Showing 1,221 - 1,240 results of 4,197 for search 'real program', query time: 0.14s Refine Results
  1. 1221
  2. 1222

    Law Student Mental Health Literacy and Distress: Finances, Accommodation and Travel Time by Nerissa Soh, Fiona Burns, Rita Shackel, Bruce Robinson

    Published 2015-01-01
    “…The School of Law at UniSA has been operating a clinical program via its Legal Advice Clinic (which is situated within the Law Building) for just over four years. …”
    Get full text
    Article
  3. 1223
  4. 1224
  5. 1225
  6. 1226

    Radioactive Source-Detector System: Design and Monte Carlo Opinion by Zainab kareem Ali, Ali N. Mohammed

    Published 2024-10-01
    “… In the current research, a computer simulation program was designed and written according to the Monte Carlo method to serve as a virtual practical system instead of a real one. …”
    Get full text
    Article
  7. 1227
  8. 1228

    Universal patching method for side-channel vulnerabilities based on atomic obfuscation by Deqing ZOU, Pan ZHANG, Wei LIU, Weijie CHEN, Yifan LU

    Published 2022-04-01
    “…Executing code containing side-channel vulnerabilities exhibits different non-functional behaviors related to inputs.Attackers can obtain these behaviors by leveraging micro architecture side-channel attacks and then analyze the pattern between the behaviors and the inputs to access sensitive data.Vulnerability repairing at the software layer brings low overheads to a program’s execution.Besides, it does not require modifying hardware or system, which enables fast patching and widespread deployment.It becomes the mainstream strategy applied to the current cryptographic implementations.However, existing solutions are deeply bound to the program’s implementation and requires manual intervention.This brings challenge to implement and is not versatile enough.A general patching method was proposed for side-channel vulnerabilities that combined dynamic obfuscated execution with hardware atomic transaction.To hide the real accesses of the side-channel vulnerabilities of a program, the proposed method inserted dynamic confusing accesses into the vulnerabilities.To avoid an attacker using fine-grained side-channel attack to distinguish the real access and the confusing access, both of them were encapsulated as transactions and they were guaranteed to be uninterrupted during the running period.In addition, a prototype system called SC-Patcher was implemented based on the LLVM compiler.Various optimization strategies were supported, including secure springboard and transaction aggregation, to further improve system security and performance.Experimental results show that the proposed method makes it impossible for an attacker to restore accurate sensitive data through side-channel attack, and it also brings almost no additional performance overhead to the program.…”
    Get full text
    Article
  9. 1229
  10. 1230
  11. 1231

    Le programme Feederwatch et la politique des grands nombres by Florian Charvolin

    Published 2004-06-01
    “…This case documents a successful program in « public understanding of science » oriented toward real science. …”
    Get full text
    Article
  12. 1232
  13. 1233

    Implementing a chest X-ray artificial intelligence tool to enhance tuberculosis screening in India: Lessons learned. by Shibu Vijayan, Vaishnavi Jondhale, Tripti Pande, Amera Khan, Miranda Brouwer, Asha Hegde, Ravdeep Gandhi, Venkatesh Roddawar, Shilpa Jichkar, Aniruddha Kadu, Sandeep Bharaswadkar, Mayank Sharma, Nathaly Aguilera Vasquez, Lucky Richardson, Dennis Robert, Saniya Pawar

    Published 2023-12-01
    “…Eight private CXR laboratories that fulfilled prerequisites for AI software installation were engaged for this program. Key lessons about operational feasibility and accessibility, along with the strategies adopted to overcome these challenges, were learned during this program. …”
    Get full text
    Article
  14. 1234

    OBJECT TRACKING VIA COMPARISON OF COLOR HISTOGRAMS by B. A. Zalesky, E. N. Seredin, M. V. Yadlouski

    Published 2016-09-01
    “…А parallel computing platform CUDA, developed to program GPUs, allows creation of real time or near-real time program realizations of the offered versions. …”
    Get full text
    Article
  15. 1235

    Continuous Auditing Paradigma Baru dalam Pengauditan by Ferry Sihaloho

    Published 2014-12-01
    “…Auditor must focus on program’s application system through the computer. …”
    Get full text
    Article
  16. 1236

    Field-Based Gait Retraining to Reduce Impact Loading Using Tibial Accelerometers in High-Impact Recreational Runners: A Feasibility Study by Eoin W. Doyle, Tim L. A. Doyle, Jason Bonacci, Joel T. Fuller

    Published 2025-03-01
    “…This study investigated the feasibility of a field-based gait retraining program using real-time axial peak tibial acceleration (PTA) feedback in high-impact recreational runners and explored the effects on running biomechanics and economy. …”
    Get full text
    Article
  17. 1237
  18. 1238
  19. 1239
  20. 1240

    Data transmission with Simulink on 6-DoF platform on CAN BUS by V. G. Mikhailov

    Published 2021-04-01
    “…Use of identical values of identifiers is applied to two cylinders 6-DoF of a platform and the subsequent their division in the program microcontrollers of cylinders.For implementation of a Real-Time mode in addition to compression it is offered to transfer data with the smaller frequency (quantization) by what a modeling clock period. …”
    Get full text
    Article