Suggested Topics within your search.
Suggested Topics within your search.
-
4201
New Method for Isomorphism Identification of Planetary Gear Trains based on Traversing Loop
Published 2020-12-01“…Then,the rule to traverse loops and its priority is defined,to make sure that there is the uniqueness of description. …”
Get full text
Article -
4202
Analysis of Seminar Presentation Performances of Postgraduate Students with Many-Facet Rasch Model
Published 2014-01-01“…The aim of the study is to make “Analysis of seminar presentation performances of postgraduate students with many-facet Rasch model”. …”
Get full text
Article -
4203
Method of diversity software protection based on fusion compilation
Published 2020-12-01“…For the obvious characteristics and single mode of the existing common protection methods,with the help of the LLVM framework,a diversity software protection method based on fusion compilation was proposed.In the proposed method,the target software is encrypted randomly,and deeply integrated with the bunker code at the compilation level,and the encrypted target software is decrypted by memory execution technology.Then it is executed in the form of no process in memory,and the diversified protection effect of the target software is realized by the diversity of the bunker and the randomness of the fusion strategies.A number of commonly used software are selected as the test case,and the proposed method is tested from the aspects of resource cost,protection effect,comparative experiment and so on.Compared with the traditional methods such as obfuscation and packing,the proposed method has great advantages in anti-static analysis and anti-dynamic debugging,and can effectively resist the mainstream methods of reverse analyzing and cracking.…”
Get full text
Article -
4204
INTERNAL BELIEF OF THE JUDGE
Published 2022-05-01“…The author suggests to make changes in p.1 Art. 17 of the Code of criminal procedure of the Russian Federation, and gives the reasonings and arguments on the matter. …”
Get full text
Article -
4205
Une linguistique au-delà de l’humain ?
Published 2020-12-01“…However, we argue that the observation of interspecific interactions is a valuable locus to analyze pragmatically efficient actions, that unfold emergently and regardless of a “code.” Animals’ actions make sense for humans, as well as humans’ action make sense for animals, and sometimes very complex joint actions rest on this rudimentary semiosis.…”
Get full text
Article -
4206
English learners with dyslexia benefit from English dyslexia intervention: an observational study of routine intervention practices
Published 2024-12-01“…One-hundred eighty-six students with dyslexia were followed over the course of two academic years. Assessments measured code and meaning-based reading skills. Multivariate profile analysis and linear mixed effects modeling were conducted to compare baseline reading profiles as well as growth in targeted skills over time.ResultsFindings reveal similar patterns of reading profiles across EL and EP groups, with more severe baseline deficits emerging for ELs. …”
Get full text
Article -
4207
Legal aspects regarding the use and integration of electronic medical records for epidemiological purposes with focus on the Italian situation
Published 2013-09-01“…In the second, “Nature of data held in electronic medical record archives”, we discuss the problem of sensitive data and procedures to make the identification code anonymous. In “Data ownership” we highlight the difference between the data controller and the database controller. …”
Get full text
Article -
4208
Legal Position Of A Deed Made By A Substitute Notary Who Does Not Meet The Requirements For Appointment
Published 2024-12-01“…The Substitute Notary is not authorized to make deeds, and the Substitute Notary is independently responsible for the deeds he/she makes, where the Substitute Notary can be sued in civil court for damages, if the parties demand damages.…”
Get full text
Article -
4209
Upgrading safety systems of industrial irradiation facilities
Published 2019-02-01“…The safety systems are designed in agreement with the codes and standards at the time. Since then, new standards, codes and recommendations, as well as lessons learned from accidents, have been issued by various international committees or regulatory bodies. …”
Get full text
Article -
4210
A Differentiable Binary Microlensing Model Using Adaptive Contour Integration Method
Published 2025-01-01“…The efficiency and accuracy of microlux have been verified across the relevant parameter space for binary microlensing. As a differentiable code, microlux makes it possible to apply gradient-based algorithms to the search and posterior estimation of the microlensing modeling. …”
Get full text
Article -
4211
Pynblint: A quality assurance tool to improve the quality of Python Jupyter notebooks
Published 2024-12-01“…Its interactive and self-documenting nature makes it particularly suitable for data-driven programming tasks. …”
Get full text
Article -
4212
Discrete element simulations of self-gravitating rubble pile collisions: the effects of non-uniform particle size and rotation
Published 2025-08-01“…We present a new implementation of a soft-sphere discrete element code to simulate the dynamics of self-gravitating granular materials. …”
Get full text
Article -
4213
Dissipation by transfer and its influence on fusion
Published 2024-01-01“…The study with the upgraded code indicates the transfer responsible for generating strongly excited targets as the leading cause of the smearing of the barrier distribution, even in the case of negative ground state to ground state Q value (Qgg). …”
Get full text
Article -
4214
-
4215
Resilience throughout COVID-19: Unmasking the realities of COVID-19 and vaccination facilitators, barriers, and attitudes among Black Canadians.
Published 2024-01-01“…First, regarding experiences with COVID-19, 36 codes were identified and mapped onto 13 themes. …”
Get full text
Article -
4216
A Low-Complexity Euclidean Orthogonal LDPC Architecture for Low Power Applications
Published 2015-01-01“…Low-density parity-check (LDPC) codes have been implemented in latest digital video broadcasting, broadband wireless access (WiMax), and fourth generation of wireless standards. …”
Get full text
Article -
4217
An Efficient Approach to Obtain Optimal Load Factors for Structural Design
Published 2014-01-01“…The load factors are calibrated so that the structural reliability index is as close as possible to a target reliability value. The optimization procedure is applied to find optimal load factors for designing of structures in accordance with the new version of the Mexico City Building Code (RCDF). …”
Get full text
Article -
4218
Shear Strength Reduction Factor of Prestressed Hollow-Core Slab Units Based on the Reliability Approach
Published 2017-01-01“…The reliability indexes were calculated for the shear strength equations of PHC slabs specified in several national design codes and those proposed in previous studies. In addition, the appropriate strength reduction factors for the shear strength equations to ensure the target reliability index were calculated. …”
Get full text
Article -
4219
Nek5000/RS performance on advanced GPU architectures
Published 2025-02-01“…The authors explore performance scalability of the open-source thermal-fluids code, NekRS, on the U.S. Department of Energy's leadership computers, Crusher, Frontier, Summit, Perlmutter, and Polaris. …”
Get full text
Article -
4220
A Multipath Routing Approach for Secure and Reliable Data Delivery in Wireless Sensor Networks
Published 2013-03-01“…The original data message is split into packets that are coded using Reed-Solomon (RS) codes and, to provide diverse levels of security, different number of fragments is encrypted related to the requested security level before being transmitted along independent node-disjoint paths. …”
Get full text
Article