Suggested Topics within your search.
Suggested Topics within your search.
-
321
Real-Time Optimization of RISC-V Processors Based on Branch Prediction and Division Data Dependency
Published 2025-01-01“…When running the CoreMark benchmark program and the division test program, the test results improved, indicating an enhanced “real-time” performance of the hardware. …”
Get full text
Article -
322
Adaptation and Use of a Five-Task Model for Evaluability Assessment
Published 2016-10-01“…This case provides an example of one model and how it was utilized to conduct an evaluability assessment of an ongoing program intervention. Purpose: This article provides a real-world example of how an evaluability assessment was conducted using a five-task model from the criminal justice field. …”
Get full text
Article -
323
-
324
Preterm preeclampsia screening and prevention: a comprehensive approach to implementation in a real-world setting
Published 2025-01-01“…This study assesses the feasibility of implementing preterm preeclampsia screening and prevention by leveraging information from our current aneuploidy screening program in a real-world setting with geographic separation clinical site and laboratory analysis site. …”
Get full text
Article -
325
-
326
Solution of a Bi-Level Linear Programming Problem with Uncertain Parameters and its Application
Published 2025-01-01“…Utilizing these conditions, the interval bi-level programming problem has been transformed into a deterministic nonlinear programming problem. …”
Get full text
Article -
327
Real-world analysis of community colorectal neoplasia screening based on stool DNA methylation detection
Published 2025-06-01“…This study aimed to assess the effectiveness of stool DNA methylation detection (sDNAMD) in improving colorectal neoplasia (CN) detection rates and colonoscopy compliance in a real-world community setting. Between July 1, 2023, and June 30, 2024, residents aged 50–75 from Maqiao Town, Minhang District, Shanghai, were invited to participate in a CN screening program. …”
Get full text
Article -
328
-
329
Tips for Surviving and Excelling in a Master and Doctoral Program Under the 40s With Honorable Recognitions
Published 2023-01-01“…In addition to the recent peer-reviewed literature concerning the many challenges advanced practice students experience while completing their academic degree this manuscript also contains real stories. These stories arise from a nursing student who survived and excelled in the educational journey and now seeks to inspire other students of all programs to believe in themselves. …”
Get full text
Article -
330
High expression of XIAP and Bcl-2 may inhibit programmed cell death in glioblastomas
“…These results raise the question of whether Bcl-2 and XIAP genes can be responsible for the inhibition of programmed cell death in glioblastomas. Moreover, they provide additional information capable of allowing the development of new target therapy strategies.…”
Get full text
Article -
331
Feasibility exploration analysis of AR virtual verification method of civil aircraft maintenance program
Published 2025-04-01“…This paper gives the workflow of maintenance program AR virtual verification based on the technical requirements of aircraft maintenance manual verification,and explores the feasibility of this method from the perspective of building consistency with real configuration aircraft and maintenance operation consistency. …”
Get full text
Article -
332
Characterization of Autonomous Work in a Chilean English Pedagogy Program: Teachers’ and Freshmen’s Perspectives
Published 2018-11-01“…The study considers data generated through the application of a questionnaire and an in-depth interview to 48 freshmen from an English Pedagogy Program, as well as a questionnaire and a focus group applied to eight English teachers from the same program. …”
Get full text
Article -
333
C3: Leveraging the Native Messaging Application Programming Interface for Covert Command and Control
Published 2025-04-01Get full text
Article -
334
Implementation of the regional program of cervical cancer screening by liquid-based cytology in the Rostov region
Published 2019-12-01“…To evaluate the effectiveness of the regional cervical cancer screening program by (LB) liquid‑based cytology.Materials and methods. …”
Get full text
Article -
335
Machine learning techniques and multi-objective programming to select the best suppliers and determine the orders
Published 2025-03-01“…Then, a new multi-objective programming model is designed, considering multiple periods and products. …”
Get full text
Article -
336
An In-Depth Analysis of the Students' Perceptions of How the Final Exam Administered in Package C Program
Published 2025-04-01“…The main goal is to investigate how Package C Program students view the distribution and quality of final exam questions and evaluate their preparedness and performance. …”
Get full text
Article -
337
Prostate Cancer Detection by Novice Micro-Ultrasound Users Enrolled in a Training Program
Published 2022-03-01“…MethodsA training program registry was assessed for the rate of clinically significant prostate cancer (csPCa, grade group ≥ 2), negative predictive value, and specificity at each stage of the program. …”
Get full text
Article -
338
Deep learning vulnerability detection method based on optimized inter-procedural semantics of programs
Published 2023-12-01“…In recent years, software vulnerabilities have been causing a multitude of security incidents, and the early discovery and patching of vulnerabilities can effectively reduce losses.Traditional rule-based vulnerability detection methods, relying upon rules defined by experts, suffer from a high false negative rate.Deep learning-based methods have the capability to automatically learn potential features of vulnerable programs.However, as software complexity increases, the precision of these methods decreases.On one hand, current methods mostly operate at the function level, thus unable to handle inter-procedural vulnerability samples.On the other hand, models such as BGRU and BLSTM exhibit performance degradation when confronted with long input sequences, and are not adept at capturing long-term dependencies in program statements.To address the aforementioned issues, the existing program slicing method has been optimized, enabling a comprehensive contextual analysis of vulnerabilities triggered across functions through the combination of intra-procedural and inter-procedural slicing.This facilitated the capture of the complete causal relationship of vulnerability triggers.Furthermore, a vulnerability detection task was conducted using a Transformer neural network architecture equipped with a multi-head attention mechanism.This architecture collectively focused on information from different representation subspaces, allowing for the extraction of deep features from nodes.Unlike recurrent neural networks, this approach resolved the issue of information decay and effectively learned the syntax and semantic information of the source program.Experimental results demonstrate that this method achieves an F1 score of 73.4% on a real software dataset.Compared to the comparative methods, it shows an improvement of 13.6% to 40.8%.Furthermore, it successfully detects several vulnerabilities in open-source software, confirming its effectiveness and applicability.…”
Get full text
Article -
339
Advancing positive youth development: integrating the 12CS framework into volleyball training programs
Published 2025-06-01“…Purpose: The study aimed to evaluate the effectiveness of integrating the 12Cs model into volleyball training programs, particularly in improving PYD outcomes through the transfer of life skills to real-world applications. …”
Get full text
Article -
340
Perspective of Islamic Religious Education Study Program Students on the Islamic Education Curriculum in Indonesia
Published 2025-06-01“… This study investigates the perceptions of final-year students in the Islamic Religious Education (PAI) Study Program at IAIN Kerinci regarding the evolution, structure, and implementation of the Islamic education curriculum in Indonesia. …”
Get full text
Article