Showing 1 - 12 results of 12 for search '"executive order"', query time: 0.04s Refine Results
  1. 1

    POL-INTEL by Tanja Kammersgaard Christensen

    Published 2024-06-01
    “…This is regulated by the Executive Order on Cross-sectional Information Analyses. …”
    Get full text
    Article
  2. 2

    Return of Benin Objects to Nigeria: Perceptions and the Law by Afolasade A. Adewumi

    Published 2024-12-01
    “…The article also carries out a critique of the Executive Order Notice No. 25, Order No. 1 of 2023, and concludes by stating that though the executive order is invalid, its invalidity is inconsequential with respect to the dictates of customary law, human rights law, and international law. …”
    Get full text
    Article
  3. 3

    HUMAN SECURITY AND LAND BORDERS CLOSURE: A HISTORICAL PERSPECTIVE by ISREAL SAMUEL, YAHAYA TOYIN LAWAL, GOD'SLOVE ZEBULON

    Published 2024-10-01
    “…The paper also revealed that what influenced government closure of the borders was due to proliferation of light and heavy weapons across the Nigeria borders hence the executive order for border closure in 2019.The paper concludes that despite federal government acclaimed success of border closure of the nation land borders the closure did not yield the desire results. …”
    Get full text
    Article
  4. 4

    Scalable and multi-application wireless sensor networks simulation based on node clustering by LI Wen-jun, LIN Hong-sheng, ZHOU Xiao-cong, ZHENG Yao-zhan

    Published 2008-01-01
    “…Interactions between nodes were simulated by entity communication, and a syn- chronous mechanism was also proposed to ensure the simulation events execute orderly. A node clustering based simula- tor ETMA was designed and implemented on top of TOSSIM. …”
    Get full text
    Article
  5. 5

    Laws that Protect Florida’s Wildlife by Joe Schaefer, John Tucker, Maia McGuire

    Published 2012-06-01
    “…Wildlife protection may also take the form of conventions, treaties, and executive orders. All are subject to periodic change. For example, legislators can alter or delete laws every year. …”
    Get full text
    Article
  6. 6

    Laws that Protect Florida’s Wildlife by Joe Schaefer, John Tucker, Maia McGuire

    Published 2012-06-01
    “…Wildlife protection may also take the form of conventions, treaties, and executive orders. All are subject to periodic change. For example, legislators can alter or delete laws every year. …”
    Get full text
    Article
  7. 7

    Condamner et punir dans une ville moyenne de province au temps des Lumières : les exécutions publiques à Tours (1762-1768) by Fabrice Mauclair

    Published 2021-04-01
    “…Then it describes in detail the public executions ordered in Tours between 1762 and 1768: frequency and motives, criminals and crimes, material organization, rituals and participants. …”
    Get full text
    Article
  8. 8

    Cryptographic service optimization scheduling algorithm for collaborative jobs in cloud environment by CAO Xiaogang, LI Fenghua, GENG Kui, LI Zifu, KOU Wenlong

    Published 2024-07-01
    “…In the selection stage, the improved NSGA-III algorithm was employed to select computing units for cryptographic computing jobs, and in the sorting stage, the execution order was determined based on the urgency of jobs. …”
    Get full text
    Article
  9. 9

    Multi-node cooperative distributed offloading strategy in V2X scenario by Dun CAO, Yingbao ZHANG, Dian ZOU, Jin WANG, Qiang TANG, Baofeng JI

    Published 2022-02-01
    “…In order to cope with the dynamic changes of the offloading environment for computing resource-intensive and separable tasks in Internet of vehicle and deal with the problem that different collaborative nodes had different communication and computing resources, a distributed offloading strategy that multiple collaborative nodes had serial offloading mode and parallel computing mode in vehicle to everything (V2X) scenario was proposed.Utilizing the predictable motion trajectories of vehicle, the tasks were split into unequal parts, finally each part was computed on itself, mobile edge server, and vehicles in parallel.Then an optimization problem of the system time delay minimization was established.To solve the optimization problem, an offloading scheme based on the game theory was designed to determine the serial offloading execution order of the cooperative nodes.Considering the dynamic characteristics of Internet of vehicles, a sequential quadratic programming (SQP) algorithm was adopted to optimally split tasks.Finally, the simulation results show that the proposed strategy can effectively reduce system delay, and when multiple cooperative nodes offload in parallel, the proposed strategy can still maintain the stable system performance under the different parameter conditions.…”
    Get full text
    Article
  10. 10

    Load-to-store: exploit the time leakage of store buffer transient window by Ming TANG, Yifan HU

    Published 2023-04-01
    “…To research the vulnerability of modern microarchitecture and consider the mitigation, memory order buffer which was responsible for managing the execution order of memory access instructions was analyzed and found that load forward would directly bypass the data of dependent store instructions to load instructions, and speculative load would execute independent load instructions in advance.While bring efficiency optimizations, it might also lead to errors and corresponding blocking.The existing optimization mechanisms on the Intel Coffee Lake microarchitecture, and the leak attack scheme by using them were analyzed.Using the four execution modes of MOB and the corresponding duration, a variety of attacks were constructed including transient attack, covert channel, and recovery of the private key of the cryptographic algorithm.The time difference caused by MOB was used to leak the address of memory instructions, and the implementation of AES T table was attacked.Key recovery experiments were conducted on AES-128 with OpenSSL 3.0.0 on an Intel i5-9400 processor.The experimental results show that 30 000 sets of samples can recover a key byte with a probability of 63.6%.Due to the characteristics of memory order buffer, the concealment of the exploit is better than traditional cache time leaks.…”
    Get full text
    Article
  11. 11

    Latency Improvement Strategies for Reliability-Aware Scheduling in Industrial Wireless Sensor Networks by Felix Dobslaw, Tingting Zhang, Mikael Gidlund

    Published 2015-10-01
    “…Moreover, SchedEx executes orders of magnitude faster than recent algorithms in the literature while producing schedules with competitive latencies. …”
    Get full text
    Article
  12. 12

    The improvement students learning achievement by applying work based learning combined with teaching factory concept by Hasan Maksum, Wawan Purwanto, Toto Sugiarto, Nuzul Hidayat, Siman Siman, Hanapi Hasan

    Published 2024-01-01
    “…The results indicate that the WBL-TEFA learning model introduced novel elements to the model syntax through the following activity steps: (1) initiation, (2) receiving orders, (3) gathering necessary information, (4) generating and sorting possible solutions, (5) executing orders, (6) quality control, and (7) assessment. …”
    Get full text
    Article