-
101
Risk-based approach to the certification of specialists in organizations operating hazardous production facility
Published 2018-09-01“…During many years of statistical observations, the causes of almost one third of all emergencies, accidents, incidents and accidents at hazardous production facilities are organizational measures directly related to the presence of the human factor. The main tasks of the state policy in the field of industrial safety are: improving the requirements, training programs, certification and verification of knowledge of managers and specialists of operating organizations; development and implementation of information technologies that enable interaction with operating organizations, to optimize the acquisition, storage and analysis of information on production control over observance of requirements of industrial safety, systems safety management; introduction of risk-based approach in the organization of Federal state control (supervision) in the field of industrial safety. …”
Get full text
Article -
102
Improvement of the mechanism for provision of housing subsidies in modern Ukraine
Published 2021-07-01Get full text
Article -
103
An integrated approach to library holdings: GOST R 7.0.93-2015 «Library fund. Forming technology»
Published 2016-09-01Get full text
Article -
104
Using artificial intelligence tools for automating the assessment of future computer science teachers' work
Published 2025-06-01“…The conducted research opens up new prospects for effective improvement of the verification of modified tasks performed by students and the generation of tests for verification. …”
Get full text
Article -
105
Intelligent Learning Support System
Published 2025-04-01“…Standard assessment systems (e.g., Moodle testing) are often limited to multiple choice, while the use of semantic analysis allows you to evaluate creative tasks and open-ended answers without manual verification by the teacher. …”
Get full text
Article -
106
Metric-based learning approach to botnet detection with small samples
Published 2023-10-01“…Botnets pose a great threat to the Internet, and early detection is crucial for maintaining cybersecurity.However, in the early stages of botnet discovery, obtaining a small number of labeled samples restricts the training of current detection models based on deep learning, leading to poor detection results.To address this issue, a botnet detection method called BT-RN, based on metric learning, was proposed for small sample backgrounds.The task-based meta-learning training strategy was used to optimize the model.The verification set was introduced into the task and the similarity between the verification sample and the training sample feature representation was measured to quickly accumulate experience, thereby reducing the model’s dependence on the labeled sample space.The feature-level attention mechanism was introduced.By calculating the attention coefficients of each dimension in the feature, the feature representation was re-integrated and the importance attention was assigned to optimize the feature representation, thereby reducing the feature sparseness of the deep neural network in small samples.The residual network design pattern was introduced, and the skip link was used to avoid the risk of model degradation and gradient disappearance caused by the deeper network after increasing the feature-level attention mechanism module.…”
Get full text
Article -
107
Development of working skills in graphic editors during the training of in the training of design and decoration works’ specialists
Published 2024-06-01“…The sequence of task at the lessons of practical training of design and decoration works’ specialists that develops image adjustment skills in graphic editors is demonstrated. …”
Get full text
Article -
108
A Novel Genetic Algorithm for Constrained Multimodal Multi-Objective Optimization Problems
Published 2025-06-01“…Additionally, three environmental selection strategies are designed to correspond to the different tasks in MTGA-CMMO. Extensive experimental verification demonstrates that MTGA-CMMO outperforms other comparative algorithms across multiple test instances and one practical application problem.…”
Get full text
Article -
109
A guide to evade hallucinations and maintain reliability when using large language models for medical research: a narrative review
Published 2025-06-01“…Meta-analyses of human-artificial intelligence collaboration experiments revealed that, although LLMs can augment individual human capabilities, they are most effective in specific contexts allowing human verification. Successful integration of LLMs in medical research requires careful tool selection aligned with task requirements and appropriate verification mechanisms. …”
Get full text
Article -
110
The privacy protection of the internet of vehicles resource transaction details based on blockchain.
Published 2025-01-01“…This resource sharing can get additional computing resources to complete the task, and can be more convenient to complete the computing task quickly. …”
Get full text
Article -
111
An extrinsic random-based ensemble approach for android malware detection
Published 2021-10-01“…In some of the relevant studies, there is substantial evidence that heterogeneous ensembles can provide very reliable solutions, better than any individual verification model. However, so far, there is no systematic study of examining the application of ensemble methods in this task. …”
Get full text
Article -
112
Noise-tolerant public-key quantum money from a classical oracle
Published 2025-04-01“…Quantum money is the task of verifying the validity of banknotes while ensuring that they cannot be counterfeited. …”
Get full text
Article -
113
The Effects of Presenting AI Uncertainty Information on Pharmacists’ Trust in Automated Pill Recognition Technology: Exploratory Mixed Subjects Study
Published 2025-02-01“…MethodsThirty licensed pharmacists in the United States performed a web-based simulated pill verification task to determine whether an image of a filled medication bottle matched a known reference image. …”
Get full text
Article -
114
Federated edge learning model based on multi-level proxy permissioned blockchain
Published 2024-04-01“…A hybrid strategy was devised to enhance model privacy using secret sharing and differential privacy. A federated task node selection algorithm based on reputation verification was devised to address the problem of zero or extremely poor credibility of edge clients. …”
Get full text
Article -
115
Federated edge learning model based on multi-level proxy permissioned blockchain
Published 2024-04-01“…A hybrid strategy was devised to enhance model privacy using secret sharing and differential privacy. A federated task node selection algorithm based on reputation verification was devised to address the problem of zero or extremely poor credibility of edge clients. …”
Get full text
Article -
116
Analisis Aspek Perkembangan Remaja terhadap Prokrastinasi Akademik Siswa di SMAN 92 Jakarta
Published 2024-10-01“…After gathering data from the field, the researcher will analyze it using an interactive model by Miles & Huberman, involving data reduction, data presentation, and drawing conclusions/verification. The results of this study indicate that respondents’ perspectives on delaying the start of tasks include (1) lack of understanding of the task; (2) intention to complete the task; and (3) underestimating the task. …”
Get full text
Article -
117
POSSIBILITIES OF USING STABLE ISOTOPES FOR IDENTIFICATION OF GEOGRAPHICAL ORIGIN OF MEAT AND MEAT PRODUCTS. A REVIEW
Published 2018-04-01“…of geographical origin of raw materials and animal-derived products to exclude a possibility of their falsification is quite a complex task, which requires searching for reliable criteria of identification that account for an effect of the geoclimatic and anthropogenic factors. …”
Get full text
Article -
118
Highly-entangled, highly-doped states that are efficiently cross-device verifiable
Published 2025-06-01“…We anticipate that these results could have applications in quantum cryptography and verification.…”
Get full text
Article -
119
Time-optimal trajectory planning for excavators operating arm based on SA-PSO algorithm
Published 2025-01-01“…ObjectiveIn view of the problems of unstable operation, low optimization efficiency and falling into local optimum when optimizing the operation trajectory with a single intelligent algorithm, this paper proposes to combine simulated annealing and particle swarm optimization (SA-PSO) to perform optimal time planning for the excavation task trajectory of the excavator operating arm.MethodsFirstly, in the D-H coordinate system, the mechanism diagram of the excavator operating arm is constructed to establish its kinematic model; secondly, the 4-3-3-3-4 piecewise polynomial is used for interpolation, and the SA-PSO algorithm is used to optimize the high-efficiency excavation task trajectory under the constraints of joint velocity and acceleration; finally, under the same operation task, the differential evolution algorithm (DE) and particle swarm optimization algorithm (PSO) are used in turn to obtain the time optimal trajectory.ResultsThe experimental results show that the optimal time trajectory obtained by the hybrid algorithm has shorter operation efficiency and the smallest impact, which can effectively reduce the wear of each joint hydraulic cylinder. …”
Get full text
Article -
120
Cooperation-based location authentication scheme for crowdsensing applications
Published 2022-09-01“…Utilizing mobile devices to collect location-related data in crowdsensing has the security problem of a location cheating attack.How to guarantee the quality of these sensitive data has become a challenge.In response to this, a location authentication scheme was proposed based on cooperation to detect malicious users who submit false locations.Firstly, users with mobile devices were used to generate location proofs for each other, and a location verification scheme was designed based on distance bounding protocols for obtaining new information by multiple collisions of the same random number, which ensured the user’s location should be unforgeable and achieved the purpose of improving the quality of collected data.In addition, a location proof cooperator select method based on region division and reputation model was proposed which effectively prevented collusion attack and solved the problem of concentration of equity.Meanwhile, the incentive mechanism based on reputation value and task completion time was designed to effectively improve the location proof cooperator efficiency of task completion.Finally, security analysis and performance evaluation indicate that the scheme has proved to be correctness and secure, and the advantages in computational cost and communication overhead.…”
Get full text
Article