Showing 21 - 40 results of 40 for search 'stored program control', query time: 0.07s Refine Results
  1. 21

    Intergenerational Transfers in Infant Mortality in Southern Sweden, 1740-1968 by Luciana Quaranta

    Published 2018-12-01
    “…This paper is one of five studies that analyses intergenerational transmissions in infant mortality by using a common program to create the dataset for analysis and run the statistical models with data stored in the Intermediate Data Structure. …”
    Get full text
    Article
  2. 22
  3. 23

    GENOME POLITICS: STRATEGY AND TACTICS by Jonas Rubikas

    Published 1999-01-01
    “…Is there any difference between human genome and genome for human? Genome controls directly or indirectly all human functions: body structure, physiology. …”
    Get full text
    Article
  4. 24

    A Complementary Low Schottky Barrier Nonvolatile Bidirectional Reconfigurable Field Effect Transistor Based on Dual Metal Silicide S/D Contacts by Liu Xi, Ya Wang, Meile Wu, Lin Qi, Mengmeng Li, Shouqiang Zhang, Xiaoshi Jin

    Published 2023-01-01
    “…It is designed with Source floating gate (SFG) and drain floating gate (DFG) and adopts two kinds of metal silicide contacts to form complementary low Schottky barrier both between the S/D electrodes and the conduction band of silicon and between the S/D electrodes and the valence band of silicon at the same time. Instead of a program gate (PG) of conventional BRFET which needs independent power supply, the SFG and DFG of the proposed CLSB-NBRFET can be programmed by the CG itself. …”
    Get full text
    Article
  5. 25
  6. 26

    Android application privacy protection mechanism based on virtual machine bytecode injection by Yubo SONG, Qi CHEN, Rui SONG, Aiqun HU

    Published 2021-06-01
    “…To solve the abuse of the Android application permission mechanism, a method of Android application access control based on virtual machine bytecode injection technology was proposed.The security policy in the form of virtual machine bytecode was generated according to the user’s security requirement and usage scenario, and injected into the coding unit of Android application that involves dangerous permission request and sensitive data access, to realize dynamic application behavior control.Tests on applications crawled from four mainstream domestic App stores show that the method can effectively intercept sensitive API calls and dangerous permission requests of legitimate App programs and implement control according to pre-specified security policies.Also, after injecting virtual machine bytecode, most of the App program operation is not affected by the injected code, and the robustness is guaranteed.The proposed method has a good universality.…”
    Get full text
    Article
  7. 27

    Sistem Pengontrol Temperatur dan Kelembaban Otomatis untuk Ruang Penyimpanan Buah by Zulkifli Amin, Muhamad Adha

    Published 2017-10-01
    “…The testing is carried out by observing the ability of the controlling unit apparatus to control the temperature and humidity of the storage container based on program inputed into the controller kit. …”
    Get full text
    Article
  8. 28
  9. 29
  10. 30

    AN INTEGRATED INFORMATION SYSTEM ON BIORESOURCE COLLECTIONS OF THE FASO OF RUSSIA by S. A. Lashin, D. A. Afonnikov, M. A. Genaev, F. V. Kazantsev, E. G. Komyshev, E. A. Oschepkova, А. V. Petrov, D. A. Rasskazov, A. A. Smirnova, N. A. Kolchanov

    Published 2018-05-01
    “…The information system “Bioresource Collections of Scientific Organizations” (IS BRC) has been developed as a Web­portal (www.biores.cytogen.ru) integrating databases on bioresource collections of the FASO of Russia and graphical user interface. Access control to the databases integrated into the IS BRC is performed through authorized program access for viewing records, their creation and editing on the basis of REST technology. …”
    Get full text
    Article
  11. 31

    Establishment of a Comprehensive Platform for Sustained Delivery of Yoga Therapy for Sickle Cell Anemia in Rural and Remote Tribal Pocket in India by Thota Neeraja, Ramesh Nanjundaiah Mavathur, Himanshu Anirudhbhai Shukla, Manmath Gharote

    Published 2024-12-01
    “…Objective: The objective was to set up a yoga-based lifestyle intervention (YBLI) center that is sustainable, accessible, affordable, and acceptable as the part of the Integrated Sickle Cell Anemia Research Program (ISCARP) randomized control trial study. Methodology: By analyzing previous government screenings, the study identified remote, high-prevalence areas. …”
    Get full text
    Article
  12. 32

    Systematic content analysis of self-help smokeless tobacco cessation smartphone applications available in India by Nishant Nishant, Arpit Gupta, Richa Shrivastava, Arpita Rai, Diptajit Das, Ashima Goyal

    Published 2024-07-01
    “…Conclusion: Adherence of these apps to the tobacco cessation guidelines by the National Tobacco Control Program (NTCP), India and the National Institute for Health and Care Excellence (NICE), U.K., was limited only to a few checklist parameters.…”
    Get full text
    Article
  13. 33
  14. 34

    Constructing immersive toy trial experience in mobile augmented reality by Lingxin Yu, Jiacheng Zhang, Xinyue Wang, Siru Chen, Xuehao Qin, Zhifei Ding, Jiahao Han

    Published 2024-01-01
    “…Additionally, interactive controls enable users to manipulate the viewing angles. …”
    Get full text
    Article
  15. 35
  16. 36

    Modeling Seed Longevity and Percentile Prediction: A Sigmoidal Function Approach in Soybean, Maize, and Tomato by Felipe Souza Carvalho, Brunna Rithielly Rezende, Amanda Rithieli Pereira dos Santos, Maria Márcia Pereira Sartori

    Published 2024-12-01
    “…This study aims to evaluate the behavior of seed longevity in soybean, maize, and tomato stored under controlled conditions using Logistic and Boltzmann sigmoidal models. …”
    Get full text
    Article
  17. 37

    Abnormal Operation Detection of Automated Orchard Irrigation System Actuators by Power Consumption Level by Shahriar Ahmed, Md Nasim Reza, Md Rejaul Karim, Hongbin Jin, Heetae Kim, Sun-Ok Chung

    Published 2025-01-01
    “…The irrigation system consisted of a single pump and two solenoid valves controlled by a Python-programmed microcontroller. The microcontroller managed the pump cycling ‘On’ and ‘Off’ states every 60 s and solenoid valves while storing and transmitting sensor data to a smartphone application for remote monitoring. …”
    Get full text
    Article
  18. 38

    Factors Influencing Recentralization of Local Government Functions in Uganda. by Biryomumeisho, Stephen, Ocan, Johnson, Adyanga, Francis Akena

    Published 2024
    “…The paper recommended that the Parliament should harmonize with the central government on the issue of returning Local revenue collection and management at the local level; give reasonable powers to the local Governments to control top technical leadership; increase funding to Central Government staff to monitor Local Government programs and build the capacity of local leaders to improve service delivery.…”
    Get full text
    Article
  19. 39

    Overview of blockchain assets theft attacks and defense technology by Beiyuan YU, Shanyao REN, Jianwei LIU

    Published 2023-02-01
    “…Since Satoshi Nakamoto’s introduction of Bitcoin as a peer-to-peer electronic cash system, blockchain technology has been developing rapidly especially in the fields of digital assets transferring and electronic currency payments.Ethereum introduced smart contract code, giving it the ability to synchronize and preserve the execution status of smart contract programs, automatically execute transaction conditions and eliminate the need for intermediaries.Web3.0 developers can use Ethereum’s general-purpose programmable blockchain platform to build more powerful decentralized applications.Ethereum’s characteristics, such as central-less control, public and transparent interaction data guaranteed by smart contracts, and user-controlled data, have attracted more attentions.With the popularization and application of blockchain technology, more and more users are storing their digital assets on the blockchain.Due to the lack of regulatory and governance authority, public chain systems such as Ethereum are gradually becoming a medium for hackers to steal digital assets.Generally, fraud and phishing attacks are committed using blockchain to steal digital assets held by blockchain users.This article aims to help readers develop the concept of blockchain asset security and prevent asset theft attacks implemented using blockchain at the source.The characteristics and implementation scenarios of various attacks were effectively studied by summarizing the asset theft attack schemes that hackers use in the blockchain environment and abstracting research methods for threat models.Through an in-depth analysis of typical attack methods, the advantages and disadvantages of different attacks were compared, and the fundamental reasons why attackers can successfully implement attacks were analyzed.In terms of defense technology, defense schemes were introduced such as targeted phishing detection, token authorization detection, token locking, decentralized token ownership arbitration, smart contract vulnerability detection, asset isolation, supply chain attack detection, and signature data legitimacy detection, which combine attack cases and implementation scenarios.The primary process and plans for implementation of each type of defense plan were also given.And then it is clear which protective measures can protect user assets in different attack scenarios.…”
    Get full text
    Article
  20. 40

    Symbiotic Root-Endophytic Soil Microbes Improve Crop Productivity and Provide Environmental Benefits by Gary E. Harman, Norman Uphoff

    Published 2019-01-01
    “…The combination of enhanced photosynthesis, increasing sequestration of CO2 from the air, and elevation of SOM removes C from the atmosphere and stores it in the soil. Reductions in global greenhouse gas levels can be accelerated by incentives for carbon farming and carbon cap-and-trade programs that reward such climate-friendly agriculture. …”
    Get full text
    Article