Showing 1,561 - 1,580 results of 4,609 for search '"code"', query time: 0.06s Refine Results
  1. 1561

    DELINEATION OF WOMEN IDENTITY IN THE DISNEY ANIMATED FILM ECANTO (2019) by Agustin Diana Wardaniningsih, E. Ngestirosa Endang Woro Kasih

    Published 2022-10-01
    “…A method that focuses on signs and texts as objects of study and how researchers interpret and understand the code (decoding) behind the signs and texts. The study revealed the women's identity on the main character, Mirabel in the film Encanto. …”
    Get full text
    Article
  2. 1562

    SD‐SHO: Security‐dominated finite state machine state assignment technique with a satisfactory level of hardware optimization by Nitish Das, Aruna Priya Panchanathan

    Published 2021-09-01
    “…It is a deterministic algorithm and consists of two key techniques, such as state assignment using an improved quadratic sum code, and state assignment using a gradient‐based interior point method. …”
    Get full text
    Article
  3. 1563

    Shaking Table Tests on Earthquake Response Characterization of a Complex Museum Isolated Structure in High Intensity Area by Wenguang Liu, Chuan Qin, Yang Liu, Wenfu He, Qiaorong Yang

    Published 2016-01-01
    “…Storey drifts of isolated structure meet required limits stipulated in Chinese design code and torsion responses of the bearings are not remarkable. …”
    Get full text
    Article
  4. 1564

    A Truncated Waveguide Fed by a Microstrip as a Radiating Element for High-Performance Automotive Anticollision Radars by Giovanni Andrea Casula, Giuseppe Mazzarella, Giorgio Montisci

    Published 2012-01-01
    “…The proposed radiating element has been analyzed by a numerical code based on an in-house method of moments, and the microstrip feeding line has been modeled by its equivalent magnetic-wall waveguide. …”
    Get full text
    Article
  5. 1565

    Improvement of Core Performance by Introduction of Moderators in a Blanket Region of Fast Reactors by Toshio Wakabayashi

    Published 2013-01-01
    “…The core characteristics have been evaluated with a continuous-energy model Monte Carlo code MVP and the JENDL-3.3 cross-section library. …”
    Get full text
    Article
  6. 1566

    Cyber Attacks on Commercial Drones: A Review by Bruno Branco, Jose Silvestre Serra Silva, Miguel Correia

    Published 2025-01-01
    “…Some examples of these attacks include breaking the connection between the drone and the controller with deauthentication attacks, discovering a password or cryptographic key used in a communication protocol, gaining control of the drone through command/code injection, and attacks. This paper covers drone attacks by analyzing different components of the drone, including the remote controller and communication protocols. …”
    Get full text
    Article
  7. 1567

    Influence of the Cavitation Model on the Simulation of Cloud Cavitation on 2D Foil Section by S. Frikha, O. Coutier-Delgosha, J. A. Astolfi

    Published 2008-01-01
    “…Some of the models were also tested using a 2D CFD code in configurations of cavitation on two-dimensional foil sections. …”
    Get full text
    Article
  8. 1568

    Seismic Fragility Analysis of Self-Anchored Suspension Bridge Considering Damping Effect by Xiangong Zhou, Lei Cao, Heng Han, Xiaobo Zheng, Hanhao Zhang, Zhiqing Zhang

    Published 2022-01-01
    “…For this type of bridge, the current code only gives the overall seismic design principle, and there is little research on seismic fragility in the existing literature. …”
    Get full text
    Article
  9. 1569

    Gulf Coast Lupine, Lupinus westianus var. westianus by Debbie Miller, Mack Thetford, Chris Verlinde, Gabriel Campbell, Ashlynn Smith

    Published 2018-10-01
    “… Gulf coast lupine (Lupinus westianus var. westianus) is listed as threatened by the Plants in the Preservation of Native Flora of Florida Act, Chapter 5B-40, Florida Administrative Code, 1998, amended (Wunderlin et al. 2017). The species is endemic to coastal counties in the western Panhandle of Florida. …”
    Get full text
    Article
  10. 1570

    Implementation of an Android-Based Attendance Application with Geofence Method for Employee Monitoring Efficiency by Arlan Leon Allacsta, T. Yudi Hadiwandra

    Published 2024-11-01
    “…In addition to the Geofence feature, the app includes QR code validation to minimize the potential for fraud. …”
    Get full text
    Article
  11. 1571

    Understanding the Challenges Experienced by COPD Patients: A Qualitative Study by Özlem Oruç, Saime Erol, Zahide Aksoy

    Published 2024-12-01
    “…Thematic analysis was used to code the data and determine themes. The Consolidated Criteria for Reporting Qualitative Research (COREQ) checklist was used as a guide to ensure the quality of the study.Results: As a result of the analysis, five themes emerged regarding the challenges experienced in COPD: Perception of disease, difficulty in disease management, losses in lifestyle, emotional burden of the disease, need for information.Conclusions: It is thought that the interventions to be implemented to strengthen COPD patients can increase their effectiveness by creating them within the scope of the themes obtained in this study.…”
    Get full text
    Article
  12. 1572

    Procedural Aspects of Handling the Electronic Evidence: the Ukrainian Context by O. V. Manzhai, A. O. Potylchak, I. V. Manzhai

    Published 2021-09-01
    “…Some statistical data on persons convicted under Art. 361-363-1 of the Criminal Code of Ukraine. The history of formation of the institute of electronic proofs is considered. …”
    Get full text
    Article
  13. 1573

    Implementation Model Prototyping In Application Design of Halal Food Product Detection For Overseas Muslim Students by Fandisya Rahman, Bambang Minto Basuki

    Published 2023-11-01
    “…These barcode scanners use optical scanners called code readers, and they are popular as they provide a quick and efficient way of obtaining information. …”
    Get full text
    Article
  14. 1574

    Relative Navigation in LEO by Carrier-Phase Differential GPS with Intersatellite Ranging Augmentation by Alfredo Renga, Michele Grassi, Urbano Tancredi

    Published 2013-01-01
    “…Specifically, a cascade-combination of dynamic and kinematic filters which processes double-differenced code and carrier measurements on two frequencies, as well as local inter-satellite ranging measurements, is used to get centimeter-level baseline estimates. …”
    Get full text
    Article
  15. 1575

    Numerical analysis of repaired wall loss defect pipelines for optimum composite wrap thickness by M. Khaisem, S. Budhe, S. de Barros, M.D. Banea, N. R. F. Rohem

    Published 2023-01-01
    “…A nonlinear explicit FE code with constitutive models for metallic steel and composite material to failure modelling was used. …”
    Get full text
    Article
  16. 1576

    Seismic Test and Simulation of Spring Vibration Isolated Foundation for Turbo-Generator by Dong An, Tianwang Liu

    Published 2021-01-01
    “…Results of seismic experiments and numerical simulations show that the foundation design meets the standard of the “Code for Seismic Design of Buildings” in China, which realizes the goal of spring vibration isolation and seismic resistance. …”
    Get full text
    Article
  17. 1577

    EXISTENCE OF WIFE BATTERY AMONG TRADERS IN UGEP COMMUNITY OF YAKURR LOCAL GOVERNMENT AREA OF CROSS RIVER STATE, NIGERIA by NNANA OKOI OFEM

    Published 2024-02-01
    “…Findings reveals that there is need to reform the discriminatory legislations in Nigeria especially as regards the criminal code which makes the indecent assault of a woman a less offence. …”
    Get full text
    Article
  18. 1578

    Exergy Analysis in Hydrogen-Air Detonation by Abel Rouboa, Valter Silva, Nuno Couto

    Published 2012-01-01
    “…A two-dimensional computational fluid dynamic code is developed using Finite volume discretization method coupled with implicit scheme for the time discretization (Euler system equations). …”
    Get full text
    Article
  19. 1579

    Thermal Environment and Energy Performance of a Typical Classroom Building in a Hot-Humid Region: A Case Study in Guangzhou, China by Liang Yi, Yuan Xie, Chang Lin

    Published 2022-01-01
    “…It is necessary to renovate the buildings of outdated code according to the current weather conditions to save energy. …”
    Get full text
    Article
  20. 1580

    Deep Grassmannian multiview subspace clustering with contrastive learning by Rui Wang, Haiqiang Li, Chen Hu, Xiao-Jun Wu, Yingfang Bao

    Published 2024-09-01
    “…Extensive experiments conducted on five benchmarking datasets demonstrate the effectiveness of the proposed method. The source code is available at https://github.com/Zoo-LLi/DGMVCL.…”
    Get full text
    Article