Showing 21,381 - 21,400 results of 22,159 for search '"learning"', query time: 0.11s Refine Results
  1. 21381

    WORLD EXPERIENCE OF GOVERNANCE REFORM by O. V. Gaman Golutvina

    Published 2013-08-01
    “…In this regard, a number of experts, including experts from the World Bank, who prepared the materials for the Government Commission on lessons learned from reforms NPM, present restrained assessment of the reform results in various countries, noting their ambiguity and limited scope in relation to the objectives. …”
    Get full text
    Article
  2. 21382

    Vocational interest profile by candidates of Job and Occupation Consultants by Zülfikar DENİZ Kaan

    Published 2013-05-01
    “…This study was conducted in accordance with certain objectives and some of them are to determine the interest of these individuals especially in the psychological aspect of this profession, to examine the difference between their interests on the basis of gender, to learn their opinions about their department and why they want to become a JOC. …”
    Get full text
    Article
  3. 21383

    Examination of the Teacher Candidates’ Environmental Attitudes via NEP Scale in terms of Different Variables by Emine Hande Aydos, Esed Yağcı

    Published 2015-01-01
    “…It will be beneficial to learn the environmental attitudes of teacher candidates who grow up elementary students after a few years. …”
    Get full text
    Article
  4. 21384

    Eventos extremos de precipitação : identificação e análise da bacia hidrográfica do Rio Jundiaí, São Paulo by Junior Ruiz Garcia, Bruno César Brito Miyamoto, Alexandre Gori Maia

    Published 2018-10-01
    “…Based on the SPI analyzes, there is a long-term tendency to increase the occurrence of excessive precipitation events. Society must learn to adapt to natural climate variability, which includes environmental policies for mitigation and adaptation to extreme climate events.…”
    Get full text
    Article
  5. 21385

    Blind mask template attacks on masked cryptographic algorithm by Yi WANG, Zhen WU, Bing LIN

    Published 2019-01-01
    “…Masking is a countermeasure against differential power analysis (DPA) attacks on cryptographic devices by using random masks to randomize the leaked power of sensitive information.Template attacks (TA) against cryptographic devices with masking countermeasure by far require attackers have knowledge of masks at the profiling phase.This requirement not only increase the prerequisite of template attacking,but also lead to some sort of difference between the experimental encryption codes of the profiling device and the codes of commercial cryptographic devices,which might degrade performance in real world attacking.Blind mask template attack directly learns templates for the combination of no mask intermediate values without the need of knowing the masks of training power traces,and then uses these templates to attack masked cryptographic devices.Both traditional Gaussian distribution and neural network were adopted as the templates in experiments.Experimental results verified the feasibility of this new approach.The success rate of neural network based blind mask template attacking against masked cryptographic devices is very close to that of traditional template attacks against cryptographic devices without masking countermeasure.…”
    Get full text
    Article
  6. 21386

    Fanar and the Serbian Orthodox Church by Milošević Zoran

    Published 2023-01-01
    “…It was not seen only in Serbia, but also in Bulgaria, where many learned Bulgarians considered themselves Greeks. Simultaneously with the arrival of Greek bishops at the head of the Serbian dioceses, the merciless plundering of the Serbian people began. …”
    Get full text
    Article
  7. 21387

    Data poisoning attack detection approach for quality of service aware cloud API recommender system by Zhen CHEN, Wenchao QI, Taiyu BAO, Limin SHEN

    Published 2023-08-01
    “…To solve the problem that existing studies usually assumed that the QoS data of cloud API recommender system was reliable, ignoring the data poisoning attack on cloud API recommender system by malicious users in open network environment, a data poisoning attack detection approach based on multi-feature fusion was proposed.Firstly, a user connected network graph was constructed based on the designed similarity function, and users’ neighborhood features were captured using Node2vec.Secondly, sparse auto-encoder was used to mine user QoS deep feature, and user interpretation feature based on QoS data weighted average deviation was designed.Furthermore, a fake user detection model based on support vector machine was established by integrating user neighborhood feature, QoS deep feature, and interpretation feature, the model parameters were learned using grid search and alternating iterative optimization strategy to complete fake user detection.Finally, the effectiveness and superiority of the proposed approach were verified through extensive experiments, realizing the poison attack defense against QoS aware cloud API recommender system at the data side.…”
    Get full text
    Article
  8. 21388

    Quoting the Academe in Writing Conference Explanations by Kelly Katherine Frantz

    Published 2024-12-01
    “…While this intertextual nature of writing conferences has not yet been explored, we can expect that in order to help writers learn the target “speech genre” (Bakhtin, 1981) of the academe, consultants must inevitably connect their current explanations to prior discourse. …”
    Get full text
    Article
  9. 21389

    RELIGIOUS SYNCRETISM IN THE LENSES OF JEWISH-BUDHHISM: A RELIGIOUS IDEA IN MODERN AFRICA DEVELOPMENT WUKARI JOURNAL OF HUMANITIES by ZACHARIAH BULUS `` TAKORE, YAKUBU DOMINIC ALKALI, DANIEL BEM APUUIVOM

    Published 2024-07-01
    “…A good number of Jews in America and Germany who combined their faith with Buddhism added strength in terms of development capacity economically, technologically and politically to the nations.Africans stand to learn for a better community life and our political, economic and social development. …”
    Get full text
    Article
  10. 21390

    De Masaccio à Stalker: pour une esthétique du seuil et de son franchissement  by Sylvie Castets

    Published 2010-04-01
    “…The artwork is thus a threshold one has “to cross in order to learn loneliness” (Serres). It vibrates with instability and crystallizes the singular state of change. …”
    Get full text
    Article
  11. 21391

    Network intrusion detection method based on VAE-CWGAN and fusion of statistical importance of feature by Taotao LIU, Yu FU, Kun WANG, Xueyuan DUAN

    Published 2024-02-01
    “…Considering the problems of traditional intrusion detection methods limited by the class imbalance of datasets and the poor representation of selected features, a detection method based on VAE-CWGAN and fusion of statistical importance of features was proposed.Firstly, data preprocessing was conducted to enhance data quality.Secondly, a VAE-CWGAN model was constructed to generate new samples, addressing the problem of imbalanced datasets, ensuring that the classification model no longer biased towards the majority class.Next, standard deviation, difference of median and mean were used to rank the features and fusion their statistical importance for feature selection, aiming to obtain more representative features, which made the model can better learn data information.Finally, the mixed data set after feature selection was classified through a one-dimensional convolutional neural network.Experimental results show that the proposed method demonstrates good performance advantages on three datasets, namely NSL-KDD, UNSW-NB15, and CIC-IDS-2017.The accuracy rates are 98.95%, 96.24%, and 99.92%, respectively, effectively improving the performance of intrusion detection.…”
    Get full text
    Article
  12. 21392

    Vehicle Detection Based on Multifeature Extraction and Recognition Adopting RBF Neural Network on ADAS System by Xuewen Chen, Huaqing Chen, Huan Xu

    Published 2020-01-01
    “…Based on the positive and negative sample base of vehicles, the neural network recognizer is trained and learned, which can quickly realize network convergence. …”
    Get full text
    Article
  13. 21393

    Identification of Poison Ivy, Poison Oak, Poison Sumac, and Poisonwood by Sydney Park Brown, Joe Sewards, Patricia Grace, Sherrie Lowe

    Published 2012-03-01
    “…This revised 6-page fact sheet helps individuals learn to identify these plants in order to avoid contact with them. …”
    Get full text
    Article
  14. 21394

    Writing a Scientific Review Article: Comprehensive Insights for Beginners by Ayodeji Amobonye, Japareng Lalung, Gift Mheta, Santhosh Pillai

    Published 2024-01-01
    “…The dearth of ample guidance or explicit training results in students having to learn all by themselves, usually by trial and error, which often leads to high rejection rates from publishing houses. …”
    Get full text
    Article
  15. 21395

    Zwischen logos und icon by Ulrich Engel

    Published 2021-09-01
    “…Contemporary art as other-place of theology) Ulrich Engel OP examines, starting from the iconic turn, the question what theology (which is primarily committed to the biblical WORD) can learn from IMAGES. Following Foucault's theory of heterotopias (other-places), the study focuses on works of contemporary visual art, which as other-places can expose and make visible hidden, overlooked, misunderstood mechanisms of exclusion. …”
    Get full text
    Article
  16. 21396

    THE CASE OF IMMIGRANT PARENTS IN RAISING THEIR MULTILINGUAL CHILDREN by Ersika Puspita Dani, Friska Yanti Simaremare

    Published 2020-03-01
    “…Dominantly, multilingual children have used to learn multilingual languages from their parents and environments, their parents always familiarize themselves to always be able to adjust in social, cultural, habits, geographical residence, and so on, which is always supported by the situations, and conditions occurred at that time. (3) There are only two kids are found to have a problem, namely dyslexia and code switching. …”
    Get full text
    Article
  17. 21397

    Optimization of IoT-Based Sporting Goods Consumer Service Management System by Lihua Yu, Baobin Duan

    Published 2021-01-01
    “…System operation can well solve the coordination work between the head office and stores; the head office can master the operation of each store, check the generated ledger at any time, form statistical reports, and guide the operation status of each store so that the stores can adjust their operation methods and learn from each other at any time. The system network management can make valuable data information aggregated, rather than single data. …”
    Get full text
    Article
  18. 21398

    « Si le folklore musical existe, alors il est vivant ; s’il est vivant, alors il est normal qu’il meure » by Francesco Giannattasio

    Published 2024-12-01
    “…It has also never failed to engage in dialogue with historical, philological and literary studies on crucial issues such as the relationship between orality and writing, the learned and the popular, conservative and innovative musical traditions, continental and Mediterranean, all of which have made Italy a very special laboratory for the study of music in the last century.Based on my career as an activist in the first political folk revival, then as a musician and finally as an ethnomusicologist, this article aims to re-read the events that led to a so-called 'heritage age'. …”
    Get full text
    Article
  19. 21399

    Val d’Hérens (Switzerland): A history of Missed (tourist) Transitions by Marjolaine Gros-Balthazard, Caterina Franco, Anouk Bonnemains

    Published 2024-04-01
    “…In addition, it presents opportunities for reflection on the lessons learned from what we might consider to be failures and their influence on territorial dynamics.…”
    Get full text
    Article
  20. 21400

    Ars Demones *2022* Manifesto by Agnieszka Anna Wołodźko

    Published 2022-07-01
    “…For Stiegler, the knowledge of mystagogy, because of its risky and excessive character, enables to learn and practice care, and it is through the work of art that we can experience of what degrees of care such an excess of another plane need. …”
    Get full text
    Article