Showing 501 - 520 results of 3,373 for search '"executed"', query time: 0.07s Refine Results
  1. 501

    Cathodic tandem alkylation/dearomatization of heterocycles enabled by Al-facilitated carbonyl deoxygenation by Jinhui Hu, Weijie Deng, Jianfeng Zhou, Yubing Huang

    Published 2025-01-01
    “…Our approach can be executed via two distinct paths: the aluminum (Al)-facilitated spin-center shift (SCS) path and the Al-facilitated direct deoxygenation path. …”
    Get full text
    Article
  2. 502

    Nepomucká sousoší v Olomouci a v Žarošicích a jejich východočeské paralely. Příspěvek k poznání barokního sochařství na Moravě by Pavel Panoch

    Published 2006-01-01
    “…John´s statue in Olomouc standing in front of the Hradisko monastery, which was executed by Josef Antonín Winterhalder. St. John of Nepomuk is presented here as the heavenly protector of all ages of human generations which are represented by three suppliants: infant, juvenile and old man. …”
    Get full text
    Article
  3. 503

    A Solution to Reconstruct Cross-Cut Shredded Text Documents Based on Character Recognition and Genetic Algorithm by Hedong Xu, Jing Zheng, Ziwei Zhuang, Suohai Fan

    Published 2014-01-01
    “…In this paper, a feature-matching algorithm based on the character recognition via establishing the database of the letters is presented, reconstructing the shredded document by row clustering, intrarow splicing, and interrow splicing. Row clustering is executed through the clustering algorithm according to the clustering vectors of the fragments. …”
    Get full text
    Article
  4. 504

    Blockchain-based payment channel network: challenges and recent advances by XU Xiu, TIAN Anqi, HE Ruiwen

    Published 2024-10-01
    “…Payment channel networks allow a large number of transactions to be executed off-chain, which can reduce costs and facilitate blockchain scaling while keeping assets secure. …”
    Get full text
    Article
  5. 505

    Marker and source-marker reprogramming of Most Permissive Boolean networks and ensembles with BoNesis by Paulevé, Loïc

    Published 2023-03-01
    “…Finally, we lift the reprogramming problems to ensembles of BNs, as supported by BoNesis, bringing insight on possible and universal reprogramming strategies. This paper can be executed and modified interactively. …”
    Get full text
    Article
  6. 506

    Antipoisoning activities in Bulgaria to enforce raptors conservation in the country by Dobromir D. Dobrev, Nikolai G. Terziev, Vladimir D. Dobrev, Volen S. Arkumarev, Anton Stamenov

    Published 2023-10-01
    “…The majority of the patrols were executed in the Eastern Rhodopes (80%) which is the core area of the vulture populations in Bulgaria. …”
    Get full text
    Article
  7. 507

    Social organizations and habitat self-management in neoliberal urban contexts by María Carla Rodríguez, María Cecilia Zapata

    Published 2020-05-01
    “…This article analyzes the characteristics and effects of the execution of the Housing Self-Management Program (Law No. 341/00) in the City of Buenos Aires from the beginning of the century to the present and the historiographic course of the dispute for the centrality of the popular sectors in this policy. …”
    Get full text
    Article
  8. 508

    ANALYSIS OF LABORATORY TESTS FOR SEVERAL VIRAL SWINE DISEASES IN RUSSIA IN 2011–2017 by A. A. Shevtsov, O. N. Petrova, S. G. Remyga, A. S. Pershin, K. N. Gruzdev, A. S.  Igolkin

    Published 2018-05-01
    “…Retrospective analysis of laboratory diagnostics carried out in Russia for dangerous viral swine diseases demonstrated that during the last seven years (the period when the Rosselkhoznadzor orders to implement National Monitoring Plans were executed) the amount of performed tests had increased. …”
    Get full text
    Article
  9. 509

    Evaluation of quality of life of patients after rectal surgery by V. I. Pomazkin

    Published 2010-11-01
    “…Original study included results of 86 patients rectal cancer in whom the anterior rectectomy has been executed. Investigation was carried out in 3 months after intervention. …”
    Get full text
    Article
  10. 510

    Analyzing the 2021 Kaseya Ransomware Attack: Combined Spearphishing Through SonicWall SSLVPN Vulnerability by Suman Bhunia, Matthew Blackert, Henry Deal, Andrew DePero, Amar Patra

    Published 2025-01-01
    “…This paper addresses the general events of the incident and the actions executed by the constituents involved. The attack was conducted through specially crafted hypertext transfer protocol (HTTP) requests to circumvent authentication and allow hackers to upload malicious payloads through Kaseya’s virtual system administrator (VSA). …”
    Get full text
    Article
  11. 511

    Effects of concrete strength and steel reinforcement area on the mechanical performance of functionally graded reinforced concrete beams: experimental and numerical investigation by Seleem S. E. Ahmad, Esraa Ali, Hesham Elemam, Mohamed Moawad

    Published 2023-07-01
    “…The results also approved that; higher strength in the compression zone can be used in beams with a high tensile steel ratio for decreasing compression steel as an economic side. 3D finite element was executed using ABAQUS to simulate experimental beams. …”
    Get full text
    Article
  12. 512

    IMSC: Instruction set architecture monitor and secure cache for protecting processor systems from undocumented instructions by Yuze Wang, Peng Liu, Yingtao Jiang

    Published 2022-07-01
    “…Abstract A secure processor requires that no secret, undocumented instructions be executed. Unfortunately, as today's processor design and supply chain are increasingly complex, undocumented instructions that can execute some specific functions can still be secretly introduced into the processor system as flaws or vulnerabilities. …”
    Get full text
    Article
  13. 513

    Doubt in the Legal Capacity of Smart Contract’s Parties and the Possibility of Applying the Principle of Correctness in the Assumption of Non-Qualification by Mohammad Hasan Taj Langerudi, Farzin Dehdar

    Published 2024-09-01
    “…As one of the relatively new topics of the technology world, the smart contract has different angles and dimensions in the field of conclusion and execution, which must be analyzed from a legal perspective. …”
    Get full text
    Article
  14. 514

    Robust and Energy-Efficient Data Gathering in Wireless Sensor Network by Juan Feng, Baowang Lian, Hongwei Zhao

    Published 2014-10-01
    “…In REEDG, data gathering is executed by a data transmitting chain which is composed by a series of virtual grids. …”
    Get full text
    Article
  15. 515

    Data Transmission with Reduced Delay for Distributed Acoustic Sensors by Hyun-Gyu Ryu, Sang-Keum Lee, Dongsoo Har

    Published 2015-11-01
    “…Detection by acoustic sensors can be executed periodically or randomly. As a result, each acoustic sensor generates its packets (50 bytes each) periodically or randomly over short time intervals (400 ms~4 seconds) and transmits directly to a cluster head (coordinator node). …”
    Get full text
    Article
  16. 516

    An Effective Privacy-Preserving Algorithm Based on Logistic Map and Rubik’s Cube Transformation by Wenbin Yao, Pengdi Ye, Xiaoyong Li

    Published 2014-01-01
    “…In EPPA, data object is organized to be several Rubik’s cubes executed for several rounds transformation at the first phase. …”
    Get full text
    Article
  17. 517

    Missing Poetry: A historiography of Albanian Literature during the Communist Regime by Edlira Macaj

    Published 2023-12-01
    “…Who were the most noticeable authors and poets, and why were they set aside, censored, imprisoned, executed, and not published? The answers suggest that only thanks to political change and awareness of literature can the reader today reassess this missing part of Albanian literature in historical texts published during the communist regime. …”
    Get full text
    Article
  18. 518

    Research on serum na, k and inorganic p values in southern anatolian red, holstein with their first and second cros - bred by Veysi ASLAN, Mehmet NİZAMLIOĞLU, Nuri BAŞPINAR

    “…The serum inorganic P values were executed by using Boehringer test kit. The results were stattistically evaluated by analysis of variance.…”
    Get full text
    Article
  19. 519

    Le Cycle pictural de la cour d’appel de Toulouse par Georges d’Espagnat (1942-1944) : un témoignage de la permanence d’une formule décorative by Coralie Machabert

    Published 2022-08-01
    “…Despite its prestigious setting, the modest decoration, inaugurated in 1944 executed by Georges d'Espagnat, takes on another dimension in the distance of History.At a time when the genre was disappearing, the project was supported by influential institutional figures, first and foremost President Joseph Guérin. …”
    Get full text
    Article
  20. 520

    FPGA multi-unit parallel optimization and implementation of post-quantum cryptography CRYSTALS-Kyber by Bin LI, Xiaojie CHEN, Feng FENG, Qinglei ZHOU

    Published 2022-02-01
    “…In lattice-based post-quantum cryptography, polynomial multiplication is complicated and time-consuming.In order to improve the computational efficiency of lattice cryptography in practical applications, an FPGA multi-unit parallel optimization and implementation of post-quantum cryptography CRYSTALS-Kyber was proposed.Firstly, the flow of Kyber algorithm was described and the execution of NTT, INTT and CWM were analyzed.Secondly, the overall structure of FPGA was given, the butterfly arithmetic unit was designed by pipeline technology, and the Barrett modulus reduction and CWM scheduling optimization were used to improve the calculation efficiency.At the same time, 32 butterfly arithmetic units were executed in parallel, which shortens the overall calculation cycle.Finally, the multi-RAM channel was optimized to improve the memory access efficiency with alternate data access control and RAM resource reuse.In addition, with the loosely coupled architecture, the overall operation scheduling was realized by DMA communication.The experimental results and analysis show that the proposed scheme implemented can complete NTT, INTT and CWM operations within 44, 49, and 163 clock cycles, which is superior to other schemes and has high energy efficiency ratio.…”
    Get full text
    Article