Search alternatives:
"executive method" » "executive methods" (Expand Search)
Showing 1 - 20 results of 32 for search '"executive method"', query time: 0.09s Refine Results
  1. 1
  2. 2

    Investigation of the effect of using NSM method in repairing cracked concrete beams under static torsional loading by Mohadeseh Anbarlouie

    Published 2020-02-01
    “…Most concrete cracks are due to incorrect designs and incorrect execution methods. One of the designs that should be done for concrete parts is the design for twisting. …”
    Get full text
    Article
  3. 3

    Insights into pathophysiology, management, and outcomes of near-hanging patients: A narrative review by Balaji Kannamani, Neeru Sahni, Anjishnujit Bandyopadhyay, Vikas Saini, Laxmi Narayana Yaddanapudi

    Published 2024-10-01
    “…Hanging has been used as a judicial execution method since medieval times and is still a common method of suicide in developing countries. …”
    Get full text
    Article
  4. 4

    Restoration-Guided Implant Rehabilitation of the Complex Partial Edentulism: a Clinical Report by Nikitas Sykaras, Fotios Tzerbos, Vasilios Tzoras

    Published 2010-01-01
    “…The purpose of this paper is to describe the clinical steps that are needed to confirm the treatment plan and allow its proper execution.Methods: Team work and basic principles are emphasized in a step-by-step description of clinical methods and techniques. …”
    Get full text
    Article
  5. 5

    Un supplice imperceptible. Prouver la douleur ressentie par les condamnés à mort dans les procès de l’injection létale aux États-Unis by Nicolas Fischer

    Published 2025-05-01
    “…Drawing on fieldwork combining interviews and analysis of court documents, this article studies the “evidentiary work” carried out by attorneys and experts involved in the current litigation over judicial executions by lethal injection in the USA. This execution method is supposed to kill the condemned “humanely” by anaesthetising them before injecting them with a lethal substance. …”
    Get full text
    Article
  6. 6

    The effect of construction management on structural stresses in buildings: Case study Yasouj city by ali momeni manesh

    Published 2023-02-01
    “…The research method is applied in terms of type and descriptive and survey in terms of execution method. Also, this research is exploratory and the library and field method (completing the questionnaire) was used to collect the required information and data. …”
    Get full text
    Article
  7. 7

    Avoiding Equivalent Test Executions in Software Product Line Testing by Pilsu Jung, Jaeho Kim

    Published 2025-01-01
    “…Our experimental evaluation with two SPL systems shows that our proposed method reduces the number of test executions by 57.1% on average compared to the exhaustive execution method without sacrificing fault detection effect.…”
    Get full text
    Article
  8. 8

    A Novel, Sport-Specific EMG-Based Method to Evaluate Movement Efficiency in Karate Punching by László Csákvári, Bence Kopper, Tamás Horváth

    Published 2025-07-01
    “…Background: This study aimed to develop a method to analyze the kinetic and kinematic characteristics of the traditional karate Gyaku Tsuki (reverse punch), focusing on the activation sequence of lower and upper extremities and trunk muscles during execution. Methods: An elite male (N = 1) karate athlete (in kata) performed 20 Gyaku Tsuki punches while equipped with 16 wireless surface EMG sensors integrated with 3-axis accelerometers. …”
    Get full text
    Article
  9. 9

    Effect of Mirror Therapy on mu rhythm of Electroencephalogram Signals by Xuefeng LIU, Weilin LIU, Qiurong XIE, Jian HE

    Published 2015-12-01
    “…Objective:To observe the changes of mu rhythm of electroencephalogram (EEG) signals in healthy human beings received mirror therapy under the conditions of movement imagination, passive movement and movement execution.Methods:Fourteen subjects of healthy adults from Fujian University of Traditional Chinese Medicine were recruited in the present study. …”
    Get full text
    Article
  10. 10

    A Survey on the Impact of Human Resource Retention Policies on Job Satisfaction with the Mediating Role of Political Behavior Skills: A Case Study of Pasargad Oil Company by Mohammad Mohammadi, Mahjubeh Saeedi

    Published 2024-07-01
    “…This research is applied in terms of purpose and descriptive survey in terms of execution method. The statistical population is 300 people, and the statistical sample, based on Cochran's formula, was 169 people, who were selected through simple random sampling procedure. …”
    Get full text
    Article
  11. 11

    Identifying and Evaluating Indicators Of Civic Responsibility Among Physical Education Teachers. (Case Study: Shahrekord) by Masoud Naderian Jahromi, Leila Ghaderi Ghahfarrokhi

    Published 2024-12-01
    “…The research is applied in terms of purpose and mixed (qualitative-quantitative) in terms of execution method. To identify the components of civil responsibility, the results of research in reliable scientific databases were used.The civil responsibilities of physical education teachers were identified before, during and after the class . …”
    Get full text
    Article
  12. 12

    Expeditious Dynamic Clustering in Preprocessing for High-Performance Classification by Anamika Pimpa, Narissara Eiamkanitchat

    Published 2024-01-01
    “…This integration selectively combines clusters based on a low-frequency criterion value, optimizing the clustering of the dataset. The EDC execution method operates without the need for a computational distance function, thereby revolutionizing the clustering paradigm for high-performance data classification. …”
    Get full text
    Article
  13. 13

    EXTRAJUDICIAL COLLECTION OF DEBTS ON HOUSING AND COMMUNAL PAYMENTS BY VIRTUE OF A NOTARY’S WRIT OF EXECUTION: PROBLEM STATEMENT by MIKHAILOVA Ekaterina Vladimirovna

    Published 2025-06-01
    “…Purpose: to identify consequences of enshrining the possibility of extrajudicial collection of debts on housing and communal payments by virtue of a notary’s writ of execution. Methods: analysis and synthesis, deduction and induction, description, interpretation. …”
    Get full text
    Article
  14. 14

    Designing a self-reliance model for households with food insecurity in Iran by Mohammad Reza Honarvar, Masoomeh Gholami

    Published 2025-07-01
    “…Additionally, interviews were held with key experts in the field to explore challenges, barriers to implementation, effective intervention strategies, and optimal execution methods. The findings were then analyzed thematically, resulting in the formulation of a proposed model. …”
    Get full text
    Article
  15. 15

    Attack surface analysis and mitigation for near-field communication networks and devices in smart grids by Jing Guo, Zhimin Gu, Haitao Jiang, Yan Li, Daohua Zhu

    Published 2025-09-01
    “…We propose mitigation strategies to address these risks, including a reverse engineering-based edge device firmware emulation and execution method, a large language model-based protocol analysis approach, and a fuzzing-based malicious behavior simulation technique in a NFN. …”
    Get full text
    Article
  16. 16

    Hard-coded backdoor detection method based on semantic conflict by Anxiang HU, Da XIAO, Shichen GUO, Shengli LIU

    Published 2023-02-01
    “…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
    Get full text
    Article
  17. 17

    Hardcoded vulnerability detection approach for IoT device firmware by Chao MU, Xin WANG, Ming YANG, Heng ZHANG, Zhenya CHEN, Xiaoming WU

    Published 2022-10-01
    “…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
    Get full text
    Article
  18. 18

    Quantifying Football Shooting Precision: The Expected Shot Impact Timing (xSIT) Approach by Blanca De-la-Cruz-Torres, Miguel Navarro-Castro, Anselmo Ruiz-de-Alarcón-Quintero

    Published 2025-06-01
    “…Additionally, this study sought to compare the performance and discriminative capacity of two existing post-shot expected goal metrics (xSIT and xGOT, expected goals on target) in evaluating the probability of scoring for shots on target after the moment of execution. Methods: Formal definitions were established for the following: (i) the ball shot location, (ii) the ball velocity, (iii) the GK location, and (iv) the outfield player’s location. …”
    Get full text
    Article
  19. 19

    Active games for increasing social and emotional competencies of young adults in probation system: a one-sample trial study in Izmir city in Turkiye by Inci Derya Yucel, Gorkem Yararbas

    Published 2024-12-01
    “…Probation as a form of execution continues to grow in popularity around the world, as it has the potential for more successful outcomes than closed institutional execution methods. However, in the face of changing societal and individual needs, the probation system must rapidly adapt to current public realities, especially with new approaches, including the use of purposeful physical movement for young adults who are obliged due to illegal substance use. …”
    Get full text
    Article
  20. 20

    Study of motor load regulation training with visual feedback in patients with diabetic polyneuropathy by N. D. Babanov, D. V. Frolov, E. V. Krukov, E. N. Panova, O. V. Kubryak

    Published 2021-02-01
    “…In this regard, an observation was carried out in which biofeedback training was used for the reference reaction in the conditions of variable feedback parameters.AIMS: To investigate the effect of a stepwise change in the depth of feedback (sensitivity) in a motor-cognitive task with visual feedback on the reference response to the result of its execution.METHODS: Single-sample observational observation with controlled conditions. 27 patients with diabetic polyneuropathy. …”
    Get full text
    Article