-
1
THE ROLE AND PLACE OF PHYSICAL TRAINING IN TRAINING POLICE OFFICERS RUSSIA
Published 2022-05-01Subjects: Get full text
Article -
2
Identification and Ranking of Ethical Human Resources Management Components in Payam Noor University
Published 2025-03-01“…The results show that human resource management, using ethical approaches, can guide employee attitudes and behaviors and optimally perform its tasks and goals in a competitive world.Introduction Sectoralism, inconsistency and inconsistency in ethics between the elements of human resources management, weak education and training of ethics-oriented human resources, lack of a comprehensive and approved ethics-oriented plan at the national level, lack of necessary executive guarantees in some laws and executive methods and Also, the conducted research shows that we are facing a lack of theory, research and models in the field of ethical human resource management in higher education and universities. …”
Get full text
Article -
3
Investigation of the effect of using NSM method in repairing cracked concrete beams under static torsional loading
Published 2020-02-01“…Most concrete cracks are due to incorrect designs and incorrect execution methods. One of the designs that should be done for concrete parts is the design for twisting. …”
Get full text
Article -
4
Insights into pathophysiology, management, and outcomes of near-hanging patients: A narrative review
Published 2024-10-01“…Hanging has been used as a judicial execution method since medieval times and is still a common method of suicide in developing countries. …”
Get full text
Article -
5
Restoration-Guided Implant Rehabilitation of the Complex Partial Edentulism: a Clinical Report
Published 2010-01-01“…The purpose of this paper is to describe the clinical steps that are needed to confirm the treatment plan and allow its proper execution.Methods: Team work and basic principles are emphasized in a step-by-step description of clinical methods and techniques. …”
Get full text
Article -
6
Un supplice imperceptible. Prouver la douleur ressentie par les condamnés à mort dans les procès de l’injection létale aux États-Unis
Published 2025-05-01“…Drawing on fieldwork combining interviews and analysis of court documents, this article studies the “evidentiary work” carried out by attorneys and experts involved in the current litigation over judicial executions by lethal injection in the USA. This execution method is supposed to kill the condemned “humanely” by anaesthetising them before injecting them with a lethal substance. …”
Get full text
Article -
7
The effect of construction management on structural stresses in buildings: Case study Yasouj city
Published 2023-02-01“…The research method is applied in terms of type and descriptive and survey in terms of execution method. Also, this research is exploratory and the library and field method (completing the questionnaire) was used to collect the required information and data. …”
Get full text
Article -
8
Avoiding Equivalent Test Executions in Software Product Line Testing
Published 2025-01-01“…Our experimental evaluation with two SPL systems shows that our proposed method reduces the number of test executions by 57.1% on average compared to the exhaustive execution method without sacrificing fault detection effect.…”
Get full text
Article -
9
A Novel, Sport-Specific EMG-Based Method to Evaluate Movement Efficiency in Karate Punching
Published 2025-07-01“…Background: This study aimed to develop a method to analyze the kinetic and kinematic characteristics of the traditional karate Gyaku Tsuki (reverse punch), focusing on the activation sequence of lower and upper extremities and trunk muscles during execution. Methods: An elite male (N = 1) karate athlete (in kata) performed 20 Gyaku Tsuki punches while equipped with 16 wireless surface EMG sensors integrated with 3-axis accelerometers. …”
Get full text
Article -
10
Effect of Mirror Therapy on mu rhythm of Electroencephalogram Signals
Published 2015-12-01“…Objective:To observe the changes of mu rhythm of electroencephalogram (EEG) signals in healthy human beings received mirror therapy under the conditions of movement imagination, passive movement and movement execution.Methods:Fourteen subjects of healthy adults from Fujian University of Traditional Chinese Medicine were recruited in the present study. …”
Get full text
Article -
11
A Survey on the Impact of Human Resource Retention Policies on Job Satisfaction with the Mediating Role of Political Behavior Skills: A Case Study of Pasargad Oil Company
Published 2024-07-01“…This research is applied in terms of purpose and descriptive survey in terms of execution method. The statistical population is 300 people, and the statistical sample, based on Cochran's formula, was 169 people, who were selected through simple random sampling procedure. …”
Get full text
Article -
12
Identifying and Evaluating Indicators Of Civic Responsibility Among Physical Education Teachers. (Case Study: Shahrekord)
Published 2024-12-01“…The research is applied in terms of purpose and mixed (qualitative-quantitative) in terms of execution method. To identify the components of civil responsibility, the results of research in reliable scientific databases were used.The civil responsibilities of physical education teachers were identified before, during and after the class . …”
Get full text
Article -
13
Expeditious Dynamic Clustering in Preprocessing for High-Performance Classification
Published 2024-01-01“…This integration selectively combines clusters based on a low-frequency criterion value, optimizing the clustering of the dataset. The EDC execution method operates without the need for a computational distance function, thereby revolutionizing the clustering paradigm for high-performance data classification. …”
Get full text
Article -
14
EXTRAJUDICIAL COLLECTION OF DEBTS ON HOUSING AND COMMUNAL PAYMENTS BY VIRTUE OF A NOTARY’S WRIT OF EXECUTION: PROBLEM STATEMENT
Published 2025-06-01“…Purpose: to identify consequences of enshrining the possibility of extrajudicial collection of debts on housing and communal payments by virtue of a notary’s writ of execution. Methods: analysis and synthesis, deduction and induction, description, interpretation. …”
Get full text
Article -
15
Designing a self-reliance model for households with food insecurity in Iran
Published 2025-07-01“…Additionally, interviews were held with key experts in the field to explore challenges, barriers to implementation, effective intervention strategies, and optimal execution methods. The findings were then analyzed thematically, resulting in the formulation of a proposed model. …”
Get full text
Article -
16
Attack surface analysis and mitigation for near-field communication networks and devices in smart grids
Published 2025-09-01“…We propose mitigation strategies to address these risks, including a reverse engineering-based edge device firmware emulation and execution method, a large language model-based protocol analysis approach, and a fuzzing-based malicious behavior simulation technique in a NFN. …”
Get full text
Article -
17
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article -
18
Hardcoded vulnerability detection approach for IoT device firmware
Published 2022-10-01“…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
Get full text
Article -
19
Quantifying Football Shooting Precision: The Expected Shot Impact Timing (xSIT) Approach
Published 2025-06-01“…Additionally, this study sought to compare the performance and discriminative capacity of two existing post-shot expected goal metrics (xSIT and xGOT, expected goals on target) in evaluating the probability of scoring for shots on target after the moment of execution. Methods: Formal definitions were established for the following: (i) the ball shot location, (ii) the ball velocity, (iii) the GK location, and (iv) the outfield player’s location. …”
Get full text
Article -
20
Active games for increasing social and emotional competencies of young adults in probation system: a one-sample trial study in Izmir city in Turkiye
Published 2024-12-01“…Probation as a form of execution continues to grow in popularity around the world, as it has the potential for more successful outcomes than closed institutional execution methods. However, in the face of changing societal and individual needs, the probation system must rapidly adapt to current public realities, especially with new approaches, including the use of purposeful physical movement for young adults who are obliged due to illegal substance use. …”
Get full text
Article