Suggested Topics within your search.
Suggested Topics within your search.
- Moral and ethical aspects 3
- Economic policy 2
- Professional ethics 2
- Agriculture 1
- Applied linguistics 1
- Artificial Intelligence 1
- Artificial intelligence 1
- Automobiles 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Civil law 1
- Civil service 1
- Coding and Information Theory 1
- Coding theory 1
- Conditional sales 1
- Corporations 1
- Data Mining and Knowledge Discovery 1
- Data mining 1
- Economic Policy 1
- Economic conditions 1
- Emotions 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Environmental Economics 1
- Environmental economics 1
- Exercise 1
- Fault location (Engineering) 1
-
941
Evaluation of the Education Plan and Activities of Swiss Sport Integrity. A report of a science-practice co-operation.
Published 2025-01-01“…World Anti-Doping Code 2021 (Art. 18 Education). Montreal: WADA. https://www.wada-ama.org Sanders, J. …”
Get full text
Article -
942
-
943
Assessment of RELAP/SCDAPSIM/MOD3.4 Prediction Capability with Severe Fuel Damage Scoping Test
Published 2017-01-01“…Thus, the PBF benchmark using severe accidental analysis codes is essential to designing reactor for current directions. …”
Get full text
Article -
944
Criminal law sanctions for misappropriation, embezzlement or seizure of property through abuse of office
Published 2023-06-01“…The concept of criminal law sanctions has been analysed, the classification of criminal law sanctions for misappropriation, embezzlement or seizure of property through abuse of office has been studied, and the peculiarities of building criminal law sanctions for crimes under Article 191 of the Criminal Code of Ukraine have been revealed. It has been concluded that a sanction is a mandatory component of an article (or part of an article) of the Special Part of the Criminal Code of Ukraine which contains a model of the type and scope of punishment which is adequate to the social danger of a criminal act. …”
Get full text
Article -
945
Noise immunity of QAM-OFDM signal reception using soft-decision demodulation in the presence of narrowband interference
Published 2024-10-01“…As a way of managing this interference, the paper studies the use of a demodulator with soft outputs and subsequent decoding of the convolutional code and low-density paritycheck (LDPC) code used in the system.Methods. …”
Get full text
Article -
946
-
947
The language ecology of a new Afrikaans Bible
Published 2002-06-01“… Three sets of codes are germane to a current Afrikaans Bible translation: Dutch, English and varieties of Afrikaans, especially Standard Afrikaans. …”
Get full text
Article -
948
Computing Coherence Vectors and Correlation Matrices with Application to Quantum Discord Quantification
Published 2016-01-01“…As a code test and application example, we consider the calculation of Hilbert-Schmidt quantum discords.…”
Get full text
Article -
949
Contribution to Synchronization and Tracking Modelisation in a CDMA Receiver
Published 2013-01-01“…We propose and analyze a noncoherent receiver with PN code tracking for direct sequence code division multiple access (DS-CDMA) communication systems. …”
Get full text
Article -
950
Ultrasonographic manifestations of a rare case of gallbladder lymphoma
Published 2025-02-01Get full text
Article -
951
Features of the application of preventive measures in the investigation of criminal offenses related to domestic violence
Published 2021-12-01“…It is proved that in the course of resolving the issue of choosing a measure of restraint during the investigation of criminal offenses related to domestic violence, it is appropriate to apply the restrictive measures provided for in Part 6 of Art. 194 of the Criminal Procedure Code of Ukraine.…”
Get full text
Article -
952
Decay Heat Removal and Transient Analysis in Accidental Conditions in the EFIT Reactor
Published 2008-01-01“…Finally, the thermal-hydraulic RELAP5 code has been employed for the analysis of LOHS accidental scenarios.…”
Get full text
Article -
953
New RELAP5-3D Lead and LBE Thermophysical Properties Implementation for Safety Analysis of Gen IV Reactors
Published 2016-01-01“…The latest versions of RELAP5-3D© code allow the simulation of thermodynamic system, using different type of working fluids, that is, liquid metals, molten salt, diathermic oil, and so forth, thanks to the ATHENA code integration. …”
Get full text
Article -
954
CFD Simulation of Polydispersed Bubbly Two-Phase Flow around an Obstacle
Published 2009-01-01“…The first method is implemented in the Neptune_CFD code, whereas the second method is implemented in the CFD code ANSYS/CFX. …”
Get full text
Article -
955
Online Structural Health Monitoring and Parameter Estimation for Vibrating Active Cantilever Beams Using Low-Priced Microcontrollers
Published 2015-01-01“…The modest computing power of the microcontroller and automated code generation designates the proposed system only for very flexible structures, with a first dominant resonant frequency under 4 Hz; however, a code-optimized version certainly allows much stiffer structures or more complicated models on the same hardware.…”
Get full text
Article -
956
International Standard Problems and Small Break Loss-of-Coolant Accident (SBLOCA)
Published 2008-01-01“…Evaluation of the capabilities and the performance of these codes can be accomplished by comparing the code predictions with measured experimental data obtained on different test facilities. …”
Get full text
Article -
957
The Incidence of Diagnosis of Munchausen Syndrome, Other Factitious Disorders, and Malingering
Published 2019-01-01“…Code Z76.5 was applied to 52 patients (12 females; 40 males), all diagnosed within health institutions. …”
Get full text
Article -
958
Seismic Performance Evaluation of Building-Damper System under Near-Fault Earthquake
Published 2020-01-01“…The building-damper system designed by a seismic code is usually considered to be able to withstand the attack of strong earthquakes. …”
Get full text
Article -
959
A SYNTHESIS METHOD OF BASIC TERNARY BENT-SQUARES BASED ON THE TRIAD SHIFT OPERATOR
Published 2017-05-01“…Practical application of advanced algebraic constructions in modern communication systems based on MC-CDMA (Multi Code Code Division Multiple Access) technology and in cryptography necessitates their further research. …”
Get full text
Article -
960
Concept and Significance of Criminalistics Classification of Crimes Related to Proxy Battle
Published 2019-09-01“…Special attention has been paid to the fact that the current criminal law in Ukraine does not handle the categories of “raidership” or “crimes related to proxy battle”; besides, the Criminal Code of Ukraine does not contain the separate Section that would include the list of criminal offenses in in this area, and the norms that provide criminal liability for certain actions accompanied by proxy battle, are dispersed between different Sections of the Special Part of the Code. …”
Get full text
Article