Suggested Topics within your search.
Suggested Topics within your search.
-
1
The Rule of ‘Being Elected as President of the Republic for Two Terms at Most’ in the Executive Presidential System - 2
Published 2023-03-01Subjects: “…presidential elections…”
Get full text
Article -
2
Election theory: Alternative voting methods in the Pennsylvania 2022 Senate election.
Published 2023-08-01“…This study utilizes a survey approach modeled after the ballots used in Pennsylvania’s 2022 Senate election in order to determine how voter support for each candidate may change as a result of non-plurality voting methods being used. …”
Get full text
Article -
3
CHANGE OF AN ENFORCEMENT ORDER OF THE EXECUTIVE DOCUMENT: LEGAL PROVISION OPTIONS
Published 2018-12-01Get full text
Article -
4
Detecting Malicious .NET Executables Using Extracted Methods Names
Published 2025-01-01“…The .NET framework is widely used for software development, making it a target for a significant number of malware attacks by developing malicious executables. Previous studies on malware detection often relied on developing generic detection methods for Windows malware that were not tailored to the unique characteristics of .NET executables. …”
Get full text
Article -
5
METHOD OF DISPLAYING AN EXECUTABLE BUSINESS PROCESS MODELS INTO PETRI NETS
Published 2016-08-01“…The aim is to study the methods of displaying an executable business process model in a Petri net. …”
Get full text
Article -
6
The role of project delivery methods on the execution of construction projects in Kenyan Judiciary
Published 2025-03-01Subjects: “…Key Word; Project delivery methods, execution of construction projects, Kenyan judiciary, time, cost, site disputes, quality, mixed-methods research.…”
Get full text
Article -
7
Investigation and analysis of executive risks in green buildings with AHP approach
Published 2019-11-01Subjects: “…executive risks…”
Get full text
Article -
8
Security protocol code analysis method combining model learning and symbolic execution
Published 2021-10-01“…Symbolic execution can comprehensively analyze program execution space in theory, but it is not feasible in practice for large programs like security protocols, due to the explosion of path space and the limitation of difficulty in solving path constraints.According to the characteristics of security protocol program, a method to guide the symbolic execution of security protocol code by using protocol state machine information obtained from model learning was proposed.At the same time, by separating cryptographic logic from protocol interaction logic, the problem that path constraints cannot be solved caused by the complexity of cryptographic logic is avoided.The feasibility of the method is demonstrated by the practice on the SSH open source project Dropbear.Compared with Dropbear's test suite, the proposed method has advantages in code coverage and error point discovery.…”
Get full text
Article -
9
Pupil Detection Execution Time Reduction in Iris Recognition System
Published 2008-12-01Get full text
Article -
10
Application of Delphi method in the construction of holistic integrative pharmacy elective course system
Published 2021-06-01Subjects: Get full text
Article -
11
Local elections 2000: analyzing the results of the elections
Published 2000-04-01“…In the face of the upcoming Seimas elections, the results of the elections become the fact attracting special importance. …”
Get full text
Article -
12
Symbolic execution based control flow graph extraction method for Android native codes
Published 2017-07-01“…A symbolic execution based method was proposed to automatically extract control flow graphs from native libraries of Android applications.The proposed method can provide execution environments for functions in native libraries,simulate JNI function call processes and solve symbols using constraint solver.A control flow graph extraction prototype system named CFGNative was implemented.The experiment results show that CFGNative can accurately distinguish all the JNI function calls and native methods of the representative example,and reach high code coverage within acceptable time.…”
Get full text
Article -
13
Method of Monitoring Correctness of Execution of Processes in Operating Systems by Control of Dimensional Systems of Variables
Published 2024-07-01“…Detection of disruptions by the method can be executed regardless of reasons of a process execution disruption. …”
Get full text
Article -
14
COMPARATIVE ANALYSIS OF PLASTERING WORK EXECUTION TIME ON LABOUR PRODUCTIVITY WITH WORK SAMPLING METHOD
Published 2025-05-01Get full text
Article -
15
Game method to increase students' motivation to engage in elective disciplines in physical culture and sports
Published 2021-06-01“…Purpose of the research: assessment of the effectiveness of the game method to increase the motivation of students to engage in elective disciplines in physical culture and sports. …”
Get full text
Article -
16
Stable federated learning method for low-altitude IoT networks based on election strategy
Published 2024-09-01“…An federated fearning based on proxy Raft election and weight calculation (FedREP-W) method was proposed, which combined classical Raft election and weight calculation, significantly improving the stability and efficiency of federated training. …”
Get full text
Article -
17
-
18
PERFORMANCE EVALUATION OF THE SCIENTIFIC-TECHNICAL PROJECT'S EXECUTIVE TEAM
Published 2018-01-01“…The article offers a method to evaluate the performance of executive managers teams involved in scientific-technical projects, which considers a range of factors allowing the team to reach applied targets. …”
Get full text
Article -
19
A review of novel methods to assist digital planning and execution of osteotomy for upper limb deformities
Published 2025-01-01Get full text
Article -
20
Executive Function in Young Children: Validation of the Preschool Executive Task Assessment
Published 2025-05-01“…Methods: Thirty-six typically developing children participated. …”
Get full text
Article