Suggested Topics within your search.
Suggested Topics within your search.
-
1221
THE IMPACT OF COGNITIVE STIMULATION IN OLDER ADULTS WITH DEMENTIA
Published 2024-09-01Get full text
Article -
1222
Law Student Mental Health Literacy and Distress: Finances, Accommodation and Travel Time
Published 2015-01-01“…The School of Law at UniSA has been operating a clinical program via its Legal Advice Clinic (which is situated within the Law Building) for just over four years. …”
Get full text
Article -
1223
Quantification of transcript isoforms at the single-cell level using SCALPEL
Published 2025-07-01Get full text
Article -
1224
Securing Maritime Autonomous Surface Ships: Cyber Threat Scenarios and Testbed Validation
Published 2025-01-01Get full text
Article -
1225
-
1226
Radioactive Source-Detector System: Design and Monte Carlo Opinion
Published 2024-10-01“… In the current research, a computer simulation program was designed and written according to the Monte Carlo method to serve as a virtual practical system instead of a real one. …”
Get full text
Article -
1227
IoT plant watering system for integrating technology and sustainability in science practicum
Published 2025-07-01Get full text
Article -
1228
Universal patching method for side-channel vulnerabilities based on atomic obfuscation
Published 2022-04-01“…Executing code containing side-channel vulnerabilities exhibits different non-functional behaviors related to inputs.Attackers can obtain these behaviors by leveraging micro architecture side-channel attacks and then analyze the pattern between the behaviors and the inputs to access sensitive data.Vulnerability repairing at the software layer brings low overheads to a program’s execution.Besides, it does not require modifying hardware or system, which enables fast patching and widespread deployment.It becomes the mainstream strategy applied to the current cryptographic implementations.However, existing solutions are deeply bound to the program’s implementation and requires manual intervention.This brings challenge to implement and is not versatile enough.A general patching method was proposed for side-channel vulnerabilities that combined dynamic obfuscated execution with hardware atomic transaction.To hide the real accesses of the side-channel vulnerabilities of a program, the proposed method inserted dynamic confusing accesses into the vulnerabilities.To avoid an attacker using fine-grained side-channel attack to distinguish the real access and the confusing access, both of them were encapsulated as transactions and they were guaranteed to be uninterrupted during the running period.In addition, a prototype system called SC-Patcher was implemented based on the LLVM compiler.Various optimization strategies were supported, including secure springboard and transaction aggregation, to further improve system security and performance.Experimental results show that the proposed method makes it impossible for an attacker to restore accurate sensitive data through side-channel attack, and it also brings almost no additional performance overhead to the program.…”
Get full text
Article -
1229
-
1230
Root ZX Electronic Foramen Locator: An Ex Vivo Study of Its Three Models’ Precision and Reproducibility
Published 2017-01-01Get full text
Article -
1231
Le programme Feederwatch et la politique des grands nombres
Published 2004-06-01“…This case documents a successful program in « public understanding of science » oriented toward real science. …”
Get full text
Article -
1232
-
1233
Implementing a chest X-ray artificial intelligence tool to enhance tuberculosis screening in India: Lessons learned.
Published 2023-12-01“…Eight private CXR laboratories that fulfilled prerequisites for AI software installation were engaged for this program. Key lessons about operational feasibility and accessibility, along with the strategies adopted to overcome these challenges, were learned during this program. …”
Get full text
Article -
1234
OBJECT TRACKING VIA COMPARISON OF COLOR HISTOGRAMS
Published 2016-09-01“…А parallel computing platform CUDA, developed to program GPUs, allows creation of real time or near-real time program realizations of the offered versions. …”
Get full text
Article -
1235
Continuous Auditing Paradigma Baru dalam Pengauditan
Published 2014-12-01“…Auditor must focus on program’s application system through the computer. …”
Get full text
Article -
1236
Field-Based Gait Retraining to Reduce Impact Loading Using Tibial Accelerometers in High-Impact Recreational Runners: A Feasibility Study
Published 2025-03-01“…This study investigated the feasibility of a field-based gait retraining program using real-time axial peak tibial acceleration (PTA) feedback in high-impact recreational runners and explored the effects on running biomechanics and economy. …”
Get full text
Article -
1237
Developing of Tomato Distribution Process Monitoring System Using Internet of Things (IoT)
Published 2024-03-01Get full text
Article -
1238
-
1239
Bax- Bcl-xL interaction dynamics during the progression of cell cycle and cell death using FLIM-FRET
Published 2025-07-01Get full text
Article -
1240
Data transmission with Simulink on 6-DoF platform on CAN BUS
Published 2021-04-01“…Use of identical values of identifiers is applied to two cylinders 6-DoF of a platform and the subsequent their division in the program microcontrollers of cylinders.For implementation of a Real-Time mode in addition to compression it is offered to transfer data with the smaller frequency (quantization) by what a modeling clock period. …”
Get full text
Article