Suggested Topics within your search.
Showing 21 - 40 results of 180 for search 'Term limits in the United States', query time: 0.10s Refine Results
  1. 21

    The US Nuclear Policy in the XXI Century: Continuity and Change in the Strategies of the George W. Bush, Barack Obama, and Donald Trump Administrations by E. P. Buzhinsky, V. A. Veselov

    Published 2020-11-01
    “…However, a growing uncertainty over the future of the Treaty between the United States of America and the Russian Federation on Measures for the Further Reduction and Limitation of Strategic Offensive Arms (New START) after February of 2021 necessitates a broader chronological perspective on the evolution of the U.S. nuclear policy in order to separate short-term considerations from long-term trends. …”
    Get full text
    Article
  2. 22
  3. 23
  4. 24
  5. 25
  6. 26
  7. 27

    Tasks of the National Police of Ukraine as a subject of implementation of the preventive function of the state by I. V. Ishchenko

    Published 2021-12-01
    “…It is emphasized that the main tasks of the Department of Preventive Activities of the National Police of Ukraine are to organize and ensure within the competence of the National Police of Ukraine the functions of Ukrainian legislation to maintain public safety and order, protect human rights and freedoms, and individual preventive work aimed at preventing the commission of administrative and criminal offenses, preventing and combating domestic violence, escorting persons detained on suspicion of committing a criminal offense, taken into custody, accused, sentenced to arrest or imprisonment, and for a term of imprisonment in the courtroom. It was emphasized that the general tasks of the Department of Preventive Activities of the National Police of Ukraine include: ensuring public safety and public order; protection of fundamental human rights and freedoms, as well as the interests of society and the state; providing, within the limits established by law, services to assist persons who, for personal, economic, social reasons or due to emergencies, need such assistance. …”
    Get full text
    Article
  8. 28
  9. 29
  10. 30

    Estimation of Forces and Powers in Ergometer and Scull Rowing Based on Long Short-Term Memory Neural Networks by Lorenzo Pitto, Frédéric R. Simon, Geoffrey N. Ertel, Gérome C. Gauchard, Guillaume Mornieux

    Published 2025-01-01
    “…This procedure can be both expensive and time-consuming, thus limiting trainers’ ability to monitor athletes. In this study, we developed an easier-to-install and cheaper method for estimating rowers’ forces and powers based only on cable position sensors for ergometer rowing and inertial measurement units (IMUs) and GPS for scull rowing. …”
    Get full text
    Article
  11. 31
  12. 32
  13. 33
  14. 34
  15. 35
  16. 36
  17. 37

    Detection of SSL/TLS protocol attacks based on flow spectrum theory by Shize GUO, Fan ZHANG, Zhuoxue SONG, Ziming ZHAO, Xinjie ZHAO, Xiaojuan WANG, Xiangyang LUO

    Published 2022-02-01
    “…Network attack detection plays a vital role in network security.Existing detection approaches focus on typical attack behaviors, such as Botnets and SQL injection.The widespread use of the SSL/TLS encryption protocol arises some emerging attack strategies against the SSL/TLS protocol.With the network traffic collection environment that built upon the implements of popular SSL/TLS attacks, a network traffic dataset including four SSL/TLS attacks, as well as benign flows was controlled.Considering the problems that limited observability of existing detection and limited separation of the original-flow spatiotemporal domains, a flow spectrum theory was proposed to map the threat behavior in the cyberspace from the original spatiotemporal domain to the transformed domain through the process of “potential change” and obtain the “potential variation spectrum”.The flow spectrum theory is based on a set of separable and observable feature representations to achieve efficient analysis of network flows.The key to the application of flow spectrum theory in actual cyberspace threat behavior detection is to find the potential basis matrix for a specific threat network flow under the condition of a given transformation operator.Since the SSL/TLS protocol has a strong timing relationship and state transition process in the handshake phase, and there are similarities between some SSL/TLS attacks, the detection of SSL/TLS attacks not only needs to consider timing context information, but also needs to consider the high-separation representation of TLS network flows.Based on the flow spectrum theory, the threat template idea was used to extract the potential basis matrix, and the potential basis mapping based on the long-short-term memory unit was used to map the SSL/TLS attack network flow to the flow spectrum domain space.On the self-built SSL/TLS attack network flow data set, the validity of the flow spectrum theory is verified by means of classification performance comparison, potential variation spectrum dimensionality reduction visualization, threat behavior feature weight evaluation, threat behavior spectrum division assessment, and potential variation base matrix heatmap visualization.…”
    Get full text
    Article
  18. 38
  19. 39

    The short-, medium-, and long-term prevalence of physical health comorbidities in first-episode psychosis: a systematic review and meta-analysis protocol [version 2; peer review: 3... by Michael Norton, Brian O'Donoghue, Mary Clarke, Karen O'Connor, Jennifer Murphy, Anna Zierotin

    Published 2025-01-01
    “…Methods Using the PRISMA and MOOSE guidelines, Medline, Embase, PsycINFO, and CINAHL+, as well as Clinical Trials gov.uk, OpenGrey, WHO International Clinical Trials Registry Platform, Current Controlled Trials, United States National Institute of Health Trials Registry, and the Irish Health Repository, will be searched from inception. …”
    Get full text
    Article
  20. 40