Showing 621 - 640 results of 3,883 for search '"Running"', query time: 0.04s Refine Results
  1. 621

    Exploit detection based on illegal control flow transfers identification by Ming-hua WANG, Ling-yun YING, Deng-guo FENG

    Published 2014-09-01
    “…In order to deal with exploit attacks such as APT,an approach was proposed to detect exploits based on illegal control flow transfers identification.Both static and dynamic analysis methods were performed to construct the CFSO (control flow safety outline),which was used to restrict the targets of control flow transfers occurred during the target program's running.When a call/ret/jmp was about to execute,the target was checked according to the CFSO.The illegal control flow transfer is considered as an exploit attack and all the following attacking steps could be captured.The ex-periment also showed that proposed method had decent overhead and could be applied to detect exploits online.…”
    Get full text
    Article
  2. 622

    Les dés sont jetés ! by Pascale Dollfus

    Published 2021-01-01
    “…On these highlands, throwing dice—a gesture always accompanied by equivocal phrases, either murmured to shouted—is not only a method of divination, a pastime or a money game, but also the means of making all decisions relating to the smooth running of the community: choosing the headman and his assistants, dividing up pastures, choosing the men sent to fetch stray animals, etc. …”
    Get full text
    Article
  3. 623
  4. 624

    « Un néant follement attifé » : macabre et grotesque dans Mesure pour Mesure by Sophie Chiari

    Published 2013-01-01
    “…Thus, the play presents us with a whole series of frail and disquieting characters, and the medieval theme of the Dance of Death running throughout the tragicomedy reveals the vanity of their speeches and attitudes. …”
    Get full text
    Article
  5. 625

    THE IMPLEMENTATION OF THE STATE FAMILY POLICY IN MODERN RUSSIA by S. Kuzin, O. Kuchmaeva

    Published 2017-01-01
    “…Аnnotation: The smooth running of the modern family is impossible without implementation of the state family policy. …”
    Get full text
    Article
  6. 626

    Design and implementation of user-customizing oriented multipath inter-domain routing system by Dong-hong QIN, Jia-hai YANG, Yang YANG, Hui ZHANG

    Published 2013-09-01
    “…With the rapid growth of Internet applications,the routing flexibility and quality of the inter-domain routing system face some significant challenges.Multipath routing is an important method of improving the reliability and robustness of the Internet.Based on previous researches,orienting user customizing routing service,a multi-path inter-domain routing system named UMIR was developed.The routing system includes three service functions of controlling and management center,route discovery and computing protocol and routing incentive,and it is made of control and management subsystem,routing protocol subsystem and routing incentive subsystems.Based on the Emulab network test platform of University of Utah,the UMIR routing system was deployed and tested.The experimental results show that the routing system is running correctly to achieve our design goals.…”
    Get full text
    Article
  7. 627

    Successive memory image analysis method for malicious codes by Wei-ming LI, De-qing ZOU, Guo-zhong SUN

    Published 2017-02-01
    “…In order to detect the behavior of malicious code more comprehensively, the technology of continuous memory image analysis was proposed. The core idea was to run malicious code in QEMU virtual machine, to obtain the memory image of the continuous increment in the running period, and then to analyze the memory image of the base and increment as the memory image. …”
    Get full text
    Article
  8. 628

    Research of Variation Characteristic of Conveyor Belt of Vehicle Group Chain Conveyor based on Elastic Catenary Theory by Yaocheng Zhang, Yang Li

    Published 2020-08-01
    “…Compared with existing general belt conveyors, its load-bearing component-the conveyor belt has less tension when the entire machine is running. Based on elastic catenary theory, the tension change rule of the new type vehicle group chain conveyor belt is studied, a theoretical model of the belt tension change in the form of analysis is established, and deduces from it, the belt tension during the operation of the chain conveyor is obtained at last. …”
    Get full text
    Article
  9. 629

    Optimum hierarchical segmentation of OCT images in retina based on macular distance by Jian-feng LI, Yi-zhou LU

    Published 2017-04-01
    “…Retina layering was the basis of optic disc structure analysis and 3D feature extraction of glaucoma.In order to improve the layering effect of retinal OCT images,an intensity based multilayer segmentation algorithm for two-dimensional retinal OCT images was proposed.Through preprocessing and filtering operation,the segmentation algorithm calculated the intensity and intensity gradient of each A-scan in the retinal OCT image to obtain the upper bound RNFL,the dividing line IS and OS,and the lower bound RPE.Then macular distance strategy,calculated by the shortest distance,was used to further optimize the layering result of macular area,so as to achieve layering segmentation of the retinal OCT images.The experimental results show the algorithm has good optimization effect,low time complexity and fast running speed.…”
    Get full text
    Article
  10. 630

    Stabilization and Tracking Control of Inverted Pendulum Using Fractional Order PID Controllers by Sunil Kumar Mishra, Dinesh Chandra

    Published 2014-01-01
    “…The fitness function is minimized by running the SIMULINK model of IP system according to the PSO program in MATLAB. …”
    Get full text
    Article
  11. 631

    Architecture modeling of satellite Internet simulation platform based on MBSE by LI Hongguang, LIU Yaoqi, ZHOU Yiqing, SHI Jinglin

    Published 2024-09-01
    “…Finally, the validity of the model was verified by running logic verification and external model integration verification, thus supporting the design of satellite Internet.…”
    Get full text
    Article
  12. 632

    Design and Construction of Hybrid Music Recommendation System Integrating Music Gene by Xuelin Zhao

    Published 2022-01-01
    “…Moreover, this study verifies it through the running time of the simulation experiment, using the growth method as the way of mutation. …”
    Get full text
    Article
  13. 633

    Nurturing group work in a children's home by Maggie Bell, Helen Fay, Debbie Ramsden, Shirley Morgan

    Published 2003-08-01
    “…Looked after children have often had experiences which make it difficult for them to value themselves or others, while for staff, working in this setting can be challenging and stressful. The primary aim of running the Nurturing Programme was to help the young people and their carers feel nurtured and valued.…”
    Article
  14. 634

    Carrier-grade NTP clock synchronization scheme of SD-WAN network by Qiangen ZHAO, Yu WANG, Ling TANG, Yongming YAN

    Published 2022-08-01
    “…SD-WAN is developing rapidly, and telecom operators and Internet companies are constantly expanding their layout.As a technology with diverse forms, SD-WAN has not made a clear specification for clock synchronization.The importance of clock synchronization to SD-WAN technology implementation and business running was analyzed.The advantages and disadvantages of the clock synchronization scheme of Internet public NTP service widely used in SD-WAN realizations were sketched.Thus the clock synchronization scheme of self-built NTP service in different scenarios was discussed.Furthermore, a clock synchronization method using management tunnel to transmit encrypted NTP synchronization data was designed, which made SD-WAN platform and devices obtain higher security and stability in time synchronization.…”
    Get full text
    Article
  15. 635

    Precisely positioning method for roadheaders and robotic roadheader system by Xinming LU, Changqing YAN, Zhaoping YUAN

    Published 2020-02-01
    “…To overcome the problems faced in underground positioning,the robotic roadheader mine Internet of things (IoT) was designed which connected multi sensors,surveying devices and industrial computers,and a novel positioning method was developed,based on which a robotic roadheader system was built.The robotic roadheader system was employed for real-world tunnel cutting.The experimental results verifies the high accuracy of the positioning method,which achieves an RMSE error less than 5 cm,and the robust running of the robotic roadheader indicates that the robotic roadheader system can precisely perceive the surrounding environment and make precise interaction with the working environment,which yield a safety,high efficiency,and precisely underground tunnel building and coal mining and an unmanned working surface.…”
    Get full text
    Article
  16. 636

    Governance and Public Leadership: Bundles of Democratic societies? by BC, Basheka

    Published 2021
    “…Yet Governance and Public leadership are themes that have walked the practices and theoretical debates about running of society and ought to have a certain degree of uniformity in their understanding. …”
    Get full text
    Article
  17. 637

    Academic Calendar for Academic Year (AY) 2022/2023 by Kabale University

    Published 2023
    “…There are three groups: Postgraduate Students (both Fresh and continuing), Undergraduate Continuing Students and Undergraduate Freshers A full AY 2022-2023 for Second-year Continuing Students is taken care of, and it stretches over thirty-four (34) weeks, running from 20th August 2022 to 27th May 2023. For other continuing students, two semesters are considered but one is the Second Semester of AY 2021/2022 (stretching from 27/08/2022 to 23/12/2022) while the other one is Semester One of AY 2022/2023 (stretching from 28th January to 27th May 2023…”
    Get full text
    Other
  18. 638

    Characterizing microcycles’ workload when combining two days structure within single training sessions during congested fixtures in an elite male soccer team by Antonio Gómez-Díaz, Fábio Yuzo Nakamura, Pedro Menezes, João Barreira, Pedro Figueiredo, Diogo Coutinho

    Published 2024-03-01
    “…Fullbacks covered higher high-speed running distance ( F = 3.6, p = 0.033) than center backs, while midfielders reported higher RPE ( F = 5.29, p = 0.003) values than defensive midfielders and fullbacks. …”
    Get full text
    Article
  19. 639

    Morning versus Nocturnal Heart Rate and Heart Rate Variability Responses to Intensified Training in Recreational Runners by Olli-Pekka Nuuttila, Heikki Kyröläinen, Veli-Pekka Kokkonen, Arja Uusitalo

    Published 2024-11-01
    “…A total of 24 recreational runners performed a 3-week baseline period (BL) and a 2-week overload (OL) period (Lucia’s training impulse + 80%). Their running performance was assessed with a 3000-m running test after the BL and OL. …”
    Get full text
    Article
  20. 640

    Exercise training partly ameliorates cardiac dysfunction in mice during doxorubicin treatment of breast cancer by Tytti-Maria Uurasmaa, Pauline Bourdin, Wail Nammas, Shiva Latifi, Heidi Liljenbäck, Antti Saraste, Olli Eskola, Johan Rajander, Anne Roivainen, Helene Rundqvist, Anu Autio, Ilkka Heinonen, Katja Anttila

    Published 2025-01-01
    “…Results DOX increased LV glucose uptake (LVGU) and mitochondrial uncoupling and decreased running activity, LV-weight, and ejection fraction (EF). …”
    Get full text
    Article