Suggested Topics within your search.
Suggested Topics within your search.
-
61
Changes in the personnel policy of executive authorities
Published 2023-03-01“…The purpose of the research is to study the features of personnel policy in executive bodies in modern conditions. The main research methods are systematization and generalization of theoretical and practical aspects of the development and implementation of personnel policy in executive authorities. …”
Get full text
Article -
62
Validation of the pipeline for the 1.4m Milanković telescope
Published 2024-01-01Get full text
Article -
63
Multithreaded Convolution Implementation Based on Block Methods
Published 2022-12-01“…The article shows the main features of the convolution implementation by the overlap method with addition and the overlap method with addition, as well as numerical examples. …”
Get full text
Article -
64
Analysis of Vibration Diagnostics Methods for Induction Motors
Published 2012-10-01“…The paper presents an analysis of existing vibration diagnostics methods. In order to evaluate an efficiency of method application the following criteria have been proposed: volume of input data required for establishing diagnosis, data content, software and hardware level, execution time for vibration diagnostics. …”
Get full text
Article -
65
Methods and Conditions for Achieving Continuous Improvement of Processes
Published 2010-05-01Get full text
Article -
66
Comparative analysis of methods for testing web applications
Published 2023-09-01Get full text
Article -
67
METHODICAL ASPECTS OF CONTROL OF THE EXPENDITURE OF THE INTERBUDGETARY TRANSFERS
Published 2022-05-01“…In article is presented methodical ensuring control process of an expenditure of the budgetary resources, on the example of means of the subventions, territorial subjects of the Russian Federation allocated to executive authorities.…”
Get full text
Article -
68
Truth Space Method for Caching Database Queries
Published 2015-04-01“…This method may be used to define lacking data in the cache and execute the query on the server only for these data. …”
Get full text
Article -
69
Enhanced method based on virtual registers rotation
Published 2018-05-01“…Sematic attacks based on the data flow analysis bring big challenges to the code obfuscation.Concerning the data flow of virtual machine based (VM-based) code protection,the method transfers the mapping relation between the virtual registers and the op-code of the bytecode during executing,which means the uncertainty and complexity of the data flow during interpretive execution of the bytecode.In addition,three policies are proposed to address the problem that how to choose the length of rotation for each bytecode,which grows complexity of the protection.Finally,a prototype of VRR-VM (virtual machine protection system based on virtual registers rotation) was implemented.Experiment results show that the method is effective and applicable for anti-reversing.…”
Get full text
Article -
70
Software diversification method based on binary rewriting
Published 2023-04-01“…Software diversity is an effective defense against code-reuse attacks, but most existing software diversification technologies are based on source code.Obtaining program source code may be difficult, while binary files are challenging to disassemble accurately and distinguish between code pointers and data constants.This makes binary file diversification difficult to generate high levels of randomization entropy, and easily compromised by attackers.To overcome these challenges, a binary file oriented software diversification method was proposed based on static binary rewriting technology, namely instruction offset randomization.This method inserted NOP instructions of varying byte lengths before program instructions with a certain probability, reducing the number of unintended gadgets in the program and randomly offsetting the original instruction address.This disrupts the program’s original memory layout and increases the cost of code-reuse attacks.At the same time, an optimization strategy based on hot code was designed for this method.The execution times of basic blocks in binary files were obtained by dynamic pile insertion, so as to adjust the NOP instruction insertion probability in each basic block.The higher the execution frequency, the fewer NOP instructions were inserted into the basic block, which can ensure lower performance overhead and produce higher randomization entropy.In the experimental part, the SPEC benchmark program was used to test the optimized method from the aspects of performance overhead, gadget survival rate and file size.The results show that a 15% insertion probability achieves the best effect, with an average gadget survival rate of less than 1.49%, increasing attackers’ difficulty in reusing the same gadget attack chain.Furthermore, only a 4.1% operation overhead and 7.7% space overhead are added, maintaining high levels of security.…”
Get full text
Article -
71
A Computational Fractional Signal Derivative Method
Published 2018-01-01“…The simulations exhibit similar results for both methods; however, the Grünwald–Letnikov method outperforms the other approach in execution time. …”
Get full text
Article -
72
A novel method for quantifying axon degeneration.
Published 2018-01-01“…As proof of principal, this new method, written as an R script called Axoquant 2.0, was used to examine the role of extracellular Ca2+ in the execution of cytoskeletal disassembly during degeneration of NGF-deprived DRG axons. …”
Get full text
Article -
73
An efficient tuning method for networked control systems
Published 2024-11-01“…Abstract Sensors, controllers, and actuators in a networked control system collaborate to execute a distributed closed-loop feedback control system. …”
Get full text
Article -
74
Image processing method based on aerospace monitoring
Published 2021-07-01“…These features make it possible to describe the shape of an object, its geometric parameters and search for images with specific spatial structures. The processing method is realized by executing efficient algorithms for coding an image on a discrete grid by means of a chain code and spectral coding based on the fast discrete Hartley transform. …”
Get full text
Article -
75
Reproducible preservation of databases through executable specifications
Published 2025-06-01“…The method involves writing a specification that can later be executed by the tool without user interaction, transforming the input files and databases into an encapsulated package suitable for archiving. …”
Get full text
Article -
76
Assessment of executive functions of poisoning following suicide
Published 2025-01-01“…METHODS: In this cross-sectional study from April to August 2020 in Khorshid Hospital affiliated with Isfahan University of Medical Sciences, Isfahan, Iran, adult poisoned patients (n = 120) suffering from suicide were selected by convenience sampling method and divided into three groups: recurrent suicide attempts, and suicide attempts for the first time with and without previous psychiatric disorders. …”
Get full text
Article -
77
I Infrastructure development: Improving on execution systems
Published 2020-01-01“…Despite this it is still the method most commonly used for the execution of capital development projects in the public and private sectors in many developing countries. …”
Get full text
Article -
78
Executive Coaching – Instrument for Implementing Organizational Change
Published 2012-03-01“…Executive coaching has seen a real expansion worldwide due to a new approach of management in the age of information. …”
Get full text
Article -
79
Media Communications of Executive Power: Assessing Effectiveness
Published 2023-10-01“…Assessing the Effectiveness of Media Communications of Executive Power: An Analysis of Speeches. This study focuses on developing a method to evaluate the effectiveness of communication between Russian executive authorities and citizens. …”
Get full text
Article -
80
On Execution of Maximum Current Protection in Distributive Network
Published 2010-06-01Get full text
Article