Showing 281 - 300 results of 427 for search 'task verification', query time: 0.08s Refine Results
  1. 281

    STRATEGI KOMUNIKASI BIDANG INFORMASI DAN KOMUNIKASI PUBLIK DISKOMINFO GUNUNGKIDUL DALAM MERAIH PRESTASI DI MASA PANDEMI COVID-19 by Tianfe Putri Khatami, Pratiwi Wahyu Widiarti

    Published 2022-10-01
    “…Kata kunci: strategi komunikasi, prestasi, e-Lapor, pandemi COVID-19 Abstract This study aims to determine: 1) the communication strategy of IKP Diskominfo Gunungkidul Sector in carrying out organizational tasks related to managing public service complaints that can achieve achievements during the COVID-19 pandemic, 2) supporting aspects and inhibitions of the successful of the communication strategy. …”
    Get full text
    Article
  2. 282

    HARDWARE SUPPORT PROCEDURES FOR ASYMMETRIC AUTHENTICATION OF THE INTERNET OF THINGS by Петро Сергійович Клімушин, Тетяна Миколаївна Соляник, Олександр Олександрович Можаєв, Віталій Вікторович Носов, Тетяна Петрівна Колісник, Василь Вікторович Янов

    Published 2021-12-01
    “…The article solves the following tasks: analysis of hardware support technologies for asymmetric cryptography of the Internet of Things; definition of secure procedures for asymmetric authentication of Internet of Things sites and their constituent elements: creation of certificates, verification of public and private keys. …”
    Get full text
    Article
  3. 283

    Construction and Application of Monitoring System for Green Tarpaulin Cover Net in Mega Cities by Yang SUN, Dawei GAO, Haoye JIANG, Wanguang DU

    Published 2025-03-01
    “…This mode can not only optimize the performance of the model, but also promotes seamless integration between the model and actual operations, making monitoring work more efficient and flexible.ResultsThis research constructs a complete working system of “establishment − implementation − verification − monitoring”. Specifically, “establishment” represents the establishment of annual accounting data and the clarification of annual work tasks; “implementation” refers to the implementation and feedback of the work of uncovering the net and promoting green development, namely the work of uncovering the net of classified land parcels; “verification” refers to the verification of uncovered land parcels. …”
    Get full text
    Article
  4. 284

    Few-shot cybersecurity event detection method by data augmentation with prompting question answering by TANG Mengmeng, GUO Yuanbo, ZHANG Han, BAI Qingchun, CHEN Qingli, ZHANG Bowen

    Published 2024-08-01
    “…The result showes that the proposed method’s substantial superiority in low-resource network security event detection tasks compared to other baseline methods.…”
    Get full text
    Article
  5. 285

    Guiding the security protection of critical information infrastructure with scientific network security concept by Yangzhao LI, Changxiang SHEN, Nan TIAN

    Published 2019-09-01
    “…In the current increasingly competitive international cyberspace security game,critical information infrastructure is facing a severe security situation.From the view of scientific principle,the essence of network security risk is the limitation of people’s cognitive logic of information science.It is impossible to build a solid network defense system,and it is not necessarily cost-effective from the view of economic benefits.In network security work,the most important thing is the convergence of security objectives.The key is to ensure that the logical combination of computing tasks is not tampered with or destroyed,and to achieve correct calculation.Focusing on this security goal,scientific and technological innovations were made in such aspects as logical correct verification theory,computing architecture and application mode of computing engineering.The problem that logical defects were not exploited by attackers was solved,a unity of offensive and defensive contradictions was formed,and the active immunity capability for information systems was established.…”
    Get full text
    Article
  6. 286

    An image processing technique for optimizing industrial defect detection using dehazing algorithms. by Xuanyi Zhao, Xiaohan Dou, Gengpei Zhang

    Published 2025-01-01
    “…Further research indicates that this method is not only applicable to industrial defect detection but can also be transferred to personnel localization and rescue tasks in fire and smoke environments. This study provides a novel technical approach for industrial defect detection in complex environments and offers valuable references for image processing and object detection tasks in other fields.…”
    Get full text
    Article
  7. 287

    Kinematics Analysis of a Novel Five-Degree-of-Freedom Spatial Parallel Micromanipulator by Daniel Prusak, Konrad Kobus, Grzegorz Karpiel

    Published 2014-01-01
    “…The objective of this paper is the introduction of a structural and geometrical model of a novel five-degree-of-freedom spatial parallel micromanipulator, analysis of the effective and useful workspace of the micromechanism, presentation of the obtained analytical solutions of the microrobot’s inverse kinematics tasks, and verification of its correctness using selected computer programs and computation environments. …”
    Get full text
    Article
  8. 288

    Personal Security Checklist: A Comprehensive Approach to Digital Security by Hitesh Choudhary, Navish Ansari, Shraddha Shivaji Sandimani

    Published 2025-07-01
    “…The system categorizes tasks on three levels - essential, optional and advanced - areas such as authentication, safe navigation, messages, social media protection and safety of physical devices. …”
    Get full text
    Article
  9. 289

    A Study on Autonomous Control of Underwater Manipulator Autonomous Operation Based on Deep Reinforcement Learning by LI Xinyang, LU Nibin, LYU Shiwei, LIU Hairui

    Published 2023-12-01
    “…Owing to the inherent complexities of underwater environments, coupled with restrictive observational angles, the precise operation of an underwater manipulator during autonomous tasks is a sizable undertaking. To tackle this issue, this paper proposes a method for autonomous control of an underwater manipulator, leveraging the robust adaptive capacity of reinforcement learning algorithms. …”
    Get full text
    Article
  10. 290

    Review of Automatic Estimation of Emotions in Speech by Douglas O’Shaughnessy

    Published 2025-05-01
    “…As machine approaches to recognize emotion in speech often have much in common with other speech tasks, such as automatic speaker verification and speech recognition, we compare such processes. …”
    Get full text
    Article
  11. 291

    SPECIFIC PHYSICAL PREPARATION OF FEMALE STUDENTS FROM SPECIALIZED BASKETBALL GROUPS by L. Kasabova

    Published 2021-11-01
    “…To solve the purpose and tasks of the study, the following methods of research are used: theoretical analysis, sports-pedagogical testing. …”
    Get full text
    Article
  12. 292

    The Effects of Topic Familiarity on Kurdish EFL Students’ Lexical Inference Skill by Zheen Hamad Amin Abdullah, Nada Jabbar Abbas

    Published 2023-10-01
    “…They guessed the meanings of target words and completed an inference verification tasks to confirm or correct guesses and encourage deeper processing of target words. …”
    Get full text
    Article
  13. 293

    THE ORGANIZATION WORKS TO IMPROVE THE CLINICAL AND ECONOMIC OUTCOMES OF CARE FOR PROSTATE CANCER by O. I. Apolikhin, A. V. Sivkov, I. V. Chernishov, M. I. Katibov, O. V. Zolotukhin, I. A. Shaderkin, S. A. Leonov, D. A. Vojtko, M. Y. Prosyannikov

    Published 2015-04-01
    “…In case of identification of risk groups for prostate cancer, patients were sent to the urologist at the place of residence, which is conducting special examinations (FRA, ultrasound of the kidneys, bladder, TRUS, UFW), forming a risk group for verification of diagnosis. Then the patient is directed to the second stage of inter-regional urology center (ITC), whose task in the diagnostic phase is to verify the diagnosis.    …”
    Get full text
    Article
  14. 294

    Leveraging human-AI collaboration to visualize age-related diabetes features using dataset by Yoshiyasu Takefuji

    Published 2024-09-01
    “…It covers human-centric for code verification, while the generative AI is tasked with creating Python code for data visualization automatically. …”
    Get full text
    Article
  15. 295

    Customs post-audit: essence and legal regulation by I.M., K.E.

    Published 2023-09-01
    “…The classification of documentary verification is presented as one of the forms of using the customs post-audit. …”
    Get full text
    Article
  16. 296

    Digital-Based Recitation Method to Improve Senior High School Shiva Learning Achievement by Yusfira Yusfira, Raya Mangsi

    Published 2025-04-01
    “…Data is collected through observation, interviews, and documentation, with analysis involving classification, data reduction, data presentation, and verification. The findings revealed that the design of digital-based reading methods includes selecting digital platforms, preparing interactive materials, assigning tasks based on themes, creating online discussion forums, and providing technical training for teachers and students. …”
    Get full text
    Article
  17. 297

    The Role of Performance-Based Allowances, Work Motivation, and Work Discipline on Employee Performance by Nji Raden Laila Mahmudah, Sri Astuti Pratminingsih

    Published 2024-12-01
    “…The research method used was descriptive verification analysis with a census/saturated sampling technique. …”
    Get full text
    Article
  18. 298
  19. 299

    Online electric network capacity assesment by A. I. Motovilov, I. I. Solovejev

    Published 2020-09-01
    “…Reliability of power supply to consumers and the efficient use of energy resources are priority tasks in the process of operational dispatch control of the energy system. …”
    Get full text
    Article
  20. 300

    Emotion-Recognition System for Smart Environments Using Acoustic Information (ERSSE) by Gabriela Santiago, Jose Aguilar, Rodrigo García

    Published 2024-10-01
    “…The implementation and verification of the tasks show a promising performance in the case study, with 80% accuracy in sound recognition, and its general behavior shows that it can contribute to improving the well-being of the people present in the environment.…”
    Get full text
    Article