Showing 20,481 - 20,500 results of 21,330 for search '"IT industry"', query time: 0.16s Refine Results
  1. 20481
  2. 20482
  3. 20483

    Economic Diplomacy of the Russian Federation: Prospects for the Development of an Eff ective Export Support System by A. A. Naryshkin

    Published 2021-04-01
    “…For the Russian Federation this issue acquires particular relevance under present conditions, since the expansion of industrial exports is designed to reduce dependence on commodity exports, strengthen national competitiveness, ensure economic growth, and, correspondingly improve the quality of life of its population. …”
    Get full text
    Article
  4. 20484
  5. 20485
  6. 20486
  7. 20487

    Enhancing university remote language learning through innovative applications of artificial intelligence technologies amidst global challenges by N. Sarnovska, J. Rybinska, Yu. Mykhailichenko

    Published 2024-05-01
    “…In recent years, the integration of artificial intelligence (AI) technologies has revolutionised various industries, and education is no exception. One area where AI is making significant strides is in distance learning of foreign languages at the university level. …”
    Get full text
    Article
  8. 20488
  9. 20489
  10. 20490
  11. 20491
  12. 20492
  13. 20493

    PM2.5/PM10 Ratios in Eight Economic Regions and Their Relationship with Meteorology in China by Danting Zhao, Hong Chen, Erze Yu, Ting Luo

    Published 2019-01-01
    “…The results indicated that PM2.5/PM10 ratios showed an increasing trend from northwest to southeast due to different economic development and industrial types. The highest values were observed in winter among all regions, and the ratios on weekends were higher than that of on weekdays in most of the regions. …”
    Get full text
    Article
  14. 20494

    CDGFD: Cross-Domain Generalization in Ethnic Fashion Design Using LLMs and GANs: A Symbolic and Geometric Approach by Meizhen Deng, Ling Chen

    Published 2025-01-01
    “…These findings suggest significant potential for AI-driven innovation in ethnic fashion design, with applications in both cultural preservation and modern fashion industries.…”
    Get full text
    Article
  15. 20495

    Hardcoded vulnerability detection approach for IoT device firmware by Chao MU, Xin WANG, Ming YANG, Heng ZHANG, Zhenya CHEN, Xiaoming WU

    Published 2022-10-01
    “…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
    Get full text
    Article
  16. 20496

    Les territoires de l’agrobusiness au Brésil by Denise Elias

    Published 2012-06-01
    “…The argument is that, in Brazil, a significant part of the changes in the field in the last five decades, due to the restructuring process of agriculture, understood as an exacerbation of the capitalist mode of production in the sector, and the organization of agro-industrial networks, promoting changes in social and technical elements of the agrarian structure. …”
    Get full text
    Article
  17. 20497

    Optimizing Hydrogen Production in the Co-Gasification Process: Comparison of Explainable Regression Models Using Shapley Additive Explanations by Thavavel Vaiyapuri

    Published 2025-01-01
    “…By integrating Shapley Additive Explanations (SHAP) into model evaluation, this work is the first to provide detailed insights into feature importance and demonstrate the operational feasibility of ML models for industrial-scale hydrogen production in the co-gasification process. …”
    Get full text
    Article
  18. 20498
  19. 20499
  20. 20500