Suggested Topics within your search.
Suggested Topics within your search.
- Moral and ethical aspects 3
- Orthopedics 3
- Sports medicine 3
- Information technology 2
- Internet in public administration 2
- Public administration 2
- Public relations 2
- Academic writing 1
- Advertising 1
- Authoritarianism 1
- Brothers and sisters 1
- Business communication 1
- Business ethics 1
- Communication 1
- Economic conditions 1
- Economic development 1
- Economic history 1
- Elections 1
- Electronic information resources 1
- Elias (Fictitious character) 1
- Embryology 1
- English language 1
- Fantasy 1
- Fugitives from justice 1
- Journalistic ethics 1
- Laia (Fictitious character) 1
- Libraries 1
- Libraries and electronic publishing 1
- Management 1
- Marketing 1
-
11481
Smart Urban Mobility and Social Sustainability: Exploring the relationship(Case Study:Shiraz City)
Published 2021-06-01“…Especially in metropolises, which are facing increasing population and various economic, social and environmental problems. …”
Get full text
Article -
11482
Evaluation of LLMs accuracy and consistency in the registered dietitian exam through prompt engineering and knowledge retrieval
Published 2025-01-01“…Abstract Large language models (LLMs) are fundamentally transforming human-facing applications in the health and well-being domains: boosting patient engagement, accelerating clinical decision-making, and facilitating medical education. …”
Get full text
Article -
11483
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article -
11484
A Risk Assessment Algorithm for College Student Entrepreneurship Based on Big Data Analysis
Published 2021-01-01“…College student entrepreneurship is a complex and dynamic process, in which the potential risks faced by entrepreneurial enterprises are interactive and diverse. …”
Get full text
Article -
11485
Toward learning recovery: challenges of international students in China during COVID-19 online learning experience
Published 2025-01-01“…Findings – The study revealed that international students in China faced significant challenges during online learning, including academic disruptions, technological barriers, financial strain and psychological stress, exacerbated by time zone differences and isolation. …”
Get full text
Article -
11486
Analysis of Lateral Displacement Law of Deep Foundation Pit Support in Soft Soil Based on Improved MSD Method
Published 2021-01-01“…Moreover, the construction of large deep foundation pit in soft soil often faces greater risks and challenges as the support structure deforms more easily and unpredictably. …”
Get full text
Article -
11487
DEVELOPMENT OF OPERATION PROCESS MAP AND ANALYSIS OF INVENTORY CONTROL BASED ON MATERIAL REQUIREMENT PLANNING IN ASSEMBLY LINE
Published 2020-06-01“…Planning the amount of inventory that will be owned company is one of the problems often faced by companies. Especially when the inventory is one important factor that can support the company's production processes and help meet customer demand. …”
Get full text
Article -
11488
Unleashing the power of pinyin: promoting Chinese named entity recognition with multiple embedding and attention
Published 2025-01-01“…Due to the differences between Chinese and English language families, Chinese NER faces challenges such as ambiguous word boundary delineation and semantic diversity. …”
Get full text
Article -
11489
RETRACTED: Optimizing electric vehicle charging schedules and energy management in smart grids using an integrated GA-GRU-RL approach
Published 2023-09-01“…However, the main challenge faced by smart grids is the efficient scheduling of electric vehicle charging and effective energy management within the grid.Methods: To address this issue, we propose a novel approach for intelligent grid electric vehicle charging scheduling and energy management, integrating three powerful technologies: Genetic Algorithm (GA), Gated Recurrent Unit (GRU) neural network, and Reinforcement Learning (RL) algorithm. …”
Get full text
Article -
11490
Optimizing precision farming: enhancing machine learning efficiency with robust regression techniques in high-dimensional data
Published 2025-02-01“… Smart precision farming leverages IoT, cloud computing, and big data to optimize agricultural productivity, lower costs, and promote sustainability through digitalization and intelligent methodologies. However, it faces challenges such as managing complex variables, addressing multicollinearity, handling outliers, ensuring model robustness, and enhancing accuracy, particularly with small to medium-sized datasets. …”
Get full text
Article -
11491
Exploiting Extrinsic Information for Serial MAP Detection by Utilizing Estimator in Holographic Data Storage Systems
Published 2024-12-01“…For signal processing, HDS faces two major challenges: inter-page interference (IPI) and two-dimensional (2D) interference. …”
Get full text
Article -
11492
A Solar Photovoltaic Performance and Financial Modeling Solution for Grid-Connected Homes in Zambia
Published 2021-01-01“…Zambia is today 90% hydropower dependent, but this may change because Zambia and the World at large are today facing a changing climate that affects the ecosystem, rain patterns, and spurs drought which reduces the production of hydropower. …”
Get full text
Article -
11493
STUDI IDENTIFIKASI PASANGAN COMMERCIALLY PURE TITANIUM DAN UHMWPE UNTUK APLIKASI MATERIAL IMPLAN LUTUT
Published 2024-12-01“…This field of science helps patients who experience joint and skeletal problems. One of the problems faced is the need for body frame components to be replaced, for example the knees. …”
Get full text
Article -
11494
Psychiatric Care, Training and Research in Aotearoa New Zealand
Published 2024-12-01“…Its universal healthcare system, restructured in 2022 under Te Whatu Ora (Health New Zealand) is aimed at enhancing efficiency and equity but faces challenges like Māori underrepresentation in the psychiatry workforce and rising demands from the growing Asian community. …”
Get full text
Article -
11495
An assessment of the impact of discounted Fees on the quality of services rendered by Quantity Surveying firms
Published 2023-12-01“… The quantity surveying (QS) profession has faced a lot of challenges that threaten its existence, growth, and success over the years. …”
Get full text
Article -
11496
Generative Image Steganography via Encoding Pose Keypoints
Published 2024-12-01“…Existing generative image steganography methods typically encode secret information into latent vectors, which are transformed into the entangled features of generated images. This approach faces two main challenges: (1) Transmission can degrade the quality of stego-images, causing bit errors in information extraction. (2) High embedding capacity often reduces the accuracy of information extraction. …”
Get full text
Article -
11497
Measurement and evaluation for privacy benefits of deploying encrypted DNS protocol between recursive and authoritative servers
Published 2024-10-01“…However, DNS communications between recursive resolvers and authoritative servers (recursive-authoritative side) still faced significant privacy threats. To address this issue, the Internet Engineering Task Force (IETF) officially released RFC 9539 in February 2024, which utilized the encrypted DNS protocol to protect DNS communication privacy on the recursive-authoritative side. …”
Get full text
Article -
11498
The EU Cooperation with South African Countries: Main Trends and Prospects for Development
Published 2024-06-01“…In particular, the EU and South African countries can work together to remove trade barriers and promote investment; the EU can continue to provide development assistance to South African countries to help them achieve their objectives; strengthen its cooperation in the field of peace and security to help address the challenges facing Africa as a whole; cooperate in the fight against climate change and on the development of a sustainable economy. …”
Get full text
Article -
11499
Lightweight object detection model for food freezer warehouses
Published 2025-01-01“…Abstract Warehouses are critical logistics nodes, with food freezer warehouses playing a key role in ensuring food quality while facing challenges such as high-density item distribution and extremely low temperatures required for occupational safety. …”
Get full text
Article -
11500
Research of the peculiarities of enterpises՚ work organization in the intercultural space
Published 2021-04-01“…In the course of their activities, enterprises are faced with the peculiarities of the organization of work in an intercultural space, which, as a rule, consist in the mental differences of business representatives of different cultures. …”
Get full text
Article