Results 51 to 60 of about 83,370 (327)
Analysis of standing timber sales based on overall coniferous/broadleaved tree species ratio
The first competitive open tender called "Standing timber sale" was executed in 2010. The aim of the paper was to conduct complete collection of data from online tender catalogues and to analyze the data with respect to the coniferous/broadleaved ratio ...
S. Slanina+3 more
doaj +1 more source
Design and Implementation Web Site for UOT Using Mobile Devices [PDF]
A mobile phone allows its user to make and receive telephone calls to and from the public telephone network which includes other mobiles and fixed-line phones across the world.
Zahraa Abid AL-Huseen+3 more
doaj +1 more source
Lung adenocarcinoma (LUAD) is the most prevalent histotype of non‐small cell lung cancer. Abstract Background Lung adenocarcinoma (LUAD) is the most prevalent histotype of non‐small cell lung cancer. Anoikis, an alternative form of programmed cell death, plays a pivotal role in cancer invasion and metastasis, preventing the detached cancer cells from ...
Xiayao Diao, Chao Guo, Shanqing Li
wiley +1 more source
Sistem Informasi Akademik Berbasis SMS pada Jurusan Teknik Elektro UNTIRTA
Perlunya pelayanan sistem informasi akademik yang cepat dan mudah pada Jurusan Teknik Elektro UNTIRTA, sehingga dirancang sebuah sistem aplikasi untuk pengaksesan informasi akademik via SMS.
Irma Saraswati+2 more
doaj +1 more source
Hybrid storage engine for geospatial data using NoSQL and SQL paradigms
The design and implementation of services to handle geospatial data involves thinking about storage engine performance and optimization for the desired use.
José A. Herrera-Ramírez+2 more
doaj +1 more source
Towards Complex Text-to-SQL in Cross-Domain Database with Intermediate Representation [PDF]
We present a neural approach called IRNet for complex and cross-domain Text-to-SQL. IRNet aims to address two challenges: 1) the mismatch between intents expressed in natural language (NL) and the implementation details in SQL; 2) the challenge in ...
Jiaqi Guo+6 more
semanticscholar +1 more source
Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review
An SQL injection attack, usually occur when the attacker(s) modify, delete, read, and copy data from database servers and are among the most damaging of web application attacks.
Maha Alghawazi+2 more
semanticscholar +1 more source
CQR-SQL: Conversational Question Reformulation Enhanced Context-Dependent Text-to-SQL Parsers [PDF]
Context-dependent text-to-SQL is the task of translating multi-turn questions into database-related SQL queries. Existing methods typically focus on making full use of history context or previously predicted SQL for currently SQL parsing, while neglecting to explicitly comprehend the schema and conversational dependency, such as co-reference, ellipsis ...
arxiv
Illegal buildings (IBs) are a dramatic problem in developing countries due to the population explosion, but, at the same time, they represent an unsolved issue in several states usually called advanced (as, for instance, Italy).
Paolino Di Felice
doaj +1 more source