Showing 61 - 80 results of 5,785 for search 'executive (method OR methods)', query time: 0.17s Refine Results
  1. 61

    Changes in the personnel policy of executive authorities by Svetlana Aslanovna Kirzhinova, Marietta Askarbievna Bolokova

    Published 2023-03-01
    “…The purpose of the research is to study the features of personnel policy in executive bodies in modern conditions. The main research methods are systematization and generalization of theoretical and practical aspects of the development and implementation of personnel policy in executive authorities. …”
    Get full text
    Article
  2. 62
  3. 63

    Multithreaded Convolution Implementation Based on Block Methods by A. V. Sharamet

    Published 2022-12-01
    “…The article shows the main features of the convolution implementation by the overlap method with addition and the overlap method with addition, as well as numerical examples. …”
    Get full text
    Article
  4. 64

    Analysis of Vibration Diagnostics Methods for Induction Motors by A. P. Kalinov, О. V. Bratash

    Published 2012-10-01
    “…The paper presents an analysis of existing vibration diagnostics methods. In order to evaluate an efficiency of method application the following criteria have been proposed: volume of input data required for establishing diagnosis, data content, software and hardware level, execution time for vibration diagnostics. …”
    Get full text
    Article
  5. 65
  6. 66
  7. 67

    METHODICAL ASPECTS OF CONTROL OF THE EXPENDITURE OF THE INTERBUDGETARY TRANSFERS by Anna Anatolyevna Babich

    Published 2022-05-01
    “…In article is presented methodical ensuring control process of an expenditure of the budgetary resources, on the example of means of the subventions, territorial subjects of the Russian Federation allocated to executive authorities.…”
    Get full text
    Article
  8. 68

    Truth Space Method for Caching Database Queries by S. V. Mosin, S. V. Zykin

    Published 2015-04-01
    “…This method may be used to define lacking data in the cache and execute the query on the server only for these data. …”
    Get full text
    Article
  9. 69

    Enhanced method based on virtual registers rotation by Yan PAN, Wei LIN

    Published 2018-05-01
    “…Sematic attacks based on the data flow analysis bring big challenges to the code obfuscation.Concerning the data flow of virtual machine based (VM-based) code protection,the method transfers the mapping relation between the virtual registers and the op-code of the bytecode during executing,which means the uncertainty and complexity of the data flow during interpretive execution of the bytecode.In addition,three policies are proposed to address the problem that how to choose the length of rotation for each bytecode,which grows complexity of the protection.Finally,a prototype of VRR-VM (virtual machine protection system based on virtual registers rotation) was implemented.Experiment results show that the method is effective and applicable for anti-reversing.…”
    Get full text
    Article
  10. 70

    Software diversification method based on binary rewriting by Benwei HE, Yunfei GUO, Yawen WANG, Qingfeng WANG, Hongchao HU

    Published 2023-04-01
    “…Software diversity is an effective defense against code-reuse attacks, but most existing software diversification technologies are based on source code.Obtaining program source code may be difficult, while binary files are challenging to disassemble accurately and distinguish between code pointers and data constants.This makes binary file diversification difficult to generate high levels of randomization entropy, and easily compromised by attackers.To overcome these challenges, a binary file oriented software diversification method was proposed based on static binary rewriting technology, namely instruction offset randomization.This method inserted NOP instructions of varying byte lengths before program instructions with a certain probability, reducing the number of unintended gadgets in the program and randomly offsetting the original instruction address.This disrupts the program’s original memory layout and increases the cost of code-reuse attacks.At the same time, an optimization strategy based on hot code was designed for this method.The execution times of basic blocks in binary files were obtained by dynamic pile insertion, so as to adjust the NOP instruction insertion probability in each basic block.The higher the execution frequency, the fewer NOP instructions were inserted into the basic block, which can ensure lower performance overhead and produce higher randomization entropy.In the experimental part, the SPEC benchmark program was used to test the optimized method from the aspects of performance overhead, gadget survival rate and file size.The results show that a 15% insertion probability achieves the best effect, with an average gadget survival rate of less than 1.49%, increasing attackers’ difficulty in reusing the same gadget attack chain.Furthermore, only a 4.1% operation overhead and 7.7% space overhead are added, maintaining high levels of security.…”
    Get full text
    Article
  11. 71

    A Computational Fractional Signal Derivative Method by Matías Salinas, Rodrigo Salas, Diego Mellado, Antonio Glaría, Carolina Saavedra

    Published 2018-01-01
    “…The simulations exhibit similar results for both methods; however, the Grünwald–Letnikov method outperforms the other approach in execution time. …”
    Get full text
    Article
  12. 72

    A novel method for quantifying axon degeneration. by Aaron D Johnstone, Robin M Hallett, Andrés de Léon, Bruno Carturan, Julien Gibon, Philip A Barker

    Published 2018-01-01
    “…As proof of principal, this new method, written as an R script called Axoquant 2.0, was used to examine the role of extracellular Ca2+ in the execution of cytoskeletal disassembly during degeneration of NGF-deprived DRG axons. …”
    Get full text
    Article
  13. 73

    An efficient tuning method for networked control systems by Debashish Pal, Shiv Kumar Bhagat, G. Shanmugasundar, Ranjan Kumar Ghadai

    Published 2024-11-01
    “…Abstract Sensors, controllers, and actuators in a networked control system collaborate to execute a distributed closed-loop feedback control system. …”
    Get full text
    Article
  14. 74

    Image processing method based on aerospace monitoring by A. I. Mitsiukhin, I. I. Pikirenya

    Published 2021-07-01
    “…These features make it possible to describe the shape of an object, its geometric parameters and search for images with specific spatial structures. The processing method is realized by executing efficient algorithms for coding an image on a discrete grid by means of a chain code and spectral coding based on the fast discrete Hartley transform. …”
    Get full text
    Article
  15. 75

    Reproducible preservation of databases through executable specifications by Ivar Rummelhoff, Thor Kristoffersen, Bjarte Østvold

    Published 2025-06-01
    “…The method involves writing a specification that can later be executed by the tool without user interaction, transforming the input files and databases into an encapsulated package suitable for archiving. …”
    Get full text
    Article
  16. 76

    Assessment of executive functions of poisoning following suicide by Nastaran Eizadi-Mood

    Published 2025-01-01
    “…METHODS: In this cross-sectional study from April to August 2020 in Khorshid Hospital affiliated with Isfahan University of Medical Sciences, Isfahan, Iran, adult poisoned patients (n = 120) suffering from suicide were selected by convenience sampling method and divided into three groups: recurrent suicide attempts, and suicide attempts for the first time with and without previous psychiatric disorders. …”
    Get full text
    Article
  17. 77

    I Infrastructure development: Improving on execution systems by Edoghogho Ogbeifun, Charles Mbohwa, Jan-Harm C Pretorius

    Published 2020-01-01
    “…Despite this it is still the method most commonly used for the execution of capital development projects in the public and private sectors in many developing countries. …”
    Get full text
    Article
  18. 78

    Executive Coaching – Instrument for Implementing Organizational Change by Camelia ENESCU, Delia Mioara POPESCU

    Published 2012-03-01
    “…Executive coaching has seen a real expansion worldwide due to a new approach of management in the age of information. …”
    Get full text
    Article
  19. 79

    Media Communications of Executive Power: Assessing Effectiveness by E. A. Bazhenova, M. A. Shirinkina

    Published 2023-10-01
    “…Assessing the Effectiveness of Media Communications of Executive Power: An Analysis of Speeches. This study focuses on developing a method to evaluate the effectiveness of communication between Russian executive authorities and citizens. …”
    Get full text
    Article
  20. 80