Showing 2,801 - 2,820 results of 3,373 for search '"executed"', query time: 0.06s Refine Results
  1. 2801

    Empirical Based Ranging Error Mitigation in IR-UWB: A Fuzzy Approach by Sunil K. Meghani, Muhammad Asif, Faroq Awin, Kemal Tepe

    Published 2019-01-01
    “…Moreover, the proposed fuzzy model is evaluated for computational complexity in terms of execution time and compared with the state-of-the-art work. …”
    Get full text
    Article
  2. 2802

    Quality of Life According to Demographic Characteristics of Patients with Type 2 Diabetes Mellitus by Gladys Coronel Burga, Yely Ranina Sánchez Burga, José Ander Asenjo Alarcón

    Published 2023-07-01
    “…Knowing the quality of life of patients with this condition will allow the execution of plans and contextualized actions. <br /><strong>Objective:</strong> to determine the quality of life according to demographic characteristics of patients with type 2 diabetes mellitus treated at a provincial hospital in Peru. …”
    Get full text
    Article
  3. 2803

    UAV Detect and Avoid from UTM-Dependent Surveillance by C. E. Lin, P. C. Shao, J. Y. Bai, Y. Y. Lin, H. T. Bui

    Published 2024-01-01
    “…From similar concept to traffic alert and collision avoidance system (TCAS) for the manned aircraft system, the UTM software executes DAA functions to generate approach alerts to UTM Controller. …”
    Get full text
    Article
  4. 2804

    Optimizing Artificial Neural Network Learning Using Improved Reinforcement Learning in Artificial Bee Colony Algorithm by Taninnuch Lamjiak, Booncharoen Sirinaovakul, Siriwan Kornthongnimit, Jumpol Polvichai, Aysha Sohail

    Published 2024-01-01
    “…Although SGD and Adam achieved faster execution times with TensorFlow, the study suggests that using PSO and improved R-ABC can improve model accuracy and efficiency. …”
    Get full text
    Article
  5. 2805

    Binary program taint analysis optimization method based on function summary by Pan YANG, Fei KANG, Hui SHU, Yuyao HUANG, Xiaoshao LYU

    Published 2023-04-01
    “…Taint analysis is a popular software analysis method, which has been widely used in the field of information security.Most of the existing binary program dynamic taint analysis frameworks use instruction-level instrumentation analysis methods, which usually generate huge performance overhead and reduce the program execution efficiency by several times or even dozens of times.This limits taint analysis technology’s wide usage in complex malicious samples and commercial software analysis.An optimization method of taint analysis based on function summary was proposed, to improve the efficiency of taint analysis, reduce the performance loss caused by instruction-level instrumentation analysis, and make taint analysis to be more widely used in software analysis.The taint analysis method based on function summary used function taint propagation rules instead of instruction taint propagation rules to reduce the number of data stream propagation analysis and effectively improve the efficiency of taint analysis.For function summary, the definition of function summary was proposed.And the summary generation algorithms of different function structures were studied.Inside the function, a path-sensitive analysis method was designed for acyclic structures.For cyclic structures, a finite iteration method was designed.Moreover, the two analysis methods were combined to solve the function summary generation of mixed structure functions.Based on this research, a general taint analysis framework called FSTaint was designed and implemented, consisting of a function summary generation module, a data flow recording module, and a taint analysis module.The efficiency of FSTaint was evaluated in the analysis of real APT malicious samples, where the taint analysis efficiency of FSTaint was found to be 7.75 times that of libdft, and the analysis efficiency was higher.In terms of accuracy, FSTaint has more accurate and complete propagation rules than libdft.…”
    Get full text
    Article
  6. 2806

    Feature selection based on Mahalanobis distance for early Parkinson disease classification by Mustafa Noaman Kadhim, Dhiah Al-Shammary, Ahmed M. Mahdi, Ayman Ibaida

    Published 2025-01-01
    “…Additionally, the proposed feature selection method significantly reduces execution time, making it highly suitable for real-time applications in medical diagnostics, where timely and accurate disease identification is critical for improving patient outcomes.…”
    Get full text
    Article
  7. 2807

    Implementation of some principles of the economic constitution concerning payment of administrative penalties by M.A. Mazo

    Published 2018-04-01
    “…The ideas developed during the research are important to enhance the role of constitutional economic principles in the legislative process, to ensure the procedure and the means of execution of administrative penalties, and to develop the status of Russia as a social state.…”
    Get full text
    Article
  8. 2808

    Scenario-aware access control model by Dibin SHAN, Xuehui DU, Wenjuan WANG, Na WANG, Aodi LIU

    Published 2024-02-01
    “…Dynamic access control model is the theoretical basis for constructing a dynamic access control system for big data.However, most existing access control models can only fulfill dynamic access control in a single scenario and are unable to adapt to access control in multiple types of dynamic scenarios.These scenarios include changes in the contextual environment of big data, changes in entity relationships, and changes in the state of objects.To address these issues, an analysis was conducted based on the research of existing access control models and the dynamic factors of big data.Subsequently, scenario-aware access control (SAAC) model was proposed, which was based on dynamic factor conversion and scenario unified modeling.All types of dynamic factors were converted into basic elements such as attributes and relationships.Then, scene information was incorporated to model the various types of constituent elements in a unified manner.A big data dynamic access control model was constructed based on scene information to support multi-type dynamic factors and extended dynamic factors.The working framework of the SAAC model was designed, and the SAAC rule learning algorithm and SAAC rule execution algorithm were proposed corresponding to the workflow of the framework.This enabled the automatic learning of access control rules and dynamic access control decision-making.The security of the proposed model was analyzed and verified by introducing the non-transitive non-interference theory.To validate the effectiveness of the access control policy mining method of the proposed model, experimental comparisons were conducted between the SAAC model and baseline models such as ABAC-L, PBAC-X, DTRM, and FB-CAAC using four datasets.The experimental results demonstrate that the SAAC model and its strategy mining method outperforms the baseline models in terms of metrics such as area under the curve AUC, monotonicity, and steepness of the ROC curve.This verification confirms that the proposed model can support multiple types of dynamic factors and dynamic factor extensions, and that the combined effect of the access control rules obtained from its mining algorithm is relatively high.…”
    Get full text
    Article
  9. 2809

    Contemporary issues in ensuring biological safety during disposal of biological wastes of animal origin by incineration in the Russian Federation by A. V. Belchikhina, M. A. Shibayev, A. M. Selyanin, A. K. Karaulov

    Published 2022-03-01
    “…Collection and analysis of data provided by the RF veterinary executive authorities were performed to objectively reflect the actual situation of the biological waste incineration facilities in the RF Subjects and to create a holistic view on the problem of interest in the country. …”
    Get full text
    Article
  10. 2810

    CAN CLEAR ALIGNERS THERAPY ACHIEVE MAXILLARY EXPANSION IN PATIENTS WITH TRANSVERSE MALOCCLUSIONS? A SYSTEMATIC REVIEW by Ibraheem Bamaga

    Published 2024-12-01
    “…This uncertainty may arise due to traditional preferences or the perceived limitations in their ability to execute complex tooth movements. Aim of the study: This systematic review investigates the effectiveness of clear aligners in achieving dentoalveolar expansion of the maxillary arch. …”
    Get full text
    Article
  11. 2811

    Administrative and legal regulation of the limits for preventing and combating corruption in the public service by E. O. Muzychuk

    Published 2023-10-01
    “…Through the prism of the USA’s experience detailed study and the views of domestic administrative scientists, separate areas of improvement of the administrative and legal regulation of the limits for prevention and counteraction corruption in the public service have been formed, in particular, the formation of an effective system of separation of powers between the executive, legislative and judicial branches, ensuring at the constitutional level guarantees of basic rights and freedoms, the development of an appropriate institutional structure, the effectiveness of legislative mechanisms of control (supervision).…”
    Get full text
    Article
  12. 2812

    ALBERTA: ALgorithm-Based Error Resilience in Transformer Architectures by Haoxuan Liu, Vasu Singh, Michal Filipiuk, Siva Kumar Sastry Hari

    Published 2025-01-01
    “…Ensuring the correct execution of these models in GPUs is critical, despite the potential for transient hardware errors. …”
    Get full text
    Article
  13. 2813

    Improving The Performance of Big Data Databases by Nzar Abdulqadir Ali, Dashne Raouf Arif

    Published 2019-12-01
    “…This paper discusses many comparisons that have been conducted on the execution time performance of types of databases (SQL and NoSQL). …”
    Get full text
    Article
  14. 2814

    Numerical nonlinear analysis of RC beams with un-strengthened and CFRP-strengthened opening drilled under service loads within shear zones by Magdy Khalaf, Louay Aboul-Nour, Mahmoud Khater, Marwa Ibrahim

    Published 2023-01-01
    “…Some important conclusions and recommendations for designer and executive engineers are stated.…”
    Get full text
    Article
  15. 2815

    Legal pathology of property acquisition in dilapidated context with historical value by the municipality (case study: Sari city) by alijan shamshirband, Reza Nasiri Larimi, Seyed Mehdi Ahmadi

    Published 2025-06-01
    “…The findings reveal that the primary organizational challenges encountered by the municipality in terms of property ownership in deteriorated areas of Sari include insufficient awareness of laws and legal procedures, lack of coordination in implementation processes, failure to regularly update property pricing tariffs, delayed and unplanned project execution, and the absence of legal analyses in project preparation. …”
    Get full text
    Article
  16. 2816

    Application and Research of Dual-Task Paradigms in Central Nervous System Diseases by LI Qinyi, LUO Siyi, JIANG Yongchun, CHEN Delong, ZHAO Biyi, LIN Qiang, CHEN Hongxin, XU Fangqiu, TANG Guibing, ZHENG Yuxin

    Published 2022-10-01
    “…The limited capacity model is the most common dual-task mechanism, in which cognitive-motor dual-tasks produce cognitive-motor interference during execution due to limited cognitive resources, while cognitive-motor interference is influenced by task difficulty, task priority, and individual factors, which can be quantified by dual task effect to objectively reflect dual-task effectiveness. …”
    Get full text
    Article
  17. 2817

    Fraudulent act: essence and legal regulation by H. S. Hofeld

    Published 2024-06-01
    “…It has been established that private law instruments should not be used by participants in civil transactions to avoid paying a debt (money, damages, damage) or to execute a court decision on debt collection (money, damages, damage) that has entered into force. …”
    Get full text
    Article
  18. 2818

    Reconstructing Zakat Management Through Political Culture: Insights from Madura by Basar Dikuraisyin, Ahmadun Najah

    Published 2024-05-01
    “…This research aims to provide a solution through cultural reconstruction in zakat execution. This reconstruction is called cultural politicization, which combines social theory and legal institutions. …”
    Get full text
    Article
  19. 2819

    Presenting a Model for Training Reflective Managers for Farhangian University by Mohammad Ahmadi beni, Masoumeh Oladian, Mahmoud Safari

    Published 2024-01-01
    “…Conclusions: These empirical results have the potential to guide the formulation and execution of methodologies designed for the training of reflective managers.…”
    Get full text
    Article
  20. 2820

    Earthquake Disaster Rescue Model Based on Complex Adaptive System Theory by Fujiang Chen, Jingang Liu, Junying Chen

    Published 2021-01-01
    “…In this paper, through the task allocation mechanism task, the disaster rescue task is divided into simple task and complex task, and the executive task subject is divided into single task subject and multitask subject. …”
    Get full text
    Article