-
661
Simulation of Shock-to-Detonation Transition by OpenFOAM
Published 2025-03-01“…This paper presents a simulation of SDT by a cost-effective hydrodynamic code developed on an open-source code framework, OpenFOAM. …”
Get full text
Article -
662
Bayesian Analysis of Complex Mutations in HBV, HCV, and HIV Studies
Published 2019-09-01Get full text
Article -
663
HEAT TRANSFER MODELLING OF TWO-PHASE FLOW IN ISOLATED CHANNEL
Published 2018-05-01“…This paper deals with Post-CHF (critical heat flux) heat transfer with the focus on different regimes of film boiling. …”
Get full text
Article -
664
CONTROL OF MICROCONTROLLER UNDER THE INFLUENCE OF ELECTROSTATIC DISCHARGE
Published 2019-06-01“…It was found that the code is damage when exposed to ESD voltage of less critical by 3.06%. …”
Get full text
Article -
665
Limits of Complementarity: Private Governance and Public Regulation of Labour Standards in Brazil’s Garment Supply Chain
Published 2025-05-01“… Under what conditions can private compliance and public regulation be complementary within global value chains, resulting in promotion of labor standards? This critical case study examines a retailer-led association that developed a code and social audit mechanism in apparel supply chains in Brazil - the world’s third largest apparel market and fourth largest apparel manufacturer - and its relationship with regulation by public authorities. …”
Get full text
Article -
666
Quantum correlations in a gravitational collapse simulation with SpheriCo.jl
Published 2025-05-01“…Abstract We report on work using a newly developed code, SpheriCo.jl, that computes the gravitational collapse of a spherical scalar field, where the scalar can be either a classical field, or a quantum field operator. …”
Get full text
Article -
667
Structured volume-law entanglement in an interacting, monitored Majorana spin liquid
Published 2024-12-01“…The sphere itself is a critical boundary with quantum Lifshitz scaling separating the volume-law phase from proximate area-law phases, a color code or a toric code. …”
Get full text
Article -
668
-
669
Analisis Dan Pengembangan Strategi Mitigasi Risiko Pada Proses Produksi Kayu Lapis (Plywood) (Studi Kasus: PT. SLJ Global Tbk)
Published 2023-03-01“…The critical risk results obtained are risks with code F6 which have an RPN value of 252, namely spare parts that are difficult to provide. …”
Get full text
Article -
670
Case Studies on Evacuation Elevator Systems in Supertall Buildings
Published 2024-10-01“…This paper examines the implementation of evacuation elevators in accordance with recent building code developments, such as the International Building Code (IBC), Chinese “General Code for Fire Protection of Buildings and Constructions” (GB 55037-2022), and the Korean Building Code (KBC). …”
Get full text
Article -
671
Machine learning-based prediction of shear strength in interior beam-column joints
Published 2025-05-01“…Abstract The beam-column joint is a critical structural element in reinforced concrete structures, especially under lateral loading conditions. …”
Get full text
Article -
672
Evaluation of the Education Plan and Activities of Swiss Sport Integrity. A report of a science-practice co-operation.
Published 2025-01-01“…World Anti-Doping Code 2021 (Art. 18 Education). Montreal: WADA. https://www.wada-ama.org Sanders, J. …”
Get full text
Article -
673
A Chain Extending from the Periphery to Dersaadet: Criminal Journals in the Ottoman Empire after 1846
Published 2021-10-01“…The first of these is the codification studies that started with the Penal Code of 1840 (followed by the 1851 and 1858 Penal Codes). …”
Get full text
Article -
674
Fatigue crack growth under remote and local compression – a state-of-the-art review
Published 2015-12-01“…The current paper provides a critical review of state-of-the-art in literature and a study of current code implications.…”
Get full text
Article -
675
FAKULTATYWNA MEDIACJA W PROCESIE O ROZWÓD WEDŁUG ZNOWELIZOWANEGO KODEKSU POSTĘPOWANIA CYWILNEGO
Published 2017-06-01“… Optional Mediation in the Divorce Proceedings as an Effect of the Amendments to the Code of Civil Proceedings Summary The article discusses the provisions amending the Code of Civil Proceedings with respect to the conciliatory proceedings with regard to a divorce. …”
Get full text
Article -
676
Gutek: Intelligent Revision Algorithms
Published 2025-01-01“…Specifically, Gutek exhibits up to 80% fewer lines of code compared to Anki and Mnemosyne and achieves the lowest number of critical issues reported in SonarQube analysis. …”
Get full text
Article -
677
A Formal Verification Methodology for DDD Mode Pacemaker Control Programs
Published 2015-01-01“…We present a formal verification methodology that can be used to check the correctness of object code programs that implement the safety-critical control functions of DDD mode pacemakers. …”
Get full text
Article -
678
Wnioskowy tryb ścigania w świetle nowelizacji Kodeksu postępowania karnego z dnia 7 lipca 2022 roku
Published 2025-01-01“…The purpose of the article is to analyze and then evaluate the changes made within the procedural aspects of the motion mode of prosecution, which were introduced by the Act of July 7, 2022 on amendments to the Act – Criminal Code and some other acts. They consisted in amending the content of Article 12 of the Criminal Code of Procedure by adding § 4. …”
Get full text
Article -
679
Backdoor detection in embedded system firmware without file system
Published 2013-08-01“…Any embedded system firmware without file system will integrate its system code and user application code into a single file.This setting has brought some additional difficulties to analyze them.Aimed at this kind of firmware,the problem of library function identification was analyzed,and several heuristic methods to recognize some important function relevant with manipulating network socket and character string / memory were proposed.Based on this analysis,the backdoor detection problem of some typical types including unauthorized listener,unintended function,hidden function,outward connection request etc.were discussed,and several backdoors (one is critical level) in a real world firmware were found.The result shows this method of identifying library function can be useful for security analysis to this type of firmware.…”
Get full text
Article -
680
Diffraction scattering of 6Li ions from atomic nuclei
Published 2007-06-01“…For selected design of sub-critical assembly the neutron fluxes inside the neutron production target, core and reflector have been calculated by means of the ORNL SCALE5 code, as well as using the Geant4- based RaT 3.0 code developed in NSC KIPT.…”
Get full text
Article