Suggested Topics within your search.
Suggested Topics within your search.
-
1241
Research on High-Precision Time–Frequency Phase-Synchronization Transmission Technology for Free-Space Optical Communication Systems on Mobile Platforms
Published 2025-05-01“…The proposed scheme utilizes symmetric free-space optical (FSO) links to effectively suppress drift errors, integrating the high bandwidth of optical links and the high stability of microwave links, enabling one-to-many networking synchronization between mobile platforms. …”
Get full text
Article -
1242
Research on Safety Characteristic of Mobile Gas Cooled Reactor System
Published 2025-01-01“…When the reactor protection system is effective, the reactor shutdown protection will be triggered 11 seconds after the accident, and the reactor core temperature will be 2 001.581 K, then the reactor can shut down safely. …”
Article -
1243
-
1244
-
1245
Women’s exposure to commercial milk formula marketing: a WHO multi-country market research study
Published 2024-11-01“…The findings reaffirm the need for action across political and health domains to counter actions of CMF companies. This will require effective national legislation fully reflecting the Code and action by professional bodies to protect health professionals from targeting by CMF marketing. …”
Get full text
Article -
1246
A Two-Level Rule-Mining Approach to Classify Breast Cancer Patterns Using Adaptive Directed Mutation and Genetic Algorithm
Published 2025-07-01“…The experimental results, compared with existing rule-based methods from previous studies, demonstrate that the proposed approach generates simple and interpretable decision rules and effectively identifies patterns that lead to accurate breast cancer classification.…”
Get full text
Article -
1247
L’évaluation des mineurs délinquants : une entreprise peu axée sur la limitation de la récidive
Published 2020-08-01“…The report resulting from these discussions recommended that “to be effective [assessment] should be based on new methods which will imply a change in professional practices” (Consensus Conference, 2013, 35). …”
Get full text
Article -
1248
PK-Judge: Enhancing IP Protection of Neural Network Models Using an Asymmetric Approach
Published 2025-03-01“…Additionally, it incorporates a robust challenge-response mechanism to mitigate replay attacks and leverages error correction codes (ECC) to achieve an Effective Bit Error Rate (EBER) of zero, ensuring watermark integrity even under conditions such as fine-tuning, pruning, and overwriting. …”
Get full text
Article -
1249
OT-PCA: New Key-Recovery Plaintext-Checking Oracle Based Side-Channel Attacks on HQC with Offline Templates
Published 2024-12-01Get full text
Article -
1250
Secure command transmission techniques for industrial remote control
Published 2025-05-01“…The results indicate that this method significantly outperforms the traditional on-site approach, where operational code is preloaded onto the microcontroller. Specifically, bundled command transmission combined with dual-core processing proved particularly effective, reducing latency and improving reliability. …”
Get full text
Article -
1251
Grant as a Special Type of budget Subsidies
Published 2020-04-01“…According to the authors, these proposals will be able to increase the effectiveness of state grant support in the Russian Federation.…”
Get full text
Article -
1252
-
1253
Methods for analyzing the impact of software changes on objective functions and safety functions
Published 2024-04-01“…In addition to searching for vulnerable code sections, it is important to evaluate the effectiveness of the control flow comparison method in the analysis of source code when transferred to another code base.…”
Get full text
Article -
1254
A Systematic Analysis of a Small-Scale HAWT Configuration and Aerodynamic Performance Optimization Through Kriging, Factorial, and RSM Methods
Published 2025-10-01“…Wind energy has emerged as an accessible and cost-effective clean energy solution, attracting the attention of scientists. …”
Get full text
Article -
1255
-
1256
High accuracy indoor positioning system using Galois field-based cryptography and hybrid deep learning
Published 2025-04-01“…The work’s main contribution is the incorporation of ECC, an effective encryption and decryption method for signal data, which is based on Galois fields. …”
Get full text
Article -
1257
Open-Source Data Logger System for Real-Time Monitoring and Fault Detection in Bench Testing
Published 2024-12-01Get full text
Article -
1258
Counting and building operators in theories with hidden symmetries and application to HEFT
Published 2025-08-01“…Abstract Identifying a full basis of operators to a given order is key to the generality of Effective Field Theory (EFT) and is by now a problem of known solution in terms of the Hilbert series. …”
Get full text
Article -
1259
Most general EFTs from spurion analysis Hilbert series and minimal lepton flavor violation
Published 2025-07-01“…Abstract We derive a saturation theorem for general Effective Field Theories (EFTs) constructed using spurion analysis. …”
Get full text
Article -
1260