Suggested Topics within your search.
Suggested Topics within your search.
-
4341
Trace Copilot: Automatically Locating Cryptographic Operations in Side-Channel Traces by Firmware Binary Instrumenting
Published 2024-12-01“…For real-world attacks, the source code is typically unavailable, which poses a challenge for locating the COs thus reducing the effectiveness of many methods. …”
Get full text
Article -
4342
Enhanced Conditional Ground Motion Selection Model Considering Spectral Compatibility and Variability of Three Components for Multi-Directional Analysis
Published 2025-04-01“…The efficiency of the model has been demonstrated through numerical examples with various uniform hazard spectra, specifically those based on Eurocode-8 and the Turkish Building Earthquake Code, as well as scenario-based target spectra. The results demonstrate that through using the proposed model it is possible to obtain GM records with the desired spectral compatibility and spectral dispersion for both horizontal and vertical GM components. …”
Get full text
Article -
4343
Modeling Fragment Simulating Projectile Penetration into Steel Plates Using Finite Elements and Meshfree Particles
Published 2011-01-01“…These simulations were compared against experimental data, evaluating the damage caused to the projectile and the target plates, as well as comparing the residual velocity when the projectile perforated the target.…”
Get full text
Article -
4344
De maîtresse à domestique. La circonstance aggravante de « vol dans une auberge » au prisme du genre (1799-1815)
Published 2025-05-01“…While the law of 16 December 1799 provided for an aggravation of the punishment if the theft was committed by the 'master or mistress of the inn', the penal code of 1810 took up this circumstance, masculinising it by removing the term 'mistress'. …”
Get full text
Article -
4345
Explanation of the architectural and spatial pattern in the plans of the historical mosques of Hormozgan
Published 2024-05-01“…In the first stage, codes were categorized through content analysis and interviews. …”
Get full text
Article -
4346
Mortality of Post-COVID-19 Condition: 2025 Update
Published 2025-01-01“…Results: By December 2024, 2653 US deaths were classified under the ICD-10 code U09.9, corresponding to an age-adjusted mortality rate of 0.089 × 100,000. …”
Get full text
Article -
4347
Perceptions of primary healthcare providers for screening and management of mental health disorders in India: a qualitative study
Published 2024-10-01“…Semi-structured interview guides were developed for each category of primary healthcare provider, including Medical Officers, Community Health Officers, and General Nurse Midwives, Auxiliary Nurse Midwives and in-depth interviews were recorded, transcribed, and thematically analyzed using codes and sub-codes.ResultsResults are summarized under the themes: (i) Navigating Mental Healthcare in Primary Healthcare Facilities, (ii) Challenges and Barriers in Mental Healthcare Delivery, (iii) Recommendation for Enhancing Mental Healthcare Services, and (iv) Approaches for Comprehensive Capacity Building Training and Module and further findings of each theme are presented under various sub-themes.ConclusionThe findings suggest that despite a perceived competence in providing mental health services, there were substantial levels of negative attitudes towards mental health disorders among participants and provide insights for policymakers and healthcare professionals to develop targeted interventions and improve mental healthcare delivery at primary care facilities.…”
Get full text
Article -
4348
Analysis of the visibility and signal strength of the LoRaWAN network in an urbanized area – a case study of the Bielany campus at the Nicolaus Copernicus University in Toruń
Published 2021-12-01“…To collect data on the night sky brightness on a regular basis, a remote measuring device was designed and constructed using specialised electronic components, wireless communication, programming code, a high-sensitivity digital light data logger and custom-made programme code. …”
Get full text
Article -
4349
Needs Assessment and Reasons for Consuming Food Supplements for Body-Building and Weightlifting Athletes in Ardabil Province
Published 2021-03-01“…Then, using MAXQDA12 software, the data was coded and the code was used for the researcher-made questionnaire. …”
Get full text
Article -
4350
THE USE OF DIFFERENT METHODS OF TRANSFER PRICING: MATTERS OF CURRENT INTEREST
Published 2017-10-01“…The existing norms set in Section V.1 of the Tax Code (TC) of the Russian Federation meet the OECD recommendations on transfer pricing. …”
Get full text
Article -
4351
Historical spatio-temporal data on North American radical environmental direct-action eventsDataverse
Published 2025-06-01“…The article's event level data include information on event type, date and geolocation, and the target of each event, as well as the original textual reports of each coded event. …”
Get full text
Article -
4352
The (racial) implications of “special favors”
Published 2023-04-01“…These findings dovetail with recent work that illustrates an ideological sorting of such measures, while offering modest evidence that a prominent instrument used in symbolic racism scales is, in fact, race-coded to specific target groups.…”
Get full text
Article -
4353
Modeling of hydrogen isotope effect on divertor detachment in EAST
Published 2025-01-01“…As the drifts are taken into account, the relative difference of detachment onset at the outer target becomes larger, while it becomes smaller for the inner target. …”
Get full text
Article -
4354
-
4355
Game-based detection method of broken access control vulnerabilities in Web application
Published 2024-06-01“…To solve the problem that the access control strategy of the program in the industrial Internet was difficult to extract from the source code, and that the user’s access operation was difficult to trigger all access paths, which led to the difficulty of universal detection of logical vulnerabilities, game theory was applied to the access control logic vulnerability detection for the first time. …”
Get full text
Article -
4356
Atlas of Diabetes Register in Russian Federation, status 2018
Published 2019-11-01“…Since 2014, the register has been transformed into online system as a unified federal database with an authorized code access. Personal data protection is carried out in accordance with the laws and regulations of the Russian Federation.…”
Get full text
Article -
4357
Parole: Legal and penological analysis
Published 2016-01-01“…At the same time special Code on prevention of sexual victimization of juveniles - contrary to the Criminal Code- abolishes a possibility of earlier release of all offenders of sexual crimes against juveniles. …”
Get full text
Article -
4358
Predicting software reuse using machine learning techniques-A case study on open-source Java software systems.
Published 2025-01-01“…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …”
Get full text
Article -
4359
Comparative legal analysis of the expertise in court under the criminal law of Ukraine and CIS countries
Published 2021-12-01“…Proposals were submitted to the domestic Criminal Procedure Code to increase the efficiency of the expertise in court. …”
Get full text
Article -
4360
Adaptive delta modulation method for arbitrary adaptation coefficients in the sensor network of the mobile ECG monitoring
Published 2018-08-01“…The proposed ADM method makes it possible to select the adaptation coefficients taking into account the forms of the processed signal.…”
Get full text
Article