Showing 4,201 - 4,220 results of 5,630 for search '(( making and coding ) OR ( targeting and coding ))', query time: 0.18s Refine Results
  1. 4201

    New Method for Isomorphism Identification of Planetary Gear Trains based on Traversing Loop by Jiawen Ding, Wei Sun

    Published 2020-12-01
    “…Then,the rule to traverse loops and its priority is defined,to make sure that there is the uniqueness of description. …”
    Get full text
    Article
  2. 4202

    Analysis of Seminar Presentation Performances of Postgraduate Students with Many-Facet Rasch Model by Burcu Duman, Çetin Semerci, Nuriye Semerci

    Published 2014-01-01
    “…The aim of the study is to make “Analysis of seminar presentation performances of postgraduate students with many-facet Rasch model”. …”
    Get full text
    Article
  3. 4203

    Method of diversity software protection based on fusion compilation by Xiaobing XIONG, Hui SHU, Fei KANG

    Published 2020-12-01
    “…For the obvious characteristics and single mode of the existing common protection methods,with the help of the LLVM framework,a diversity software protection method based on fusion compilation was proposed.In the proposed method,the target software is encrypted randomly,and deeply integrated with the bunker code at the compilation level,and the encrypted target software is decrypted by memory execution technology.Then it is executed in the form of no process in memory,and the diversified protection effect of the target software is realized by the diversity of the bunker and the randomness of the fusion strategies.A number of commonly used software are selected as the test case,and the proposed method is tested from the aspects of resource cost,protection effect,comparative experiment and so on.Compared with the traditional methods such as obfuscation and packing,the proposed method has great advantages in anti-static analysis and anti-dynamic debugging,and can effectively resist the mainstream methods of reverse analyzing and cracking.…”
    Get full text
    Article
  4. 4204

    INTERNAL BELIEF OF THE JUDGE by Fatima H. Bajchorova

    Published 2022-05-01
    “…The author suggests to make changes in p.1 Art. 17 of the Code of criminal procedure of the Russian Federation, and gives the reasonings and arguments on the matter. …”
    Get full text
    Article
  5. 4205

    Une linguistique au-delà de l’humain ? by Chloé Mondémé

    Published 2020-12-01
    “…However, we argue that the observation of interspecific interactions is a valuable locus to analyze pragmatically efficient actions, that unfold emergently and regardless of a “code.” Animals’ actions make sense for humans, as well as humans’ action make sense for animals, and sometimes very complex joint actions rest on this rudimentary semiosis.…”
    Get full text
    Article
  6. 4206

    English learners with dyslexia benefit from English dyslexia intervention: an observational study of routine intervention practices by Anna E. Middleton, Marcela Davila, Sheryl L. Frierson

    Published 2024-12-01
    “…One-hundred eighty-six students with dyslexia were followed over the course of two academic years. Assessments measured code and meaning-based reading skills. Multivariate profile analysis and linear mixed effects modeling were conducted to compare baseline reading profiles as well as growth in targeted skills over time.ResultsFindings reveal similar patterns of reading profiles across EL and EP groups, with more severe baseline deficits emerging for ELs. …”
    Get full text
    Article
  7. 4207

    Legal aspects regarding the use and integration of electronic medical records for epidemiological purposes with focus on the Italian situation by Antonietta Stendardo, Francesca Preite, Rosaria Gesuita, Simona Villani, Antonella Zambon, SISMEC "Observational Studies" working group

    Published 2013-09-01
    “…In the second, “Nature of data held in electronic medical record archives”, we discuss the problem of sensitive data and procedures to make the identification code anonymous. In “Data ownership” we highlight the difference between the data controller and the database controller. …”
    Get full text
    Article
  8. 4208

    Legal Position Of A Deed Made By A Substitute Notary Who Does Not Meet The Requirements For Appointment by Dewi Puspitasari

    Published 2024-12-01
    “…The Substitute Notary is not authorized to make deeds, and the Substitute Notary is independently responsible for the deeds he/she makes, where the Substitute Notary can be sued in civil court for damages, if the parties demand damages.…”
    Get full text
    Article
  9. 4209

    Upgrading safety systems of industrial irradiation facilities by Rogerio dos Santos Gomes, Joana D'Arc Ramos Lopes Gomes, Evaldo Luiz Correa da Costa, Mara Lucia de Lara Costa, Zieli Dutra Thomé Filho

    Published 2019-02-01
    “…The safety systems are designed in agreement with the codes and standards at the time. Since then, new standards, codes and recommendations, as well as lessons learned from accidents, have been issued by various international committees or regulatory bodies. …”
    Get full text
    Article
  10. 4210

    A Differentiable Binary Microlensing Model Using Adaptive Contour Integration Method by Haibin Ren, Wei Zhu

    Published 2025-01-01
    “…The efficiency and accuracy of microlux have been verified across the relevant parameter space for binary microlensing. As a differentiable code, microlux makes it possible to apply gradient-based algorithms to the search and posterior estimation of the microlensing modeling. …”
    Get full text
    Article
  11. 4211

    Pynblint: A quality assurance tool to improve the quality of Python Jupyter notebooks by Luigi Quaranta, Fabio Calefato, Filippo Lanubile

    Published 2024-12-01
    “…Its interactive and self-documenting nature makes it particularly suitable for data-driven programming tasks. …”
    Get full text
    Article
  12. 4212

    Discrete element simulations of self-gravitating rubble pile collisions: the effects of non-uniform particle size and rotation by Job Guidos, Lucas Kolanz, Davide Lazzati

    Published 2025-08-01
    “…We present a new implementation of a soft-sphere discrete element code to simulate the dynamics of self-gravitating granular materials. …”
    Get full text
    Article
  13. 4213

    Dissipation by transfer and its influence on fusion by Colucci Giulia, Trzcińska Agnieszka, Wen Pei Wei, Piasecki Ernest

    Published 2024-01-01
    “…The study with the upgraded code indicates the transfer responsible for generating strongly excited targets as the leading cause of the smearing of the barrier distribution, even in the case of negative ground state to ground state Q value (Qgg). …”
    Get full text
    Article
  14. 4214
  15. 4215
  16. 4216

    A Low-Complexity Euclidean Orthogonal LDPC Architecture for Low Power Applications by M. Revathy, R. Saravanan

    Published 2015-01-01
    “…Low-density parity-check (LDPC) codes have been implemented in latest digital video broadcasting, broadband wireless access (WiMax), and fourth generation of wireless standards. …”
    Get full text
    Article
  17. 4217

    An Efficient Approach to Obtain Optimal Load Factors for Structural Design by Juan Bojórquez, Sonia E. Ruiz

    Published 2014-01-01
    “…The load factors are calibrated so that the structural reliability index is as close as possible to a target reliability value. The optimization procedure is applied to find optimal load factors for designing of structures in accordance with the new version of the Mexico City Building Code (RCDF). …”
    Get full text
    Article
  18. 4218

    Shear Strength Reduction Factor of Prestressed Hollow-Core Slab Units Based on the Reliability Approach by Hae-Chang Cho, Min-Kook Park, Hyunjin Ju, Jae-Yuel Oh, Young-Hun Oh, Kang Su Kim

    Published 2017-01-01
    “…The reliability indexes were calculated for the shear strength equations of PHC slabs specified in several national design codes and those proposed in previous studies. In addition, the appropriate strength reduction factors for the shear strength equations to ensure the target reliability index were calculated. …”
    Get full text
    Article
  19. 4219

    Nek5000/RS performance on advanced GPU architectures by Misun Min, Yu-Hsiang Lan, Paul Fischer, Paul Fischer, Paul Fischer, Thilina Rathnayake, John Holmen

    Published 2025-02-01
    “…The authors explore performance scalability of the open-source thermal-fluids code, NekRS, on the U.S. Department of Energy's leadership computers, Crusher, Frontier, Summit, Perlmutter, and Polaris. …”
    Get full text
    Article
  20. 4220

    A Multipath Routing Approach for Secure and Reliable Data Delivery in Wireless Sensor Networks by Hind Alwan, Anjali Agarwal

    Published 2013-03-01
    “…The original data message is split into packets that are coded using Reed-Solomon (RS) codes and, to provide diverse levels of security, different number of fragments is encrypted related to the requested security level before being transmitted along independent node-disjoint paths. …”
    Get full text
    Article