Suggested Topics within your search.
Suggested Topics within your search.
- Moral and ethical aspects 3
- Economic policy 2
- Professional ethics 2
- Agriculture 1
- Applied linguistics 1
- Artificial Intelligence 1
- Artificial intelligence 1
- Automobiles 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Civil law 1
- Civil service 1
- Coding and Information Theory 1
- Coding theory 1
- Conditional sales 1
- Corporations 1
- Data Mining and Knowledge Discovery 1
- Data mining 1
- Economic Policy 1
- Economic conditions 1
- Emotions 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Environmental Economics 1
- Environmental economics 1
- Exercise 1
- Fault location (Engineering) 1
-
1561
DELINEATION OF WOMEN IDENTITY IN THE DISNEY ANIMATED FILM ECANTO (2019)
Published 2022-10-01“…A method that focuses on signs and texts as objects of study and how researchers interpret and understand the code (decoding) behind the signs and texts. The study revealed the women's identity on the main character, Mirabel in the film Encanto. …”
Get full text
Article -
1562
SD‐SHO: Security‐dominated finite state machine state assignment technique with a satisfactory level of hardware optimization
Published 2021-09-01“…It is a deterministic algorithm and consists of two key techniques, such as state assignment using an improved quadratic sum code, and state assignment using a gradient‐based interior point method. …”
Get full text
Article -
1563
Shaking Table Tests on Earthquake Response Characterization of a Complex Museum Isolated Structure in High Intensity Area
Published 2016-01-01“…Storey drifts of isolated structure meet required limits stipulated in Chinese design code and torsion responses of the bearings are not remarkable. …”
Get full text
Article -
1564
A Truncated Waveguide Fed by a Microstrip as a Radiating Element for High-Performance Automotive Anticollision Radars
Published 2012-01-01“…The proposed radiating element has been analyzed by a numerical code based on an in-house method of moments, and the microstrip feeding line has been modeled by its equivalent magnetic-wall waveguide. …”
Get full text
Article -
1565
Improvement of Core Performance by Introduction of Moderators in a Blanket Region of Fast Reactors
Published 2013-01-01“…The core characteristics have been evaluated with a continuous-energy model Monte Carlo code MVP and the JENDL-3.3 cross-section library. …”
Get full text
Article -
1566
Cyber Attacks on Commercial Drones: A Review
Published 2025-01-01“…Some examples of these attacks include breaking the connection between the drone and the controller with deauthentication attacks, discovering a password or cryptographic key used in a communication protocol, gaining control of the drone through command/code injection, and attacks. This paper covers drone attacks by analyzing different components of the drone, including the remote controller and communication protocols. …”
Get full text
Article -
1567
Influence of the Cavitation Model on the Simulation of Cloud Cavitation on 2D Foil Section
Published 2008-01-01“…Some of the models were also tested using a 2D CFD code in configurations of cavitation on two-dimensional foil sections. …”
Get full text
Article -
1568
Seismic Fragility Analysis of Self-Anchored Suspension Bridge Considering Damping Effect
Published 2022-01-01“…For this type of bridge, the current code only gives the overall seismic design principle, and there is little research on seismic fragility in the existing literature. …”
Get full text
Article -
1569
Gulf Coast Lupine, Lupinus westianus var. westianus
Published 2018-10-01“… Gulf coast lupine (Lupinus westianus var. westianus) is listed as threatened by the Plants in the Preservation of Native Flora of Florida Act, Chapter 5B-40, Florida Administrative Code, 1998, amended (Wunderlin et al. 2017). The species is endemic to coastal counties in the western Panhandle of Florida. …”
Get full text
Article -
1570
Implementation of an Android-Based Attendance Application with Geofence Method for Employee Monitoring Efficiency
Published 2024-11-01“…In addition to the Geofence feature, the app includes QR code validation to minimize the potential for fraud. …”
Get full text
Article -
1571
Understanding the Challenges Experienced by COPD Patients: A Qualitative Study
Published 2024-12-01“…Thematic analysis was used to code the data and determine themes. The Consolidated Criteria for Reporting Qualitative Research (COREQ) checklist was used as a guide to ensure the quality of the study.Results: As a result of the analysis, five themes emerged regarding the challenges experienced in COPD: Perception of disease, difficulty in disease management, losses in lifestyle, emotional burden of the disease, need for information.Conclusions: It is thought that the interventions to be implemented to strengthen COPD patients can increase their effectiveness by creating them within the scope of the themes obtained in this study.…”
Get full text
Article -
1572
Procedural Aspects of Handling the Electronic Evidence: the Ukrainian Context
Published 2021-09-01“…Some statistical data on persons convicted under Art. 361-363-1 of the Criminal Code of Ukraine. The history of formation of the institute of electronic proofs is considered. …”
Get full text
Article -
1573
Implementation Model Prototyping In Application Design of Halal Food Product Detection For Overseas Muslim Students
Published 2023-11-01“…These barcode scanners use optical scanners called code readers, and they are popular as they provide a quick and efficient way of obtaining information. …”
Get full text
Article -
1574
Relative Navigation in LEO by Carrier-Phase Differential GPS with Intersatellite Ranging Augmentation
Published 2013-01-01“…Specifically, a cascade-combination of dynamic and kinematic filters which processes double-differenced code and carrier measurements on two frequencies, as well as local inter-satellite ranging measurements, is used to get centimeter-level baseline estimates. …”
Get full text
Article -
1575
Numerical analysis of repaired wall loss defect pipelines for optimum composite wrap thickness
Published 2023-01-01“…A nonlinear explicit FE code with constitutive models for metallic steel and composite material to failure modelling was used. …”
Get full text
Article -
1576
Seismic Test and Simulation of Spring Vibration Isolated Foundation for Turbo-Generator
Published 2021-01-01“…Results of seismic experiments and numerical simulations show that the foundation design meets the standard of the “Code for Seismic Design of Buildings” in China, which realizes the goal of spring vibration isolation and seismic resistance. …”
Get full text
Article -
1577
EXISTENCE OF WIFE BATTERY AMONG TRADERS IN UGEP COMMUNITY OF YAKURR LOCAL GOVERNMENT AREA OF CROSS RIVER STATE, NIGERIA
Published 2024-02-01“…Findings reveals that there is need to reform the discriminatory legislations in Nigeria especially as regards the criminal code which makes the indecent assault of a woman a less offence. …”
Get full text
Article -
1578
Exergy Analysis in Hydrogen-Air Detonation
Published 2012-01-01“…A two-dimensional computational fluid dynamic code is developed using Finite volume discretization method coupled with implicit scheme for the time discretization (Euler system equations). …”
Get full text
Article -
1579
Thermal Environment and Energy Performance of a Typical Classroom Building in a Hot-Humid Region: A Case Study in Guangzhou, China
Published 2022-01-01“…It is necessary to renovate the buildings of outdated code according to the current weather conditions to save energy. …”
Get full text
Article -
1580
Deep Grassmannian multiview subspace clustering with contrastive learning
Published 2024-09-01“…Extensive experiments conducted on five benchmarking datasets demonstrate the effectiveness of the proposed method. The source code is available at https://github.com/Zoo-LLi/DGMVCL.…”
Get full text
Article