To see the other types of publications on this topic, follow the link: : Friendly URLs.

Journal articles on the topic ': Friendly URLs'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic ': Friendly URLs.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Apoorva, Ganapathy, Al Ayub Ahmed Alim, and Nur-E.-Alam Siddique Md. "Easy URLs in the Content Management System with Crawlers for Added Security." Academy of Marketing Studies Journal 25, no. 4 (2021): 1–10. https://doi.org/10.5281/zenodo.5002946.

Full text
Abstract:
Websites are becoming busier by the hour, and URL is what differentiates a single one from the rest. Additionally, a record of bootlickers would require metadata of the page to give classification. This study is aimed at describing the role of friendly URLs in the content management system (CMS) and the power of global ranking with added security. Some selected scientific databases to discover a piece of literature about URLs (search engine optimization) in the content management system and global ranking with crawler with added safety was searched in order to achieve the objective of this stu
APA, Harvard, Vancouver, ISO, and other styles
2

P. V. Kishore Kumar, K. vamsi, J. manasa, S. D V Swaroop, and V. gayatri. "Digital Fortress - Web Application Malware Detection." International Research Journal on Advanced Engineering and Management (IRJAEM) 6, no. 07 (2024): 2307–11. http://dx.doi.org/10.47392/irjaem.2024.0334.

Full text
Abstract:
Currently, the risk of network information insecurity is increasing rapidly in number and level of danger. The method mostly used by hackers today is to attack end to end technology and exploit human vulnerabilities. These techniques include social engineering, phishing, pharming, etc. one of the steps in conducting these attacks is to deceive users with malicious Uniform Resource Locators (URLs). As results, malicious URL detection is of great interest nowadays. there have been several scientific studies showing a number of methods to detect malicious URLs based on machine learning and deep l
APA, Harvard, Vancouver, ISO, and other styles
3

Vijaykumar. "Automated Phishing Detection Through URL Analysis and Machine Learning." Communications on Applied Nonlinear Analysis 32, no. 6s (2025): 151–59. https://doi.org/10.52783/cana.v32.3282.

Full text
Abstract:
Phishing attacks are categorized as one of the greatest threats to cybersecurity. Threat, which is misinformation to make the user provide important and personal information via fake websites or emails. This paper also realizes the notion of a machine phishing detection-based learning tool aimed at classifying URLs they designated as ”phishing”, ”suspicious,” or ”safe.” Utilizing a Random Forest classifier, the system examines URL-based characteristics inclusive of URL. length, special symbols, and the usage of HTTPs to distinguish between real URLs and fake ones (or phishing URLs) with high a
APA, Harvard, Vancouver, ISO, and other styles
4

Vedav, K. S., Nayak U. Koushik, Mukesh A, V. Karthik, and Patil Soumya. "Fake URL Detection Using Machine Learning and Deep Learning." International Journal of Innovative Science and Research Technology 7, no. 12 (2023): 1198–205. https://doi.org/10.5281/zenodo.7511267.

Full text
Abstract:
The risk of network information insecurity is growing rapidly in number and level of risk is very high. The methods mostly used by hackers today is to attack whole system and exploit human vulnerabilities. These techniques include social engineering, phishing, pharming, etc. One of the steps in conducting these attacks is to deceive users with fake Uniform Resource Locators (URLs). As a result, fake URL detection is of great interest nowadays. There have been several scientific studies showing a number of methods to detect malicious URLs based on machine learning and deep learning techniques.
APA, Harvard, Vancouver, ISO, and other styles
5

Mrs, Varshini J., B. Nidhiswar, L. Ravikrishna, S. Rohith, and Babu S. Yashwanth. "Website Phishing Detector." Research and Reviews: Advancement in Cyber Security 2, no. 3 (2025): 33–38. https://doi.org/10.5281/zenodo.15583261.

Full text
Abstract:
<em>Phishing attempts are still one of the most popular techniques to deceive customers and steal personal information, especially with the significant increase in cyberthreats. This project provides a browser extension-based phishing detection solution to increase user security when using the internet. The plugin continuously examines and assesses website URLs, data, and content to identify any phishing attempts. It makes use of databases of blocked URLs, machine learning techniques, and heuristic criteria to accurately identify questionable websites. When a threat is detected, users receive
APA, Harvard, Vancouver, ISO, and other styles
6

M, Prof Chethana R. "AI Based Web Approach System for Detecting Malicious URLs and Preventing Cyber Fraud." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 6042–50. https://doi.org/10.22214/ijraset.2025.69772.

Full text
Abstract:
Abstract: Describehowadvancesindeeplearning,especially As the internet becomes more essential in our daily lives, cyber fraud— especially through harmful links—has become a serious issue. This project introduces a smart, web-based system that detects and classifies dangerous URLs in real time, such as phishing, malware, or defacement links. It uses machine learning models trained on a mix of safe and harmful URLs by analyzing features like link structure, special characters, and keywords. Built using Flask, the system provides a simple interface where users can check URLs. It also includes a f
APA, Harvard, Vancouver, ISO, and other styles
7

Rao, R. Chinna, Khadeer Shaik, Khaja Babu Shaik, and Sargam Ritesh. "Malicious Uniform Resource Locator Detection." International Journal of Scientific Methods in Intelligence Engineering Networks 02, no. 03 (2024): 01–08. http://dx.doi.org/10.58599/ijsmien.2024.2301.

Full text
Abstract:
This paper introduces the escalating risk of network information insecurity, driven by hackers’ tactics such as exploiting end-to-end technology and human vulnerabilities like social engineering, phishing, and pharming. A common strategy in these attacks involves deceiving users with malicious Uniform Resource Locators (URLs), prompting a critical need for effective malicious URL detection methods. Recent scientific studies have explored various machine learning and deep learning approaches for this purpose. Our paper presents a novel method for detecting malicious URLs, leveraging machine lea
APA, Harvard, Vancouver, ISO, and other styles
8

Macumber, Russ, and Venkata Durga Eswar Pagadala. "Google, SEO and helpful content: How artificial intelligence can be helpful for e-commerce websites." Journal of Digital & Social Media Marketing 12, no. 3 (2024): 206. https://doi.org/10.69554/rjuw9313.

Full text
Abstract:
This paper explores the impact of artificial intelligence (AI) on search engine optimisation (SEO) practices within a marketing agency setting, with a particular focus on quality, topical authority and relevance over quantity. By leveraging AI-powered content creation tools, the study explores the effectiveness of generating various SEO elements for enhancing the visibility and ranking of product pages. Using models such as OpenAI’s text-davinci-003, the study demonstrates the generation of SEO elements tailored to specific product details, brand names and website URLs. Through examples of fit
APA, Harvard, Vancouver, ISO, and other styles
9

Verma, Alok Kumar, and Dr Saranya V. "Rent-a-Read: A Secure, Cloud-Powered eBook Rental." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–9. https://doi.org/10.55041/ijsrem40279.

Full text
Abstract:
Rent-a-Read is a secure, cloud-based eBook rental system designed to make books more accessible and affordable through a real-time rental platform. This paper presents a robust web-based solution that allows users to rent eBooks for a limited time, ensuring seamless access while preventing downloads. The platform is powered by Amazon Web Services (AWS) for secure storage, MongoDB for data management, and Flask with JWT authentication for backend services. The system implements fine-grained access control using signed URLs to provide time-limited access to rented content. Furthermore, MongoDB s
APA, Harvard, Vancouver, ISO, and other styles
10

Ganapathy, Apoorva. "Friendly URLs in the CMS and Power of Global Ranking with Crawlers with Added Security." Engineering International 5, no. 2 (2017): 87–96. http://dx.doi.org/10.18034/ei.v5i2.541.

Full text
Abstract:
The web space has the capacity for constant evolution in a dynamic world like ours; hence keeping up to date with the amounts of data that keeps trickling into its space per second requires an apt introspection of the fundamental tool designed for such task. The URL is saddled with the duty to safe keep most of the informational resources. So a functional and reliable one always gives users reasons to bookmark and return to it on a future date. This very writes up gave an in-depth definition of what a URL entails and the appropriate way of using it, which we argued should be: precise, comprehe
APA, Harvard, Vancouver, ISO, and other styles
11

Kumar, Narendra, Vikas Goel, Raju Ranjan, Majid Altuwairiqi, Hashem Alyami, and Simon Atuah Asakipaam. "A Blockchain-Oriented Framework for Cloud-Assisted System to Countermeasure Phishing for Establishing Secure Smart City." Security and Communication Networks 2023 (April 21, 2023): 1–13. http://dx.doi.org/10.1155/2023/8168075.

Full text
Abstract:
The information that is saved in the cloud about users is protected by a number of different safeguards in order to facilitate the development of smart cities. Phishing and other forms of social engineering are two examples of misleading tactics that may be used by hostile actors to get sensitive information about users. Phishing is still the first step of a multistage assault, despite the significant technological advancements that have been made to it in recent years. Phishing kits have evolved to become attack tools that are much simpler, more user-friendly, and more readily available as ti
APA, Harvard, Vancouver, ISO, and other styles
12

Aruna, Ms M. G., Maheswari V, and Pranethaa M. "A WEB APPLICATION FOR REAL-TIME PHISHING WEBSITE DETECTION." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 07, no. 10 (2023): 1–11. http://dx.doi.org/10.55041/ijsrem26477.

Full text
Abstract:
The rapid proliferation of the internet has led to an alarming increase in cyber threats, particularly phishing attacks. Phishing websites impersonate legitimate ones, luring users into divulging sensitive information such as login credentials and financial details. Detecting and preventing such attacks are crucial for safeguarding user privacy and security. This paper presents the development of a web application for real-time phishing website detection. The application employs machine learning techniques, specifically the XGBoost algorithm, to analyze the characteristics of URLs and classify
APA, Harvard, Vancouver, ISO, and other styles
13

Manjula R, Dr. "Rent-a-Read: A Secure, Cloud-Powered eBook Rental System with Real-Time Access and Integrated Payments." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem46172.

Full text
Abstract:
Abstract — Rent-a-Read is a cloud-powered eBook rental system that aims to enhance accessibility and affordability of books via a real-time rental platform. This paper introduces a solid web-based solution that enables users to rent eBooks for a specific period, ensuring easy access while blocking downloads. The platform uses Amazon Web Services (AWS) for secure storage, MongoDB for managing data, and Flask with JWT authentication for the backend services. The system uses signed URLs to create fine-grained access control, allowing for time-limited access to rented content. Additionally, MongoD
APA, Harvard, Vancouver, ISO, and other styles
14

Ramya, M., S. Prakash, and D. Tamilselvam. "CREATING A WEB APPLICATION AND ELEVATE LEARNING QUIZ." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 07 (2024): 1–8. http://dx.doi.org/10.55041/ijsrem36815.

Full text
Abstract:
This project aims to develop the implementation of a quiz web application using the Django framework, aimed at providing an intuitive and efficient platform for conducting quizzes online. The project focuses on creating a user-friendly interface for both quiz creators and participants, incorporating features such as user authentication, quiz creation, real- time quiz taking, and performance analytics. Utilizing Django's powerful tools and libraries, the application offers seamless integration of components like views, templates, models, and URLs, ensuring scalability, flexibility, and security
APA, Harvard, Vancouver, ISO, and other styles
15

NAGARAJU, DR V. SIVA, S. Sujan Reddy, and B. Vivekananda Reddy. "Online Library Management System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–7. https://doi.org/10.55041/ijsrem39858.

Full text
Abstract:
The Online Library Management System (OLMS) is a digital solution designed to manage and organize library resources efficiently. It allows users, including lecturers, students, and college management, to easily store and access book information such as title, author, edition, ISBN, and publication date. The system includes features to track reading progress, mark books as "read," save favorites, and provide URLs for additional details.Developed using SQLite for database management and SQLAlchemy for seamless ORM integration, the system ensures data consistency and scalability. The platform sim
APA, Harvard, Vancouver, ISO, and other styles
16

Ahna, R., Ameena Nowshad, S. Fousiya, Marwa, Anisha Thomas, and G. S. Anju. "Deep Neural Architecture for Phishing Website Identification." International Journal of Recent Advances in Multidisciplinary Topics 5, no. 5 (2024): 63–66. https://doi.org/10.5281/zenodo.11192819.

Full text
Abstract:
Phishing attacks remain a prevalent threat in the digital age, tricking users into surrendering sensitive information through fraudulent websites. Expand more Traditional machine learning approaches for phishing detection often rely on manually extracted features, which can be time-consuming and ineffective against evolving attack strategies. This paper proposes a novel deep learning framework for real-time phishing website detection utilizing Convolutional Neural Networks (CNNs) and Bidirectional Long Short-Term Memory (BiLSTM) networks. Expand more by leveraging the strengths of CNNs in feat
APA, Harvard, Vancouver, ISO, and other styles
17

Li, Qilin, Yincong Zhou, Yingmin Jiao, et al. "DaTo: an atlas of biological databases and tools." Journal of Integrative Bioinformatics 13, no. 4 (2016): 30–38. http://dx.doi.org/10.1515/jib-2016-297.

Full text
Abstract:
Summary This work presents DaTo, a semi-automatically generated world atlas of biological databases and tools. It extracts raw information from all PubMed articles which contain exact URLs in their abstract section, followed by a manual curation of the abstract and the URL accessibility. DaTo features a user-friendly query interface, providing extensible URL-related annotations, such as the status, the location and the country of the URL. A graphical interaction network browser has also been integrated into the DaTo web interface to facilitate exploration of the relationship between different
APA, Harvard, Vancouver, ISO, and other styles
18

Fridman, Ilona, Dahlia Boyles, Ria Chheda, Carrie Baldwin-SoRelle, Angela B. Smith, and Jennifer Elston Lafata. "Identifying Misinformation About Unproven Cancer Treatments on Social Media Using User-Friendly Linguistic Characteristics: Content Analysis." JMIR Infodemiology 5 (February 12, 2025): e62703. https://doi.org/10.2196/62703.

Full text
Abstract:
Background Health misinformation, prevalent in social media, poses a significant threat to individuals, particularly those dealing with serious illnesses such as cancer. The current recommendations for users on how to avoid cancer misinformation are challenging because they require users to have research skills. Objective This study addresses this problem by identifying user-friendly characteristics of misinformation that could be easily observed by users to help them flag misinformation on social media. Methods Using a structured review of the literature on algorithmic misinformation detectio
APA, Harvard, Vancouver, ISO, and other styles
19

Krishna, Usha. "YouTube Comments Sentiments Analysis." International Journal for Research in Applied Science and Engineering Technology 13, no. 1 (2025): 875–80. https://doi.org/10.22214/ijraset.2025.66475.

Full text
Abstract:
It’s the YouTube Comments Sentiment Analysis Web Application, an advanced content tool for content creators that’s designed to analyze viewer response on social media, mostly on YouTube. Thistool helpsin the extraction process and subsequent analysis and classification of comments to give better insight into audience sentiment. The application utilizes the YouTube Data API to download particular video comments on their URLs. The application uses advanced techniques of Natural Language Processing to classify comments into three sentiment classes: positive, negative, and neutral. Results are det
APA, Harvard, Vancouver, ISO, and other styles
20

Dorai, D. Ramya. "AdaptixSummarizer: A Versatile Text Summarization Tool Adaptable to Roles and Styles." International Scientific Journal of Engineering and Management 04, no. 05 (2025): 1–7. https://doi.org/10.55041/isjem03474.

Full text
Abstract:
Abstract- Text summarization plays a pivotal role in Natural Language Processing (NLP), enabling efficient distillation of key information from extensive and diverse textual content. This paper introduces FlexiSummarizer, a modular, customizable summarization tool designed to accommodate multiple input types—including plain text, web URLs, image files, and PDFs—through an integrated and user-friendly interface. The system combines Optical Character Recognition (OCR) via EasyOCR, PDF parsing through PyMuPDF, and a large language model (LLM) accessed through a backend API currently under develop
APA, Harvard, Vancouver, ISO, and other styles
21

Narasani, Snehitha. "Synoptix Summarizer: A Role and Style Adaptive Text Summarization Tool with Multi-Input Support." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47724.

Full text
Abstract:
Abstract- Text summarization plays a pivotal role in Natural Language Processing (NLP), enabling efficient distillation of key information from extensive and diverse textual content. This paper introduces Synoptix Summarizer, a modular, customizable summarization tool designed to accommodate multiple input types—including plain text, web URLs, image files, and PDFs—through an integrated and user-friendly interface. The system combines Optical Character Recognition (OCR) via EasyOCR, PDF parsing through PyMuPDF, and a large language model (LLM) accessed through a backend API currently under dev
APA, Harvard, Vancouver, ISO, and other styles
22

Wahsheh, Heider A. M., and Flaminia L. Luccio. "Security and Privacy of QR Code Applications: A Comprehensive Study, General Guidelines and Solutions." Information 11, no. 4 (2020): 217. http://dx.doi.org/10.3390/info11040217.

Full text
Abstract:
The widespread use of smartphones is boosting the market take-up of dedicated applications and among them, barcode scanning applications. Several barcodes scanners are available but show security and privacy weaknesses. In this paper, we provide a comprehensive security and privacy analysis of 100 barcode scanner applications. According to our analysis, there are some apps that provide security services including checking URLs and adopting cryptographic solutions, and other apps that guarantee user privacy by supporting least privilege permission lists. However, there are also apps that deceiv
APA, Harvard, Vancouver, ISO, and other styles
23

Odeh, Najla, and Derar Eleyan. "Responsive Web Design Trend in Official Ministries and Government Institutions Websites in Palestine." مجلة جامعة فلسطين التقنية للأبحاث 10, no. 5 (2022): 18–33. http://dx.doi.org/10.53671/pturj.v11i1.236.

Full text
Abstract:
Websites compatibility with different browsers is quite necessary as modern technology evolves and more new devices are being invented. This paper aims at determining the application of the Responsive Web Design approach in the Palestinian ministries and governmental institutions. Thirty official websites in Palestine were evaluated and tested using Google DevTools, which is a testing environment that provides a quick and easy way to test websites on mobile devices and tablets, and the Google Mobile-Friendly Test Tool, which analyzes URLs and progress reports on a site's relevance for mobile u
APA, Harvard, Vancouver, ISO, and other styles
24

Kazeem Odutola. "Skeletal-based action recognition for medical condition detection using PoseConv3D." World Journal of Biology Pharmacy and Health Sciences 14, no. 2 (2023): 329–42. https://doi.org/10.30574/wjbphs.2023.14.2.0213.

Full text
Abstract:
Early detection of medical conditions is important for elderly people, as early diagnosis can save them from getting late help and swift intervention. In this work, we are interested in developing PoseConv3D, a novel design to address such challenges raised in traditional GCNs with apply skeletal based action recognition. GCNs are good at analyzing human joint movements, however, they fail at processing noisy pose estimations, being unscalable in recognizing a group of activities, and integrating other data types. To overcome this limitation, PoseConv3D represents 2D skeletal data with time st
APA, Harvard, Vancouver, ISO, and other styles
25

Kakarla, Deepti, and Devi S. M. Renuka. "An analytical approach to network with IoT security using NodeMCU access point-prevention technique." i-manager’s Journal on Electronics Engineering 14, no. 2 (2024): 1. http://dx.doi.org/10.26634/jele.14.2.20488.

Full text
Abstract:
This paper focuses on a very pertinent issue in the field of cybersecurity, particularly concerning the increased use of public Wi-Fi and the proliferation of IoT devices. The scenario, where an attacker captures user details through a malicious access point set up through a NodeMCU, is a practical illustration of a Man-in-the-Middle (MitM) attack. These attacks are especially concerning in the context of smart homes and smart cities, where security breaches can lead to severe privacy invasions and disruptions of essential services. The NodeMCU, being a low-cost, open-source IoT platform, is a
APA, Harvard, Vancouver, ISO, and other styles
26

Karthikeyan C, Mugilan M, Nithish S, Ranjithkumar S, and Abinesh M. "Phishing Attack Stimulation and Prevention Mechanism." International Research Journal on Advanced Engineering and Management (IRJAEM) 3, no. 04 (2025): 1029–34. https://doi.org/10.47392/irjaem.2025.0168.

Full text
Abstract:
Phishing attacks have become one of the most prevalent cyber security threats, exploiting social engineering techniques to deceive users into revealing sensitive information such as passwords, banking details, and personal data. Cybercriminals continuously refine their tactics, making traditional security measures like blacklists and rule-based filters less effective. To address this challenge, we propose a machine learning (ML)–based browser extension designed to detect and prevent phishing attempts in real-time. Initially developed for Google Chrome but adaptable to other browsers, the exten
APA, Harvard, Vancouver, ISO, and other styles
27

Arviola, Marife, Joseph Carl Matienzo, and Joy Peji. "Indang Konektayo Kiosk: An Interactive Menu System for Tourists." Journal of Innovative Technology Convergence 6, no. 3 (2024): 41–50. http://dx.doi.org/10.69478/jitc2024v6n3a05.

Full text
Abstract:
Every traveler wants to experience hassle-free and safe travel while maintaining an enjoyable journey with the help of user-friendly interfaces and an innovative technological menu system. An interactive information menu system that improves the traveler experience, commercial operations, and tourism information at the Municipality of Indang. It is a technological solution that is relevant to today's demand and interest, and that is readily available data sources and information, which benefit. Specifically, it possesses the following characteristics, including: (1) a place finder that provide
APA, Harvard, Vancouver, ISO, and other styles
28

Tafuto, Barbara, Riddhi Vyas, and Trish Pruis. "520 CTSA Search Solutions." Journal of Clinical and Translational Science 6, s1 (2022): 107–8. http://dx.doi.org/10.1017/cts.2022.314.

Full text
Abstract:
OBJECTIVES/GOALS: CTSA Search Solutions (https://ctsa-search.rutgers.edu/search/) is a database that allows users to systematically conduct structured searches among the 60+ CTSA hub websites for information related to NCATS goals and CTSA hub activities. It was created with the objective of providing a novel process to evaluating and benchmarking CTSA hubs. METHODS/STUDY POPULATION: The CTSA Search Solutions database is an information tool that includes structured search terms relating to 3 main CTSA categories: NCATS goals, CTSA activities, and COVID 19 information. Subcategories from these
APA, Harvard, Vancouver, ISO, and other styles
29

Kodityala, Prasanna Laxmi, Swathi Pamula, Ms.M.Mamatha, Sunder Mr.P.Shyam, Dr.K.Rajitha, and R. Mohan Krishna Mr. "AI-DRIVEN E-COMMERCE REVIEW ANALYSIS USING BERT ALGORITHM." Journal of Advancement in Software Engineering and Testing 8, no. 2 (2025): 31–39. https://doi.org/10.5281/zenodo.15573002.

Full text
Abstract:
<em>&nbsp;This project is designed to provide users with meaningful insights from customer feedback by analyzing reviews collected from popular e-commerce platforms like Amazon and Flipkart. It allows users to input product URLs, from which reviews are automatically extracted using robust web scraping techniques. These techniques are implemented using tools like Selenium and BeautifulSoup to handle dynamic content and retrieve multiple pages of reviews effectively.</em> <em>Once the reviews are collected, the backend processes those using advanced Natural Language Processing (NLP) techniques.
APA, Harvard, Vancouver, ISO, and other styles
30

Laguna Galindo, Selene, and Celso Valdez Vargas. "El Concurso entre Camaradas 1926-1927: rumbo a nuevas formas de habitar en la URSS." TEMPORÁNEA. Revista de Historia de la Arquitectura, no. 5 (2024): 82–113. https://doi.org/10.12795/temporanea.2024.05.03.

Full text
Abstract:
El Concurso Amistoso entre Camaradas de 1926-1927, fue convocado por la Asociación de Arquitectos Contemporáneos (OSA) para contribuir a solucionar las problemáticas de vivienda de la clase trabajadora en la Unión de Repúblicas Socialistas Soviéticas (URSS); su desarrollo constituyó un ejercicio de búsqueda de formas nuevas de habitar para transitar hacia la vida socialista. El Concurso se realizó en un contexto posrevolucionario, históricamente determinado por las políticas económicas del naciente Estado y caracterizado por las indagaciones para resolver el problema de la tierra, la ciudad y
APA, Harvard, Vancouver, ISO, and other styles
31

Wu, Chuan Bao, and Bo Qiao. "URSS/PVA/WP Composite Materials: Preparation and Performance." Advanced Materials Research 968 (June 2014): 80–83. http://dx.doi.org/10.4028/www.scientific.net/amr.968.80.

Full text
Abstract:
A novel kind of environmentally friendly composite materials containing upper part of rice straw segments (URSS), poly (vinyl alcohol) (PVA) and waste paper (WP) were prepared by hot-pressing at 140°C for 10 min. The tensile strength, tensile elongation and hardness of composites were measured. Results showed that the tensile strength and the strength at tensile break of the composites first increased and then decreased with increasing PVA content. Tensile strength was higher than the strength at tensile break at different PVA contents, indicating that URSS/PVA/WP composite materials had certa
APA, Harvard, Vancouver, ISO, and other styles
32

Ch., J. Cl. "Fesbach.(M.), Friendly (A.) — Ecocide in the URSS. Health and nature under siege." Population Vol. 48, no. 1 (1993): 206–7. http://dx.doi.org/10.3917/popu.p1993.48n1.0207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Snigireva, Tatyana A. "People and Nature of the Urals: Variants of Representation in the Wartime Literature." Izvestia Ural Federal University Journal Series 1. Issues in Education, Science and Culture 29, no. 2 (2023): 32–40. http://dx.doi.org/10.15826/izv1.2023.29.2.023.

Full text
Abstract:
The study is focused on identifying and analysis of the two conceptual blocks that literary represent the Urals in wartime: the Ural character and the Ural nature. The study material consists of works of different genres, from documentary essays to verse journalism. It is shown that the idea of the original Ural character is generally perceived by an independent view of journalists sent to the Urals to report labor feats at the home front (it is akin to the military feats), and writers stranded in the Urals as a result of the evacuation. Optical differences allowed the creation of a sophistica
APA, Harvard, Vancouver, ISO, and other styles
34

Ahlawat, Dhruv Kumar. "Visual Cryptography-Based Secure URL Sharing System: Design and Implementation." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 07, no. 10 (2023): 1–11. http://dx.doi.org/10.55041/ijsrem26094.

Full text
Abstract:
In this paper, we describe the design and implementation of a secure URL-sharing system based on Visual Cryptography, that is, QR codes that have been extensively used in recent years because they speed up the process and provide users with ultimate convenience. However, as convenient as possible, regular URL- sharing systems are vulnerable to different types of attacks. Therefore, sharing must be sufficiently secure to protect integrity and confidentiality. Moreover, the URL sharing system must provide authenticity for both the sender and receiver. In this study, the security of the proposed
APA, Harvard, Vancouver, ISO, and other styles
35

Sohail, Farrukh, and W. R. Hudson. "Network-Level Implementation of URMS: A Graphical Urban Roadway Management System." Transportation Research Record: Journal of the Transportation Research Board 1524, no. 1 (1996): 36–47. http://dx.doi.org/10.1177/0361198196152400105.

Full text
Abstract:
The preservation of existing roads and streets has become a major activity for all levels of government. Deteriorating urban roads and reduced funding are major problems for local governments. Funds designated for pavements therefore must be used as effectively as possible. For the most efficient management of urban roadway networks, regulations calling for the involvement of metropolitan planning organizations in the development and implementation of pavement management systems (PMSs) were established by the Intermodal Surface Transportation Efficiency Act of 1991. Considerable effort is now
APA, Harvard, Vancouver, ISO, and other styles
36

Kamenskikh, Mikhail S., and Andrey A. Avdashkin. "“Our Friend Wang”." Journal of Frontier Studies 8, no. 1 (2023): 161–76. http://dx.doi.org/10.46539/jfs.v8i1.501.

Full text
Abstract:
The article is devoted to the visualization of the image of a Chinese in the periodical press of the Urals in the 1950s. Using the methodology of critical discourse analysis, the authors identify several target groups that form the image, describe their characteristic features and highlight the general and the special characteristics. The source base was made up of materials from the Ural periodical press. During “Great friendship” the Chinese who took part in labor training at enterprises and universities in the USSR became an object of attention of the Ural periodical press from the moment o
APA, Harvard, Vancouver, ISO, and other styles
37

Karpova, Marja, Nina Roznina, Dmitriy Paliy, Elena Lapina, and Oksana Galyuta. "Cultivation of promising oil flax varieties in the Trans-Urals." BIO Web of Conferences 37 (2021): 00109. http://dx.doi.org/10.1051/bioconf/20213700109.

Full text
Abstract:
In Russia, flax has been cultivated since ancient times; fiber linen fabrics and other products were produce to meet needs of the population and for exchange. Oil flax was a less common crop, but its cultivation is of great interest.In recent years, worldwide interest in the use of flaxseed oil has increased due to its healing properties and high content of linolenic acid. Flaxseed oil removes cholesterol, improves the metabolism of proteins and fats, normalizes blood pressure, and reduces the likelihood of blood clots and tumors. Flaxseed oil reduces the risk of cardiovascular and oncological
APA, Harvard, Vancouver, ISO, and other styles
38

Gurevich, Yuri. "Past Present." International Journal of Foundations of Computer Science 27, no. 02 (2016): 103–7. http://dx.doi.org/10.1142/s0129054116400013.

Full text
Abstract:
In 2014, the Development in Language Theory conference took place in the city of Yekaterinburg, in the Ural mountains of Russia. I used to live there. In Soviet times, there were no international conferences in the city. The whole region of the Urals was closed to foreigners. As I walked the streets of Yekaterinburg, I thought of my friends there and of Faulkner's lines “The past is never dead. It isn't even past.”
APA, Harvard, Vancouver, ISO, and other styles
39

Oboskalova, T. A., M. G. Askerova, A. B. Bakurinskih, and A. M. Yakushev. "Ivan Ivanovich Benediktov: man, teacher, mentor, friend." Bulletin of maternal and child care 2, no. 2 (2025): 28–37. https://doi.org/10.69964/bmcc-2025-2-2-28-37.

Full text
Abstract:
Professor, Doctor of Medical Sciences, Honored Scientist of the Russian Federation, Head of the Department of Obstetrics and Gynecology at the Sverdlovsk State Medical Institute Ivan Ivanovich Benediktov was born on November 1, 1916 in the Ulyanovsk region. After graduating from the Tomsk Medical Institute, I.I. Benediktov began working as a surgeon in a rural hospital in the Tomsk region. In 1942, he was drafted into the Red Army and went through the entire war as a military surgeon, being the commander of a medical battalion and being on the front line, providing medical care in the most dif
APA, Harvard, Vancouver, ISO, and other styles
40

Martynenko, A. V., Yu G. Myslyakova, N. A. Matushkina, and S. V. Kotlyarova. "Modelling High-Tech Trade Flows of a Macroregion Considering an Increase in Trade Barriers." Economy of Regions 19, no. 4 (2023): 1018–32. http://dx.doi.org/10.17059/ekon.reg.2023-4-6.

Full text
Abstract:
Current geopolitical situation requires improving a methodology for researching, planning and managing foreign economic activity of Russian regions. Imposed sanctions changed the development of Russian foreign trade, contributing to the transformation of foreign economic activity. The study aims to model high-tech trade flows of the Ural macroregion, considering trade barriers, as well as to determine new international trade boundaries and emerging high-tech trade flows. The Ural Federal District was selected for study due to its unique experience in the development of international trade and
APA, Harvard, Vancouver, ISO, and other styles
41

Petrov, Sergei, Natali Mamaeva, and Maksim Narushko. "Analysis of climate variables and strategies for adapting agriculture to climate change in the Northern Trans-Urals." BIO Web of Conferences 36 (2021): 08001. http://dx.doi.org/10.1051/bioconf/20213608001.

Full text
Abstract:
Today, humanity is faced with the problem of a changing planetary climate. At the same time, there is no common point of view on the main causes and trends of the dynamics of the modern climate, its consequences for individual components of the natural environment, as well as on the optimization of land use in Siberia. The paper examines the influence of the relative humidity of the air on the yield and gross harvest of grain and leguminous crops. It was revealed that the climate becomes more favorable for the cultivation of grain and leguminous crops in the Northern Trans-Urals, thus, from th
APA, Harvard, Vancouver, ISO, and other styles
42

Sharova, Elena, Nikolai Kruglikov, and Alexander Belyaev. "Effect of hydrostatic pressure on seed germination and subsequent growth of Silybum marianum (L.) Gaertn. seedlings in Middle Ural introduction." E3S Web of Conferences 392 (2023): 01035. http://dx.doi.org/10.1051/e3sconf/202339201035.

Full text
Abstract:
The influence of pre-sowing treatment of holy thistle seeds (Silybum marianum) by hydrostatic pressure (from 10 to 200 MPa) on the dynamics of the emergence of seedlings and the subsequent development of seedlings in the open ground in the Middle Urals has been studied. It is shown that the treatment of seeds with a pressure of 10 MPa during their subsequent sowing a day later (after drying) provided good germination and accelerated the passage of all stages of the ontogenesis of holy thistle plants in the dry growing season of 2021. At the same time, earlier and more friendly maturation of se
APA, Harvard, Vancouver, ISO, and other styles
43

Johar, Md Gapar Md, Zairina Ibrahim, and Nur Farhana Mohd Hamidi. "Secure Quick Response Based on Dynamic Quick Response Code." Journal of Computational and Theoretical Nanoscience 17, no. 2 (2020): 1090–98. http://dx.doi.org/10.1166/jctn.2020.8772.

Full text
Abstract:
This paper aims to explain the nature of quick response (QR) codes and their possible applications in attendance monitoring system at several universities. The aim of this research was to avoid QR code scanning for students who do not attend classes. A QR Code is a two dimensional barcode that is capable of storing a lots of information and various types of information. QR codes have a wide range of uses, including easy storage and transmission of data including web link URLs (Uniform Resource Locators), plain text, email addresses, contact information, SMS or MMS, calendar entries, Wireless n
APA, Harvard, Vancouver, ISO, and other styles
44

Shanta, Kallur, N. Totad Puneeth, Patil Vijeta, P. Naik Susan, and Belkar Supriya. "Detection of Spoofing Websites." Journal of Computer Science Engineering and Software Testing 6, no. 1 (2020): 6–16. https://doi.org/10.5281/zenodo.3630207.

Full text
Abstract:
<em>Spoofing websites are fake websites those are created by hackers or intruders to get real information from the users. They look like real websites. With the emerging use of internet, there is an increase in the number of people who are depending on online services to shop, check their banking account, pay their bills or even play with anonymous friends. The major security drawback in today&rsquo;s world is spoofing attacks. It is a kind of attack through emails. The goal is to trick the email recipient into believing that the message is something they want or need a request from their bank
APA, Harvard, Vancouver, ISO, and other styles
45

Kostylev, Yuri S., and Alexandra V. Tikhomirova. "Detoponymic Names of Ural Minerals: Word-Formation Patterns." Вопросы Ономастики 22, no. 1 (2025): 203–19. https://doi.org/10.15826/vopr_onom.2025.22.1.008.

Full text
Abstract:
The article examines the names of minerals derived from toponyms found in the Urals. The material for the study was sourced from specialized works on the mineralogy of the region, Russia, and the world. The aim of the research is to analyze the word-formation patterns characteristic of detoponymic mineral names, both in motivational and formal terms. The detoponymic pattern ranks as the second most frequent for mineral names, accounting for 21% of the total number of Ural mineral names (with the most frequent pattern being the deanthroponymic one). Given the diversity of the mineral nomenclatu
APA, Harvard, Vancouver, ISO, and other styles
46

Авдашкин, А. А., and И. В. Сибиряков. "“Together Forever”: friendship of The USSR and PRC in the optics of the Soviet provincial newspapers." Диалог со временем, no. 76(76) (August 17, 2021): 235–50. http://dx.doi.org/10.21267/aquilo.2021.76.76.005.

Full text
Abstract:
Статья посвящена изображению советско-китайской дружбы в провинциальной печати на примере газет Челябинска и Магнитогорска. При работе с этими источниками, большая часть которых впервые введена в научный оборот, авторы использовали имагологический метод и дискурс-анализ. Этот инструментарий позволил проанализировать ведущие образы советско-китайской дружбы, транслировавшиеся в советской провинциальной периодике в исследуемый период. Они складывались из описаний китайских практикантов на промышленных предприятиях, презентации ведущей роли СССР в построении социализма в Китае и демонстраций креп
APA, Harvard, Vancouver, ISO, and other styles
47

Kazak, Anastasiia, Yu Loginov, Lyudmila Yakubyshina, Sergey Nikolaevich Yaschenko, and Andrey Gayzatulin. "THE ECONOMIC VALUE OF WINTER BARLEY AND THEIR USE IN SPRING BREEDING IN THE TYUMEN REGION." Bulletin of KSAU, no. 2 (February 21, 2025): 55–66. https://doi.org/10.36718/1819-4036-2025-2-55-66.

Full text
Abstract:
The potential of barley in terms of yield and protein content in grain has been realized in the Tyumen region, as well as in Siberia as a whole, by 30-40%. In solving this problem, the variety is of particular importance. To create barley varieties well adapted to the conditions of the region, valuable source material is needed, as which winter barley varieties are of great scientific interest. In 2017-2023, winter barley varieties were studied in the experimental field of the State Agrarian University of the Northern Urals. It was found that during winter sowing (April 10-15), winter barley v
APA, Harvard, Vancouver, ISO, and other styles
48

Klyashev, A. N. "“Other” Protestants — change of religious identity." Memoirs of NovSU, no. 4 (2023): 298–303. http://dx.doi.org/10.34680/2411-7951.2023.4(49).298-303.

Full text
Abstract:
In this article, the author attempts to reveal some aspects related to the transformation of the confessional identity of members of Protestant religious organizations operating in the Southern, Middle and Polar Urals and identifying themselves as representatives of “other” ethnic groups that are not widespread in Russia. The article presents data on the confessional identity of the respondents and on the factors that contributed to their adoption of Protestant Christianity. The research materials allow us to conclude that the religious identity (or lack of it) of the respondents before coming
APA, Harvard, Vancouver, ISO, and other styles
49

Shkerin, V. A. "History of “Note on Sects Existing in the Perm Governorate” (1827) in the Fate of the Author and His Informants." Vestnik NSU. Series: History and Philology 22, no. 1 (2023): 78–86. http://dx.doi.org/10.25205/1818-7919-2023-22-1-78-86.

Full text
Abstract:
The article studies a history of creation of the “Note on sects existing in the Perm Governorate” (1827), which became the most detailed description of the Ural Old believers of this time. The materials for the note was collected by a Moscow official and writer S. D. Nechaev. He traveled to the Urals during the troubled times after the defeat of the Decembrist Revolt when Emperor Nicholas I was inclined to suspect secret societies’ activities everywhere. Stepan Dmitrievich Nechaev (1792–1860) was also a member of the Union of Prosperity. Usually, investigators were not interested in persons wh
APA, Harvard, Vancouver, ISO, and other styles
50

Bessudnova, Zoya. "Grigory (Gotthelf) Fischer Von Waldheim (1771-1853): Author of the First Scientific Works on Russian Geology and Palæontology." Earth Sciences History 32, no. 1 (2013): 102–20. http://dx.doi.org/10.17704/eshi.32.1.n68416x30q1l4916.

Full text
Abstract:
Sometimes called the 'Russian Cuvier', Grigory Fischer von Waldheim was born in 1771 in Waldheim near Freiberg in Saxony and graduated in 1792 from the Freiberg Mining Academy, where he studied under Werner and became friends with von Buch and von Humboldt. In Paris, he studied under Cuvier and the two became friends. In Russia, Fischer became Director of the Moscow University Natural History Museum (1804-1832), founder of the Moscow Society of Naturalists at Moscow University (1805), Corresponding Member (1805) and Honorary Member (1819) of the Imperial Academy of Sciences, and Professor (lat
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!