 2025-04-01
    “…In recent years, security incidents caused by IoT devices have occurred frequently, which makes the research of IoT device security become a hot spot. …”
    Get full text
    Article
  19. 2499

    Design and Security Analysis of a Fragment of Internet of Things Telecommunication System by V. A. Alexandrov, V. A. Desnitsky, D. Y. Chaly

    Published 2016-12-01
    “…We solved the following tasks in the work, namely, a description of the system Smart Home, a description of steps and evaluation system security Smart Home; implementation of hardware assembly and writing a code for the selected fragment of the system; safety evaluation of the selected fragment Smart House and identification of actual threats; make recommendations to counter current threats; software implementation of one of the most urgent threats and software implementation of protective measures for a selected threat. …”
    Get full text
    Article
  20. 2500

    A lightweight high-frequency mamba network for image super-resolution by Tao Wu, Wei Xu, Yajuan Wu

    Published 2025-07-01
    “…We study the use of self-attention mechanism to integrate local and global information, aiming to make the model better balance the weights of the two parts of information. …”
    Get full text
    Article