Suggested Topics within your search.
Suggested Topics within your search.
-
4841
UPAYA PAKSA (DWANG MIDDELEN) DALAM DUGAAN TERJADINYA TINDAK PIDANA BAGI PENYIDIK
Published 2022-11-01“…The supreme court didn’t make the gradation on the evidence law in the process of the law enforcement on the first stage/pre-trial (investigation and introgation) and the second stage/trial (prosecution and verdict). …”
Get full text
Article -
4842
A Cumulant-Based Method for Acquiring GNSS Signals
Published 2024-09-01“…The study concludes that while the method may increase computational load, its performance in challenging conditions makes it a promising approach for future GNSS receiver designs.…”
Get full text
Article -
4843
Optimized Error Detection and Correction in ATM Networks Using the Enhanced Berlekamp Massey Algorithm With Hybrid Automatic Repeat Request
Published 2025-01-01“…Not only the proposed algorithm cuts decoding complexity and processing time but also it makes it suitable for real time and modern communication networks like ATM. …”
Get full text
Article -
4844
Comparison among single-phase test, automated screening method and GC/MS for the traceability of ketamine in urine
Published 2016-12-01“…CONCLUSION Following the law indications, ketamine is not searched: this limit does not make the authorities able to apply the penalties expected for road laws violations. …”
Get full text
Article -
4845
Ideological Field Model in the Ossetian Political Narrative
Published 2025-12-01“…Variable models of political ergonyms and language codes that make them explicit are described. Among party onyms, synonymous elements of their verbal representations have been identified in Russian, in Ossetian or both. …”
Get full text
Article -
4846
Influence of Across-Wind on Rectangular Tall Buildings
Published 2024-12-01“…From this study, it is evident that, through advanced techniques such as computational fluid dynamics (CFD) simulations, designers can gain insights into pressure distributions and make informed decisions to optimize the performance of buildings against wind loads.…”
Get full text
Article -
4847
Joint Data Hiding and Partial Encryption of Compressive Sensed Streams
Published 2025-06-01“…A particularity of the presented method is on-the-fly insertion, which makes it appropriate for the sequential acquisition of measurements with a single-pixel camera. …”
Get full text
Article -
4848
Pycnogonida collection of the Shirshov Institute of Oceanology, Russian Academy of Sciences
Published 2025-04-01“…This dataset comprises detailed information on 2,134 Pycnogonida specimens stored in the Ocean Benthic Fauna collection (collection code: OBFc) of the Shirshov Institute of Oceanology (IORAS). …”
Get full text
Article -
4849
Ecolinguistics: A paradigm shift
Published 2025-04-01“…Confined to the methodologically erroneous and theoretically untenable framework based on the code model of language and communication, linguistics of the mainstream persists in viewing language as a cultural tool in the service of the mind rather than a biologically and ecologically functional feature of humans as a species. …”
Get full text
Article -
4850
The Blending ToolKit: A simulation framework for evaluation of galaxy detection and deblending
Published 2025-02-01“…BTK includes a suite of tutorials and comprehensive documentation. The source code is publicly available on GitHub at https://github.com/LSSTDESC/BlendingToolKit.…”
Get full text
Article -
4851
Revolutionizing Concrete Bridge Assessment: Implementing Nondestructive Scanning for Transformative Evaluation
Published 2024-12-01“…Implementing this algorithm into a computer code has paved the way for comprehensive automation of GPR data analyses. …”
Get full text
Article -
4852
INFLUENCE OF COMPUTER ASSISTED INSTRUCTION ON PRIMARY EDUCATION IN NIGERIA
Published 2022-05-01“…The data collected were collated, coded and analyzed, using descriptive statistics and mean rating because of their appropriateness to the study. …”
Get full text
Article -
4853
Terms and Procedures of Insurance Payments are in Need of Rectification
Published 2019-01-01“…Among the causes that give rise to them, an important place is occupied by separate provisions of the Tax Code of the Russian Federation, which allow an ambiguous interpretation of their content by each of these parties. …”
Get full text
Article -
4854
The factors that attract healthcare professionals to and retain them in rural areas in South Africa
Published 2015-02-01“…Fourteen participants were purposively selected for the study. Data were coded and the themes extracted and critically analysed by two researchers. …”
Get full text
Article -
4855
Avec la série The Expanse, penser l’expérience du corps face aux images
Published 2023-12-01“…By taking into account the particular space of the series, we show that the relationship to the body is effectively modified - and in this way, the sensitive, affective and biological performances of the body itself - to the extent of the belief in the image that makes the filmic experience a form of magical ritual, a pivotal moment between social codes and instructions and the restitution of the biological body.…”
Get full text
Article -
4856
Optimization Algorithm of Neural Network Structure Based on Adaptive Genetic Algorithm
Published 2021-02-01“…The structural design of neural network is one of the hot issues in neural network research The number of hidden layers and nodes has a great influence on the convergence speed and generalization ability of neural network Genetic algorithm is an adaptive optimization probability search algorithm formed by simulating biological heredity and evolution Its core idea is derived from the natural law of biological genetics and survival of the fittest, and it is a search algorithm with the iterative process of “survival + detection” However, the selection of genetic algorithm parameters is subjective, slow convergence and easy to fall into premature convergence To solve these problems, an adaptive genetic algorithm is proposed to find the optimal neural network structure The adaptive genetic algorithm selects the first n optimal individuals and adds a certain amount of random individuals in the optimization process of each iteration to update the population, and selfadaptive optimization of the search step size of the population can ensure the diversity of the population and improve the convergence rate at the same time Then we code and the structure of neural network processing, adaptive genetic algorithm, neural network structure optimization, so as to make the neural network as soon as possible to find the optimal network structure and parameters, in order to improve the accuracy of neural network. …”
Get full text
Article -
4857
Study of the pine wilt disease occurrence and its range expansion pattern based on GIS
Published 2006-09-01“…Through exploring the spatially referenced pine wilt disease (PWD) occurrence data and mining the centroid of its infested forest stand, distance matrix of the geo-coded PWD infested rate was derived, and the spatial statistic autocorrelation index Moran's Ⅰ was used in exploring PWD spatial expansion mechanism. …”
Get full text
Article -
4858
Design Improvement of a Semi-submersible Floating Offshore Wind Turbines through Frequency-domain Load Analyses
Published 2025-04-01“…The results are expected to make a significant contribution to improving the motion performance of FOWTs.…”
Get full text
Article -
4859
Universal patching method for side-channel vulnerabilities based on atomic obfuscation
Published 2022-04-01“…Executing code containing side-channel vulnerabilities exhibits different non-functional behaviors related to inputs.Attackers can obtain these behaviors by leveraging micro architecture side-channel attacks and then analyze the pattern between the behaviors and the inputs to access sensitive data.Vulnerability repairing at the software layer brings low overheads to a program’s execution.Besides, it does not require modifying hardware or system, which enables fast patching and widespread deployment.It becomes the mainstream strategy applied to the current cryptographic implementations.However, existing solutions are deeply bound to the program’s implementation and requires manual intervention.This brings challenge to implement and is not versatile enough.A general patching method was proposed for side-channel vulnerabilities that combined dynamic obfuscated execution with hardware atomic transaction.To hide the real accesses of the side-channel vulnerabilities of a program, the proposed method inserted dynamic confusing accesses into the vulnerabilities.To avoid an attacker using fine-grained side-channel attack to distinguish the real access and the confusing access, both of them were encapsulated as transactions and they were guaranteed to be uninterrupted during the running period.In addition, a prototype system called SC-Patcher was implemented based on the LLVM compiler.Various optimization strategies were supported, including secure springboard and transaction aggregation, to further improve system security and performance.Experimental results show that the proposed method makes it impossible for an attacker to restore accurate sensitive data through side-channel attack, and it also brings almost no additional performance overhead to the program.…”
Get full text
Article -
4860
The Issue of Nullifying a Judgment in Criminal Procedural Law
Published 2023-12-01“…Lastly, study will examine judgments indicative of a nullification in Turkish criminal procedural law and discuss whether the practice of distinctly subjecting a judgment to nullification is accurate or not without regard to the general legal remedial system ensured in Turkish Criminal Procedural Code.…”
Get full text
Article