Showing 141 - 160 results of 241 for search '"resource location"', query time: 0.22s Refine Results
  1. 141

    A Focused Event Crawler with Temporal Intent by Hao Wu, Dongyang Hou

    Published 2023-03-01
    “…The crawler incorporates the start time of the event into the similarity calculation module, and a new URL (Uniform Resource Locator) priority assignment method is developed using the quantified temporal distribution of temporal intent as the independent variable of a natural exponential function. …”
    Get full text
    Article
  2. 142

    Tratamento farmacológico da obesidade em páginas da Internet brasileira: análise dos Critérios Técnicos de Qualidade by E.V. Silva, L.L.C. Castro, R. Cymrot

    Published 2008-05-01
    “…Após eliminação de determinadas Uniform Resource Locators (URL), conforme os critérios de exclusão, aplicou-se um instrumento, elaborado pelos autores e fundamentado em revisão bibliográfica, para verificar a presença de Critérios Técnicos de Qualidade (CTQ). …”
    Get full text
    Article
  3. 143

    PEMANFAATAN SUMBERDAYA PERIKANAN BERBASIS KEARIFAN LOKAL DI WILAYAH PESISIR KABUPATEN KUTAI TIMUR by JULIANI JULIANI

    Published 2016-11-01
    “…Various forms of local wisdom includes beliefs and taboos when performing catch activities, ethics and rules on fishing activities, techniques and technologies applied catchs, as well as the practices and traditions of management and use of natural resources. Location of the study was 7 districts in the coastal area of East Kutai Regency has a fairly large fishery potential fishery households with large amounts of which are Teluk Pandan, South Sangatta, North Sangatta, Bengalon, Kaliorang Sangkulirang and Sandaran. …”
    Get full text
    Article
  4. 144

    Detection of Fake News on COVID-19 on Web Search Engines by Valeria Mazzeo, Andrea Rapisarda, Andrea Rapisarda, Andrea Rapisarda, Giovanni Giuffrida

    Published 2021-06-01
    “…By extracting lexical and host-based features of associated uniform resource locators (URLs) for news articles, we show that the proposed methods, so common in phishing and malicious URL detection, can improve the efficiency and performance of classifiers. …”
    Get full text
    Article
  5. 145

    Analysis of water leakage in the Daugyvenė river basin (Mūša tributary) by Asta Lukauskienė, Vaidas Bondzinskas, Violeta Petraškienė

    Published 2022-10-01
    “…One of the most important treasures of Lithuania is the water resources located in the territory of the country. The article analyses water resources within the basin of Daugyvenė river, tributary of Mūša. …”
    Get full text
    Article
  6. 146

    Building an Effective Classifier for Phishing Web Pages Detection: A Quantum-Inspired Biomimetic Paradigm Suitable for Big Data Analytics of Cyber Attacks by Saad M. Darwish, Dheyauldeen A. Farhan, Adel A. Elzoghabi

    Published 2023-05-01
    “…The use of the Hadoop framework and a hybrid machine learning approach (K-mean and QABC) to deal with the large size of uniform resource locator (URL) data is one of the main contributions of this paper. …”
    Get full text
    Article
  7. 147

    International Petroleum Fiscal Regimes: Trends in Tax-Royalty Worldwide and in Romania by MARIANA PAPATULICĂ

    Published 2014-05-01
    “…“Resource nationalism” is a cyclical phenomenon whereby governments assert varying degrees of control over natural resources located within their territories, in an attempt to maximise revenue generation from their national resources. …”
    Get full text
    Article
  8. 148

    Malicious Domain Names Detection Algorithm Based on Lexical Analysis and Feature Quantification by Hong Zhao, Zhaobin Chang, Weijie Wang, Xiangyan Zeng

    Published 2019-01-01
    “…The first phase checks an observed domain name against a blacklist of known malicious uniform resource locator (URLs). The observed domain name is classified as being definitely malicious or potentially malicious based on its edit distances to the domain names on the blacklist. …”
    Get full text
    Article
  9. 149

    PDGAN: Phishing Detection With Generative Adversarial Networks by Saad Al-Ahmadi, Afrah Alotaibi, Omar Alsaleh

    Published 2022-01-01
    “…This paper proposes a phishing detection model called PDGAN that depends only on a website’s uniform resource locator (URL) to achieve reliable performance. …”
    Get full text
    Article
  10. 150

    Exploring the Spatio-Temporal Dynamics of Development of Specialized Agricultural Villages in the Underdeveloped Region of China by Ning Niu, Xiaojian Li, Li Li

    Published 2021-07-01
    “…Eleven indicators described the geographic factors in five categories: terrains, resources, locations, markets, and economy. The results showed that the spatial pattern of DSAVs was from relatively uneven in the early formation to significantly clustering in the development period of SAVs. …”
    Get full text
    Article
  11. 151

    Human capabilities of South African parents who have children with developmental disabilities by Lumka Magidigidi, Nicolette V. Roman, Inge K. Sonn

    Published 2023-06-01
    “…Contribution: The study contains helpful information about families of children with DD in under-resourced locations. The information may be of significance to policymakers who are accountable for designing and executing policies that are targeted at assisting parents or caregivers of children with DD.…”
    Get full text
    Article
  12. 152

    Multi-Point Media Content Sharing Scheme in Internet of Things Networks by Byung Moo Lee

    Published 2018-01-01
    “…Among them, the content redirection in which a sink pulls the content from a cloud server based on universal resource locator information received from a source is a very promising technology in terms of resource usage. …”
    Get full text
    Article
  13. 153

    A Link Network Analysis of Iranian Research Institute Websites: Overt and Covert Relationships by Zahra Noroozi, Mohammad Javad Hashemzadeh

    Published 2014-03-01
    “…The analysis of Uniform Resource Locators (URLs) of in-links and out-links of Iranian research institute websites showed that the maximum number of in-link to these websites was reserved for the domains .ir and .com. …”
    Get full text
    Article
  14. 154

    PathMarker: protecting web contents against inside crawlers by Shengye Wan, Yue Li, Kun Sun

    Published 2019-02-01
    “…By adding a marker to each Uniform Resource Locator (URL), we can trace the page that leads to the access of this URL and the user identity who accesses this URL. …”
    Get full text
    Article
  15. 155

    Attrition of Canadian Internet pharmacy websites: what are the implications? by Veronin MA, Clancy KM

    Published 2013-08-01
    “…Methods: In February to March 2006, 117 distinct, fully functional "Canadian Internet pharmacy" websites were located using the advanced search options of Google and the uniform resource locator (URL) for each website was recorded. To determine website attrition, each of the 117 websites obtained and recorded from the previous study was revisited at two later periods of time within a 4-year period. …”
    Get full text
    Article
  16. 156

    Comparative Performance Evaluation of Syntax Structure of Digital Identifier Systems by Hamid Reza Khedmatgozar, Mehdi Alipour-Hafezi

    Published 2019-12-01
    “…According to the findings, DOI (Digital object Identifier) and UCI (Universal Content Identifier) have a robust performance in their syntax structure and Handle, ARK (Archival Resource Key), URN (Uniform Resource Name) and PURL (Persistent Uniform Resource Locator) systems have mediocre performance in this component. …”
    Get full text
    Article
  17. 157

    The effectiveness of url features on phishing emails classification using machine learning approach by Ahmad Fadhil Naswir, Lailatul Qadri Zakaria, Saidah Saad

    Published 2022
    “…Feature selection is one of the essential parts of getting a good classification result, commonly used features are header, body, and Uniform Resource Locator (URL). Besides the email body text content, the URL is one of the leading indicators that the phishing attack successfully happened. …”
    Get full text
    Article
  18. 158

    An effective security alert mechanism for real-time phishing tweet detection on twitter by Mohd Sani, Nor Fazlida, Sharum, Mohd Yunus, Yaakob, Razali, Abdullah@Selimun, Mohd Taufik, Liew, Seow Wooi

    Published 2019
    “…As such, the effectiveness of security alert to prompt Twitter users for the tweet containing phishing Uniform Resource Locator (URL) in real-time is crucial. Many solutions have been proposed but their effectiveness are inadequate and doubtful. …”
    Get full text
    Article
  19. 159

    Evaluating the reliability and readability of online information on osteoporosis by Ozan Volkan Yurdakul, Mehmet Serkan Kilicoglu, Fatih Bagcier

    Published 2020-11-01
    “…We evaluated the first 200 uniform resource locators (URLs) in the query results regarding typology, the Journal of the American Medical Association (JAMA) scores, Health on the Net Foundation Code of conduct (HONcode) certification, Flesch–Kincaid Grade (FKG), and Simple Measure of Gobbledygook (SMOG) scores. …”
    Get full text
    Article
  20. 160

    Sistem Penampil Informasi Koleksi Tanaman berbasis QR Code di Green House Biologi Universitas Muhammadiyah Surakarta by Wisnu Wahyu Aji, Heru Supriyono

    Published 2019-10-01
    “…Sistem ini menggunakan pemindai smartphone untuk membaca QR Code yang berisi alamat Uniform Resource Locator (URL) dan dialihkan kealamat tersebut. …”
    Get full text
    Article