Suggested Topics within your search.
Suggested Topics within your search.
-
2481
INFLUENCE OF COMPUTER ASSISTED INSTRUCTION ON PRIMARY EDUCATION IN NIGERIA
Published 2022-05-01“…The data collected were collated, coded and analyzed, using descriptive statistics and mean rating because of their appropriateness to the study. …”
Get full text
Article -
2482
Terms and Procedures of Insurance Payments are in Need of Rectification
Published 2019-01-01“…Among the causes that give rise to them, an important place is occupied by separate provisions of the Tax Code of the Russian Federation, which allow an ambiguous interpretation of their content by each of these parties. …”
Get full text
Article -
2483
The factors that attract healthcare professionals to and retain them in rural areas in South Africa
Published 2015-02-01“…Fourteen participants were purposively selected for the study. Data were coded and the themes extracted and critically analysed by two researchers. …”
Get full text
Article -
2484
Generating diversity and securing completeness in algorithmic retrosynthesis
Published 2025-05-01“…We also make progress on understanding DFPN in terms of completeness, i.e., the ability to find a solution whenever there exists one. …”
Get full text
Article -
2485
Avec la série The Expanse, penser l’expérience du corps face aux images
Published 2023-12-01“…By taking into account the particular space of the series, we show that the relationship to the body is effectively modified - and in this way, the sensitive, affective and biological performances of the body itself - to the extent of the belief in the image that makes the filmic experience a form of magical ritual, a pivotal moment between social codes and instructions and the restitution of the biological body.…”
Get full text
Article -
2486
Optimization Algorithm of Neural Network Structure Based on Adaptive Genetic Algorithm
Published 2021-02-01“…The structural design of neural network is one of the hot issues in neural network research The number of hidden layers and nodes has a great influence on the convergence speed and generalization ability of neural network Genetic algorithm is an adaptive optimization probability search algorithm formed by simulating biological heredity and evolution Its core idea is derived from the natural law of biological genetics and survival of the fittest, and it is a search algorithm with the iterative process of “survival + detection” However, the selection of genetic algorithm parameters is subjective, slow convergence and easy to fall into premature convergence To solve these problems, an adaptive genetic algorithm is proposed to find the optimal neural network structure The adaptive genetic algorithm selects the first n optimal individuals and adds a certain amount of random individuals in the optimization process of each iteration to update the population, and selfadaptive optimization of the search step size of the population can ensure the diversity of the population and improve the convergence rate at the same time Then we code and the structure of neural network processing, adaptive genetic algorithm, neural network structure optimization, so as to make the neural network as soon as possible to find the optimal network structure and parameters, in order to improve the accuracy of neural network. …”
Get full text
Article -
2487
Study of the pine wilt disease occurrence and its range expansion pattern based on GIS
Published 2006-09-01“…Through exploring the spatially referenced pine wilt disease (PWD) occurrence data and mining the centroid of its infested forest stand, distance matrix of the geo-coded PWD infested rate was derived, and the spatial statistic autocorrelation index Moran's Ⅰ was used in exploring PWD spatial expansion mechanism. …”
Get full text
Article -
2488
Design Improvement of a Semi-submersible Floating Offshore Wind Turbines through Frequency-domain Load Analyses
Published 2025-04-01“…The results are expected to make a significant contribution to improving the motion performance of FOWTs.…”
Get full text
Article -
2489
Universal patching method for side-channel vulnerabilities based on atomic obfuscation
Published 2022-04-01“…Executing code containing side-channel vulnerabilities exhibits different non-functional behaviors related to inputs.Attackers can obtain these behaviors by leveraging micro architecture side-channel attacks and then analyze the pattern between the behaviors and the inputs to access sensitive data.Vulnerability repairing at the software layer brings low overheads to a program’s execution.Besides, it does not require modifying hardware or system, which enables fast patching and widespread deployment.It becomes the mainstream strategy applied to the current cryptographic implementations.However, existing solutions are deeply bound to the program’s implementation and requires manual intervention.This brings challenge to implement and is not versatile enough.A general patching method was proposed for side-channel vulnerabilities that combined dynamic obfuscated execution with hardware atomic transaction.To hide the real accesses of the side-channel vulnerabilities of a program, the proposed method inserted dynamic confusing accesses into the vulnerabilities.To avoid an attacker using fine-grained side-channel attack to distinguish the real access and the confusing access, both of them were encapsulated as transactions and they were guaranteed to be uninterrupted during the running period.In addition, a prototype system called SC-Patcher was implemented based on the LLVM compiler.Various optimization strategies were supported, including secure springboard and transaction aggregation, to further improve system security and performance.Experimental results show that the proposed method makes it impossible for an attacker to restore accurate sensitive data through side-channel attack, and it also brings almost no additional performance overhead to the program.…”
Get full text
Article -
2490
The Issue of Nullifying a Judgment in Criminal Procedural Law
Published 2023-12-01“…Lastly, study will examine judgments indicative of a nullification in Turkish criminal procedural law and discuss whether the practice of distinctly subjecting a judgment to nullification is accurate or not without regard to the general legal remedial system ensured in Turkish Criminal Procedural Code.…”
Get full text
Article -
2491
Domain Adaptation for Underwater Image Enhancement via Content and Style Separation
Published 2022-01-01“…Although some work leverage transfer learning and domain adaptation to alleviate this problem, they target to minimize the latent discrepancy of synthesis and real-world data, and make the latent space hard to interpret and cannot manipulate. …”
Get full text
Article -
2492
THE CONCEPT OF SOCIAL, ENVIRONMENTAL, AND ECONOMIC BEHAVIOR OF CORPO- RATES
Published 2025-06-01“…Therefore, effective CSR should involve corporate governance reform and regulatory intervention to make it mandatory and ensure control over the process. …”
Get full text
Article -
2493
Integrity of Best-Answer Assignments in Large Enrollment Classes; the role of Compulsory Attribution
Published 2024-12-01“…The method secures compulsory attribution of digital solutions using meta-data, access controls, and extensible code available in many common applications, including Microsoft Office. …”
Get full text
Article -
2494
Rock Crushing Analysis of TBM Disc Cutter Assisted by Ultra-High-Frequency Loading
Published 2022-01-01“…The addition of ultrahigh-frequency loading also reduces the fluctuation increase of cracks, which makes the operation state of the disc cutter more stable and avoids abnormal damage to tools.…”
Get full text
Article -
2495
Domownik Workbook. A Resource for Shaping Children’s Cultural Identity in Grades I–III
Published 2025-01-01“…These features guide the pupil towards the knowledge and education of language (linguistic codes), customs (communal celebrations), history (collective memory) and being rooted in religion. …”
Get full text
Article -
2496
The Impact of Technology on the Gender Wage Gap
Published 2024-12-01“…This result shows that women should be encouraged and justified to make more investments in the field of technological education…”
Get full text
Article -
2497
Fault classification in inverter based resources system using spherical coordinate system
Published 2025-09-01“…Modern grid codes require renewable energy source (RES) plants to remain connected with the grid even during fault scenarios. …”
Get full text
Article -
2498
Survey on automated vulnerability mining techniques for IoT device firmware
Published 2025-04-01“…In recent years, security incidents caused by IoT devices have occurred frequently, which makes the research of IoT device security become a hot spot. …”
Get full text
Article -
2499
Design and Security Analysis of a Fragment of Internet of Things Telecommunication System
Published 2016-12-01“…We solved the following tasks in the work, namely, a description of the system Smart Home, a description of steps and evaluation system security Smart Home; implementation of hardware assembly and writing a code for the selected fragment of the system; safety evaluation of the selected fragment Smart House and identification of actual threats; make recommendations to counter current threats; software implementation of one of the most urgent threats and software implementation of protective measures for a selected threat. …”
Get full text
Article -
2500
A lightweight high-frequency mamba network for image super-resolution
Published 2025-07-01“…We study the use of self-attention mechanism to integrate local and global information, aiming to make the model better balance the weights of the two parts of information. …”
Get full text
Article