-
601
Abandoning the EPP-feature in Polish dual copula clauses by redefining the predication relation
Published 2021-12-01“…We derive this requirement by following Zeiljstra’s (2012) upward Agree which only takes place once interpretable features c-command uninterpretable features, and Rothstein’s (2004) approach which is based on a neo-Davidsonian event semantics and which argues that be and its complement form a complex predicate, separated from the pre-copular DP both semantically and syntactically. …”
Get full text
Article -
602
Key technologies of deep space TT&C and telecommunication for Mars exploration
Published 2023-03-01“…The implementation of China's deep space telemetry, track and command (TT&C) system has always revolved around the three-step strategy of the lunar exploration project, including “circling”, “falling” and “returning”, which helps us to make great achievements from the breakthrough of key technologies, the initial construction of the system to the optimization of the system.At present, the success of Mars exploration will further promote our ability of deep space TT&C system construction.In terms of the view of the key technologies of deep space response and the ground station system construction, the development process of China's deep space TT&C system from scratch was reviewed, and the key technologies of Mars deep space TT&C system were summarized.At the same time, in view of the advantages of the United States in planetary exploration, the deep space response technology of the “Perseverance” rover was analyzed and summarized, which can provide reference for the future development of Mars exploration in China.Furthermore, considering the construction of the US deep space station and the current rapidly growing demand for future deep space exploration missions, the system structure, overall performance, key system design issues and contributions of these Chinese deep space stations were briefly reviewed.…”
Get full text
Article -
603
L’appareil artistique de Schwitters
Published 2012-07-01“…Or pendant l’entre-deux guerres, et même plus tard, un certain nombre d’artistes n’ont pas hésité à répondre à des commandes extérieures et commerciales, tout en se consacrant à leurs propres recherches plastiques. …”
Get full text
Article -
604
BUSINESS ENVIRONMENT - THE CASE OF WESTERN BALKAN COUNTRIES
Published 2014-11-01“…Many evidence from the countries of central Europe show that the development of SMEs and entrepreneurship is a key factor for a successful transformation from command to market based economy in WBCs. SMEs create new jobs, products and services, help in restructuring former state enterprises, which is very important for transition countries, and generate government revenues. …”
Get full text
Article -
605
Tulsa Oklahoma Oktoberfest Tent Collapse Report
Published 2012-01-01“…EMT's and paramedics from Tulsa Fire Department and EMSA provided care at the scene under unified incident command. Of the 23 patients transported by EMS, four were hospitalized, one with critical spinal injury and one with critical head injury. …”
Get full text
Article -
606
Yönetim Felsefesi Bağlamında Doğu ve Batı İttihad Eder mi? Gazali ve Machiavelli Üzerinden Hermenötik Bir Değerlendirme
Published 2021-12-01“…Both philosophies have close perspectives on issues such as the characteristics that a manager should have, communication management, commanding and obedience, referring to the opinions of others, and qualifications required in assistants. …”
Get full text
Article -
607
Software and Hardware Development of Madrasah Ibtidaiyah Student's Fitness Evaluation based on Hexagonal Obstacle Microcontroller (Evabugar Mikrohexo)
Published 2023-10-01“…This is because the operational method is not yet user-friendly, and there are still many confusing commands. The use of Evabugar Mikrohexo in large group trials has improved. …”
Get full text
Article -
608
Local corner smoothing based on deep learning for CNC machine tools
Published 2025-01-01“…Abstract Most of toolpaths for machining is composed of series of short linear segments (G01 command), which limits the feedrate and machining quality. …”
Get full text
Article -
609
A Novel Approach for Detecting DGA-Based Botnets in DNS Queries Using Machine Learning Techniques
Published 2021-01-01“…The behavior of botnets that use domain-flux techniques to hide command and control channels was investigated in this research. …”
Get full text
Article -
610
Ruptured Arteriovenous Malformation Presenting with Kernohan’s Notch
Published 2015-01-01“…Postoperatively, she made significant improvement and was following commands contralaterally with ipsilateral hemiplegia. …”
Get full text
Article -
611
Unveiling nature’s antidiabetic potential in Berberis orthobotrys seeds for alloxan-induced diabetic rats
Published 2025-01-01“…The primary metabolite Berberine, which was qualitatively detected by GC-MS in blood and urine samples of rats, may be the alkaloid in command of insulin release or recovery of beta cells after alloxan destruction. …”
Get full text
Article -
612
Pragmatic Analysis of Searle’s Directive Acts Types in “Get Out Movie”
Published 2022-12-01“…Specifically, nine data were found in ask, command showed two data, order consisted of six data, one data in plead, beg, and entreat, permit got five data, request was discovered in two data, four data were found in advise, and invite consisted of four data. …”
Get full text
Article -
613
Combined dynamic multi-feature and rule-based behavior for accurate malware detection
Published 2019-11-01“…We apply the proposed detection system on a combined set of three types of dynamic features, namely, (1) list of application programming interface calls; (2) application programming interface sequences; and (3) network traffic, which represents the IP addresses and domain names used by malware to connect to remote command-and-control servers. Feature selection and construction techniques, that is, term frequency–inverse document frequency and longest common subsequence, are performed on the three extracted features to generate new set of features, which are used to build behavioral Yet Another Recursive Acronym rules. …”
Get full text
Article -
614
Loss shaping enhances exact gradient learning with Eventprop in spiking neural networks
Published 2025-01-01“…We implemented Eventprop in the GPU-enhanced neural networks framework (GeNN) and used it for training recurrent SNNs on the Spiking Heidelberg Digits (SHD) and Spiking Speech Commands (SSC) datasets. We found that learning depended strongly on the loss function and extended Eventprop to a wider class of loss functions to enable effective training. …”
Get full text
Article -
615
Current development and future prospects of multi-target assignment problem: A bibliometric analysis review
Published 2025-01-01“…The multi-target assignment (MTA) problem, a crucial challenge in command control, mission planning, and a fundamental research focus in military operations, has garnered significant attention over the years. …”
Get full text
Article -
616
WEB VULNERABILITIES DETECTION USING A HYBRID MODEL OF CNN, GRU AND ATTENTION MECHANISM
Published 2025-01-01“…Particularly, the model can help detect attacks based on Structured Query Language Injection (SQLi), Cross-Site Scripting (XSS), and command injection. When using the dataset SXCM1, our model achieved 99.77%, 99.66% and 99.63% for training, validation and testing, respectively. …”
Get full text
Article -
617
PREVENTION OF INFERIORITY COMPLEX ATTITUDES ACCORDING TO THE QUR'AN
Published 2024-08-01“…The results of this study show that the mufassir emphasize that true strength lies in faith, solid faith is the initial key in overcoming the sense of inferiority complex, inferiority complex is the spiritual part of human beings and spiritual studies sourced from the Qur'an are the initial stages in fighting the inferiority complex. Allah commands His servants not to feel weak because they are created in the best form by Allah, with physical, intellectual, and spiritual virtues. …”
Get full text
Article -
618
Characteristics of Inpatient Hypertension Cases and Factors Associated with Admission Outcomes in Ashanti Region, Ghana: An Analytic Cross-Sectional Study
Published 2017-01-01“…Accounting for clustering, all analyses were performed using the “svy” command in Stata. Frequencies, Chi-square test, and logistic regression analysis were used in the analysis. …”
Get full text
Article -
619
Four-channel Control of Master-slave Robotic System with User’s Force Transfer during Obstacle Collision at the Remote Site based on Input-to-state Stability
Published 2024-09-01“…In this method, the amount of force/torque of the user's hand of the master robot will be directly involved in the control command of the slave robot. In this article, in addition to the four-channel system, a three-channel system is proposed. …”
Get full text
Article -
620
CathROB: A Highly Compact and Versatile Remote Catheter Navigation System
Published 2017-01-01“…Key features of CathROB include an extremely compact design that minimizes encumbrance and time for system set-up in a standard cath lab, a force-sensing mechanism, an intuitive command interface, and functions for automatic catheter navigation and repositioning. …”
Get full text
Article