Suggested Topics within your search.
Suggested Topics within your search.
-
1121
Cross-Modal Hashing Retrieval Based on Density Clustering
Published 2025-01-01“…Cross-modal hashing retrieval methods have attracted much attention for their effectiveness and efficiency. However, most of the existing hashing methods have the problem of how to precisely learn potential correlations between different modalities from binary codes with minimal loss. …”
Get full text
Article -
1122
The Mechanism of Neutralization of Corruption Threat in Commercial Sector
Published 2018-04-01Get full text
Article -
1123
Jointly Optimizing Resource Allocation, User Scheduling, and Grouping in SBMA Networks: A PSO Approach
Published 2025-06-01“…SBMA leverages flexible user grouping (UG) strategies to effectively manage its unique combination of sparse code constraints and interference alignment requirements, thereby facilitating the fulfillment of diverse Quality of Service (QoS) demands. …”
Get full text
Article -
1124
Battered Woman Syndrome: Prospect of Situating It Within Criminal Law in India
Published 2021-12-01“…This paper also challenges the effectiveness of the existing defences under the Indian Penal Code, 1860 in accommodating the cases of battered women, and highlights the need for the introduction of a new justificatory defence as a plausible solution.…”
Get full text
Article -
1125
Design of Development Environment for Embedded Control Software Based on Simulink
Published 2014-01-01“…Based on the development environment, using the model-based design concept, it effectively solves such problems as low efficiency and long cycle in the traditional method.…”
Get full text
Article -
1126
Normative acts in the system of national tax security provision
Published 2022-01-01“…The article characterizes the role of Russian Constitution, federal laws and bylaws in ensuring tax security.The purpose of the article is to identify legal norms that ensure the tax security of the state, and to confirm the hypothesis that such norms hat such norms are effective in systemic interaction.The methodology. …”
Get full text
Article -
1127
Generating political priority for breastfeeding and the adoption of Kenya’s 2012 BMS act: the importance of women’s leadership
Published 2025-05-01“…Support for the adoption of this landmark law was led by effective female political leaders, including public health minister Beth Mugo, the ministry’s nutrition division head Terrie Wefwafwa, and members of the Kenya Women’s Parliamentary Association. …”
Get full text
Article -
1128
Test method for static parameter of unipolar ADC
Published 2024-02-01“…This paper proposes a normalized processing platform scheme based on code density histogram. According to the test requirements, the test excitation amplitude that meets the requirements is selected to verify the effectiveness of the normalized scheme.The experimental results show that normalization reduces the influence of sinusoidal amplitude change on the code density histogram method and improves the stability of the code density histogram method.…”
Get full text
Article -
1129
Calculations of the nuclide composition of spent nuclear fuel RBMK-1000 for verification computer module SCALE-6
Published 2013-12-01“…The discrepancy with the experimental data on isotopes 235U, 239Pu, 241Pu, which are major contributors to the effective neutron multiplication factor, does not exceed 22 %. …”
Get full text
Article -
1130
A verification method for DMA controller based on AHB bus
Published 2025-01-01“…The code coverage of two verification platforms was collected separately. …”
Get full text
Article -
1131
-
1132
Enhancing Malware Detection via RGB Assembly Visualization and Hybrid Deep Learning Models
Published 2025-06-01“…This research contributes to the field by integrating static binary analysis with advanced computer vision techniques, offering a scalable and effective solution for malware detection.…”
Get full text
Article -
1133
Control-flow integrity technology based on the combination of software and hardware
Published 2024-10-01“…Experimental results demonstrated that programs fortified with SHCFI effectively defended against code reuse attacks, exhibiting favorable runtime overhead.…”
Get full text
Article -
1134
ApproximateSecret Sharing in Field of Real Numbers
Published 2025-07-01“…The experimental results validate its effectiveness in balancing precision and security across various real-number types.…”
Get full text
Article -
1135
Using Large Language Models for the Interpretation of Building Regulations
Published 2024-12-01“…As LLMs become more sophisticated, the increased common sense, logical coherence and means to domain adaptation can significantly support ACC, leading to more efficient and effective checking processes.…”
Get full text
Article -
1136
Assessment of a polymeric composite as a radiation attenuator and a restoration mortar for cracking in biological shields
Published 2020-12-01“…Also, the MCNP5 code and MERCSF-N program have been used to compute the parameters theoretically. …”
Get full text
Article -
1137
APPLICATION OF THE LOYAL COOPERATION PRINCIPLE IN PUBLIC ADMINISTRATION
Published 2023-06-01“…Furthermore, with the appearance of the Administrative Code, in Part III, dedicated to local public administration, among the principles applicable to local public administration, art. 75 para. (1) lit. e), the principle of collaboration. …”
Get full text
Article -
1138
A Model-Driven Approach Employing DSL and Generation Templates to Accelerate the Development of Conversational Agents for Smart Tourism
Published 2025-01-01“…Third, we develop a graphical interface that incorporates intuitive icons to simplify the creation of conversational agent models. Fourth, we define code generation templates to translate the graphical models into executable agent source code. …”
Get full text
Article -
1139
Efisiensi Penggunaan QRIS Dengan Merchant Presented Mode Dalam Transaksi Pembayaran Non-Tunai
Published 2024-08-01“… Quick Response Code Indonesian Standard (QRIS) merupakan salah satu metode pembayaran non-tunai di Indo-nesia yang memanfaatkan standar kode Quick Response (QR) dengan lebih dari 29,4 juta merchant terdaftar. …”
Get full text
Article -
1140
Research on Random Discrete Ordinates Method Based on Quasi-Monte Carlo Integration Technique
Published 2025-06-01“…The first collision source method, widely implemented in SN codes to mitigate ray effects, operates by employing alternative transport methodologies, such as ray tracing, Monte Carlo simulations, or PN expansions, to compute the uncollided flux component most severely impacted by ray effects, thereby reducing numerical distortions. …”
Article