-
101
Ethics on Compulsion of Vaccinations in the Age of COVID-19
Published 2023-02-01“…The COVID-19 pandemic broke out at the end of 2019 and throughout 2020 there were intensive international efforts to find a vaccine for the disease, which has already led to the deaths of a few million people. …”
Get full text
Article -
102
Performance optimization of the CLIC positron source
Published 2025-01-01“…The total deposited power in the target is reduced by a factor of 2.1. The most realistic start-to-end simulation to date of the system from the target to the injector linac is performed taking into account new design of essential hardware. …”
Get full text
Article -
103
Triple product amplitude from chiral string
Published 2024-12-01“…We found the graviton amplitude, the Virasoro amplitude, and also a special kind of amplitude that has one infinite spin tower. …”
Get full text
Article -
104
Quand les paroles s’envolent : réflexions sur les caractéristiques et la forme phonétique du High Rising Terminal en anglais contemporain
Published 2015-11-01“…Hirschberg & Ward 1995, Ladd 1996, Fletcher et al. 2005, Liberman 2006b) insist that the name ‘High Rising Terminal’ implies that the intonation contours favoured by ‘uptalkers’ are mainly high-rises, i.e. rising nuclear tones which start relatively high in the speakers’ pitch range and end at a very high pitch, so that the voice often becomes ‘squeaky’ (Cruttenden 1997). …”
Get full text
Article -
105
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article -
106
Reading and (not) seeing?
Published 2016-12-01“…“Where does the lie start?” is the opening line of “Paris.” “Where does the lie end?” …”
Get full text
Article -
107
Real‐time recognition of human motions using multidimensional features in ultrawideband biological radar
Published 2022-01-01“…Furthermore, because action reflects the behaviour of a human within a period, and the start and end are unavailable, intercepting fixed‐length data in the time domain for recognition is not feasible. …”
Get full text
Article -
108
The politics of critique: On the socio-politically engaged dimension of Foucault's methodology
Published 2023-01-01“…In the end of this chapter, we present the notion of the "dispositive", which Foucault defines as an interconnected system of discursive and non-discursive practices, and his notion of subjectivity, which is defined as a relation an individual has with himself. …”
Get full text
Article -
109
Clinical Efficacy of Probiotic Therapy on Bowel-Related Symptoms in Patients with Ulcerative Colitis during Endoscopic Remission: An Observational Study
Published 2022-01-01“…All patients completed bowel-related symptom questionnaires and short inflammatory bowel disease questionnaires (SIBDQs) at the start and end of the 4-week treatment period. Results. …”
Get full text
Article -
110
Retained Intraabdominal Gossypiboma, Five Years after Bilateral Orchiopexy
Published 2010-01-01“…Surgical sponges should be counted once at the start and twice at the end of all surgical operations.…”
Get full text
Article -
111
Electronic Medical Record Entity Recognition via Machine Reading Comprehension and Biaffine
Published 2021-01-01“…The biaffine mechanism scores pair start and end tokens in a sentence so that the model is able to predict named entities accurately. …”
Get full text
Article -
112
Identifying the Latitude and Longitude of ATMs in ATM Networks
Published 2024-06-01“…Results By leveraging 2100 ATM locations (a portion of the data available in Datis Arian Qeshm Company) and examining 562609790 transactions in four months from the start of April 2022 to the end of July 2022, we identified the location of 4000 existing ATMs across the country belonging to 12 banks. …”
Get full text
Article -
113
Flexibly funding WHO? An analysis of its donors’ voluntary contributions
Published 2023-04-01“…Results Our analysis demonstrates that in the last decade voluntary contributions have steadily increased as a proportion of WHO’s budget, from 75% at the start of the period to 88% at the end. …”
Get full text
Article -
114
Coordinated control and protection scheme for fault identification in hybrid three-terminal DC line based on pre-estimation of fault characteristics
Published 2025-03-01“…Firstly, a start-up criterion considering estimated fault characteristics is constructed to achieve reliable start-up during high-resistance faults. …”
Get full text
Article -
115
Towards fairness-aware multi-objective optimization
Published 2024-11-01“…This paper aims to illuminate and broaden our understanding of multi-objective optimization from the perspective of fairness. To this end, we start with a discussion of user preferences in multi-objective optimization. …”
Get full text
Article -
116
NEW ROLE FOR THE TEACHER: PREVENT STUDENTS FROM COMPLETELY ABANDONING THEMSELVES TO AI AND RELINQUISHING CONTROL OVER THEIR LEARNING. Illustration for foreign languages for specifi...
Published 2024-12-01“…The teachers are hesitant, because they still don't know, most of the time, where to start and where to end the AI in their activity. …”
Get full text
Article -
117
-
118
Cohesive factors in Chubak's Short Story: Adl
Published 2019-02-01“…Speed and acceleration in prose is the feature of short story. Chubak creates a simple, coherent prose without complexity, by using more grammatical cohesion elements, so there is not appeared any slightest meaning gap from start to the end of the story.…”
Get full text
Article -
119
Investigation of the October effect in very low-frequency (VLF) signals
Published 2025-01-01“…This study investigates the occurrence of the October effect and its dependencies on latitude and longitude. We developed a method to detect the occurrence of the October effect in the long-term VLF data and derive key parameters characterizing (start and end date, intensity) the sudden decrease in the signal amplitude. …”
Get full text
Article -
120
The rat's sciatic nerve functional index dynamics after its transection and recovery by means of epineural neurorrhaphy
Published 2024-12-01“…The method of determining the function of the paretic limb after sciatic nerve injury in rats using SFI has a number of technical limitations, which are the reason for significant variability in experimental results among different research groups. …”
Get full text
Article