-
281
STRATEGI KOMUNIKASI BIDANG INFORMASI DAN KOMUNIKASI PUBLIK DISKOMINFO GUNUNGKIDUL DALAM MERAIH PRESTASI DI MASA PANDEMI COVID-19
Published 2022-10-01“…Kata kunci: strategi komunikasi, prestasi, e-Lapor, pandemi COVID-19 Abstract This study aims to determine: 1) the communication strategy of IKP Diskominfo Gunungkidul Sector in carrying out organizational tasks related to managing public service complaints that can achieve achievements during the COVID-19 pandemic, 2) supporting aspects and inhibitions of the successful of the communication strategy. …”
Get full text
Article -
282
HARDWARE SUPPORT PROCEDURES FOR ASYMMETRIC AUTHENTICATION OF THE INTERNET OF THINGS
Published 2021-12-01“…The article solves the following tasks: analysis of hardware support technologies for asymmetric cryptography of the Internet of Things; definition of secure procedures for asymmetric authentication of Internet of Things sites and their constituent elements: creation of certificates, verification of public and private keys. …”
Get full text
Article -
283
Construction and Application of Monitoring System for Green Tarpaulin Cover Net in Mega Cities
Published 2025-03-01“…This mode can not only optimize the performance of the model, but also promotes seamless integration between the model and actual operations, making monitoring work more efficient and flexible.ResultsThis research constructs a complete working system of “establishment − implementation − verification − monitoring”. Specifically, “establishment” represents the establishment of annual accounting data and the clarification of annual work tasks; “implementation” refers to the implementation and feedback of the work of uncovering the net and promoting green development, namely the work of uncovering the net of classified land parcels; “verification” refers to the verification of uncovered land parcels. …”
Get full text
Article -
284
Few-shot cybersecurity event detection method by data augmentation with prompting question answering
Published 2024-08-01“…The result showes that the proposed method’s substantial superiority in low-resource network security event detection tasks compared to other baseline methods.…”
Get full text
Article -
285
Guiding the security protection of critical information infrastructure with scientific network security concept
Published 2019-09-01“…In the current increasingly competitive international cyberspace security game,critical information infrastructure is facing a severe security situation.From the view of scientific principle,the essence of network security risk is the limitation of people’s cognitive logic of information science.It is impossible to build a solid network defense system,and it is not necessarily cost-effective from the view of economic benefits.In network security work,the most important thing is the convergence of security objectives.The key is to ensure that the logical combination of computing tasks is not tampered with or destroyed,and to achieve correct calculation.Focusing on this security goal,scientific and technological innovations were made in such aspects as logical correct verification theory,computing architecture and application mode of computing engineering.The problem that logical defects were not exploited by attackers was solved,a unity of offensive and defensive contradictions was formed,and the active immunity capability for information systems was established.…”
Get full text
Article -
286
An image processing technique for optimizing industrial defect detection using dehazing algorithms.
Published 2025-01-01“…Further research indicates that this method is not only applicable to industrial defect detection but can also be transferred to personnel localization and rescue tasks in fire and smoke environments. This study provides a novel technical approach for industrial defect detection in complex environments and offers valuable references for image processing and object detection tasks in other fields.…”
Get full text
Article -
287
Kinematics Analysis of a Novel Five-Degree-of-Freedom Spatial Parallel Micromanipulator
Published 2014-01-01“…The objective of this paper is the introduction of a structural and geometrical model of a novel five-degree-of-freedom spatial parallel micromanipulator, analysis of the effective and useful workspace of the micromechanism, presentation of the obtained analytical solutions of the microrobot’s inverse kinematics tasks, and verification of its correctness using selected computer programs and computation environments. …”
Get full text
Article -
288
Personal Security Checklist: A Comprehensive Approach to Digital Security
Published 2025-07-01“…The system categorizes tasks on three levels - essential, optional and advanced - areas such as authentication, safe navigation, messages, social media protection and safety of physical devices. …”
Get full text
Article -
289
A Study on Autonomous Control of Underwater Manipulator Autonomous Operation Based on Deep Reinforcement Learning
Published 2023-12-01“…Owing to the inherent complexities of underwater environments, coupled with restrictive observational angles, the precise operation of an underwater manipulator during autonomous tasks is a sizable undertaking. To tackle this issue, this paper proposes a method for autonomous control of an underwater manipulator, leveraging the robust adaptive capacity of reinforcement learning algorithms. …”
Get full text
Article -
290
Review of Automatic Estimation of Emotions in Speech
Published 2025-05-01“…As machine approaches to recognize emotion in speech often have much in common with other speech tasks, such as automatic speaker verification and speech recognition, we compare such processes. …”
Get full text
Article -
291
SPECIFIC PHYSICAL PREPARATION OF FEMALE STUDENTS FROM SPECIALIZED BASKETBALL GROUPS
Published 2021-11-01“…To solve the purpose and tasks of the study, the following methods of research are used: theoretical analysis, sports-pedagogical testing. …”
Get full text
Article -
292
The Effects of Topic Familiarity on Kurdish EFL Students’ Lexical Inference Skill
Published 2023-10-01“…They guessed the meanings of target words and completed an inference verification tasks to confirm or correct guesses and encourage deeper processing of target words. …”
Get full text
Article -
293
THE ORGANIZATION WORKS TO IMPROVE THE CLINICAL AND ECONOMIC OUTCOMES OF CARE FOR PROSTATE CANCER
Published 2015-04-01“…In case of identification of risk groups for prostate cancer, patients were sent to the urologist at the place of residence, which is conducting special examinations (FRA, ultrasound of the kidneys, bladder, TRUS, UFW), forming a risk group for verification of diagnosis. Then the patient is directed to the second stage of inter-regional urology center (ITC), whose task in the diagnostic phase is to verify the diagnosis. …”
Get full text
Article -
294
Leveraging human-AI collaboration to visualize age-related diabetes features using dataset
Published 2024-09-01“…It covers human-centric for code verification, while the generative AI is tasked with creating Python code for data visualization automatically. …”
Get full text
Article -
295
Customs post-audit: essence and legal regulation
Published 2023-09-01“…The classification of documentary verification is presented as one of the forms of using the customs post-audit. …”
Get full text
Article -
296
Digital-Based Recitation Method to Improve Senior High School Shiva Learning Achievement
Published 2025-04-01“…Data is collected through observation, interviews, and documentation, with analysis involving classification, data reduction, data presentation, and verification. The findings revealed that the design of digital-based reading methods includes selecting digital platforms, preparing interactive materials, assigning tasks based on themes, creating online discussion forums, and providing technical training for teachers and students. …”
Get full text
Article -
297
The Role of Performance-Based Allowances, Work Motivation, and Work Discipline on Employee Performance
Published 2024-12-01“…The research method used was descriptive verification analysis with a census/saturated sampling technique. …”
Get full text
Article -
298
Right-brain utilization in pharmacists' dispensing processes: an eye-tracking analysis of efficiency and safety using error-induction models
Published 2025-05-01“…Methods We created verification slides for display on a prescription monitor and three drug rack monitors. …”
Get full text
Article -
299
Online electric network capacity assesment
Published 2020-09-01“…Reliability of power supply to consumers and the efficient use of energy resources are priority tasks in the process of operational dispatch control of the energy system. …”
Get full text
Article -
300
Emotion-Recognition System for Smart Environments Using Acoustic Information (ERSSE)
Published 2024-10-01“…The implementation and verification of the tasks show a promising performance in the case study, with 80% accuracy in sound recognition, and its general behavior shows that it can contribute to improving the well-being of the people present in the environment.…”
Get full text
Article