Showing 661 - 680 results of 2,743 for search 'critical code', query time: 0.07s Refine Results
  1. 661

    Simulation of Shock-to-Detonation Transition by OpenFOAM by Thien Xuan Dinh, Masatake Yoshida, Shuichi Ishikura

    Published 2025-03-01
    “…This paper presents a simulation of SDT by a cost-effective hydrodynamic code developed on an open-source code framework, OpenFOAM. …”
    Get full text
    Article
  2. 662
  3. 663

    HEAT TRANSFER MODELLING OF TWO-PHASE FLOW IN ISOLATED CHANNEL by Daniel Vlček, Vojtěch Caha, Martin Ševeček

    Published 2018-05-01
    “…This paper deals with Post-CHF (critical heat flux) heat transfer with the focus on different regimes of film boiling. …”
    Get full text
    Article
  4. 664

    CONTROL OF MICROCONTROLLER UNDER THE INFLUENCE OF ELECTROSTATIC DISCHARGE by G. A. Piskun, V. F. Alexeev

    Published 2019-06-01
    “…It was found that the code is damage when exposed to ESD voltage of less critical by 3.06%. …”
    Get full text
    Article
  5. 665

    Limits of Complementarity: Private Governance and Public Regulation of Labour Standards in Brazil’s Garment Supply Chain by Katiuscia M Galhera, Scott Martin, João Paulo Veiga

    Published 2025-05-01
    “… Under what conditions can private compliance and public regulation be complementary within global value chains, resulting in promotion of labor standards? This critical case study examines a retailer-led association that developed a code and social audit mechanism in apparel supply chains in Brazil - the world’s third largest apparel market and fourth largest apparel manufacturer - and its relationship with regulation by public authorities. …”
    Get full text
    Article
  6. 666

    Quantum correlations in a gravitational collapse simulation with SpheriCo.jl by Benjamin Berczi, Magdalena Eriksson, Thanasis Giannakopoulos, Paul M. Saffin

    Published 2025-05-01
    “…Abstract We report on work using a newly developed code, SpheriCo.jl, that computes the gravitational collapse of a spherical scalar field, where the scalar can be either a classical field, or a quantum field operator. …”
    Get full text
    Article
  7. 667

    Structured volume-law entanglement in an interacting, monitored Majorana spin liquid by Guo-Yi Zhu, Nathanan Tantivasadakarn, Simon Trebst

    Published 2024-12-01
    “…The sphere itself is a critical boundary with quantum Lifshitz scaling separating the volume-law phase from proximate area-law phases, a color code or a toric code. …”
    Get full text
    Article
  8. 668
  9. 669

    Analisis Dan Pengembangan Strategi Mitigasi Risiko Pada Proses Produksi Kayu Lapis (Plywood) (Studi Kasus: PT. SLJ Global Tbk) by Andi Deny, Anggriani Profita, Suwardi Gunawan

    Published 2023-03-01
    “…The critical risk results obtained are risks with code F6 which have an RPN value of 252, namely spare parts that are difficult to provide. …”
    Get full text
    Article
  10. 670

    Case Studies on Evacuation Elevator Systems in Supertall Buildings by Shiyu Huan, AYoung Yun, Ervin Cui

    Published 2024-10-01
    “…This paper examines the implementation of evacuation elevators in accordance with recent building code developments, such as the International Building Code (IBC), Chinese “General Code for Fire Protection of Buildings and Constructions” (GB 55037-2022), and the Korean Building Code (KBC). …”
    Get full text
    Article
  11. 671

    Machine learning-based prediction of shear strength in interior beam-column joints by Iman Kattoof Harith, Wissam Nadir, Mustafa S. Salah, Ahmed Y. Mohammed, Mohammed L. Hussien

    Published 2025-05-01
    “…Abstract The beam-column joint is a critical structural element in reinforced concrete structures, especially under lateral loading conditions. …”
    Get full text
    Article
  12. 672

    Evaluation of the Education Plan and Activities of Swiss Sport Integrity. A report of a science-practice co-operation. by Christoffer Klenk, Jonas Personeni

    Published 2025-01-01
    “…World Anti-Doping Code 2021 (Art. 18 Education). Montreal: WADA. https://www.wada-ama.org Sanders, J. …”
    Get full text
    Article
  13. 673

    A Chain Extending from the Periphery to Dersaadet: Criminal Journals in the Ottoman Empire after 1846 by Kübra Nugay

    Published 2021-10-01
    “…The first of these is the codification studies that started with the Penal Code of 1840 (followed by the 1851 and 1858 Penal Codes). …”
    Get full text
    Article
  14. 674

    Fatigue crack growth under remote and local compression – a state-of-the-art review by A. Chahardehi, A. Mehmanparast

    Published 2015-12-01
    “…The current paper provides a critical review of state-of-the-art in literature and a study of current code implications.…”
    Get full text
    Article
  15. 675

    FAKULTATYWNA MEDIACJA W PROCESIE O ROZWÓD WEDŁUG ZNOWELIZOWANEGO KODEKSU POSTĘPOWANIA CYWILNEGO by Wanda Stojanowska

    Published 2017-06-01
    “… Optional Mediation in the Divorce Proceedings as an Effect of the Amendments to the Code of Civil Proceedings Summary The article discusses the provisions amending the Code of Civil Proceedings with respect to the conciliatory proceedings with regard to a divorce. …”
    Get full text
    Article
  16. 676

    Gutek: Intelligent Revision Algorithms by Lukasz Galka

    Published 2025-01-01
    “…Specifically, Gutek exhibits up to 80% fewer lines of code compared to Anki and Mnemosyne and achieves the lowest number of critical issues reported in SonarQube analysis. …”
    Get full text
    Article
  17. 677

    A Formal Verification Methodology for DDD Mode Pacemaker Control Programs by Sana Shuja, Sudarshan K. Srinivasan, Shaista Jabeen, Dharmakeerthi Nawarathna

    Published 2015-01-01
    “…We present a formal verification methodology that can be used to check the correctness of object code programs that implement the safety-critical control functions of DDD mode pacemakers. …”
    Get full text
    Article
  18. 678

    Wnioskowy tryb ścigania w świetle nowelizacji Kodeksu postępowania karnego z dnia 7 lipca 2022 roku by Justyna Karaźniewicz

    Published 2025-01-01
    “…The purpose of the article is to analyze and then evaluate the changes made within the procedural aspects of the motion mode of prosecution, which were introduced by the Act of July 7, 2022 on amendments to the Act – Criminal Code and some other acts. They consisted in amending the content of Article 12 of the Criminal Code of Procedure by adding § 4. …”
    Get full text
    Article
  19. 679

    Backdoor detection in embedded system firmware without file system by Chao-jian HU, Yi-bo XUE, Liang ZHAO, Zhou-jun LI

    Published 2013-08-01
    “…Any embedded system firmware without file system will integrate its system code and user application code into a single file.This setting has brought some additional difficulties to analyze them.Aimed at this kind of firmware,the problem of library function identification was analyzed,and several heuristic methods to recognize some important function relevant with manipulating network socket and character string / memory were proposed.Based on this analysis,the backdoor detection problem of some typical types including unauthorized listener,unintended function,hidden function,outward connection request etc.were discussed,and several backdoors (one is critical level) in a real world firmware were found.The result shows this method of identifying library function can be useful for security analysis to this type of firmware.…”
    Get full text
    Article
  20. 680

    Diffraction scattering of 6Li ions from atomic nuclei by V. V. Gann, I. S. Guk, A. N. Dovbnya, S. V. Dyuldya, S. G. Kononenko, F. A. Peev, A. S.Tarasenko, M. van der Wiel, J. I. M. Botman, M. I. Bratchenko

    Published 2007-06-01
    “…For selected design of sub-critical assembly the neutron fluxes inside the neutron production target, core and reflector have been calculated by means of the ORNL SCALE5 code, as well as using the Geant4- based RaT 3.0 code developed in NSC KIPT.…”
    Get full text
    Article