-
621
Pragmatic Analysis of Searle’s Directive Acts Types in “Get Out Movie”
Published 2022-12-01“…Specifically, nine data were found in ask, command showed two data, order consisted of six data, one data in plead, beg, and entreat, permit got five data, request was discovered in two data, four data were found in advise, and invite consisted of four data. …”
Get full text
Article -
622
Combined dynamic multi-feature and rule-based behavior for accurate malware detection
Published 2019-11-01“…We apply the proposed detection system on a combined set of three types of dynamic features, namely, (1) list of application programming interface calls; (2) application programming interface sequences; and (3) network traffic, which represents the IP addresses and domain names used by malware to connect to remote command-and-control servers. Feature selection and construction techniques, that is, term frequency–inverse document frequency and longest common subsequence, are performed on the three extracted features to generate new set of features, which are used to build behavioral Yet Another Recursive Acronym rules. …”
Get full text
Article -
623
Loss shaping enhances exact gradient learning with Eventprop in spiking neural networks
Published 2025-01-01“…We implemented Eventprop in the GPU-enhanced neural networks framework (GeNN) and used it for training recurrent SNNs on the Spiking Heidelberg Digits (SHD) and Spiking Speech Commands (SSC) datasets. We found that learning depended strongly on the loss function and extended Eventprop to a wider class of loss functions to enable effective training. …”
Get full text
Article -
624
Current development and future prospects of multi-target assignment problem: A bibliometric analysis review
Published 2025-01-01“…The multi-target assignment (MTA) problem, a crucial challenge in command control, mission planning, and a fundamental research focus in military operations, has garnered significant attention over the years. …”
Get full text
Article -
625
WEB VULNERABILITIES DETECTION USING A HYBRID MODEL OF CNN, GRU AND ATTENTION MECHANISM
Published 2025-01-01“…Particularly, the model can help detect attacks based on Structured Query Language Injection (SQLi), Cross-Site Scripting (XSS), and command injection. When using the dataset SXCM1, our model achieved 99.77%, 99.66% and 99.63% for training, validation and testing, respectively. …”
Get full text
Article -
626
PREVENTION OF INFERIORITY COMPLEX ATTITUDES ACCORDING TO THE QUR'AN
Published 2024-08-01“…The results of this study show that the mufassir emphasize that true strength lies in faith, solid faith is the initial key in overcoming the sense of inferiority complex, inferiority complex is the spiritual part of human beings and spiritual studies sourced from the Qur'an are the initial stages in fighting the inferiority complex. Allah commands His servants not to feel weak because they are created in the best form by Allah, with physical, intellectual, and spiritual virtues. …”
Get full text
Article -
627
Characteristics of Inpatient Hypertension Cases and Factors Associated with Admission Outcomes in Ashanti Region, Ghana: An Analytic Cross-Sectional Study
Published 2017-01-01“…Accounting for clustering, all analyses were performed using the “svy” command in Stata. Frequencies, Chi-square test, and logistic regression analysis were used in the analysis. …”
Get full text
Article -
628
Four-channel Control of Master-slave Robotic System with User’s Force Transfer during Obstacle Collision at the Remote Site based on Input-to-state Stability
Published 2024-09-01“…In this method, the amount of force/torque of the user's hand of the master robot will be directly involved in the control command of the slave robot. In this article, in addition to the four-channel system, a three-channel system is proposed. …”
Get full text
Article -
629
CathROB: A Highly Compact and Versatile Remote Catheter Navigation System
Published 2017-01-01“…Key features of CathROB include an extremely compact design that minimizes encumbrance and time for system set-up in a standard cath lab, a force-sensing mechanism, an intuitive command interface, and functions for automatic catheter navigation and repositioning. …”
Get full text
Article -
630
Detecting Subtle Cyberattacks on Adaptive Cruise Control Vehicles: A Machine Learning Approach
Published 2025-01-01“…To address the detection of such attacks, we first present a traffic modeling framework for three types of potential cyberattacks: malicious manipulation of vehicle control commands, data poison attacks, and denial-of-service (DoS) attacks. …”
Get full text
Article -
631
Precise Orbit Determination of BDS MEO Satellites Based on Satellite TT&C Stations
Published 2016-01-01“…A novel method, which is based on the triple-frequency combination and Space-Based Telemetry, Tracking, and Command (STT&C) stations, is proposed in this paper. …”
Get full text
Article -
632
Study on Applicability of Xin'anjiang Model and Tank Model in Flood Forecasting in Majiagou Reservoir
Published 2023-01-01“…Flood forecasting is one of the important non-engineering flood control measures and is the main basis for flood control command and decision-making.In order to avoid the uncertainty of the prediction results of a single model,the Majiagou Reservoir in Chenggu County was taken as the object to simulate the daily runoff and flood process from 2019 to 2021 by using the Xin'anjiang model and tank model respectively,and the simulation results and accuracy of the two models were compared by using the model parameters calibrated and optimized by the genetic algorithm.In the daily runoff simulation,the simulation effect of the tank model is better than that of the Xin'anjiang model,with a relative error of flood volume of less than 16%,a relative error of flood peak of less than 4%,a difference of peak time of less than 1 h,and a Nash-Sutcliffe efficiency coefficient of greater than 0.58,all of which meet the evaluation accuracy requirements of the Standard for Hydrological Information and Hydrological Forecasting,and the simulation effect of deluge in the reservoir is ideal.In the flood process simulation,the difference of peak time between the two models is similar;the simulation effect of the Xin'anjiang model is smoother,and the flood volume and flood peak simulated by the tank model are closer to the measured flow process.On the whole,the tank model is more suitable for flood forecasting in Majiagou Reservoir than the Xin'anjiang model.…”
Get full text
Article -
633
HUMANITARIAN TURN IN CONTEMPORARY ISLAMIC STUDIES: A REFLECTION OF ALI ZAIN AL-JUFRI’S THOUGHT ON RELIGIOUS MODERATION
Published 2023-08-01“…In the end, this research concluded that there are three significant values of al-Jufri's religious moderation, including the command to speak good words (Surah al-Baqarah [2]: 83), the prohibition on killing fellow humans (Surah al-Ma'idah [3]: 32), and the order to uphold justice on earth (Surah al-Nisa [5]: 135). …”
Get full text
Article -
634
IMPLICATIONS OF XENOPHOBIA ON AFRICAN UNITY
Published 2022-05-01“…South Africa started to command sphere of influence and became a rallying point in terms of trade, tourism, education, telecommunication and sport for African countries. …”
Get full text
Article -
635
“Yeni Terörizm”in Geleceğin Güvenlik Ortamına Etkileri: Daeş Örneği
Published 2019-12-01“…First of all, it is seen that new terrorist organizations have started to be organized in the form of loose horizontal networks with minimum chain of command. Secondly, it is observed that the terrorist organizations in this wave of terror have increased their interest and demand for access to weapons of mass destruction as well as conventional weapons compared to their predecessors. …”
Get full text
Article -
636
Evaluation of combat effectiveness of unmanned aerial vehicle group in uncertain situations
Published 2025-02-01Get full text
Article -
637
Hypothesis generation for rare and undiagnosed diseases through clustering and classifying time-versioned biological ontologies.
Published 2024-01-01“…Our tool, BOCC, is available as a web app and command line tool.…”
Get full text
Article -
638
Unleashing green technology innovation in agribusiness: traditional environmental regulations, carbon trading, or synergies?
Published 2025-01-01“…It was found that: (1) Although both traditional environmental regulatory tools and carbon trading provide incentive effects, the former tends to exhibit more pronounced direct effects, making it more suitable for adoption by local governments, while the latter demonstrates stronger spatial spillover effects, making it more appropriate for application in a national market context. (2) Command-and-control environmental regulatory instruments and carbon trading are complementary policy mixes, and other environmental policy mixes are to be used as appropriate in the context of the actual situation. (3) The incentive effects of environmental policies are more significant in eastern regions, non-heavily polluting, and state-owned agribusinesses, but not in the basic agricultural sector. …”
Get full text
Article -
639
Analysis and design of a fixed wing unmanned aerial vehicle gas launching system
Published 2025-02-01Get full text
Article -
640
Design of a Hybid Energy Metering System with an Alarm.
Published 2023“…The software module consists of the Application Platform especially for token generation and Database. The SMS Command format for recharging of the meter was also developed using GSM which is a cell system which implies that the cellular telephones unite with it via looking for cells in the prompt region in the neighboring cells to maintain a strategic distance from contortion in signs with the phone. …”
Get full text
Thesis