-
401
CRIMINAL LAW CONCEPTUALIZATION OF THE CATEGORY “OFFICIAL AUTHORITY” AS A NECESSARY PREREQUISITE FOR A UNIFORM DELINEATION OF THE CRIMES PROVIDED FOR BY ARTICLES 285 AND 286 OF THE...
Published 2025-06-01“…The relevance of the problems of this article is due to the need to improve law enforcement practice in the field of qualification of crimes under Articles 285 and 286 of the Criminal Code of the Russian Federation. A critical review of the Russian Federation Supreme Court Plenum explanations, sentences and scientific works allows to conclude that the main obstacle to a uniform delineation between abuse of official authorities and excess of official authorities is the lack of a theoretically mature construction of official authority in criminal law doctrine. …”
Get full text
Article -
402
Long non-coding RNA MALAT1 sponges miR-30c to promote the calcification of human vascular smooth muscle cells by regulating Runx2
Published 2023-12-01“…Objectives Recent evidence suggested that long non-coding RNAs (lncRNAs) and microRNAs (miRNAs) play critical roles in the pathogenesis of vascular calcification (VC). …”
Get full text
Article -
403
Rethinking the regulations and development patterns of villages connected to the city; approaches based on generic codes at macro level(Case study: Perjikola and Bala lamouk villag...
Published 2018-09-01“…The theoretical framework of the research is based on the application of Christopher Alexander's theory to gradually growth based on the concept of generative codes. The first part of the research analysis the results of the existing standards by critical-analysis approach. …”
Get full text
Article -
404
-
405
An Automated Tool for Streamlining Software Engineering: Information Extraction and Decision
Published 2025-08-01“…Also, it introduces a new automated tool called CodeLens which analyzes software code, extract lines of code (LOC), documentation quality, complexity, and other key criteria. …”
Get full text
Article -
406
Multistage Encryption for Text Using Steganography and Cryptography
Published 2023-03-01“…The ciphertext will process by Morse code and will then hide in a cover image using Least Significant Bits (LSB) technique. …”
Get full text
Article -
407
ApproximateSecret Sharing in Field of Real Numbers
Published 2025-07-01“…In the era of big data, the security of information encryption systems has garnered extensive attention, particularly in critical domains such as financial transactions and medical data management. …”
Get full text
Article -
408
-
409
ترقية التفكير الإبداعي والنقدي في مهارة الكلام العربي بوسيلة بودكاست في المدرسة
Published 2025-04-01“…Data were analyzed thematically, involving coding and identifying recurring themes. Triangulation of sources and methods was used to ensure credibility. …”
Get full text
Article -
410
Jointly Optimizing Resource Allocation, User Scheduling, and Grouping in SBMA Networks: A PSO Approach
Published 2025-06-01“…Blind Interference Alignment (BIA) and Sparse Code Multiple Access (SCMA) offer the potential for massive connectivity but face limitations. …”
Get full text
Article -
411
A Model-Driven Approach Employing DSL and Generation Templates to Accelerate the Development of Conversational Agents for Smart Tourism
Published 2025-01-01“…To address these limitations, this work tackles critical gaps in conversational agent development tools by constructing a graphical Domain-Specific Language (DSL) and code generation templates for accelerating the development of conversational agents tailored to smart tourism’s needs. …”
Get full text
Article -
412
ANALYZING FOUR IDENTITY STATUS ON SAIKAKU’S SHORT STORY “TWO OLD CHERRY TREES STILL IN BLOOM” TO ENHANCE CRITICAL READINGIN
Published 2021-06-01“…He brought the readers into critical reading to help them find the identity. To analyze the 4 identity status content in his short story, the coding analysis was used. …”
Get full text
Article -
413
The complete chloroplast genome of Cynometra cebuensis F. Seid. (Fabaceae), a critically endangered endemic plant from Cebu, Philippines
Published 2025-09-01“…Cynometra cebuensis F. Seid., a critically endangered species endemic to Cebu, Philippines, lacks published genomic data. …”
Get full text
Article -
414
-
415
The protection of employees in the early warning tools and preventive restructuring frameworks: the EU Directive 2019/1023 (“Insolvency Directive”) and the Italian Crisis and Insol...
Published 2025-07-01“…It also offers some critical reflections on the issue of information and consultation rights of workers’ representatives, which have not achieved significant progress under the Italian Code of Business Crisis and Insolvency.…”
Get full text
Article -
416
Long non-coding RNA CCAT2 promotes cell proliferation and invasion through regulating Wnt/β-catenin signaling pathway in clear cell renal cell carcinoma
Published 2017-07-01“…Clear cell renal cell carcinoma (ccRCC) is a common urologic malignancy. Long non-coding RNA colon cancer–associated transcript 2 (CCAT2) has been suggested as serving pivotal roles in tumorigenesis. …”
Get full text
Article -
417
-
418
-
419
Long non-coding RNA MIR22HG impedes the progression of anaplastic thyroid carcinoma via targeting miR-141-3p/PTEN/AKT axis
Published 2025-08-01“…The MiR-22 host gene (MIR22HG) has been identified as a novel long non-coding RNA (lncRNA) in a few types of cancer. Nevertheless, little is known about the potential role of MIR22HG in ATC. …”
Get full text
Article -
420
Intensive Care Unit Rotations and Predictors of Career Choice in Pulmonary/Critical Care Medicine: A Survey of Internal Medicine Residency Directors
Published 2018-01-01“…The United States (US) is experiencing a growing shortage of critical care medicine (CCM) trained physicians. Little is known about the exposures to CCM experienced by internal medicine (IM) residents or factors that may influence their decision to pursue a career in pulmonary/critical care medicine (PCCM). …”
Get full text
Article